Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged satellites

Rss Feed Group items tagged

Paul Merrell

Syria ready to unleash missiles on Israel | The Sunday Times - 0 views

  • SYRIA has put its most advanced missiles on standby with orders to hit Tel Aviv if Israel launches another raid on its territory. Reconnaissance satellites have been monitoring preparations by the Syrian army to deploy surface-to-surface Tishreen missiles. An Israeli official told The New York Times that Israel, which has launched three recent attacks on Syria, was considering further strikes and warned President Bashar al-Assad that his government would face “crippling consequences” if he hit back at Israel.
  • All parties fear hostilities spreading beyond Syria’s borders. Faisal al-Miqdad, Syria’s deputy foreign minister, said last week that the Israeli airstrikes represented “a declaration of war”.
  • Some Israeli defence experts believe that if Israel strikes again, Assad will have little choice but to retaliate. “The Tishreen missiles are extremely accurate and can cause serious harm,” said Uzi Rubin, Israel’s leading missile expert. He said Syria had large stocks of Tishreens. Referring to Israel’s main international airport, he said: “Even if they don’t hit Ben-Gurion directly, they would halt all commercial flights out of the country.”
Paul Merrell

The Daily Star - Online Edition - 0 views

  • Sheikh Hassan Nasrallah, chief of the Shiite Hezbollah group in Lebanon, appeared unwavering in his support for the regime of Syrian President Bashar Assad. He signaled for the first time the Iranian-backed militant group will stay involved in the civil war after helping Assad's army recapture the key town of Qusair in central Homs province from rebels. "We will be where we should be. We will continue to bear the responsibility we took upon ourselves," Nasrallah said in a speech via satellite to supporters in south Beirut. "There is no need to elaborate. ... We leave the details to the requirements of the battlefield."
  • Hezbollah has come under harsh criticism at home and abroad for sending its fighters to Qusair, and Nasrallah's gamble in Syria primarily stems from his group's vested interest in the regime's survival. The Syrian government has been one of Hezbollah's strongest backers for decades, and the militant group fears that if Assad's regime falls, it will be replaced by a U.S.-backed government that is hostile to Hezbollah.
  • Assad's forces, aided by the Hezbollah fighters, captured Qusair on June 5, dealing a heavy blow to rebels who had been entrenched in the strategic town for more than a year. Since then, the regime has shifted its attention to recapture other areas in the central province of Homs and the city of Aleppo in the north. Nasrallah did not say outright whether his group would go as far north as Aleppo, but he strongly suggested the group was prepared to fight until the end. "After Qusair for us will be the same as before Qusair," he said.
  •  
    There go the predictions that Hezbollah would confine itself to protecting a buffer zone along the Syria-Lebanon border.  
Paul Merrell

McCain and the POW Cover-Up | The American Conservative - 0 views

  • Eighteen months ago, TAC publisher Ron Unz discovered an astonishing account of the role the 2008 Republican presidential nominee, John McCain, had played in suppressing information about what happened to American soldiers missing in action in Vietnam. Below, we present in full Sydney Schanberg’s explosive story. * * * John McCain, who has risen to political prominence on his image as a Vietnam POW war hero, has, inexplicably, worked very hard to hide from the public stunning information about American prisoners in Vietnam who, unlike him, didn’t return home. Throughout his Senate career, McCain has quietly sponsored and pushed into federal law a set of prohibitions that keep the most revealing information about these men buried as classified documents. Thus the war hero who people would logically imagine as a determined crusader for the interests of POWs and their families became instead the strange champion of hiding the evidence and closing the books.
  • Almost as striking is the manner in which the mainstream press has shied from reporting the POW story and McCain’s role in it, even as the Republican Party has made McCain’s military service the focus of his presidential campaign. Reporters who had covered the Vietnam War turned their heads and walked in other directions. McCain doesn’t talk about the missing men, and the press never asks him about them. The sum of the secrets McCain has sought to hide is not small. There exists a telling mass of official documents, radio intercepts, witness depositions, satellite photos of rescue symbols that pilots were trained to use, electronic messages from the ground containing the individual code numbers given to airmen, a rescue mission by a special forces unit that was aborted twice by Washington—and even sworn testimony by two Defense secretaries that “men were left behind.” This imposing body of evidence suggests that a large number—the documents indicate probably hundreds—of the U.S. prisoners held by Vietnam were not returned when the peace treaty was signed in January 1973 and Hanoi released 591 men, among them Navy combat pilot John S. McCain.
  •  
    Perhaps no other moral principle is so deeply burned into the psyche of the American soldier than "leave no one behind." It is a permutation of the Golden Rule that allows of no cost-benefit analysis. Commonly, hundreds of lives have been lost to save only a few. That we left behind hundreds of members of the U.S. military as prisoners of war in Viet Nam is morally reprensible. That John McCain, himself a former POW,  played and still plays a key role in the cover-up conspiracy is well beyond morally reprehensible.   
Paul Merrell

Report: France data gathering program compared to PRISM - 0 views

  • PARIS (AP) — A leading French newspaper says France's intelligence services have put in place a giant electronic surveillance gathering network.Citing no sources, the Le Monde daily says France's Direction Generale de la Securite Exterieure, the country's foreign intelligence agency, systematically collects information about all electronic data sent by computers and telephones in France, as well as communications between France and abroad.
  • According to Le Monde, data on "all e-mails, SMSs, telephone calls, Facebook and Twitter posts" are collected and stored in a massive three-floor underground bunker at the DGSE's headquarters in Paris. The paper specified that it is the communications' metadata — such as when was call was made and where an author was when she sent an email — that is being archived, not their content.Officials at the DGSE did not answer phone calls or emails seeking comment Thursday.The vast archive, which Le Monde says amounts to tens of millions of gigabytes, is accessible to France's other spy agencies, including military intelligence, domestic intelligence, Paris police and a special financial crimes task force.
  • Le Monde compared the French digital dragnet to PRISM, the U.S. National Security Agency program which has most caught the imagination of Internet users. But PRISM appears aimed at allowing U.S. spies to peel data off the servers of Silicon Valley firms — whereas the program described in Le Monde appears to be fed through the mass interception of electronic data bouncing across the world.Also, PRISM can apparently be used to collect content, not just metadata.Le Monde said the French surveillance program relies on spy satellites, listening stations in French overseas territories or former colonies such as Mayotte or Djibouti, and information harvested from undersea cables — all three of which are methods long familiar to the NSA.A French lawmaker played down the report, saying France's surveillance gathering system is not comparable with the NSA's.Patricia Adam, a lawmaker who until last year headed parliament's intelligence committee, said French spies "are line fishing, not trawling" the vast oceans of data thrown up by mobile phones, emails and Internet communication.
Paul Merrell

