Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged terrorist-plots

Rss Feed Group items tagged

Paul Merrell

US air war against jihadists in Syria begins - The Long War Journal - 0 views

  • The United States and "partner nation forces" have expanded airstrikes against the Islamic State into Syria, broadening the war with the jihadist group beyond Iraq. Additionally, the US targeted the Khorasan Group, a coordinating council made up of al Qaeda leaders in Syria. US military officials involved in the operation told The Long War Journal that the strike package includes US B-1 bombers, carrier-based F/A-18 fighters and ground-based F-15s and F-16s, remotely piloted drones, and Tomahawk cruise missiles launched from warships. Airstrikes targeted Islamic State command and control centers in Raqqah, the jihadist group's de facto capital in Raqqah province in eastern Syria, as well as arms caches, supply depots, and ground units near the Iraqi border. Rear Admiral James Kirby, the Pentagon's spokesman, confirmed that airstrikes have begun. "I can confirm that US military and partner nation forces are undertaking military action against ISIL [Islamic State] terrorists in Syria using a mix of fighter, bomber and Tomahawk Land Attack Missiles," Kirby said in a statement obtained by The Long War Journal. In the early morning of Sept. 23, US Central Command, or CENTCOM, which is directing the operations in Iraq and Syria, provided further details of the attack.
  • Fourteen strikes against the Islamic State were executed using by "a mix of fighters, bombers, remotely piloted aircraft and Tomahawk Land Attack Missiles," according to a statement by CENTCOM. Forty-seven cruise missiles were "launched from the USS Arleigh Burke and USS Philippine Sea, which were operating from international waters in the Red Sea and North Arabian Gulf." "The strikes destroyed or damaged multiple ISIL targets in the vicinity of the towns of Raqqah in north central Syria, Dier al Zour, and Abu Kamal in eastern Syria and Hasakah in northeastern Syria," the statement says. "The targets included ISIL fighters, training compounds, headquarters and command and control facilities, storage facilities, a finance center, supply trucks and armed vehicles." According to the Syrian Observator for Human Rights, more than 70 Islamic State fighters were killed in the strikes and and over 300 were wounded. Other countries that participated in the operation include Bahrain, Jordan, Saudi Arabia, Qatar and the United Arab Emirates. Additionally, the US launched eight airstrikes against "a network of seasoned al Qaeda veterans - sometimes referred to as the Khorasan Group - who have established a safe haven in Syria to develop external attacks, construct and test improvised explosive devices and recruit Westerners to conduct operations." The strikes targeted "training camps, an explosives and munitions production facility, a communication building and command and control facilities" as part of an effort "to disrupt the imminent attack plotting against the United States and Western interests."
  • CENTCOM did not provide details on the names or numbers of Islamic State and al Qaeda fighters killed. The Syrian Observatory for Human Rights reported that "no less than 50 fighters from Jabhat al-Nusra (most of them were Syrian fighters), were killed by air strikes by the warplanes of the international coalition." In addition, eight civilians, including three children and a women, are reported to have been killed. CENTCOM was clear that only the US targeted al Qaeda's network in Syria. The Khorasan Group is closely tied to the Al Nusrah Front and other jihadist groups in Syria, which are at odds with the Islamic State. These groups are poised to gain from any setbacks to the rival Islamic State. President Barrack Obama stated 13 days ago that the US air campaign against the Islamic State, which began in northern Iraq on Aug. 7, would be expanded into Syria. US and French warplanes are now operating over Irbil, Sinjar, Kirkuk, the Mosul and Haditha dams, southwest of Baghdad (likely in Jurf al Sakhar in northern Babil), and somewhere on the Euphrates River. According to CENTCOM, the US has launched 194 airstrikes in Iraq since Aug. 7. The Islamic State has threatened to retaliate against the US and other Western countries that participate in military action against the jihadist group. Just yesterday, Abu Muhammad al Adnani, the spokesman for the Islamic State, called for Muslims in Western countries to wage jihad. [See Threat Matrix report, Islamic State spokesman again threatens West in new speech.]
Paul Merrell

John Kerry admits: some US surveillance has gone too far | World news | theguardian.com - 0 views

