Dontyouremember

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 8 August 2013

Ghost radar!

Posted on 18:21 by Unknown
I'm sick of writing NSA stories and you're sick of reading them. So right now, I'd like to talk about something that happened as I was walking home from breakfast at Mickey D's.

I heard a small boy sobbing and crying for aid: "Can somebody help me?" He stood just outside of his quaint row house.

"What's wrong?" I asked.

"My Mommy and Daddy aren't home and I can't go back in," he said.

"Why not?"

"There's a GHOST!" he cried.

"How do you know there's a ghost?" I asked.

"I was down in the basement and I heard it walking. Real loud. And it was on the radar."

"Radar...?" I asked.

"Ghost radar! iPhone!" He started crying again. I later learned that there is an iPhone app called Ghost Radar, which allegedly identifies paranormal activity in any given location.

I informed him that a lot of people don't believe that ghosts exist.

What really concerned me was the idea of a very young child being home alone. I questioned him as to where his mother and father worked.

At that point, a young lady -- of adult age, or nearly so -- popped out of the front door. She identified herself as the boy's sister. Naturally, I was gratified to learn that the youngster had not been left by himself.

I told her that her younger brother had become convinced of the presence of a ghost in the basement.

"No way," she said. "I sleep in that basement every night. No ghosts."

"Were you walking around on the floor above the basement just now?" I asked.

"I guess. Maybe."

A small dog escaped the front door. The boy -- no longer weeping or upset -- merrily went chasing after it.

Does this anecdote have a point? Well, not a political point -- although if you are imaginative enough to discover a political angle, you will have my deep respect.

But perhaps we can draw a practical lesson from this tale. Parents, please be careful as to which apps you let your child use without supervision. And if you do allow a kid to play with your "ghost radar," make sure the youngster understands the concept of the false positive.

So tell me: Has anyone ever had success using the Ghost Radar app?
Read More
Posted in | No comments

Anything you say can and will be used against you

Posted on 05:45 by Unknown
You'd have to be dense as concrete not to understand the unsettling implications of this NYT story...
The N.S.A. is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, a practice that government officials have openly acknowledged. It is also casting a far wider net for people who cite information linked to those foreigners, like a little used e-mail address, according to a senior intelligence official.
Inadvertently, this piece confirms what some of us have been saying for years: The NSA scoops up everything -- and by "everything" I mean everything -- but doesn't consider the email/phone call transcript to be truly "intercepted" until human eyes have seen the words. Human eyes will see those words only after the machines have data-mined the text for key phrases.

As a moment's thought will tell you, that technology can be used against you, against me, against anyone. It's the ultimate form of political control.

Of course, we are assured that right now, the targets are -- allegedly -- terrorists. Just terrorists. Nothing else. At least, so claims the New York Times; we shall soon see that the "target field" is actually rather wider.

We have only the word of our NSA and FBI overseers that they will not use this technology against political opponents.

Ah -- but if the spooks do find damning material against political opponents, how would anyone know? Our controllers have became very adept at the arcane art of using the NSA's eavesdropping against you while disguising the origins of that data.
Details of a U.S. Drug Enforcement Administration program that feeds tips to federal agents and then instructs them to alter the investigative trail were published in a manual used by agents of the Internal Revenue Service for two years.
A 350-word entry in the Internal Revenue Manual instructed agents of the U.S. tax agency to omit any reference to tips supplied by the DEA's Special Operations Division, especially from affidavits, court proceedings or investigative files. The entry was published and posted online in 2005 and 2006, and was removed in early 2007. The IRS is among two dozen arms of the government working with the Special Operations Division, including the Federal Bureau of Investigation, the National Security Agency and the Central Intelligence Agency.
The tactic is called "parallel construction"...
According to documents and interviews, agents use a procedure they call "parallel construction" to recreate the investigative trail, stating in affidavits or in court, for example, that an investigation began with a traffic infraction rather than an SOD tip.

The IRS document offers further detail on the parallel construction program.

