Skip to main content

Home/ History Readings/ Group items matching "Intercepts" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
maddieireland334

Belgium shows off Russian plane intercepts - CNN.com - 0 views

  • New photos released by Belgium give a close-up look at some interesting Russian aircraft that Belgian F-16 fighters encountered during a four-month stint as part of NATO's Baltic Air Policing mission.
  • The Russian planes intercepted by the Belgians included a Su-27 Flanker, a Tu-134AK, an Il-76, an An-72 and an An-12PPS, according to The Aviationist blog, which reported on the photos last week
  • In April, the U.S. accused a Russian Su-27 jet of doing a barrel roll over a U.S. Air Force RC-135 reconnaissance plane over the Baltic Sea.
  • ...1 more annotation...
  • Russia denied its aircraft performed any dangerous maneuvers as it intercepted the U.S. plane.
izzerios

N.S.A. Gets More Latitude to Share Intercepted Communications - The New York Times - 0 views

  • In its final days, the Obama administration has expanded the power of the National Security Agency to share globally intercepted personal communications with the government’s 16 other intelligence agencies before applying privacy protections.
  • new rules significantly relax longstanding limits on what the N.S.A. may do with the information gathered by its most powerful surveillance operations
  • the government is reducing the risk that the N.S.A. will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will see private information about innocent people.
  • ...16 more annotations...
  • Previously, the N.S.A. filtered information before sharing intercepted communications with another agency, like the C.I.A. or the intelligence branches of the F.B.I. and the Drug Enforcement Administration
  • N.S.A.’s analysts passed on only information they deemed pertinent
  • other intelligence agencies will be able to search directly through raw repositories of communications intercepted by the N.S.A.
  • “This is not expanding the substantive ability of law enforcement to get access to signals intelligence,”
  • “It is simply widening the aperture for a larger number of analysts, who will be bound by the existing rules.”
  • Toomey, a lawyer for the American Civil Liberties Union, called the move an erosion of rules intended to protect the privacy of Americans when their messages are caught by the N.S.A.’s powerful global collection methods
  • “Seventeen different government agencies shouldn’t be rooting through Americans’ emails with family members, friends and colleagues, all without ever obtaining a warrant.”
  • “Rather than dramatically expanding government access to so much personal data, we need much stronger rules to protect the privacy of Americans,” Mr. Toomey said
  • Under the new system, agencies will ask the N.S.A. for access to specific surveillance feeds, making the case that they contain information relevant and useful to their missions.
  • The move is part of a broader trend of tearing down bureaucratic barriers to sharing intelligence between agencies that dates back to the aftermath of the terrorist attacks of Sept. 11, 2001.
  • Congress enacted the FISA Amendments Act — which legalized warrantless surveillance on domestic soil so long as the target is a foreigner abroad, even when the target is communicating with an American
  • Among the most important questions left unanswered in February was when analysts would be permitted to use Americans’ names, email addresses or other identifying information to search a 12333 database and pull up any messages to, from or about them that had been collected without a warrant.
  • National security analysts sometimes search that act’s repository for Americans’ information, as do F.B.I. agents working on ordinary criminal cases. Critics call this the “backdoor search loophole,” and some lawmakers want to require a warrant for such searches.
  • However, under the rules, if analysts stumble across evidence that an American has committed any crime, they will send it to the Justice Department.
  • Americans’ information gathered under Order 12333 do not apply to metadata: logs showing who contacted whom, but not what they said.
  • Analysts at the intelligence agencies may study social links between people, in search of hidden associates of known suspects, “without regard to the location or nationality of the communicants.”
Javier E

China Is Said to Use Powerful New Weapon to Censor Internet - NYTimes.com - 0 views