  • John Kerry, the US secretary of state, conceded on Thursday that some of the country's surveillance activities had gone too far, saying that certain practices had occurred "on autopilot" without the knowledge of senior officials in the Obama administration.In the most stark comments yet by a senior administration official, Kerry promised that a previously announced review of surveillance practices would be thorough and that some activities would end altogether."The president and I have learned of some things that have been happening in many ways on an automatic pilot, because the technology is there and the ability is there," he told a conference in London via video link."In some cases, some of these actions have reached too far and we are going to try to make sure it doesn't happen in the future."
  • In recent days, the Obama administration has put some distance between it and the National Security Agency (NSA). Kerry's comments are a reflection in particular of a concern about the diplomatic fallout from the revelation that the US monitored the cellphone of the German chancellor, Angela Merkel.The tactic has irritated senior intelligence officials. On Thursday evening, the director of the NSA, General Keith Alexander, blamed US diplomats for requests to place foreign leaders under surveillance.During a pointed exchange with a former US ambassador to Romania, James Carew Rosapepe, Alexander said: "We, the intelligence agencies, don't come up with the requirements. The policy-makers come up with the requirements."He added: "One of those groups would have been, let me think, hold on, oh: ambassadors."
  • Alexander said that the NSA collected information when it was asked by policy officials to discover the "leadership intentions" of foreign countries. "If you want to know leadership intentions, these are the issues," he said at a discussion hosted by the Baltimore Council on Foreign Relations.Earlier in Washington, the debate continued about whether further legal constraints should be placed on the NSA. The Senate intelligence committee approved a bill that placed largely cosmetic restrictions on the National Security Agency's domestic surveillance programme.The bill, sponsored by committee chairwoman Dianne Feinstein, a California Democrat, allows the NSA continue to collect phone metadata of millions of Americans for renewable 90-day periods, but orders it to be more transparent about the practice.
  • ...4 more annotations...
  • The bill, which is competing with more restrictive measures from other committees, now moves forward to a full Senate vote. The stage is now set for a showdown with the USA Freedom Act, a bipartisan bill that would prohibit bulk collection of Americans' telephone records.Senator Mark Udall, a Democratic member of the Senate intelligence committee and a supporter of NSA reform, said it did not go far enough."The NSA's invasive surveillance of Americans' private information does not respect our constitutional values and needs fundamental reform, not incidental changes," he said.
  • In a separate development on Thursday, a group of technology giants called for substantial reforms to the US government's surveillance programmes. The companies were furious about revelations this week – the latest to emerge from documents leaked by the former NSA contractor Edward Snowden – that the agency had intercepted the cables that link the worldwide data centres belonging to Google and Yahoo.It was also reported that Obama had ordered the NSA to stop eavesdropping on the headquarters of the International Monetary Fund (IMF) and World Bank. Reuters cited a US official as saying the president had ordered the halt in the past few weeks.The NSA's surveillance of the IMF and World Bank has not previously been disclosed.
  • In response to Reuters inquiries, a senior Obama administration official said, "The United States is not conducting electronic surveillance targeting the headquarters of the World Bank or IMF in Washington." The Obama administration official, who spoke on condition of anonymity, did not address whether the NSA had eavesdropped on the two entities in the past.Kerry, in his comments to a conference organised by the Open Government Partnership, acknowledged that trust needed to be restored. "There is an effort to try to gather information, yes, in same cases inappropriately, and the president is now doing a thorough review, in order that nobody will have a sense of abuse," he said.Despte the cracks between the administration and the spy community, Kerry was careful to defended the motives of US intelligence agencies, insisting no "innocent people" were being abused and saying surveillance by several countries had prevented many terrorist plots.
  • A German MP said he met Snowden in Moscow on Thursday, and said the NSA whistelblower was prepared in principle to help Germany investigate allegations of surveillance by US intelligence.Hans-Christian Stroebele, a lawmaker with Germany's opposition Greens and a prominent critic of the NSA's alleged actions, told ARD television that Snowden "made clear he knows a great deal."He said Snowden would be prepared to travel to Germany and testify, "but the circumstances would have to be cleared up".
  •  
    Looks like maybe Snowden is now a hero in Germany and may be allowed to travel there. Meanwhile, the Obama Administration rats continue to desert the sinking NSA ship, but Diane Feinstein fights on to preserve mass surveillance. 
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
Paul Merrell

Torture Report Revives Rogue Image the CIA Has Sought to Erase - Bloomberg - 0 views

  • This week’s Senate report on the CIA’s use of harsh interrogation methods is neither the first nor the worst time the agency has run afoul of its congressional overseers. Four decades ago, a series of hearings on Capitol Hill helped reveal that the CIA-run Phoenix Program in South Vietnam, working in concert with the U.S. and South Vietnamese militaries, had “neutralized” -- killed, detained or recruited -- as many as 80,000 people suspected of being members of the Communist Vietcong and used gang rape, beatings and electric shock as well as waterboarding to interrogate prisoners. Then in 1975 and 1976, a Senate panel took a broader look into the dark side of the Central Intelligence Agency and found that the nation’s spies seemed to have few limits, with covert activities that included plotting to assassinate foreign leaders, domestic spying and LSD experiments on unwitting subjects.
  • The Church committee, the investigative panel named for Democratic chairman Frank Church of Idaho, published 14 reports on CIA activities, including efforts to kill leaders in Cuba, Chile, the Democratic Republic of the Congo, the Dominican Republic and Vietnam; a secret program to open Americans’ mail; and a mind-control program called MKULTRA
  • It led to creation of the current congressional intelligence committees to guard against CIA abuses and resulted in an executive order by Republican President Gerald Ford banning assassinations of foreign leaders.
  • ...5 more annotations...
  • Nevertheless, the new findings are a blow to the agency Brennan leads. “The Senate intel report is right up there with the Church committee in the scathing criticism of the agency,” said Thomas Blanton, director of the National Security Archive at George Washington University in Washington.
  • Obama has defended CIA Director John Brennan, who this week said that the agency’s methods produced “intelligence that helped thwart attack plans, capture terrorists and save lives.” Brennan said the report was wrong to suggest the CIA “systematically and intentionally misled” Congress and the White House.
  • This image of the CIA supposedly having run amok and having done all this torture stuff on its own will stick with a large part of the American public,” said Paul Pillar, a former senior CIA analyst who had a 28-year career in the intelligence community. “The idea that the CIA has been lying to the president, lying to the Justice Department, lying to the Congress, and even lying to itself about how effective these programs were -- that’s the real show-stopper in the Senate intel report,” Blanton said. “That’s really the most remarkable piece of it.” The Church committee, despite the breadth of its review, “did not produce this kind of damning indictment using the CIA’s own words and own evidence,” Blanton said.
  • Pillar said the reaction to the CIA’s interrogation methods reflects a public mood change from the “fears and emotions” immediately after the Sept. 11 attacks. Similarly, Americans at first accepted the internment of Japanese-Americans after the attack on Pearl Harbor, a policy since considered a black mark in American history, he said. “The CIA is where the people who are on the bottom end of the political process happen to work, but this was a much bigger process where the bigger story was how the American mood, as expressed by the public and our political leaders, has changed significantly since the first year or two after 9/11, when there was much more willingness to compromise long-held values in the name of American security,” Pillar said.
  • In 1984, Senate Intelligence Committee chairman Barry Goldwater, an Arizona Republican, wrote an angry “Dear Bill” letter to CIA Director William Casey amid reports that the CIA was covertly involved in mining Nicaraguan harbors. “I’m pissed off,” Goldwater wrote, complaining that Casey had misled the committee on an action that amounted to an act of war. The panel’s Democratic vice chairman, Daniel Patrick Moynihan of New York, quit the committee as the “most emphatic way to protest” the Reagan administration’s failure to inform lawmakers.
Paul Merrell