"Special Operations Division has the ability to collect, collate, analyze, evaluate, and disseminate information and intelligence derived from worldwide multi-agency sources, including classified projects," the IRS document says. "SOD converts extremely sensitive information into usable leads and tips which are then passed to the field offices for real-time enforcement activity against major international drug trafficking organizations."

The 2005 IRS document focuses on SOD tips that are classified and notes that the Justice Department "closely guards the information provided by SOD with strict oversight." While the IRS document says that SOD information may only be used for drug investigations, DEA officials said the SOD role has recently expanded to organized crime and money laundering.
SOD (discussed in an earlier post) gets its intel from the NSA. So we now know that the tactics described by the NYT are not relegated entirely to the war against terrorists.
According to the document, IRS agents are directed to use the tips to find new, "independent" evidence: "Usable information regarding these leads must be developed from such independent sources as investigative files, subscriber and toll requests, physical surveillance, wire intercepts, and confidential source information. Information obtained from SOD in response to a search or query request cannot be used directly in any investigation (i.e. cannot be used in affidavits, court proceedings or maintained in investigative files)."

The IRS document makes no reference to SOD's sources of information, which include a large DEA telephone and Internet database.
Are you sure that these tactics will never be used against political opponents? Recall the Bush years, when the "no-fly" lists were used to harass left-wing critics of the administration...

The propaganda! It burns! I've cited The Moderate Voice from time to time. Previously, I've never really had much problem with (or interest in) that site. But this shows how thoroughly the anti-Snowden propaganda blitz has penetrated the national consciousness.

The topic is the National Review's recent -- and uncharacteristically reasonable -- call to give Snowden immunity in exchange for testimony. The MV response:
Second, Snowden’s megalomania means that Snowden would be unlikely to accept any such offer. He views himself as a transcendent global figure, allying with a host of authoritarian regimes and anarchist groups against the United States generally. He appears to believe that he is at the heart of a global conspiracy, that the CIA is out to kill him, and that his disclosures caused the CIA to threaten to assassinate the entire families of any congressional representatives who voted against an anti-NSA bill. Why would Snowden’s massively inflated self-image deflate from a grant of immunity?
What nonsense. Megalomania? Is this guy kidding? Did that soft-spoken fellow in those interviews seem very megalomaniacal to you?
Snowden’s media handler Greenwald would also probably object. Snowden’s testimony to Congress would cut off the one thing that Greenwald values most: exclusive ownership of the spotlight. Indeed, evidence is mounting that Greenwald groomed Snowden as a sock puppet for his anti-NSA crusade long before Snowden decamped for Hong Kong and Russia.
Now this is paranoia of the lowest form. Are we really supposed to believe these baseless accusations that evil journalists are plotting to "turn" those who toil within the spook empire? I would expect this sort of idiocy from Ann Coulter or Michelle Malkin, but not from any site labeled "The Moderate Voice."

Needless to say, there's no evidence for any of this nonsense. A hundred years from now, Greenwald will be remembered as one of the few remaining real journalists. And Snowden will be known as one of the few willing to sacrifice a life of ease in order to pursue the dictates of conscience.

Always remember the words of Malcolm X:

“If you're not careful, the newspapers will have you hating the people who are being oppressed, and loving the people who are doing the oppressing.”

"I've had enough of someone else's propaganda. I'm for truth, no matter who tells it. I'm for justice, no matter who it's for or against. I'm a human being first and foremost, and as such I am for whoever and whatever benefits humanity as a whole."
Read More
Posted in | No comments

Wednesday, 7 August 2013

America is under the SOD (and other NSA stories)

Posted on 02:24 by Unknown
Y'know, I really really really REALLY would prefer to address any topic other than the NSA right now. But that topic is Not So Avoidable.

Yemen. We've just learned that the Big Plot uncovered by those stalwart lads and lasses at NSA involved an Al Qaeda scheme to take over Yemen.
Yemeni government spokesman Rajeh Badi said the plot involved blowing up oil pipelines and taking control of certain cities - including two ports in the south, one of which accounts for the bulk of Yemen's oil exports and is where a number of foreign workers are employed.
Sources have told BBC Newsnight that the US is preparing special operations forces for possible strike operations against al-Qaeda in Yemen.