MI5 feared GCHQ went 'too far' over phone and internet monitoring | UK news | The Observer - 0 views

  • Senior figures inside British intelligence have been alarmed by GCHQ's secret decision to tap into transatlantic cables in order to engage in the bulk interception of phone calls and internet traffic.According to one source who has been directly involved in GCHQ operations, concerns were expressed when the project was being discussed internally in 2008: "We felt we were starting to overstep the mark with some of it. People from MI5 were complaining that they were going too far from a civil liberties perspective … We all had reservations about it, because we all thought: 'If this was used against us, we wouldn't stand a chance'."The Guardian revealed on Friday that GCHQ has placed more than 200 probes on transatlantic cables and is processing 600m "telephone events" a day as well as up to 39m gigabytes of internet traffic. Using a programme codenamed Tempora, it can store and analyse voice recordings, the content of emails, entries on Facebook, the use of websites as well as the "metadata" which records who has contacted who. The programme is shared with GCHQ's American partner, the National Security Agency.
  • Interviews with the UK source and the NSA whistleblower Edward Snowden raise questions about whether the programme:■ Exploits existing law which was passed by parliament without any anticipation that it would be used for this purpose.■ For the first time allows GCHQ to process bulk internal UK traffic which is routed overseas via these cables.■ Allows the NSA to engage in bulk intercepts of internal US traffic which would be forbidden in its own territory.■ Functions with no effective oversight.
  • The source claimed that even the conventional warrant system has been distorted – whereas police used to ask for a warrant before intercepting a target's communications, they will now ask GCHQ to intercept the target's communications and then use that information to seek a warrant.There is a particular concern that the programme allows GCHQ to break the boundary which stopped it engaging in the bulk interception of internal UK communications. The Ripa requirement that one end of a communication must be outside the UK was a significant restriction when it was applied to phone calls using satellites, but it is no longer effective in the world of fibre-optic cables. "The point is that this is an island," the source said. "Everything comes and goes – nearly everything – down fibre-optic cables. You make a mobile phone call, it goes to a mast and then down into a fibre-optic cable, under the ground and away. And even if the call is UK to UK, it's very likely – because of the way the system is structured – to go out of the UK and come back in through these fibre-optic channels."
  • ...4 more annotations...
  • Internet traffic is also liable to be routed internationally even if the message is exchanged between two people within the UK. "At one point, I was told that we were getting 85% of all UK domestic traffic – voice, internet, all of it – via these international cables."
  • There are similar concerns about the role of the NSA. It could have chosen to attach probes to the North American end of the cables and documents shown to the Guardian by Edward Snowden suggest that key elements of the Tempora filtering process were designed by the NSA. Instead, the NSA agency has exported its computer programs and 250 of its analysts to operate the system from the UK.Initial inquiries by the Guardian have failed to explain why this has happened, but US legislators are likely to want to check whether the NSA has sought to bypass legal or policy requirements which restrict its activity in the US. This will be particularly sensitive if it is confirmed that Tempora is also analysing internal US traffic.The UK source challenges the official justification for the programme; that it is necessary for the fight against terrorism and serious crime: "This is not scoring very high against those targets, because they are wise to the monitoring of their communications. If the terrorists are wise to it, why are we increasing the capability?
  • Defenders insist that the mass of data is heavily filtered by the programme so that only that relating to legitimate targets is analysed.However, there are doubts about the effectiveness of this. First, according to the UK source, "written definitions for targeting and filtering are very elastic. They are wide open to interpretation." The target areas defined by the Ripa certificates are secret.Second, there is further room for interpretation when human analysts become involved in using the filtered intelligence to produce what are known as "contact chains". "Here is target A. But who is A talking to? Now we're into B and C and D." If analysts believe it is proportional, they can look at all the traffic – content and metadata – relating to all of the target's contact." GCHQ audits a sample of its analysts' work – believed to be 5% every six months – but even the statistical results of these audits are also secret.
  • Beyond the detail of the operation of the programme, there is a larger, long-term anxiety, clearly expressed by the UK source: "If there was the wrong political change, it could be very dangerous. All you need is to have the wrong government in place. It is capable of abuse because there is no independent scrutiny."
Paul Merrell