The Ron Paul Institute for Peace and Prosperity : End Torture, Shut Down the CIA! - 0 views

  • End Torture, Shut Down the CIA! Written by Ron Paul Sunday July 27, 2014
  • Remember back in April, 2007, when then-CIA director George Tenet appeared on 60 Minutes, angrily telling the program host, “we don’t torture people”? Remember a few months later, in October, President George W. Bush saying, “this government does not torture people”? We knew then it was not true because we had already seen the photos of Iraqis tortured at Abu Ghraib prison four years earlier.   Still the US administration denied that torture was torture, preferring to call it “enhanced interrogation” and claiming that it had disrupted so many terrorist plots. Of course, we later found out that the CIA had not only lied about the torture of large numbers of people after 9/11, but it had vastly exaggerated any valuable information that came from such practices. However secret rendition of prisoners to other places was ongoing.
  • The US not only tortured people in its own custody, however. Last week the European Court of Human Rights found that the US government transferred individuals to secret detention centers in Poland (and likely elsewhere) where they were tortured away from public scrutiny. The government of Poland was ordered to pay hundreds of thousands of dollars in damages to two victims for doing nothing to stop their torture on Polish soil.
  • ...1 more annotation...
  • Meanwhile, former CIA director George Tenet and other senior current and former CIA officials are said to be frantically attempting to prepare a response to a planned release of an unclassified version of a 6,500 page Senate Intelligence Committee study on the torture practices of that agency. The CIA was already caught tapping into the computers of Senate investigators last year, looking to see what information might be contained in the report. Those who have seen the report have commented that it details far more brutal CIA practices than have been revealed to this point.   Revelations of US secret torture sites overseas and a new Senate investigation revealing widespread horrific CIA torture practices should finally lead to the abolishment of this agency. Far from keeping us safer, CIA covert actions across the globe have led to destruction of countries and societies and unprecedented resentment toward the United States. For our own safety, end the CIA!
  •  
    Ron Paul calls for shutting down the CIA. He's not the first. For example, former President Harry Truman, who established the CIA, said years after he left office that the Agency was operating so far outside its authority that it should be shut down. And JFK was also seriously considering ending the CIA. By statute, the CIA is limited to intelligence gathering, acting as the central intelligence agency for gathering and reporting to the President on all intelligence from all other intelligence agencies.  One error in Paul's article, where he says that the recent decisions were the first time the European Court of Human Rights had connected any EU country to U.S. torture practices. The first was in 2012 in the case of El-Masri v. The Former Yugoslav Republic of Macedonia, No. 39630/09, European Court of Human Rights (Grand Chamber Judgment of 13 December 2012), http://hudoc.echr.coe.int/sites/fra-press/pages/search.aspx?i=003-4184975-4955119, also at http://tinyurl.com/c88qs74. See also El-Masri Application, http://www.law.columbia.edu/ipimages/Human_Rights_Institute/ctlm%20docs/ElMasriApplication.pdf.
Paul Merrell