  • The Great Cannon, the researchers said in a report published on Friday, allows China to intercept foreign web traffic as it flows to Chinese websites, inject malicious code and repurpose the traffic as Beijing sees fit.
  • With a few tweaks, the Great Cannon could be used to spy on anyone who happens to fetch content hosted on a Chinese computer, even by visiting a non-Chinese website that contains Chinese advertising content.
  • “The operational deployment of the Great Cannon represents a significant escalation in state-level information control,” the researchers said in their report. It is, they said, “the normalization of widespread and public use of an attack tool to enforce censorship.”
  • ...10 more annotations...
  • The device has the ability not only to snoop on Internet traffic but also to alter the traffic and direct it — on a giant scale — to any website, in what is called a “man in the middle attack.”
  • The American system, according to the documents, which were published by The Intercept, can deploy a system of programs that can intercept web traffic on a mass scale and redirect it to a site of their choosing. The N.S.A. and its partners appear to use the programs for targeted surveillance, whereas China appears to use the Great Cannon for an aggressive form of censorship.
  • The similarities of the programs may put American officials on awkward footing, the researchers argue in their report. “This precedent will make it difficult for Western governments to credibly complain about others utilizing similar techniques,” they write.
  • the Chinese program illustrates how far officials in Beijing are willing to go to censor Internet content they deem hostile. “This is just one part of President Xi Jinping’s push to gain tighter control over the Internet and remove any challenges to the party,
  • Beijing continues to increase its censorship efforts under its State Internet Information Office, an office created under Mr. Xi to gain tighter control over the Internet within the country and to clamp down on online activism. In a series of recent statements, Lu Wei, China’s Internet czar, has called on the international community to respect China’s Internet policies.
  • “The position of the Chinese government is that efforts to serve what it views as hostile content inside China’s borders is a hostile and provocative act that is a threat to its regime stability and ultimately its national security.”
  • by sweeping up Baidu’s would-be visitors in its attacks, researchers and foreign policy experts say, Beijing could harm the company’s reputation and market share overseas.
  • “Because both the Great Cannon and Great Firewall are operating on the same physical link, we believe they are both being run under the same authority,
  • researchers’ fear is that the state could use its new weapon to attack Internet users, particularly dissidents, without their knowledge. If they make a single request to a server inside China or even visit a non-Chinese website that contains an ad from a Chinese server, the Great Cannon could infect their web communications and those of everyone they communicate with and spy on them.
  • Ultimately, researchers say, the only way for Internet users and companies to protect themselves will be to encrypt their Internet traffic so that it cannot be intercepted and diverted as it travels to its intended target.“Put bluntly,” the researchers said, “unprotected traffic is not just an opportunity for espionage but a potential attack vector.”
katherineharron

Woman suspected of sending letter containing ricin to Trump arrested - CNNPolitics - 0 views

  • A woman suspected of sending a letter containing the poison ricin to President Donald Trump was arrested
  • CNN previously reported that law enforcement had intercepted a ricin package sent to Trump last week, according to two law enforcement officials, and that investigators were looking into the possibility that it came from Canada.
  • Two tests had been done to confirm the presence of ricin. All mail for the White House is sorted and screened at an offsite facility before reaching the White House.
  • ...3 more annotations...
  • In a statement provided to CNN on Saturday, the FBI's Washington field office said that "the FBI and our U.S. Secret Service and U.S. Postal Inspection Service partners are investigating a suspicious letter received at a U.S. government mail facility. At this time, there is no known threat to public safety."
  • "We are aware of the concerning reports of packages containing ricin directed toward US federal government sites," Mary-Liz Power, chief spokeswoman for Canada's Minister of Public Safety Bill Blair, told CNN on Saturday.
  • Ricin is a highly toxic compound extracted from castor beans that has been used in terror plots. It can be used in powder, pellet, mist or acid form. If ingested, it causes nausea, vomiting and internal bleeding of the stomach and intestines, followed by failure of the liver, spleen and kidneys, and death by collapse of the circulatory system.
katyshannon

The Assassination Complex - 0 views

  • DRONES ARE A TOOL, not a policy. The policy is assassination. While every president since Gerald Ford has upheld an executive order banning assassinations by U.S. personnel, Congress has avoided legislating the issue or even defining the word “assassination.” This has allowed proponents of the drone wars to rebrand assassinations with more palatable characterizations, such as the term du jour, targeted killings.”
  • When the Obama administration has discussed drone strikes publicly, it has offered assurances that such operations are a more precise alternative to boots on the ground and are authorized only when an “imminent” threat is present and there is “near certainty” that the intended target will be eliminated. Those terms, however, appear to have been bluntly redefined to bear almost no resemblance to their commonly understood meanings.
  • Additional documents on high-value kill/capture operations in Afghanistan buttress previous accounts of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also paint a picture of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups.
  • ...10 more annotations...
  • The Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides.
  • The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.
  • Two sets of slides focus on the military’s high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4.
  • The first drone strike outside of a declared war zone was conducted more than 12 years ago, yet it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. Those guidelines offered little specificity, asserting that the U.S. would only conduct a lethal strike outside of an “area of active hostilities” if a target represents a continuing, imminent threat to U.S. persons,” without providing any sense of the internal process used to determine whether a suspect should be killed without being indicted or tried.
  • One top-secret document shows how the terror “watchlist” appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them.
  • The ISR study also reveals new details about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and killed him in Somalia.
  • Taken together, the secret documents lead to the conclusion that Washington’s 14-year high-value targeting campaign suffers from an overreliance on signals intelligence, an apparently incalculable civilian toll, and — due to a preference for assassination rather than capture — an inability to extract potentially valuable intelligence from terror suspects.
  • They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront.
  • These secret slides help provide historical context to Washington’s ongoing wars, and are especially relevant today as the U.S. military intensifies its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear.
  • Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy.
  •  
    The Intercept's release of top-secret government documents detailing U.S. drone strikes in the Middle East and Africa.
Javier E