America, the Election, and the Dismal Tide « LobeLog - 0 views

  • I thought about that March night as the election results rolled in, as the New York Times forecast showed Hillary Clinton’s chances of winning the presidency plummet from about 80% to less than 5%, while Trump’s fortunes skyrocketed by the minute. As Clinton’s future in the Oval Office evaporated, leaving only a whiff of her stale dreams, I saw all the foreign-policy certainties, all the hawkish policies and military interventions, all the would-be bin Laden raids and drone strikes she’d preside over as commander-in-chief similarly vanish into the ether. With her failed candidacy went the no-fly escalation in Syria that she was sure to pursue as president with the vigor she had applied to the disastrous Libyan intervention of 2011 while secretary of state.  So, too, went her continued pursuit of the now-nameless war on terror, the attendant “gray-zone” conflicts — marked by small contingents of U.S. troops, drone strikes, and bombing campaigns — and all those munitions she would ship to Saudi Arabia for its war in Yemen. As the life drained from Clinton’s candidacy, I saw her rabid pursuit of a new Cold War start to wither and Russo-phobic comparisons of Putin’s rickety Russian petro-state to Stalin’s Soviet Union begin to die.  I saw the end, too, of her Iron Curtain-clouded vision of NATO, of her blind faith in an alliance more in line with 1957 than 2017. As Clinton’s political fortunes collapsed, so did her Israel-Palestine policy — rooted in the fiction that American and Israeli security interests overlap — and her commitment to what was clearly an unworkable “peace process.”  Just as, for domestic considerations, she would blindly support that Middle Eastern nuclear power, so was she likely to follow President Obama’s trillion-dollarpath to modernizing America’s nuclear arsenal.  All that, along with her sure-to-be-gargantuan military budget requests, were scattered to the winds by her ringing defeat.
  • Clinton’s foreign policy future had been a certainty.  Trump’s was another story entirely.  He had, for instance, called for a raft of military spending: growing the Army and Marines to a ridiculous size, building a Navy to reach a seemingly arbitrary and budget-busting number of ships, creating a mammoth air armada of fighter jets, pouring money into a missile defense boondoggle, and recruiting a legion of (presumably overweight) hackers to wage cyber war.  All of it to be paid for by cutting unnamed waste, ending unspecified “federal programs,” or somehow conjuring up dollars from hither and yon.  But was any of it serious?  Was any of it true?  Would President Trump actually make good on the promises of candidate Trump?  Or would he simply bark “Wrong!” when somebody accused him of pledging to field an army of 540,000 active duty soldiers or build a Navy of 350 ships. Would Trump actually attempt to implement his plan to defeat ISIS — that is, “bomb the shit out of them” and then “take the oil” of Iraq?  Or was that just the bellicose bluster of the campaign trail?  Would he be the reckless hawk Clinton promised to be, waging wars like the Libyan intervention?  Or would he follow the dictum of candidate Trump who said, “The current strategy of toppling regimes, with no plan for what to do the day after, only produces power vacuums that are filled by terrorists.” Outgoing representative Randy Forbes of Virginia, a contender to be secretary of the Navy in the new administration, recently said that the president elect would employ “an international defense strategy that is driven by the Pentagon and not by the political National Security Council… Because if you look around the globe, over the last eight years, the National Security Council has been writing that. And find one country anywhere that we are better off than we were eight years [ago], you cannot find it.”
  • Such a plan might actually blunt armed adventurism, since it was war-weary military officials who reportedly pushed back against President Obama’s plans to escalate Iraq War 3.0.  According to some Pentagon-watchers, a potentially hostile bureaucracy might also put the brakes on even fielding a national security team in a timely fashion. While Wall Street investors seemed convinced that the president elect would be good for defense industry giants like Lockheed Martin and General Dynamics, whose stocks surged in the wake of Trump’s win, it’s unclear whether that indicates a belief in more armed conflicts or simply more bloated military spending. Under President Obama, the U.S. has waged war in or carried out attacks on at least eight nations — Afghanistan, Iran, Iraq, Pakistan, Somalia, Yemen, Libya, and Syria.  A Clinton presidency promised more, perhaps markedly more, of the same — an attitude summed up in her infamous comment about the late Libyan autocrat Muammar Gaddafi: “We came, we saw, he died.”  Trump advisor Senator Jeff Sessions said, “Trump does not believe in war. He sees war as bad, destructive, death and a wealth destruction.”  Of course, Trump himself said he favors committing war crimes like torture and murder.  He’s also suggested that he would risk war over the sort of naval provocations — like Iranian ships sailing close to U.S. vessels — that are currently met with nothing graver than warning shots. So there’s good reason to assume Trump will be a Clintonesque hawk or even worse, but some reason to believe — due to his propensity for lies, bluster, and backing down — that he could also turn out to be less bellicose.
  • ...3 more annotations...
  • Given his penchant for running businesses into the ground and for economic proposals expected to rack up trillions of dollars in debt, it’s possible that, in the end, Trump will inadvertently cripple the U.S. military.  And given that the government is, in many ways, a national security state bonded with a mass of money and orbited by satellite departments and agencies of far lesser import, Trump could even kneecap the entire government.  If so, what could be catastrophic for Americans — a battered, bankrupt United States — might, ironically, bode well for the wider world.
  • At the time, I told my questioner just what I thought a Hillary Clinton presidency might mean for America and the world: more saber-rattling, more drone strikes, more military interventions, among other things.  Our just-ended election aborted those would-be wars, though Clinton’s legacy can still be seen, among other places, in the rubble of Iraq, the battered remains of Libya, and the faces of South Sudan’s child soldiers.  Donald Trump has the opportunity to forge a new path, one that could be marked by bombast instead of bombs.  If ever there was a politician with the ability to simply declare victory and go home — regardless of the facts on the ground — it’s him.  Why go to war when you can simply say that you did, big league, and you won? The odds, of course, are against this.  The United States has been embroiled in foreign military actions, almost continuously, since its birth and in 64 conflicts, large and small, according to the military, in the last century alone.  It’s a country that, since 9/11, has been remarkably content to wage winless, endless wars with little debate or popular outcry.  It’s a country in which Barack Obama won election, in large measure, due to dissatisfaction with the prior commander-in-chief’s signature war and then, after winning a Nobel Peace Prize and overseeing the withdrawal of troops from Iraq, reengaged in an updated version of that very same war — bequeathing it now to Donald J. Trump. “This Trump.  He’s a crazy man!” the African aid worker insisted to me that March night.  “He says some things and you wonder: Are you going to be president?  Really?”  It turns out the answer is yes. “It can’t happen, can it?” That question still echoes in my mind.
  • I know all the things that now can’t happen, Clinton’s wars among them. The Trump era looms ahead like a dark mystery, cold and hard.  We may well be witnessing the rebirth of a bitter nation, the fruit of a land poisoned at its root by evils too fundamental to overcome; a country exceptional for its squandered gifts and forsaken providence, its shattered promises and moral squalor. “It can’t happen, can it?” Indeed, my friend, it just did.
Paul Merrell

Visualizing the U.S.-Mexico Border - 0 views

  • What does the southern border of the United States look like? For all the talk of “securing the border” and “building a wall,” there is surprisingly little visual material that conveys just how vast this stretch of space is. In total, the U.S.-Mexico border spans 1,954 miles. According to Google Maps, it would take 34 hours to drive its entire length. In places, there already is a border fence — more than 650 miles of it. Pushed and pulled by various forces, some 1 million people are estimated to pass through the official ports of entry every day. But what does the geography of this landscape look like? Is it industrial? Desolate? Populated? All of the above? Using the geographic coordinates of the international boundary line, in addition to location data for the existing border fence (which has been mapped by journalists at NPR and the Center for Investigative Reporting), I wrote a small computer script to download satellite imagery for the entire border. I ended up with about 200,000 images.
  • Using a command-line tool called ffmpeg, I programmatically stitched the images together, and then worked with Laura Poitras and her team at Field of Vision to edit them into a short film. Jace Clayton, the artist and author known as DJ /rupture, developed an original score for the piece.
  •  
    Great video demonstrating just how preposterous Trump's southern border wall proposal is. Even if it could be done, what a waste. With our nation's bridges crumbling, we should want to build a wall? Why not fix the bridges instead and keep commerce moving. Not to mention the rest of our nation's infrastructure.
Paul Merrell