Asia Times Online :: Middle East News, Iraq, Iran current affairs - 0 views

  • And why did Islamic State, formerly ISIS, become winners? Because the "West" regimented, schooled, trained, logistically helped and weaponized most of IS's Takfiri goons with a mission at hand: to destroy Syria. The "West" lauded them as "Syrian rebels". Freedom fighters. Washington even promoted Jabhat al-Nusra (the official al-Qaeda franchise in Syria, and a "terrorist organization", according to the State Department) as "good" jihadis, as well as the preferred Saudi combo, the Islamic Front.
  • The House of Saud, directly and indirectly, and the proverbial wealthy Gulf Cooperation Council donors are the Mom and Dad of ISIS. All duly vetted/approved by the industrial-military-Orwellian-Panopticon complex. And yet "Assad must go" had other ideas for Syria. He didn't go. He and his army resisted and counter-attacked. So the original mission in Syria morphed across the (non-existent) desert border towards Iraq. ISIS kept expanding - via extortion, kidnapping, captured oil fields, tribal smuggling networks.
  • How convenient that IS strategy is totally divide and rule. Totally balkanization of Iraq. Totally mum on Israel's slow-motion ethnic cleansing of Gaza. Totally useful in wagging the (beheading) dog to make the world forget about Gaza. Moroever, IS/ISIS strategy, stripped to the bone, is Pentagon manual; clear, hold and build - then expand (to an area larger than Great Britain). It's even Pentagon manual redux - as in building "coalitions of the willing" (see the alliance with "remnants" - Rummy talk - of the Saddam regime propelling their northern Iraq summer offensive.) How convenient that the mighty Orwellian/Panopticon complex satellite maze could not identify a long convoy of gleaming white Toyotas crossing the desert towards their summer conquests. And how convenient that a Briton beheading an American - what a "special relationship" plot twist! - fully sanctions the Return of Iraq Bombing ("for months", in Obama's words); more strikes; more drones; perhaps more boots on the ground; perhaps, in the near future, a Syria extension. IS also took over Tikrit, the birthplace of Saddam, in their summer adventure. Now Baghdad's military are trying to take it back. IS welcomed them with minefields, booby-trapped buildings, an array of snipers and hardcore mortar fire. How convenient that Obama's "humanitarian" bombs are not involved in R2P ("responsibility to protect") Saddam's birthplace. What really matters is the US consulate in Erbil, scores of CIA operatives and vast Big Oil interests in Iraqi Kurdistan.
  •  
    Pepe Escbar catches a whiff of the same rat Tony Cartalucci caught, but sees it ending badly for the House of Saud. I've said it before, but I'll say it again: Escobar has earned very high credibility with me. 
Paul Merrell

New Evidence Links Ledezma, COPEI to Thwarted Coup | venezuelanalysis.com - 0 views

  • Speaking on his television program "Con el Mazo Dando", National Assembly President Diosdado Cabello released new evidence on Wednesday regarding the thwarted "Blue Coup" attempt against the government of Nicolas Maduro on February 12.Coming in the wake of the arrest of Antonio Ledezma last Thursday on charges of sedition and conspiracy, these revelations could lend further support to allegations concerning both the Caracas Metropolitan Mayor's role in the coup as well as the advance knowledge and involvement of the opposition party COPEI.Ledezma Linked to Coup Plotters Via U.S. Phone NumberAccording to Cabello, Ledezma allegedly made three phone calls in December to a New York-based number belonging jointly to General Eduardo Báez Torrealba (alias "Máximo") and Carlos Manuel Osuna Saraco (alias "Guillermo"), the latter of whom is believed to be the "financier" of the coup plot.
  • In a two week period spanning from the 25th of December to the 10th of January, Lieutenant Henry Salazar Moncada, who has been arrested and formally charged for his role in the coup attempt, also made three separate phone calls to the same U.S. number."The evidence is notorious. The proof is extremely clear [...] It's a coup, and as President Nicolas Maduro said, there are very few opposition leaders who didn't know anything [about the coup]," announced the President of the National Assembly.Antonio Ledezma was one of three signatories of a public statement by leaders of the Venezuelan opposition calling for the ouster of President Nicolas Maduro as part of a "national transition", which was released just 24 hours prior to the coup attempt.The other signatories were multi-millionaire former legislator Maria Corina Machado, whose various NGOs have received millions in funding from the U.S. government, and Voluntad Popular leader Leopoldo Lopez, who currently awaits trial for his role in leading violent opposition protests last year that took the lives of 43 people.
  • Ledezma has also been linked to extreme right-wing opposition figures such as Lorent Gómez Saleh, who was extradited from Colombia and charged with allegedly conspiring with paramilitaries to launch terrorist attacks as part of a campaign of so-called "resistance" against the Venezuelan government.COPEI Leaders Discuss Links to Military Officials "Preparing How to Do the Transition"On his program on Wednesday night, Cabello also presented a recording of an alleged phone call between the first COPEI vice-president for Lara State Jose Cassany, and another top party official by the name of Antonio Sotillo in which the two christian democrats appear to discuss preparations for a coup.In a conversation recorded on January 3 of this year, Cassany informs Sotillo that he is friends with a businessman who has a relationship "with the civil and military worlds, active military [officials], including generals."He added that these military officials were "preparing how to do the transition," which is the name given by the opposition to their demand for the ouster of President Nicolas Maduro.
  • ...4 more annotations...
  • In another alleged phone recording highlighted by the President of the National Assembly, the Caracas president of COPEI Antonio Ecarri and the secretary general Rogelio Diaz consider the option of a coup against President Nicolas Maduro.In a recording dated February 21, Ecarri asks Diaz if he received the message from national secretary general Herberto Diaz and then goes on to state that, "one cannot have a double posture in life, if you are going to abandon the electoral field, you are going to call openly for a coup and everything else, that's fine, that is a path [...] I say we must look for a different mechanism."Diaz agrees with Ecarri's affirmation that while a coup represents a legitimate "path", a "different mechanism" is needed, adding that otherwise, "we put everything on the table and they put us in jail.The conversation ends with the two leaders agreeing on the need to "promote street activity".
  • Nonetheless, since February 2014, opposition "street activity" has largely taken the form of violent protests, which resulted in the death of 43 people last year as well as millions of dollars in damages to public property.On Tuesday, Public Ministry officials discovered a weapons cache at COPEI headquarters in Las Palmas, Caracas. Among the weapons found were 52 homemade explosive devices resembling a type of grenade, 32 molotov cocktails, and four gas masks.Officials also discovered various pamphlets with messages expressing support for Metropolitan Mayor Antonio Ledezma in the wake of his arrest on charges of conspiracy and sedition.
  • In the same program on Wednesday, Diosdado Cabello also unveiled a recording of the alleged confession of First Lieutenant Luis Lugo Calderón, revealing further details regarding the thwarted coup effort earlier this month.During his interrogation, the Air Force Lieutenant confirmed the existence of a video intended to be the "preamble" to the coup, "calling on the superior officers to wake up, asking for the renunciation of the President of the Republic, and saying that the lower officers were against the government."Lugo further elaborated that the video was to be disseminated outside the country by the Miami-based journalist Patricia Poleo around the time of Carnival, when vast numbers of Venezuelans travel to the beach and other parts of the country.The officer also substantiated allegations that coup plotters intended to use a "Super Tucano" counter-insurgency aircraft to bomb numerous ground targets such as the Miraflores Palace, teleSur, and the Ministry of Defense.
  • Identifying himself as the intended pilot of the military aircraft, he added that among the targets were air force bases located in highly populated cities, including the La Carlota base in the wealthy Caracas neighborhood of Chacao as well as the the Sucre base in the city of Maracay in Aragua State.Furthermore, the Lieutenant indicated that he had been approached by an official from the British embassy with an offer of asylum in the event that the coup failed, though he did not give further details.
  •  
    Isn't it odd how quiet Washington, D.C. has been about the arrests? In January, Obama signed legislation imposing economic sanctions on Venezuela because it had arrested "protestors" during the last coup attempt. Of course the protestors were members of the U.S. recruited "opposition" and had been arrested for some extremely violent behavior. Could it be that CIA realized that Venezuela has firm evidence of U.S. and U.K. involvement this time around?
Paul Merrell