N.S.A. Said to Have Spied on Leaders of Brazil and Mexico - NYTimes.com - 0 views

  • a document dated June 2012 shows that Mexican President Enrique Pena Nieto's emails were being read. The document's date is a month before Pena Nieto was elected. The document on which Greenwald based the report includes communications from Pena Nieto indicating who he would like to name to some government posts among other information.
  • As for Brazil's leader, the June 2012 document "doesn't include any of Dilma's specific intercepted messages, the way it does for Nieto," Greenwald told The Associated Press in an email. "But it is clear in several ways that her communications were intercepted, including the use of DNI Presenter, which is a program used by NSA to open and read emails and online chats."
  • In July, Greenwald co-wrote articles in O Globo that said documents leaked by Snowden indicate Brazil was the largest target in Latin America for the NSA program, which collected data on billions of emails and calls flowing through Brazil.
Grace Gannon

Nato jets 'intercept Russian plane' - 0 views

  •  
    Nato jets have intercepted a Russian spy plane that was flying over the Baltic Sea. Russia has recently been accused of several recent border violations in the region and has also been accused of sending submarines into Swedish waters, crossing borders once again.
Javier E

Heather Cox Richardson Offers a Break From the Media Maelstrom. It's Working. - The New York Times - 0 views

  • By my conservative estimate based on public and private Substack figures, the $5 monthly subscriptions to participate in her comments section are on track to bring in more than a million dollars a year, a figure she ascribes to this moment in history.
  • Dr. Richardson’s focus on straightforward explanations to a mass audience comes as much of the American media is going in the opposite direction, driven by the incentives of subscription economics that push newspapers, magazines, and cable channels alike toward super-serving subscribers, making you feel as if you’re on the right team, part of the right faction, at least a member of the right community
  • “What I am doing is speaking to women who have not necessarily been paying attention to politics, older people who had not been engaged,” Dr. Richardson said. “I’m an older woman and I’m speaking to other women about being empowered.”
  • ...10 more annotations...
  • She built a huge and devoted following on Facebook, which is widely and often accurately viewed in media circles as a home of misinformation, and where most journalists don’t see their personal pages as meaningful channels for their work.
  • She also contradicts the stereotype of Substack, which has become synonymous with offering new opportunities for individual writers to turn their social media followings into careers outside big media, and at times appears to be where purged ideological factions go to regroup
  • it’s true of left-leaning writers who have broken bitterly with elements of the mainstream liberal consensus, whether around race or national security, from the Intercept co-founder Glenn Greenwald to the Vox co-founder Matthew Yglesias to the firebrand Matt Taibbi,
  • When readers on Facebook started suggesting she write a newsletter, she realized she didn’t want to pay hundreds of dollars a month for a commercial platform, and jumped at Substack because it would allow her to send out her emails without charge to her or her readers
  • Substack makes its money by taking a percentage of writers’ subscription revenue, and she said she felt guilty that the company’s support team wasn’t getting paid for fixing her recurring problem: that her extensive footnotes set off her readers’ spam filters.
  • She thinks of her politics as Lincoln-era Republican, but she is in today’s terms a fairly conventional liberal, disturbed by President Trump and his attacks on America’s institutions.
  • she published her sixth book, “How the South Won the Civil War: Oligarchy, Democracy, and the Continuing Fight for the Soul of America,” an extended assault on the kind of nostalgia that animates Mr. Trump’s fight to preserve Confederate symbols
  • The face of the South in Dr. Richardson’s book is a bitterly racist and sexually abusive South Carolina planter and senator, James Henry Hammond, who called Jefferson’s notion that all men are created equal “ridiculously absurd.”
  • Dr. Richardson’s “readers are people who have been orphaned by the changes in media and the sensationalism and the meanness of so much of Twitter and Facebook, and they were surprised to find her there and pleased and spread the word,” said Bill Moyers
  • “You live in a world of thunderstorms,” he said, “and she watches the waves come in.”
kennyn-77