Syrian moderate rebel "spymaster" slams CIA for 'ignoring' detailed intel on Isil since... - 0 views

  • The "spymaster" of a key moderate Syrian rebel group has accused the CIA of failing to act on reams of detailed intelligence his network has been supplying the US on Isil since 2013 - including GPS coordinates of its leaders and headquarters. The Free Syrian Army’s spy chief insisted proper use of the intelligence his agents provided from within Isil’s ranks, and often at grave risk to their life, could have critically damaged the jihadist group on several occasions. Speaking to Le Monde in Turkey, “M”, as the French newspaper dubbed the man for security reasons, said: “From the moment Daesh (the Arab acronym for Isil) had 20 members to when it had 20,000, we have shown everything to the Americans. When we asked them what they did with this information, they always gave evasive answers, saying it was up to their decision-makers”. The Free Syrian Army, or FSA, was founded by a group of defected Syrian Armed Forces officers and soldiers in July 2011, and received backing from Britain and the US for its moderate line.
  • In the summer of 2014, while Isil besieged Mossul in Iraq, “M” helped devise a secret plan presented to the Americans to rout Isil from northern Syria on the Azaz-Alep line. The plan was detailed street by street, hour by hour, and included the precise itinerary of fighters and their refuelling points. “In every village held by Daesh, knew the number of armed men, where their offices and hideouts were. We had located snipers and mines, we knew where the local emir slept, the colour of his car and even the brand. From a tactical and strategic point of view, we were ready,” he said. However, the Americans failed to give the green light, he said. “They were reluctant to provide us satellite images. They said their planes couldn’t help once the fighting with Isil started. All they offered us was to get rid of a few obstacles before the start of the offensive,” he said. He then provided the US with details of the Isil command structure in Raqqa, from the emir to those in charge of checkpoints and pages of GPS coordinates. “That was a year and a half ago and Raqqa is still the capital of Daesh,” he said.
  •  
    Why, it's almost as though the U.S. government doesn't want to really hurt ISIL. 
Paul Merrell

Government Assessment of the Syrian Government's Use of Chemical Weapons on August 21, ... - 0 views

  • The United States Government assesses with high confidence that the Syrian government carried out a chemical weapons attack in the Damascus suburbs on August 21, 2013. We further assess that the regime used a nerve agent in the attack. These all-source assessments are based on human, signals, and geospatial intelligence as well as a significant body of open source reporting.Our classified assessments have been shared with the U.S. Congress and key international partners. To protect sources and methods, we cannot publicly release all available intelligence – but what follows is an unclassified summary of the U.S. Intelligence Community’s analysis of what took place.
  • We assess with high confidence that the Syrian government carried out the chemical weapons attack against opposition elements in the Damascus suburbs on August 21. We assess that the scenario in which the opposition executed the attack on August 21 is highly unlikely. The body of information used to make this assessment includes intelligence pertaining to the regime’s preparations for this attack and its means of delivery, multiple streams of intelligence about the attack itself and its effect, our post-attack observations, and the differences between the capabilities of the regime and the opposition. Our high confidence assessment is the strongest position that the U.S. Intelligence Community can take short of confirmation. We will continue to seek additional information to close gaps in our understanding of what took place.
  • We assess with high confidence that the Syrian regime has used chemical weapons on a small scale against the opposition multiple times in the last year, including in the Damascus suburbs. This assessment is based on multiple streams of information including reporting of Syrian officials planning and executing chemical weapons attacks and laboratory analysis of physiological samples obtained from a number of individuals, which revealed exposure to sarin. We assess that the opposition has not used chemical weapons.
  • ...6 more annotations...
  • The Syrian regime has initiated an effort to rid the Damascus suburbs of opposition forces using the area as a base to stage attacks against regime targets in the capital. The regime has failed to clear dozens of Damascus neighborhoods of opposition elements, including neighborhoods targeted on August 21, despite employing nearly all of its conventional weapons systems. We assess that the regime’s frustration with its inability to secure large portions of Damascus may have contributed to its decision to use chemical weapons on August 21
  • On August 21, a Syrian regime element prepared for a chemical weapons attack in the Damascus area, including through the utilization of gas masks. Our intelligence sources in the Damascus area did not detect any indications in the days prior to the attack that opposition affiliates were planning to use chemical weapons.
  • Multiple streams of intelligence indicate that the regime executed a rocket and artillery attack against the Damascus suburbs in the early hours of August 21. Satellite detections corroborate that attacks from a regime-controlled area struck neighborhoods where the chemical attacks reportedly occurred – including Kafr Batna, Jawbar, ‘Ayn Tarma, Darayya, and Mu’addamiyah. This includes the detection of rocket launches from regime controlled territory early in the morning, approximately 90 minutes before the first report of a chemical attack appeared in social media. The lack of flight activity or missile launches also leads us to conclude that the regime used rockets in the attack.
  • Three hospitals in the Damascus area received approximately 3,600 patients displaying symptoms consistent with nerve agent exposure in less than three hours on the morning of August 21, according to a highly credible international humanitarian organization. The reported symptoms, and the epidemiological pattern of events – characterized by the massive influx of patients in a short period of time, the origin of the patients, and the contamination of medical and first aid workers – were consistent with mass exposure to a nerve agent. We also received reports from international and Syrian medical personnel on the ground.
  • We have identified one hundred videos attributed to the attack, many of which show large numbers of bodies exhibiting physical signs consistent with, but not unique to, nerve agent exposure. The reported symptoms of victims included unconsciousness, foaming from the nose and mouth, constricted pupils, rapid heartbeat, and difficulty breathing. Several of the videos show what appear to be numerous fatalities with no visible injuries, which is consistent with death from chemical weapons, and inconsistent with death from small-arms, high-explosive munitions or blister agents. At least 12 locations are portrayed in the publicly available videos, and a sampling of those videos confirmed that some were shot at the general times and locations described in the footage. We assess the Syrian opposition does not have the capability to fabricate all of the videos, physical symptoms verified by medical personnel and NGOs, and other information associated with this chemical attack. We have a body of information, including past Syrian practice, that leads us to conclude that regime officials were witting of and directed the attack on August 21. We intercepted communications involving a senior official intimately familiar with the offensive who confirmed that chemical weapons were used by the regime on August 21 and was concerned with the U.N. inspectors obtaining evidence. On the afternoon of August 21, we have intelligence that Syrian chemical weapons personnel were directed to cease operations.
  • To conclude, there is a substantial body of information that implicates the Syrian government’s responsibility in the chemical weapons attack that took place on August 21.As indicated, there is additional intelligence that remains classified because of sources and methods concerns that is being provided to Congress and international partners. Syria: Damascus Areas of Influence and Areas Reportedly Affected by 21 August Chemical Attack
  •  
    Well, here's what the public gets told, from a President and his intelligence community that have been caught in lie after lie in the NSA scandal this summer. And of course, to "protect sources and methods, we cannot publicly release all available intelligence." One thing is certain: The "high confidence" of the summary does not acknowledge the doubt about that confidence expressed by government officials speaking anonymously to the Associated Press before the report was released. http://bigstory.ap.org/article/ap-sources-intelligence-weapons-no-slam-dunk   I'll have more later. 
Paul Merrell