The al Qaeda Files: Bin Laden Documents Reveal a Struggling Organization - The Intercept - 0 views

  • Palm oil cultivation in West Africa, climate change, and how to kill Americans more effectively than cigarettes. These were the issues on Osama bin Laden’s mind in his final years as he struggled to direct the terrorist group’s activities from his hideout in Pakistan, according to newly released files retrieved from the compound where he was killed. Direct communications between the al Qaeda leader and his inner circle were entered as evidence in a terrorism trial recently concluded in Brooklyn, New York, effectively doubling the amount of publicly available documents recovered from bin Laden’s final hideout. Together the newly disclosed documents paint a picture of a man who, despite being holed up for years in his high-walled compound in the garrison town of Abbottabad, Pakistan, maintained a hands-on role managing al Qaeda in the face of a crippling “espionage war” and mounting bureaucratic obstacles. The emergence of the documents marks just the second time since the historic 2011 raid, which ended in the death of bin Laden, that documentary evidence recovered from his compound has been made public; 17 other documents were declassified and released to West Point’s Combating Terrorism Center in 2012.
  • The new documents were entered as evidence in the federal trial of Abid Naseer, a Pakistani national convicted of plotting with al Qaeda to carry out a bomb attack in Manchester, England between 2008 and 2009; Naseer is not mentioned in the documents. U.S. attorneys used the recovered documents to support the testimony of an FBI agent who was present when a team of U.S. Navy SEALs returned bin Laden’s body and the materials they recovered from his compound to a U.S. base in Afghanistan.
  •  
    But are the docs real or forgeries? The evidence that the Abbotabad raid killed bin Laden is beyond thin. 
Paul Merrell