Although the US has previously sent special forces to train counter-terrorist units, there are now suggestions that the Joint Special Operations Command (JSOC), may be preparing units for strike operations, the sources said.
All very exciting. And, I suspect, all very fictional.

Faraway Yemen is a great place to set your Wag-the-Dog yarn. Who can double-check?

Congress. NSA defenders say that everything they do has congressional approval and oversight. To the contrary...
On MSNBC on Wednesday night, Sen. Richard Blumenthal (D-Ct) was asked by host Chris Hayes: "How much are you learning about what the government that you are charged with overseeing and holding accountable is doing from the newspaper and how much of this do you know?" The Senator's reply:
The revelations about the magnitude, the scope and scale of these surveillances, the metadata and the invasive actions surveillance of social media Web sites were indeed revelations to me."
But it is not merely that members of Congress are unaware of the very existence of these programs, let alone their capabilities. Beyond that, members who seek out basic information - including about NSA programs they are required to vote on and FISA court (FISC) rulings on the legality of those programs - find that they are unable to obtain it.
Denial of access for members of Congress to basic information about the NSA and the FISC appears to be common. Justin Amash, the GOP representative who, along with Democratic Rep. John Conyers, co-sponsored the amendment to ban the NSA's bulk collection of Americans' phone records, told CNN on July 31: "I, as a member of Congress, can't get access to the court opinions. I have to beg for access, and I'm denied it if I - if I make that request."
What about the intel committees?
Its members typically receive much larger contributions from the defense and surveillance industries than non-Committee members. And the two Committee Chairs - Democrat Dianne Feinstein in the Senate and Republican Mike Rogers in the House - are two of the most steadfast NSA loyalists in Congress. The senior Democrat on the House Committee is ardent NSA defender Dutch Ruppersberger, whose district not only includes NSA headquarters in Fort Meade, but who is also himself the second-largest recipient of defense/intelligence industry cash.

Moreover, even when members of the Intelligence Committee learn of what they believe to be serious abuses by the NSA, they are barred by law from informing the public.
Dutch -- who is also my congressman -- is a Democrat, and has a "good" voting record (from a blue-state perspective) on most issues. This dichotomy is what makes his NSAttitude so annoying.

It's simple: We long ago reached the point where we no longer run the spooks. The spooks run us.

Snowden. Speaking of dichotomies, we have a doozie when it comes to everyone's favorite whistleblower. The official spookland spokespersons have, at various times, said that Snowden never had access to the programs he has revealed...
First up, we've got intelligence officials claiming that Snowden didn't get the really deep dark secrets of the NSA:
U.S. intelligence now believes Edward Snowden did not gain access to the "crown jewels" of National Security Agency programs that secretly intercept and monitor conversations around the world, CNN has learned.
Note that comes from CNN reporter Barbara Starr who is well known for basically spreading the NSA official line so much that she's been called "the Pentagon spokesperson who works for CNN." However, just a day later, another site published a quote from General Bob Kehler, who "oversees cyber warfare" and is "sort of" NSA chief Keith Alexander's boss, claiming something quite different:
He referred to the type of information Snowden released as ”the deepest of the deep secrets.”
So... he didn't get access to the "crown jewels" but has already released "the deepest of the deep secrets"? How does that work?
You can't claim a man is the new Benedict Arnold while simultaneously dismissing him as unimportant. It's got to be one or the other. Propagandists should follow the KYSS principle -- Keep Your Stories Straight!

Speaking of double-dealing... Why is it okay for the Obama administration to reveal the details of (allegedly) intercepted Al Qaeda emails? I mean, doesn't that get into a Snowden-esque "sources and methods" area?

Toss out your V mask: Ed Snowden is the new Guy Fawkes.

How to use your secret info: This story from a couple of days ago notes the main problem facing our spook overlords. Since we have not yet entered the era of open technofascism, the feds face what we might call a "Coventry" dilemma: How do you use the information you've obtained without revealing the methods by which you obtained it?