Pentagon Is Ordered to Expand Potential Targets in Syria With a Focus on Forces - NYTim... - 0 views

  • President Obama has directed the Pentagon to develop an expanded list of potential targets in Syria in response to intelligence suggesting that the government of President Bashar al-Assad has been moving troops and equipment used to employ chemical weapons while Congress debates whether to authorize military action.
  • For the first time, the administration is talking about using American and French aircraft to conduct strikes on specific targets, in addition to ship-launched Tomahawk cruise missiles. There is a renewed push to get other NATO forces involved.
  • The strikes would be aimed not at the chemical stockpiles themselves — risking a potential catastrophe — but rather the military units that have stored and prepared the chemical weapons and carried the attacks against Syrian rebels, as well as the headquarters overseeing the effort, and the rockets and artillery that have launched the attacks, military officials said Thursday. Gen. Martin E. Dempsey, the chairman of the Joint Chiefs of Staff, has said that other targets would include equipment that Syria uses to protect the chemicals — air defenses, long-range missiles and rockets, which can also deliver the weapons.
  • ...1 more annotation...
  • But military planners are now preparing options to include attacks from Air Force bombers, a development reported Thursday by The Wall Street Journal. The Pentagon was initially planning to rely solely on cruise missiles. Bombers could carry scores more munitions, potentially permitting the United States to carry out more strikes if the first wave does not destroy the targets. Among the options available are B-52 bombers, which can carry air-launched cruise missiles; B-1s that are based in Qatar and carry long-range, air-to-surface missiles; and B-2 stealth bombers, which are based in Missouri and carry satellite-guided bombs.
  •  
    Obama preparing for an even more massive war. Sending in aircraft very substantially increases the number of necessary targets, to take out Syria's formidable aircraft defense system. And of course the announcement that Syria's missiles are targeted vastly increases Syria's incentives to retaliate as soon as they realize a military strike on them is under way, else they lose the ability to retaliate.
Paul Merrell

Your Computer May Already be Hacked - NSA Inside? | Steve Blank - 1 views

  • But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”  Say what??  They can see the plaintext on my computer before I encrypt it? That defeats any/all encryption methods. How could they do that? Bypass Encryption While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
  • The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT. Today every desktop and laptop computer has another way for the NSA to get inside. Intel Inside It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn’t crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip. After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing it’s microprocessors to load fixes automatically when your computer starts.
  • Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer’s BIOS.). Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update. Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that 3rd parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it is impossible to know whether anyone is loading a backdoor into your computer.
  • ...3 more annotations...
  • Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security conscious sites can discover rootkits by tools that check kernel code and data for changes. But what if you could use the configuration and state of microprocessor hardware in order to hide? You’d be invisible to all rootkit detection techniques that checks the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA’s biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.) Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys  giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.) That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.
  • A few months ago these kind of discussions would have been theory at best, if not paranoia.
  • The Prism disclosures prove otherwise – the National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven’t implemented a microcode backdoor. The downside is that 1) backdoors can be hijacked by others with even worse intent. So if NSA has a microcode backdoor – who else is using it? and 2) What other pieces of our infrastructure, (routers, smartphones, military computers, satellites, etc) use processors with uploadable microcode? —— And that may be why the Russian president is now using a typewriter rather than a personal computer.
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Why France Sank an Iran Nuke Deal | Consortiumnews - 0 views

  • France’s sabotage of a compromise agreement on Iran’s nuclear program is a textbook case of how the new Saudi-Israel alliance can disrupt President Barack Obama’s strategy for resolving Middle East disputes through diplomacy, not war. Over the summer, Saudi officials including intelligence chief Prince Bandar bin Sultan visited European capitals dangling financial deals and energy concessions to countries if they would line up behind Saudi and Israeli desires for military intervention in the Syrian civil war and heightened economic warfare against Iran. French Foreign Minister Laurent Fabius greets U.S. Secretary of State John Kerry in Paris, France, on Feb. 27, 2013. [State Department photo]The carrots were particularly appealing to the French who are struggling with a sluggish economy, high unemployment and a recent credit downgrade. So, the flash of Saudi petro-dollars got the attention of the French government.
  • Just last month, French Defense Minister Jean-Yves Le Drian celebrated the signing of a $1.5 billion deal with Saudi Arabia to overhaul six of its navy ships. In July, Saudi Arabia’s ally, United Arab Emirates, signed a $913 million deal with France to buy two high-resolution Helios military satellites. Other lucrative arms deals are reportedly in the works between France and Saudi Arabia (and its Sunni allies). Saudi Arabia also has deployed its money to bolster France’s sagging agricultural and food sectors, including a Saudi firm buying a major stake in Groupe Doux, Europe’s largest poultry firm based in Brittany. The Saudis, however, had less success with other countries.
  • Putin also stepped up his cooperation with President Obama in searching for negotiated settlements to longstanding disagreements in the Middle East, including a U.S.-Russia-brokered deal to get the Syrian government to give up its chemical weapons, a joint push for Syrian peace talks in Geneva and a plan to resolve the Iranian nuclear dispute. But Israeli Prime Minister Benjamin Netanyahu and the Saudi royals favor a more belligerent approach to these conflicts – wanting the United States to bomb Syria and “degrade” its military, demanding the immediate removal of Syrian President Assad, and insisting on a complete capitulation by Iran under threat of crippling economic sanctions or a U.S.-Israeli aerial bombardment. Last weekend – as an interim agreement with Iran was about to be signed by the five United Nations Security Council members plus Germany – the French rushed to the rescue of the Israeli-Saudi alliance, showing up at the last minute to unravel the deal that had been painstakingly knitted together. To the apparent surprise of the Obama administration, the Russians and other governments working on a compromise with Iran over its nuclear program, French Foreign Minister Laurent Fabius joined the talks late and prevented the accord from being signed.
  • ...2 more annotations...
  • Much of the subsequent commentary has focused on why the French were coming to the aid of the Israelis in blocking the interim agreement that Netanyahu has denounced in apocalyptic terms. But France’s interest in undercutting the deal can perhaps best be understood by factoring in the Saudi money. Indeed, the logic behind the behind-the-scenes Saudi-Israeli alliance has been that the two former adversaries now view their interests as mostly aligning, especially their contempt for Iran’s Shiite government and its influence extending along the Shiite Crescent from Tehran through Baghdad and Damascus to Beirut. Israel and Saudi Arabia agree that Iran is the greatest threat to their regional interests. Both countries have indicated that they want the Iranian-backed government in Syria to be overthrown even if that means it will be replaced by Saudi-backed Sunni jihadists linked to al-Qaeda. [See Consortiumnews.com’s “Israel Sides with Syrian Jihadists.”]
  • Israel and Saudi Arabia also took the same side on the Egyptian military coup d’etat which ousted elected President Mohamed Morsi, a leader of the Muslim Brotherhood. Though the Muslim Brotherhood is Sunni – like the Saudis – it represents a populist movement that the Saudi monarchy considers a threat to its anti-democratic structure. Israel views the Muslim Brotherhood as sympathetic to Hamas in Gaza. But what makes the Saudi-Israeli alliance so influential is the complementary strengths of the two countries. Israel has extraordinary skills at lobbying and propaganda, especially in influencing Official Washington and Capitol Hill. Saudi Arabia has vast financial resources that can turn the heads of defense officials in Paris, oil men in Houston or investment bankers on Wall Street. Together these strengths can make the negotiation of any good-faith compromise with Iran or Syria difficult, if not impossible. Between Netanyahu pulling the strings of his political and media marionettes in Washington and the Saudis manipulating the French government and others with financial inducements, it will take toughness and savvy for the Obama administration to guide the process to a peaceful resolution. And, toughness and savvy are not attributes that the administration is known to have in great supply.
Paul Merrell