57 Years Ago: U.S. and Britain Approved Use of Islamic Extremists to Topple Syrian Gove... - 0 views

  • BBC reports that – in 1957 – the British and American leaders approved the use of Islamic extremists and false flag attacks to topple the Syrian government: Nearly 50 years before the war in Iraq, Britain and America sought a secretive “regime change” in another Arab country… by planning the invasion of Syria and the assassination of leading figures.   Newly discovered documents show how in 1957 [former Prime Minister of the United Kingdom] Harold Macmillan and President Dwight Eisenhower approved a CIA-MI6 plan to stage fake border incidents as an excuse for an invasion by Syria’s pro-western neighbours, and then to “eliminate” the most influential triumvirate in Damascus.   ***   Although historians know that intelligence services had sought to topple the Syrian regime in the autumn of 1957, this is the first time any document has been found showing that the assassination of three leading figures was at the heart of the scheme. In the document drawn up by a top secret and high-level working group that met in Washington in September 1957, Mr Macmillan and President Eisenhower were left in no doubt about the need to assassinate the top men in Damascus.
  • Kermit Roosevelt had a proven track record in this sort of thing.  According to the New York Times, he was the leader of the CIA’s coup in Iran in 1953, which – as subsequently admitted by the CIA - used false flag terror to topple the democratically elected leader or Iran. BBC continues: More importantly, Syria also had control of one of the main oil arteries of the Middle East, the pipeline which connected pro-western Iraq’s oilfields to Turkey.   ***   The report said that once the necessary degree of fear had been created, frontier incidents and border clashes would be staged to provide a pretext for Iraqi and Jordanian military intervention. Syria had to be “made to appear as the sponsor of plots, sabotage and violence directed against neighbouring governments,” the report says. “CIA and SIS should use their capabilities in both the psychological and action fields to augment tension.”   ***   The plan called for funding of a “Free Syria Committee” [hmmm ... sounds vaguely familiar], and the arming of “political factions with paramilitary or other actionist capabilities” within Syria. The CIA and MI6 would instigate internal uprisings, for instance by the Druze [a Shia Muslim sect] in the south, help to free political prisoners held in the Mezze prison, and stir up the Muslim Brotherhood in Damascus.
  • [Background:  Governments from Around the World – Including Western, Islamic, Asian and African Nations – ADMIT They Carry Out False Flag Terror] Is it purely coincidence that the U.S. has heavily armed Al Qaeda Muslim extremists in Syria (and see this), and trained the jihadis who later became ISIS? Regime change in Syria was not a once-off plan.   Neoconservatives also planned regime change in Syria more than 20 years ago … in 1991. The West Has Been Arbitrarily Breaking Up Middle Eastern Countries for 100 Years The Western powers agreed 100 years ago to arbitrarily divvy up the Middle East, without regard for historical boundries. Neooconservatives in the U.S. and Israel have long advocated for the balkanization of Syria into smaller regions based on ethnicity and religion. The goal was to break up the country, and to do away with the sovereignty of Syria as a separate nation. (The same goal has long applied to Iraq and other Arab states as well.)
  • ...2 more annotations...
  • In 1982, a prominent Israeli journalist formerly attached to the Israeli Foreign Ministry allegedly wrote a book expressly calling for the break up of Syria: All the Arab states should be broken down, by Israel, into small units ….   Dissolution of Syria and Iraq later on into ethnically or religiously unique areas such as in Lebanon, is Israel’s primary target on the Eastern front in the long run. In any event, it is well-documented that – in 1996 – U.S. and Israeli Neocons advocated: Weakening, containing, and even rolling back Syria ….
  • In summary, we don’t have conclusive proof that the U.S., Israeli or their allies have intentionally broken up Syria. But in light of such claims – and the 57-year old American-British plan to stir up Muslim Brotherhood and other religious extremists  in Syria – maps showing the Islamic jihadi group ISIS’ carving up of Syria (and Iraq) into “the Islamic State” are interesting, indeed:
Paul Merrell

Files on UK role in CIA rendition accidentally destroyed, says minister | World news | ... - 0 views

  • The British government's problems with missing files deepened dramatically when the Foreign Office claimed documents on the UK's role in the CIA's global abduction operation had been destroyed accidentally when they became soaked with water.In a statement that human rights groups said "smacked of a cover-up", the department maintained that records of post-9/11 flights in and out of Diego Garcia, the British territory in the Indian Ocean, were "incomplete due to water damage".The claim comes amid media reports in the US that a Senate report due to be published later this year identifies Diego Garcia as a location where the CIA established a secret prison as part of its extraordinary rendition programme. According to one report, classified CIA documents state that the prison was established with the "full cooperation" of the UK government.
  • Ministers of successive governments have repeatedly given misleading or incomplete information about the CIA's use of Diego Garcia. In February 2008, the then foreign secretary, David Miliband, was forced to apologise to MPs and explain that Tony Blair's "earlier explicit assurances that Diego Garcia had not been used for rendition flights" had not been correct. Miliband said at this point that two rendition flights had landed, but that the detainees on board had not disembarked.Miliband's admission was made after human rights groups produced irrefutable evidence that aircraft linked to the rendition programme had landed on Diego Garcia. Since then, far more aircraft have been shown to have been involved in the operation.The "water damage" claim was given in response to a parliamentary question by the Tory chair of the Treasury select committee, Andrew Tyrie, who has been investigating the UK's involvement in the rendition programme for several years.
  • The British government is particularly sensitive about the allegations that Diego Garcia hosted one of the CIA's prisons, at times claiming that it knows only that which it is told by Washington. Although the island has operated as a US military base since the islanders were evicted in the 1960s, it remains a British territory, and its use during the rendition programme would have placed the UK in breach of a raft of international and domestic laws.Belhaj and his wife are suing MI6, the agency's former head of counter-terrorism Sir Mark Allen and Jack Straw, who was foreign secretary at the time that the couple were abducted.Last month, the Commons cross-party defence committee suggested that information about the extent to which the CIA used the island as a "black site" to transfer detainees was still being withheld. "Recent developments have once again brought into question the validity of assurances by the US about its use of Diego Garcia," it said.The committee warned that it will assess the implications for Britain and for "public confidence" in its previous statements on US use of Diego Garcia, and said the US should not in future be permitted to use the island, to transfer terror suspects, for combat operations, "or any other politically sensitive activity", without the explicit authorisation from the UK government.
  • ...1 more annotation...
  • Although Miliband told MPs that detainees had not been held on Diego Garcia, others have contradicted this assertion.Manfred Nowak, as United Nations special rapporteur on torture, said he had received "credible evidence from well-placed sources familiar with the situation on the island" that CIA detainees had been held there between 2002 and 2003.General Barry McCaffrey, a former head of Southcom, the US military's southern command, has twice stated publicly that Diego Garcia has been used by the US to hold prisoners, saying in one radio interview in May 2004: "We're probably holding around 3,000 people, you know, Bagram air field, Diego Garcia, Guantánamo, 16 camps throughout Iraq."In 2003, Time magazine quoted "a regional intelligence official" as saying that a man accused of plotting the 2002 Bali nightclub bombing was being interrogated on Diego Garcia. Five years later the magazine reported that a CIA counter-terrorism official said a high-value prisoner or prisoners were being held and interrogated on the island.In August 2008, the Observer reported that former US intelligence officers "unofficially told senior Spanish judge Baltasar Garzón that Mustafa Setmarian, a Spanish-based Syrian accused of running terrorist training camps in Afghanistan, was taken to Diego Garcia in late 2005 and held there for months".
Paul Merrell