If you're a fan of the BBC's Sherlock series, you know the story about how Churchill allegedly let the Nazis bomb Coventry because preventing the raid would have revealed that he had obtained an Enigma machine. Although that story is questionable (much of it derives from a fantasy writer named William Stephenson), the basic idea illustrates one of the major problems that all intelligence officials have faced. If, for example, you use information from an agent planted within an enemy government, you may not be able to act on that information without exposing your source.

In the current situation, the spooks have access to your every email and telephone conversation, but they don't want to broadcast that fact in any official way. In a sense, the Coventry problem is the only thing keeping you safe right now. Until the day comes when your masters decide to drop all pretense of democracy, you must be granted the illusion of privacy.

So what happens when FBI agents want to build a case based on data that they can't let the world know they know? Retuers gives us a few clues...
A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.
The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred.
So...you might say that America is under the SOD. The unit is located "in Virginia." Reuters won't say where in Virginia, apparently at SOD's request -- national security and all that -- so I will happily give you the bits that Reuters left out. The Special Operations Division is located at 14560 Avion Parkway, Chantilly, VA 20151, a stone's throw away from the National Air and Space Museum (not the one on the Mall, but the really cool Udvar-Hazy center where they keep the space shuttle Discovery). Phone number: 703-488-4200. SOD is run by a fellow named Joseph Keefe. If you know where to look online, you may be able to find the address and phone number for a Joseph Keefe living in Chantilly. If you stop by, say "Hi" to Joey and tell him that Cannon sends his love.

Back to our Reuters story...
But two senior DEA officials defended the program, and said trying to "recreate" an investigative trail is not only legal but a technique that is used almost daily.

A former federal agent in the northeastern United States who received such tips from SOD described the process. "You'd be told only, ‘Be at a certain truck stop at a certain time and look for a certain vehicle.' And so we'd alert the state police to find an excuse to stop that vehicle, and then have a drug dog search it," the agent said.
Well, that's one solution to the Coventry problem.

Remember the TOR spyware? In our previous installment, we said that it was an FBI thing. Some white-hat hackers did a little digging and found that it transmits info to an IP address owned and operated by the NSA. Go here and scroll down.
Read More
Posted in | No comments

Tuesday, 6 August 2013

News

Posted on 11:54 by Unknown
Everyone is talking about Jeff Bezo's purchase of the Washington Post. I don't think this decision will be as "culturally cataclysmic" as some say, since it continues the hoary tradition of a CIA link to the Post.

Bezos and the CIA? Yes. They started working together last year. Maybe earlier. Bezos and the CIA's investment arm have sunk a lot of money in a quantum computer called DWave which will make it easier for the NSA to break encryption systems.

(Seems like every story these days is related to the NSA...)

Of course, the intelligence connection is hardly surprising to anyone who knows the backgrounds of Katherine Graham and Ben Bradlee -- or, for that matter, Bob Woodward. I would be surprised if there weren't an intelligence connection to Bezos.

Bezos is generally considered a liberal, but I'm guessing this means (as it usually means) "liberal on social issues." By now, we all know what to expect from a liberal-on-social-issues megacapitalist: Gay marriage? All for it! A decent minimum wage and single-payer health insurance? Er...let me get back to you on that. Meanwhile, here's a copy of "Atlas Shrugged" for you to read!

An immodest proposal. Bezos famously has said that printed newspapers will disappear within twenty years, and that most readers will refuse to pay for internet news. So how to fund journalism?

I propose that we use the BBC as a model. A modest annual tax on internet service providers can be distributed equally among internet newspapers, enabling them to hire more staff and do more overseas and investigative reporting. Of course, there will be endless wrangling over what constitutes a "newspaper" on the internet -- blogs, obviously, are out -- and also over what constitutes objective reportage. But if everyone understood that an obviously skewed news publisher would lose its subsidy, there would be an incentive to provide unbiased coverage.
Read More
Posted in | No comments

Ending privacy? There's an app for that!