Migrant abuses continue in Libya. So does EU border training | AP News - 0 views

  • A confidential European Union military report calls for continuing a controversial EU program to train and equip Libya’s coast guard and navy despite growing concerns about their treatment of migrants, a mounting death toll at sea, and the continued lack of any central authority in the North African nation.
  • Europe’s determination to support Libya in the interception and return of tens of thousands of men, women and children to Libya, where they face insufferable abuse.
  • Hundreds of thousands of migrants hoping to reach Europe have made their way through Libya, where a lucrative trafficking and smuggling business has flourished in a country without a functioning government,
  • ...8 more annotations...
  • At least three requests have been filed to the International Criminal Court demanding that Libyan and European officials, as well as traffickers, militiamen and others be investigated for crimes against humanity.
  • A U.N. inquiry published in October also found evidence that abuses committed in Libya may amount to crimes against humanity.
  • The EU report noted the “excessive use of physical force” by a Libyan patrol during the Sept. 15 interception of a wooden boat with about 20 migrants off the coast of Libya.
  • In 2018 she got on a smuggler’s boat bound for Europe but her group was caught by Libyan authorities and taken to the notorious Tajoura detention center where detainees were beaten and abused. She was only released after a friend paid a $700 ransom to the guards.
  • Questioned about the detention centers in Libya, Stano said the EU’s position is clear: “They are unacceptable. The current arbitrary detention system must end.”
  • The Libyan government last month named Mohammed Al-Khoja, a militia leader implicated in abuses against migrants, to head the Department for Combating Irregular Migration, which oversees the detention centers.
  • “The Europeans pretend to show the good face,” said a Cameroonian woman who arrived in Libya in 2016 with her child thinking she would find work. Instead, she was trafficked and forced into prostitution after being separated from her daughter. The AP does not identify victims of sexual violence.
  • The Libyan forces used tactics “never observed before and not in compliance with (EU) training ... as well as international regulation,”
Javier E

Senate Votes to Extend Electronic Surveillance Authority - NYTimes.com - 0 views

  • Congress gave final approval on Friday to a bill extending the government’s power to intercept electronic communications of spy and terrorism suspects, after the Senate voted down proposals from several Democrats and Republicans to increase protections of civil liberties and privacy.
  • clearing it for approval by President Obama, who strongly supports it. Intelligence agencies said the bill was their highest legislative priority.
  • Congressional critics of the bill said that they suspected that intelligence agencies were picking up the communications of many Americans, but that they could not be sure because the agencies would not provide even rough estimates of how many people inside the United States had had communications collected under authority of the surveillance law, known as the Foreign Intelligence Surveillance Act.
  • ...5 more annotations...
  • The Foreign Intelligence Surveillance Act was adopted in 1978 and amended in 2008, with the addition of new surveillance authority and procedures, which are continued by the bill approved on Friday. The 2008 law was passed after the disclosure that President George W. Bush had authorized eavesdropping inside the United States, to search for evidence of terrorist activity, without the court-approved warrants ordinarily required for domestic spying.
  • By a vote of 52 to 43, the Senate on Friday rejected a proposal by Mr. Wyden to require the national intelligence director to tell Congress if the government had collected any domestic e-mail or telephone conversations under the surveillance law. The Senate also rejected, 54 to 37, an amendment that would have required disclosure of information about significant decisions by a special federal court that reviews applications for electronic surveillance in foreign intelligence cases.
  • The No. 2 Senate Democrat, Richard J. Durbin of Illinois, said the surveillance law “does not have adequate checks and balances to protect the constitutional rights of innocent American citizens.” “It is supposed to focus on foreign intelligence,” Mr. Durbin said, “but the reality is that this legislation permits targeting an innocent American in the United States as long as an additional purpose of the surveillance is targeting a person outside the United States.”
  • Mr. Merkley said the administration should provide at least unclassified summaries of major decisions by the Foreign Intelligence Surveillance Court. “An open and democratic society such as ours should not be governed by secret laws,” Mr. Merkley said, “and judicial interpretations are as much a part of the law as the words that make up our statute.”
  • Mr. Wyden said these writs reminded him of the “general warrants that so upset the colonists” more than 200 years ago. “The founding fathers could never have envisioned tweeting and Twitter and the Internet,” Mr. Wyden said. “Advances in technology gave government officials the power to invade individual privacy in a host of new ways.”
nataliedepaulo1

U.S. troops carry out ground raid against ISIS in Syria - The Washington Post - 0 views