Germany asks CIA station chief to leave over spying allegations - The Washington Post - 0 views

  • The German government ordered the CIA’s top officer in Berlin to leave the country Thursday in an extraordinary escalation of a conflict between the two allies over American espionage. The move amounts to a high-profile expression of German anger over alleged CIA operations uncovered by German investigators in recent weeks, as well as continued public outrage over the exposure last year of widespread U.S. surveillance programs whose targets included Chancellor Angela Merkel. A spokesman for the German government, Steffen Seibert, confirmed the expulsion of the CIA station chief in a statement that made clear Berlin regards U.S. espionage efforts as a breach of trust.
  • The decision means that the United States will be forced to withdraw an officer who oversees U.S. spying programs in Germany but also serves as the main point of contact with German intelligence services — exchanging information on subjects ranging from terrorist plots to Iranian nuclear ambitions. In ordering the CIA station chief to leave, Germany resorted to a form of retaliation that is occasionally employed by determined espionage adversaries — such as the United States and Russia — but rarely by such a close ally.
  • Before ordering him out, Germany “had to make a calculation of what they were going to lose — they get a substantial amount of intelligence from us,” said a senior former U.S. intelligence official who worked closely with Berlin and spoke on the condition of anonymity because of the sensitivity of the subject. “There will be people in the [U.S.] intelligence community who will want to say, ‘That’s it.’ ” Former U.S. officials said the agency pulled back on certain spying operations last year amid concern about the fallout from the Edward Snowden leaks. At the same time, the former officials said, the latest arrest and raids indicate that Germany has stepped up its defenses and efforts to root out U.S. spies. Even before the expulsion, U.S. officials said espionage-related frictions with Germany had hurt diplomatic relations with an ally the United States has relied on for support in a series of security matters, including efforts to contain Russian aggression in Ukraine.
  •  
    O.K. Now how do we boot the CIA out of America?
Paul Merrell

Letter from Retired Military Leaders to President Obama on CIA and the Release of the T... - 0 views

  • On your second day in office, you led the country forward by issuing executive orders banning torture and other forms of abusive interrogation. Many of us were in the Oval Office that day, proud to stand behind you as you signaled an end to the misguided policies of the post-9/11 period. As retired generals and admirals, we have worked since that day to build a stronger, more durable consensus against torture in our country so that, at a future moment when our nation is tested, the American people will reject calls to resort to such abuses. We welcomed your public support for declassification of the Senate Select Intelligence Committee’s study on the CIA’s rendition, detention, and interrogation program. We believe that the American people must understand fully what the program entailed, how it came to be, and what was gained—and lost— because of it. We write to you today because we believe your strong record against torture is being undermined by members of your own administration. In part because there has been so little transparency about the torture program, some former government officials continue to claim that so-called “enhanced” interrogation techniques were necessary to disrupt terrorist plots and save lives. Now one of the key proponents of this false narrative that “torture works,” the former CIA director George Tenet, is reportedly coordinating with the current leadership of the CIA to discredit the Senate intelligence committee’s report. CIA Director John Brennan recently told the Wall Street Journal that he plans to "take issue” with parts of the report that he “believe[s] are inaccurate or misleading."
  • It is understandable that current and former employees of the CIA feel protective of the agency’s reputation and embarrassed by what the Senate study contains. The U.S. military’s examination of torture in its ranks after the Abu Ghraib scandal was painful; it was also necessary to the health of the institution. The stakes are too high to allow the intelligence community to circle the wagons and launch a concerted campaign to undermine the report’s credibility. Ultimately, an American public that understands the high costs of torture is the best guarantee against a future president rescinding your executive order and treating torture as a viable policy option. There is no substitute for leadership from the top on an issue like this. You have set the direction for your administration that torture is unacceptable. But for that leadership to have a lasting impact on the direction of our country, beyond your administration, you must act to ensure that Americans learn the right lessons from our past. We urge you to make clear in no uncertain terms that you expect CIA Director John Brennan to support an expansive declassification of the report and an honest reckoning with its findings.
  •  
    Signed by a whole bunch of retired generals and admirals. 
Paul Merrell