Quitting Over Syria | The American Conservative - 0 views

  • The release of the White House “Government Assessment” on August 30, providing the purported evidence to support a bombing attack on Syria, defused a conflict with the intelligence community that had threatened to become public through the mass resignation of a significant number of analysts. The intelligence community’s consensus view on the status of the Syrian chemical-weapons program was derived from a National Intelligence Estimate (NIE) completed late last year and hurriedly updated this past summer to reflect the suspected use of chemical weapons against rebels and civilians. The report maintained that there were some indications that the regime was using chemicals, while conceding that there was no conclusive proof. There was considerable dissent from even that equivocation, including by many analysts who felt that the evidence for a Syrian government role was subject to interpretation and possibly even fabricated. Some believed the complete absence of U.S. satellite intelligence on the extensive preparations that the government would have needed to make in order to mix its binary chemical system and deliver it on target was particularly disturbing. These concerns were reinforced by subsequent UN reports suggesting that the rebels might have access to their own chemical weapons. The White House, meanwhile, considered the somewhat ambiguous conclusion of the NIE to be unsatisfactory, resulting in considerable pushback against the senior analysts who had authored the report.
  • In a scenario unfortunately reminiscent of the lead up to Iraq, the National Security Council tasked the various intelligence agencies to beat the bushes and come up with more corroborative information. Israel obligingly provided what was reported to be interceptions of telephone conversations implicating the Syrian army in the attack, but it was widely believed that the information might have been fabricated by Tel Aviv, meaning that bad intelligence was being used to confirm other suspect information, a phenomenon known to analysts as “circular reporting.” Other intelligence cited in passing by the White House on the trajectories and telemetry of rockets that may have been used in the attack was also somewhat conjectural and involved weapons that were not, in fact, in the Syrian arsenal, suggesting that they were actually fired by the rebels. Also, traces of Sarin were not found in most of the areas being investigated, nor on one of the two rockets identified. Whether the victims of the attack suffered symptoms of Sarin was also disputed, and no autopsies were performed to confirm the presence of the chemical. 
  • With all evidence considered, the intelligence community found itself with numerous skeptics in the ranks, leading to sharp exchanges with the Director of Central Intelligence John Brennan and Director of National Intelligence James Clapper. A number of analysts threatened to resign as a group if their strong dissent was not noted in any report released to the public, forcing both Brennan and Clapper to back down. This led to the White House issuing its own assessment, completely divorcing the process from any direct connection to the intelligence community. The spectacle of CIA Director George Tenet sitting behind Secretary of State Colin Powell in the United Nations, providing him with credibility as Powell told a series of half-truths, would not be repeated. Philip Giraldi, a former CIA officer, is executive director of the Council for the National Interest.
  •  
    More detail about backing up previous reports that the information supplied in the White House "Government Assessment of the Syrian Government's Use of Chemical Weapons on August 21, 2013" cooking of intelligence to justify missile strikes on Syria. Note that the same day the Assessment was published by the White House Offiice of the Press Secretary, active duty intelligence officials passed a message to Obama through veteran intelligence officers that the intelligence in the report was unreliable and that there was strong evidence that it was the "rebels" rather than Syrian government that had used sarin gas. http://www.globalresearch.ca/u-s-military-and-intelligence-officials-to-obama-assad-not-responsible-for-chemical-attack/5348576 Next came a report three days later citing and quoting an anonymous former intelligence official who said the format used and its publication by the White House rather than by the Chief of Intelligence were both strong indications that the document was not the product of the intelligence community. http://www.ipsnews.net/2013/09/obamas-case-for-syria-didnt-reflect-intel-consensus/ Now we learn the reason the White House had to cook its own "public summary of intelligence,"  because many top intelligence threatened to resign if the cherry-picked version of events without reservations explaining the likelihood that it was the rebels who did it. So the Obama Administration, like the Bush II Administration, deliberately lied to the public in an attempt to stampede the nation into another foreign war in the Mideast. The only relevant difference is that Obama didn't get away with launching his own "shock and awe" campaign. Impeachable offense? Yes. Likely to happen? No. Too many hawks in Congress who want war against both Syria and Iran.
Paul Merrell

Spies worry over doomsday cache stashed by ex-NSA contractor Snowden | Reuters - 0 views