  • BEIRUT — Members of an elite U.S. force have carried out a ground operation in eastern Syria aimed at capturing leaders of the Islamic State, U.S. officials said Monday.
  • A U.S. official said U.S. forces intercepted a vehicle thought to be carrying senior Islamic State members, but declined to say whether the militants had been captured or killed
  • “The Coalition can confirm a U.S. operation in the vicinity of Deir al-Zour on Jan. 8. The U.S. and the entire counter-ISIL Coalition will continue to pursue ISIL leaders wherever they are to ensure the security and stability of the region and our homelands,” he said in an email. ISIL is another name for the Islamic State.
rachelramirez

News Today - The Atlantic - 0 views

  • U.S. Ends 'Wet Foot, Dry Foot' Policy for Fleeing Cubans
  • the White House announced Thursday
  • Obama administration ended the policy with immediate effect through an executive order, one which could be reversed by the incoming Trump administration.
  • ...6 more annotations...
  • which was enacted by the Clinton administration in 1995, would grant residency for Cubans that made it to U.S. land, putting them on the path toward U.S. citizenship
  • Cubans who were intercepted in U.S. waters would be turned away and sent back to Cuba or a third country
  • “With this change we will continue to welcome Cubans as we welcome immigrants from other nations, consistent with our laws,” President Obama said
  • Hundreds of thousands of Cubans have fled the island nation since 1960
  • Since 2012, 118,000 Cubans have arrived in the U.S.,
  • This is just the latest step by the Obama administration in its continued efforts to normalize relations
sarahbalick

US activates missile shield base in Romania - BBC News - 0 views

  • US activates missile shield base in Romania
  • The US has activated a land-based missile defence station in Romania, which will form part of a larger and controversial European shield.
  • The US says the Aegis system is a shield to protect Nato from short and medium-range missiles, particularly from the Middle East.
  • ...8 more annotations...
  • Relations between the West and Russia have deteriorated since Moscow's annexation of Ukraine's southern Crimea peninsula in 2014.
  • The US is believed to have spent $800m (£554m) on radar and SM-2 missile interceptors since 2013.
  • The station will have a battery of SM-2 missile interceptors.
  • Nato and US officials say the system has been developed to track and intercept missiles fired from a "rogue" state. In the past Iran was mentioned in that context, but the US has also had North Korea in mind.
  • "Russia has repeatedly raised concerns that the US and Nato defence are directed against Russia and represents a threat to its strategic nuclear deterrent. Nothing could be further from the truth," he added.
  • "This decision is harmful and mistaken, because it is capable of upsetting strategic stability," said Mikhail Ulyanov, head of the Russian foreign ministry's department for proliferation and arms control issues.
  • He said the Americans' MK-41 launch system could also be used to fire cruise missiles, not just air defence missiles.
  • "From our viewpoint this is a violation of the Intermediate-Range Nuclear Forces Treaty," he said.
Megan Flanagan

Russian jet barrel-rolls over U.S. aircraft - CNNPolitics.com - 0 views

  • plane was barrel-rolled by a Russian jet over the Baltic Sea
  • when a Russian jet "performed erratic and aggressive maneuvers" as it flew within 50 feet of the U.S. aircraft's wing tip
  • "intercepted by a Russian SU-27 in an unsafe and unprofessional manner,"
  • ...7 more annotations...
  • actions of a single pilot have the potential to unnecessarily escalate tensions between countries
  • United States is protesting with the Russian government.Read More
  • incident were "not consistent with reality"
  • encounter comes just days after the U.S. Embassy in Moscow issued formal concerns with the Russian government over an incident last week in which Russian fighter jets flew close to the USS Donald Cook in the Baltic.
  • ncounters between Russian military aircraft and U.S. warships have become increasing common in recent months
  • Department of Defense announced it was spending $3.4 billion for the European Reassurance Initiative in an effort to deter Russian aggression against NATO allies following Russia's 2014 intervention in Ukraine.
  • U.S. has deployed additional military assets throughout Europe
Javier E

Woodward and Bernstein: 40 years after Watergate, Nixon was far worse than we thought - The Washington Post - 0 views