The Spy Cables: A glimpse into the world of espionage - Al Jazeera English - 0 views

  • A digital leak to Al Jazeera of hundreds of secret intelligence documents from the world's spy agencies has offered an unprecedented insight into operational dealings of the shadowy and highly politicised realm of global espionage. Over the coming days, Al Jazeera's Investigative Unit is publishing The Spy Cables, in collaboration with The Guardian newspaper.
  • Spanning a period from 2006 until December 2014, they include detailed briefings and internal analyses written by operatives of South Africa's State Security Agency (SSA). They also reveal the South Africans' secret correspondence with the US intelligence agency, the CIA, Britain's MI6, Israel's Mossad, Russia's FSB and Iran's operatives, as well as dozens of other services from Asia to the Middle East and Africa.
  • Among the revelations, the Spy Cables disclose how: Israel's Mossad told its allies that Iran was not working to produce nuclear weapons just a month after Prime Minister Benjamin Netanyahu warned it was barely a year from being able to do so; The CIA made attempts to contact Hamas directly despite the US government listing the Palestinian group as a "terrorist organisation"; Britain's MI6 sought South African help in an operation to recruit a North Korean official who had previously refused their cash; and South African and Ethiopian spies struggled to "neutralise" an assassination plot targeting a leading African diplomat.
  • ...6 more annotations...
  • Mossad contradicted Netanyahu on Iran nuclear programme The Spy Cables A glimpse into the world of espionage Spy Cables South African spies wary of Iran operations Spy Cables expose 'desperate' US approach to Hamas Israeli cable reveals S Africa missile theft cover-up The Spy Cables - Al Jazeera English Yazidis battle ISIL Disaster 'made us stronger' Spy Cables Abbas and Israel ally against 2009 UN probe Cables describe British attempt to recruit N Korean spy The Rise of the Oligarchs
  • Unlike the Edward Snowden documents that focus on electronic signals intelligence, commonly referred to in intelligence circles as "SIGINT", the Spy Cables deal with human intelligence, or "HUMINT".
  • Rather than chronicling spy-movie style tales of  ruthless efficiency of intelligence agencies, they offer an unprecedented glimpse into the daily working lives of people whose jobs are kept secret from the public.
  • The Spy Cables also reveal that in many cases, intelligence agencies are over-classifying information and hiding behind an unnecessary veil of secrecy. This harms the ability of a democratic society to either consent to the activities of their intelligence agencies or provide adequate checks and balances to their powers.
  • Spy Cables expose 'desperate' US approach to Hamas Leaked documents also show Mossad lobbying South Africa against Goldstone Report, claiming Abbas shared their stance.
  • Spy Cables: South African spies wary of Iran operations Leaked documents describe Tehran working to counter sanctions by using front companies and official channels.
Paul Merrell

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
Paul Merrell

Russia Tells U.S. Military to Get Out of Syria - 0 views

  • Russia ramped up its calls for the U.S. military to depart from Syria on Thursday, contending it has no substantial reasons to be in the country and its presence there "must end."“Any reasons cited by the Americans to justify their further military presence... are just excuses and we think their presence must end," Alexander Lavrentiev, Russian President Vladimir Putin's envoy to Syria, told reporters. Lavrentiev was in Astana, Kazakhstan, on Thursday ahead of peace talks regarding the Syria conflict between Russia, Iran and Turkey, Reuters reports. Russia, a major ally of Syrian President Bashar al-Assad, has played a significant role in the Syria conflict. 
  • This is not the first time the Russian government has expressed such views in recent weeks. Russia seemingly feels the U.S. military has no purpose in Syria now that the the Islamic State militant group (ISIS) has largely lost its foothold in Syria and Iraq. The envoy's remarks also come after the U.S. and Russia have sparred over airspace in Syria. In mid-December, two U.S. warplanes in Syria were diverted from supporting ground operations against ISIS to intercept Russian fighter jets that allegedly crossed into U.S. coalition airspace. But the Pentagon has signified it has no plans to withdraw U.S. troops from Syria any time in the near future. "We are going to maintain our commitment on the ground as long as we need to, to support our partners and prevent the return of terrorist groups," Pentagon spokesperson Eric Pahon told Agence France-Presse earlier this month. "To ensure an enduring defeat of ISIS, the coalition must ensure it cannot regenerate, reclaim lost ground or plot external attacks," he added. There are currently nearly 2,000 U.S. troops in Syria, according to numbers from the Pentagon. Since the Syrian conflict began in 2011, it has claimed more than 400,000 lives, according to the U.N., and contributed to the worst refugee crisis since World War II. 
« First ‹ Previous 81 - 97 of 97
Showing 20 items per page