  • (Reuters) - British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said.The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters.The passwords are in the possession of at least three different people and are valid for only a brief time window each day, they said. The identities of persons who might have the passwords are unknown.
  • One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm.U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories."The worst is yet to come," said one former U.S. official who follows the investigation closely.Snowden, who is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents, is living in Russia under temporary asylum, where he fled after traveling to Hong Kong. He has been charged in the United States under the Espionage Act.Cryptome, a website which started publishing leaked secret documents years before the group WikiLeaks or Snowden surfaced, estimated that the total number of Snowden documents made public so far is over 500.
  • Snowden's revelations of government secrets have brought to light extensive and previously unknown surveillance of phone, email and social media communications by the NSA and allied agencies. That has sparked several diplomatic rows between Washington and its allies, along with civil liberties debates in Europe, the United States and elsewhere.Among the material which Snowden acquired from classified government computer servers, but which has not been published by media outlets known to have had access to it, are documents containing names and resumes of employees working for NSA's British counterpart, the Government Communications Headquarters (GCHQ), sources familiar with the matter said.The sources said Snowden started downloading some of it from a classified GCHQ website, known as GC-Wiki, when he was employed by Dell and assigned to NSA in 2012.
  • ...2 more annotations...
  • Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published.""If anything happens at all to Edward Snowden, he has arranged for them to get access to the full archives," Greenwald said in a June interview with the Daily Beast website. He added: "I don't know for sure whether has more documents than the ones he has given me... I believe he does."In an email exchange with Reuters, Greenwald, who has said he remains in contact with Snowden, affirmed his statements about Snowden's "precautions" but said he had nothing to add.Officials believe that the "doomsday" cache is stored and encrypted separately from any material that Snowden has provided to media outlets.
  • Sources familiar with unpublished material Snowden downloaded said it also contains information about the CIA - possibly including personnel names - as well as other U.S. spy agencies such as the National Reconnaissance Office and National Geospatial-Intelligence Agency, which operate U.S. image-producing satellites and analyze their data.U.S. security officials have indicated in briefings they do not know what, if any, of the material is still in Snowden's personal possession. Snowden himself has been quoted as saying he took no such materials with him to Russia.
Paul Merrell

N.S.A. Spied on Allies, Aid Groups and Businesses - NYTimes.com - 0 views

  • Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.
  • While the names of some political and diplomatic leaders have previously emerged as targets, the newly disclosed intelligence documents provide a much fuller portrait of the spies’ sweeping interests in more than 60 countries. Britain’s Government Communications Headquarters, working closely with the National Security Agency, monitored the communications of senior European Union officials, foreign leaders including African heads of state and sometimes their family members, directors of United Nations and other relief programs, and officials overseeing oil and finance ministries, according to the documents. In addition to Israel, some targets involved close allies like France and Germany, where tensions have already erupted over recent revelations about spying by the N.S.A.
  • Details of the surveillance are described in documents from the N.S.A. and Britain’s eavesdropping agency, known as GCHQ, dating from 2008 to 2011. The target lists appear in a set of GCHQ reports that sometimes identify which agency requested the surveillance, but more often do not. The documents were leaked by the former N.S.A. contractor Edward J. Snowden and shared by The New York Times, The Guardian and Der Spiegel. The reports are spare, technical bulletins produced as the spies, typically working out of British intelligence sites, systematically tapped one international communications link after another, focusing especially on satellite transmissions. The value of each link is gauged, in part, by the number of surveillance targets found to be using it for emails, text messages or phone calls. More than 1,000 targets, which also include people suspected of being terrorists or militants, are in the reports. It is unclear what the eavesdroppers gleaned. The documents include a few fragmentary transcripts of conversations and messages, but otherwise contain only hints that further information was available elsewhere, possibly in a larger database.
  • ...8 more annotations...
  • Ms. Hansen, the spokeswoman for the European Commission, said that it was already engaged in talks with the United States that were “needed to restore trust and confidence in the trans-Atlantic relationship.” She added that “the commission will raise these new allegations with U.S. and U.K. authorities.”
  • Also appearing on the surveillance lists is Joaquín Almunia, vice president of the European Commission, which, among other powers, has oversight of antitrust issues in Europe. The commission has broad authority over local and foreign companies, and it has punished a number of American companies, including Microsoft and Intel, with heavy fines for hampering fair competition. The reports say that spies intercepted Mr. Almunia’s communications in 2008 and 2009. Mr. Almunia, a Spaniard, assumed direct authority over the commission’s antitrust office in 2010. He has been involved in a three-year standoff with Google over how the company runs its search engine. Competitors of the online giant had complained that it was prioritizing its own search results and using content like travel reviews and ratings from other websites without permission. While pushing for a settlement with Google, Mr. Almunia has warned that the company could face large fines if it does not cooperate.
  • Some condemned the surveillance on Friday as unjustified and improper. “This is not the type of behavior that we expect from strategic partners,” Pia Ahrenkilde Hansen, a spokeswoman for the European Commission, said on the latest revelations of American and British spying in Europe. Some of the surveillance relates to issues that are being scrutinized by President Obama and a panel he appointed in Washington that on Wednesday recommended tighter limits on the N.S.A., particularly on spying of foreign leaders, especially allies.
  • “We do not use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line,” said Vanee Vines, an N.S.A. spokeswoman. But she added that some economic spying was justified by national security needs. “The intelligence community’s efforts to understand economic systems and policies, and monitor anomalous economic activities, are critical to providing policy makers with the information they need to make informed decisions that are in the best interest of our national security,” Ms. Vines said.
  • The surveillance reports show American and British spies’ deep appetite for information. The French companies Total, the oil and gas giant, and Thales, an electronics, logistics and transportation outfit, appear as targets, as do a French ambassador, an “Estonian Skype security team” and the German Embassy in Rwanda.
  • Multiple United Nations Missions in Geneva are listed as targets, including Unicef and the United Nations Institute for Disarmament Research. So is Médecins du Monde, a medical relief organization that goes into war-ravaged areas. Leigh Daynes, an executive director of the organization in Britain, responded to news about the surveillance by saying: “There is absolutely no reason for our operations to be secretly monitored.” More obvious intelligence targets are also listed, though in smaller numbers, including people identified as “Israeli grey arms dealer,” “Taleban ministry of refugee affairs” and “various entities in Beijing.” Some of those included are described as possible members of Al Qaeda, and as suspected extremists or jihadists.
  • While few if any American citizens appear to be named in the documents, they make clear that some of the intercepted communications either began or ended in the United States and that N.S.A. facilities carried out interceptions around the world in collaboration with their British partners. Some of the interceptions appear to have been made at the Sugar Grove, W.Va., listening post run by the N.S.A. and code-named Timberline, and some are explicitly tied to N.S.A. target lists in the reports.
  • Strengthening the likelihood that full transcripts were taken during the intercepts is the case of Mohamed Ibn Chambas, an official of the Economic Community of West African States, known as Ecowas, a regional initiative of 15 countries that promotes economic and industrial activity. Whether intentionally or through some oversight, when Mr. Chambas’s communications were intercepted in August 2009, dozens of his complete text messages were copied into one of the reports.
  •  
    No mention of any "terrorist" targets. Could it be that Snowden and Greenwald are right, that the surveillance is not about terrorism at all? Surely our nation's leaders would not lie to us about that. Right. The Politics of Fear.
Paul Merrell