  • At its most virulent, Watergate was a brazen and daring assault, led by Nixon himself, against the heart of American democracy: the Constitution, our system of free elections, the rule of law.
  • an abundant record provides unambiguous answers and evidence about Watergate and its meaning. This record has expanded continuously over the decades with the transcription of hundreds of hours of Nixon’s secret tapes, adding detail and context to the hearings in the Senate and House of Representatives; the trials and guilty pleas of some 40 Nixon aides and associates who went to jail; and the memoirs of Nixon and his deputies.
  • Such documentation makes it possible to trace the president’s personal dominance over a massive campaign of political espionage, sabotage and other illegal activities against his real or perceived opponents.
  • ...38 more annotations...
  • In the course of his five-and-a-half-year presidency, beginning in 1969, Nixon launched and managed five successive and overlapping wars — against the anti-Vietnam War movement, the news media, the Democrats, the justice system and, finally, against history itself.
  • All reflected a mind-set and a pattern of behavior that were uniquely and pervasively Nixon’s: a willingness to disregard the law for political advantage, and a quest for dirt and secrets about his opponents as an organizing principle of his presidency.
  • Long before the Watergate break-in, gumshoeing, burglary, wiretapping and political sabotage had become a way of life in the Nixon White House.
  • What was Watergate? It was Nixon’s five wars.
  • In 1970, he approved the top-secret Huston Plan, authorizing the CIA, the FBI and military intelligence units to intensify electronic surveillance of individuals identified as “domestic security threats.” The plan called for, among other things, intercepting mail and lifting restrictions on “surreptitious entry” — that is, break-ins or “black bag jobs.”
  • On June 17, 1971 — exactly one year before the Watergate break-in — Nixon met in the Oval Office with his chief of staff, H.R. “Bob” Haldeman, and national security adviser Henry Kissinger. At issue was a file about former president Lyndon Johnson’s handling of the 1968 bombing halt in Vietnam.
  • “You can blackmail Johnson on this stuff, and it might be worth doing,” Haldeman said, according to the tape of the meeting. “Yeah,” Kissinger said, “but Bob and I have been trying to put the damn thing together for three years.” They wanted the complete story of Johnson’s actions.
  • “Huston swears to God there’s a file on it at Brookings,” Haldeman said. “Bob,” Nixon said, “now you remember Huston’s plan? Implement it. . . . I mean, I want it implemented on a thievery basis. God damn it, get in and get those files. Blow the safe and get it.”
  • Though Ellsberg was already under indictment and charged with espionage, the team headed by Hunt and Liddy broke into the office of his psychiatrist, seeking information that might smear Ellsberg and undermine his credibility in the antiwar movement.
  • “You can’t drop it, Bob,” Nixon told Haldeman on June 29, 1971. “You can’t let the Jew steal that stuff and get away with it. You understand?”
  • In a July 3, 1971, conversation with Haldeman, he said: “The government is full of Jews. Second, most Jews are disloyal. You know what I mean? You have a Garment [White House counsel Leonard Garment] and a Kissinger and, frankly, a Safire [presidential speechwriter William Safire], and, by God, they’re exceptions. But Bob, generally speaking, you can’t trust the bastards. They turn on you.”
  • In a tape from the Oval Office on Feb. 22, 1971, Nixon said, “In the short run, it would be so much easier, wouldn’t it, to run this war in a dictatorial way, kill all the reporters and carry on the war.”
  • John N. Mitchell, Nixon’s campaign manager and confidante, met with Liddy at the Justice Department in early 1972, when Mitchell was attorney general. Liddy presented a $1 million plan, code-named “Gemstone,” for spying and sabotage during the upcoming presidential campaign.
  • In Nixon’s third war, he took the weapons in place — the Plumbers, wiretapping and burglary — and deployed them against the Democrats challenging his reelection.
  • Operation Diamond would neutralize antiwar protesters with mugging squads and kidnapping teams; Operation Coal would funnel cash to Rep. Shirley Chisholm, a black congresswoman from Brooklyn seeking the Democratic presidential nomination, in an effort to sow racial and gender discord in the party;
  • Operation Opal would use electronic surveillance against various targets, including the headquarters of Democratic presidential candidates Edmund Muskie and George McGovern; Operation Sapphire would station prostitutes on a yacht, wired for sound, off Miami Beach during the Democratic National Convention.
  • Mitchell approved a $250,000 version, according to Jeb Magruder, the deputy campaign manager. It included intelligence-gathering on the Democrats through wiretaps and burglaries.
  • They discussed a secret $350,000 stash of cash kept in the White House, the possibility of using priests to help hide payments to the burglars, “washing” the money though Las Vegas or New York bookmakers, and empaneling a new grand jury so everyone could plead the Fifth Amendment or claim memory failure. Finally, they decided to send Mitchell on an emergency fundraising mission.
  • On Oct. 10, 1972, we wrote a story in The Post outlining the extensive sabotage and spying operations of the Nixon campaign and White House, particularly against Muskie, and stating that the Watergate burglary was not an isolated event. The story said that at least 50 operatives had been involved in the espionage and sabotage, many of them under the direction of a young California lawyer named Donald Segretti; several days later, we reported that Segretti had been hired by Dwight Chapin, Nixon’s appointments secretary. (The Senate Watergate committee later found more than 50 saboteurs, including 22 who were paid by Segretti.)
  • A favored dirty trick that caused havoc at campaign stops involved sweeping up the shoes that Muskie aides left in hotel hallways to be polished, and then depositing them in a dumpster.
  • In a memo to Haldeman and Mitchell dated April 12, 1972, Patrick Buchanan and another Nixon aide wrote: “Our primary objective, to prevent Senator Muskie from sweeping the early primaries, locking up the convention in April, and uniting the Democratic Party behind him for the fall, has been achieved.”
  • “I’d really like to get Kennedy taped,” Nixon told Haldeman in April 1971. According to Haldeman’s 1994 book, “The Haldeman Diaries,” the president also wanted to have Kennedy photographed in compromising situations and leak the images to the press.
  • On Sept. 8, 1971, Nixon ordered Ehrlichman to direct the Internal Revenue Service to investigate the tax returns of all the likely Democratic presidential candidates, as well as Kennedy. “Are we going after their tax returns?” Nixon asked. “You know what I mean? There’s a lot of gold in them thar hills.”
  • The arrest of the Watergate burglars set in motion Nixon’s fourth war, against the American system of justice. It was a war of lies and hush money, a conspiracy that became necessary to conceal the roles of top officials and to hide the president’s campaign of illegal espionage and political sabotage, including the covert operations that Mitchell described as “the White House horrors” during the Watergate hearings: the Huston Plan, the Plumbers, the Ellsberg break-in, Liddy’s Gemstone plan and the proposed break-in at Brookings.
  • In a June 23, 1972, tape recording, six days after the arrests at the Watergate, Haldeman warned Nixon that “on the investigation, you know, the Democratic break-in thing, we’re back in the problem area, because the FBI is not under control . . . their investigation is now leading into some productive areas, because they’ve been able to trace the money.”
  • Haldeman said Mitchell had come up with a plan for the CIA to claim that national security secrets would be compromised if the FBI did not halt its Watergate investigation.
  • Nixon approved the scheme and ordered Haldeman to call in CIA Director Richard Helms and his deputy Vernon Walters. “Play it tough,” the president directed. “That’s the way they play it, and that’s the way we are going to play it.”
  • On March 21, 1973, in one of the most memorable Watergate exchanges caught on tape, Nixon met with his counsel, John W. Dean, who since the break-in had been tasked with coordinating the coverup. “We’re being blackmailed” by Hunt and the burglars, Dean reported, and more people “are going to start perjuring themselves.” “How much money do you need?” Nixon asked.
  • “I would say these people are going to cost a million dollars over the next two years,” Dean replied. “And you could get it in cash,” the president said. “I, I know where it could be gotten. I mean, it’s not easy, but it could be done.”
  • Mitchell later denied approving the plan. He testified that he told Magruder: “We don’t need this. I’m tired of hearing it.” By his own account, he did not object on the grounds that the plan was illegal.
  • Nixon’s final war, waged even to this day by some former aides and historical revisionists, aims to play down the significance of Watergate and present it as a blip on the president’s record. Nixon lived for 20 years after his resignation and worked tirelessly to minimize the scandal.
  • In his 1978 memoir “RN,” Nixon addressed his role in Watergate: “My actions and omissions, while regrettable and possibly indefensible, were not impeachable.” Twelve years later, in his book “In the Arena,” he decried a dozen “myths” about Watergate and claimed that he was innocent of many of the charges made against him. One myth, he said, was that he ordered the payment of hush money to Hunt and others. Yet, the March 21, 1973, tape shows that he ordered Dean to get the money 12 times.
  • Even now, there are old Nixon hands and defenders who dismiss the importance of Watergate or claim that key questions remain unanswered.
  • By August, Nixon’s impending impeachment in the House was a certainty, and a group of Republicans led by Sen. Barry Goldwater banded together to declare his presidency over. “Too many lies, too many crimes,” Goldwater said. On Aug. 7, the group visited Nixon at the White House. How many votes would he have in a Senate trial? the president asked. “I took kind of a nose count today,” Goldwater replied, “and I couldn’t find more than four very firm votes, and those would be from older Southerners. Some are very worried about what’s been going on, and are undecided, and I’m one of them.”
  • In his last remarks about Watergate as a senator, 77-year-old Sam Ervin, a revered constitutionalist respected by both parties, posed a final question: “Why was Watergate?” The president and his aides, Ervin answered, had “a lust for political power.” That lust, he explained, “blinded them to ethical considerations and legal requirements; to Aristotle’s aphorism that the good of man must be the end of politics.”
  • Nixon had lost his moral authority as president. His secret tapes — and what they reveal — will probably be his most lasting legacy. On them, he is heard talking almost endlessly about what would be good for him, his place in history and, above all, his grudges, animosities and schemes for revenge. The dog that never seems to bark is any discussion of what is good and necessary for the well-being of the nation.
  • By the time he was forced to resign, Nixon had turned his White House, to a remarkable extent, into a criminal enterprise.
  • “Always remember,” he said, “others may hate you, but those who hate you don’t win unless you hate them, and then you destroy yourself.” His hatred had brought about his downfall. Nixon apparently grasped this insight, but it was too late. He had already destroyed himself.
Javier E