The US/NATO Enlargement Project » CounterPunch: Tells the Facts, Names the Names - 0 views

  • In February, 1990, US Secretary of State James Baker (1989-1992), representing President George HW Bush, traveled to Moscow to meet with Russian President Mikhail Gorbachev regarding the possible reunification of Germany and the removal of 300,000 Soviet troops. There is little serious dispute that as the Berlin Wall teetered, Baker promised Gorbachev “there would be no extension of NATO’s jurisdiction for forces of NATO one inch to the east.” Gorbachev is reported to have taken the US at its word and responded “any extension of the zone of NATO is unacceptable.” “I agree,” replied Baker.” Unfortunately, Gorbachev never got it in writing and most historians, at the time, agreed that NATO expansion was “ill conceived, ill-timed, and above all ill-suited to the realities of the post-Cold War world.”
  • President Bush’s National Security Advisor Brent Scowcroft and Bill Clinton’s Defense Secretary were also in agreement. But by 1994, that verbal contract had not deterred the concerted efforts of a handful of State Department policy professionals to subdue the overwhelming bureaucratic opposition according to James Goldgeier in his classic “Not Whether but When: The US Decision to Enlarge NATO.” By 1997, the Gorbachev-Baker-Bush agreement was a forgotten policy trinket as Hungary, Poland and the Czech Republic were accepted into NATO. In 2004, former Soviet satellite countries Lithuania, Latvia and Estonia were admitted and in 2009, Croatia and Albania joined NATO. Currently, the former Soviet republics of Ukraine, Georgia, Moldova, Kazakhstan, Armenia, and Azerbaijan are pending membership and all five former Soviet republics in Central Asia (Kyrgyzstan, Tajikistan, Turkmenistan, Kazakhstan, and Uzbekistan) provide NATO with logistical support for the US war in Afghanistan. As the US-led NATO alliance tightens its grip on the Caucasus countries, the American public has not been informed about the Ukrainian Parliament’s approval for a series of NATO military exercises that would put US troops on Russia’s border, even though the Ukraine is not yet a member of NATO. Rapid Trident is a 12-nation military ‘interoperability’ exercise led by the US who will commit the majority of participating troops and Sea Breeze is a naval exercise that will take place on the Black Sea adjacent to Russian ports. The NATO buildup includes joint ground operations with Moldova and Romania.
  • Most recently, NATO Secretary General Anders Fogh Rasmussen announced that the military alliance has cut Russia off from civilian and military cooperation and that there would be the deployment and reinforcement of military assets including increased air patrols over the Baltic Sea and AWACS surveillance flights over Poland and Romania. It goes without saying that the NATO build up is in addition to the deployment of US troops and F-16 warplanes to Poland, F-15C warplanes to Lithuania and aircraft carriers to the Black and Mediterranean Seas. All this raises the question about whether a promise and handshake in the world of international diplomacy is a real commitment and what is a 1991 international promise made by a Republican Administration worth in 1994 to a Democratic Administration? Apparently zilch.
  • ...1 more annotation...
  • What all this means is that, behind the diplomatic landscape of verbal jujitsu and summit meetings, there had been a concerted effort at the US State Department with the creation of a NATO Enlargement Office to establish what has become a Russian Wall – an impenetrable US – defined barrier of estrangement along the Russian border meant to cut the country off from land and sea access – as NATO, itching for war, continues to bait Russia with isolation and threats.
Paul Merrell

BBC News - In pictures: Russian military build-up near Ukraine - 0 views

  • Nato's decision to release over 20 satellite images and associated maps of the Russian military build-up on Ukraine's eastern frontier is a signal of the concern among the alliance's commanders that a Russian military option against Ukraine is very much on the table, the BBC's diplomatic correspondent Jonathan Marcus reports. The imagery issued by Nato's Supreme Headquarters Allied Powers Europe (Shape) reportedly dates from late March and early April.
Paul Merrell

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional committee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial institutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms with Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency with which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of its largest.19 The political clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [Italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘It was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 It also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the Italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter Maritime Bank, which interlocked with BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 It is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. It is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. It may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
Paul Merrell

NSA Whistleblower: Snowden Never Had Access to the "Juiciest" Intelligence Documents | ... - 0 views

  • NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping. Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:
  • He says the NSA started spying on President Obama when he was a candidate for Senate:
  • Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this. Washington’s Blog called Tice to find out more about what he saw when he was at NSA.
  • ...8 more annotations...
  • NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.] Does Snowden even have documents which contain the information which you’ve seen? RUSSELL TICE:  The answer is no. WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
  • RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden? Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing? They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.] Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” - Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way. I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.
  • Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS. And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance]. ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks. These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
  • It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency. When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up. There was no such thing beforehand. It was made up … to try to placate the American people. The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of. So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
  • Snowden’s Failure To Understand the Most Important Documents RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG. The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at. But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there. I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
  • Cheney Was Running the Show WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive]. Is that right … and if so, how do you know that? RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington. WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means? RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.
  • NSA Is Spying On CONTENT as Well as Metadata WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata? RUSSELL TICE: Of course it is. Of course. [Background. But see this.] NSA Spying On Journalists, Congress, Admirals, Lawyers … RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such. I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state. Or an Admiral and his wife, and his kids and his staffers …
  • The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else. These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.
  •  
    Whistleblower Russell Tice says that there are super-classified domestic surveillance records that Edward Snowden, Congressional oversight committees, and the NSA Inspector-General did not have access to. Must-read.
« First ‹ Previous 41 - 60 of 95 Next › Last »
Showing 20 items per page