White House goes authoritarian on CNN scoop about Russia dossier - The Washington Post - 0 views

  • according to reporting by Sciutto and colleague Evan Perez, “multiple current and former U.S. law enforcement and intelligence officials tell CNN that intelligence intercepts of foreign nationals confirm that some of the conversations described in the dossier took place between the same individuals on the same days and from the same locations as detailed in the dossier.
  • So what did White House press secretary Sean Spicer say? “We continue to be disgusted by CNN’s fake news reporting.”
  • The response from officialdom aligns with an authoritarian’s refusal to face facts. After CNN broke its January story of high-level briefings on the dossier, Trump attempted to discredit the outlet by lumping it with BuzzFeed’s hasty and irresponsible decision to simply plop the unconfirmed dossier on its website. “You are fake news,” thundered Trump
  • ...2 more annotations...
  • , CNN’s reporting on the travels of the dossier up through the ranks of government remained intact — there wasn’t a fake word in it.
  • it “relates to conversations between foreign nationals,” according to CNN. And that draws a fake-news response from the White House press secretary?
malonema1

Obama White House rushed to protect files on Russian interference - The Boston Globe - 0 views

  • In Obama’s last days, his aides tried to leave clues about Russian meddling
  • In the Obama administration’s last days, some White House officials scrambled to spread information about Russian efforts to undermine the presidential election — and about possible contacts between associates of President-elect Donald Trump and Russians — across the government.
  • U.S. allies, including the British and the Dutch, had provided information describing meetings in European cities between Russian officials — and others close to Russia’s president, Vladimir Putin — and associates of President-elect Trump, according to three former U.S. officials who requested anonymity in discussing classified intelligence. Separately, U.S. intelligence agencies had intercepted communications of Russian officials, some of them within the Kremlin, discussing contacts with Trump’s associates.
  • ...2 more annotations...
  • Trump has accused the Obama administration of hyping the Russia storyline as a way to discredit his new administration
  • What followed was a push to preserve the intelligence that underscored the deep anxiety with which the White House and U.S. intelligence agencies had come to view the threat from Moscow.
anonymous

Trump Campaign Aides Had Repeated Contacts With Russian Intelligence - The New York Times - 0 views

  • Trump Campaign Aides Had Repeated Contacts With Russian Intelligence
  • WASHINGTON — Phone records and intercepted calls show that members of Donald J. Trump’s 2016 presidential campaign and other Trump associates had repeated contacts with senior Russian intelligence officials in the year before the election, according to four current and former American officials.
  • The officials interviewed in recent weeks said that, so far, they had seen no evidence of such cooperation.
anonymous

Trump Condemns Leaks to News Media in a Flurry on Twitter - The New York Times - 0 views

  • Trump Condemns Leaks to News Media in a Flurry on Twitter
  • WASHINGTON — President Trump lashed out at the nation’s intelligence agencies again on Wednesday, accusing them of illegally leaking information to the news media, on a day of new disclosures about his dealings with Russia during and after the presidential campaign.
  • In a fusillade of early-morning posts on Twitter, Mr. Trump revived his charge that the allegations of a “Russian connection” were nothing more than a Democratic conspiracy, fed to a receptive news media to distract from the mistakes made by Hillary Clinton during the campaign.
  • ...1 more annotation...
  • The president also praised a column by Eli Lake of Bloomberg View, which criticized the selective leaking of intercepted communications between Mr. Flynn and Russia’s ambassador to Washington, Sergey I. Kislyak. Mr. Lake went on to suggest, however, that Mr. Flynn had been sacrificed to protect other officials, potentially including the president himself.
1 - 20 of 55 Next › Last »
Showing 20 items per page