Posted on 01:39 by Unknown
I may have mentioned this before, but: You know that when folding money gets old, it is sent to an official location for disposal, right? Well, do you know how the aged bills get where they need to go?

The mail.

You probably thought that armored cars might come into the picture, but they don't. An armored car tells crooks where the money is. A long time ago, the government discovered that old money travels safer when "hidden in plain sight" within the postal system.

Computers are like that. If you try to hide your IP address by using TOR or some other proxy system, you are telling Uncle: "Hey, Uncle -- looky here! Secret stuff! I'm doing secret stuff that I don't want you to know about!" Using TOR is, in this sense, like driving an armored car.

The fiends who dote on kiddie porn have long relied on TOR. Some of them recently learned all about the principle described above. The folks at the FBI (and SAIC, it seems) have come up with a spyware called CIPAV which is designed to crack the anonymity provided by TOR.
Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor.

The code has been used sparingly in the past, which kept it from leaking out and being analyzed or added to anti-virus databases.

The broad Freedom Hosting deployment of the malware coincides with the arrest of Eric Eoin Marques in Ireland on Thursday on an U.S. extradition request. The Irish Independent reports that Marques is wanted for distributing child pornography in a federal case filed in Maryland, and quotes an FBI special agent describing Marques as “the largest facilitator of child porn on the planet.”
I put the words "and others" in boldface for a reason.

The problem with CIPAV and cognate technologies should be obvious: If we allow the feds to use spyware against people we hate -- like child pornographers -- we inevitably allow its use against...others. If you read the Wired article at the other end of the link above, you'll come across a comment from a right-wing reader which deserves to be noted here:
Terrorists, drug dealers, child porn scum & Tea Party members are the current "enemies" of the FBI, etc. How easy would it be to expand that list to "anyone who gives $ to the political opponents of the current (liberal or conservative) administration"?
I may not agree with this guy's conservative political stance, and I hardly believe that the Tea Party has been treated as an "enemy." (The baggers certainly are having an easier time of it than did members of the Communist Party in the old days.) Nevertheless, the principle expressed here is sound.

Child pornographers are scum. But software designed to end privacy for scum may also be used against non-scum. And if you think you have nothing to hide -- well, one day you may live a more interesting life. One day you may decide that the government has gone too far, has changed too much, has strayed from our founding principles -- has ceased to be a true democracy. You may decide that the time has come to restore what was lost.

But you won't be able to do so. Uncle will always be one step ahead of you, watching everything you do.

And remember: If Uncle can access your system, then he can also plant things on it -- after all, he knows your passwords. Uncle can even insert items into your twitter feed or use your email account to send contraband.

Contraband like child porn.
Read More
Posted in | No comments

Monday, 5 August 2013

Egypt

Posted on 15:06 by Unknown
Pro-Morsi Egyptians blame Obama for supporting the coup against Morsi. Anti-Morsi Egyptians blame Obama for supporting Morsi.

Barack Obama has become a blank slate upon which one may write any story one chooses.
Read More
Posted in | No comments

New spook stuff

Posted on 00:27 by Unknown
You've probably seen all the headlines about the very, very serious Al Qaeda threat that those brave folks at the NSA have uncovered. See, for example, here...
Sen. Saxby Chambliss (R-Ga.), the top Republican on the Senate Intelligence Committee, revealed on Sunday that the National Security Agency's controversial surveillance programs uncovered information about current terrorist threats to the United States.

"These programs are controversial, we understand that," Chambliss said on NBC's "Meet the Press." "But they are also very important... If we did not have these programs, then we simply would not be able to listen in on the bad guys."
Subtle. Real subtle.

Of course, you don't get to run an intel committee unless the spooks already have you in their collective pocket.

Also see here:
Sen. Lindsey Graham, R-South Carolina, said Sunday that the terror threats, which forced the U.S. to close 22 embassies and consulates Sunday, further verify why the NSA surveillance programs need to be kept in place.

"The NSA program is proving its worth yet again," he said on "State of the Union."

"To the members of Congress who want to reform the NSA program, great," he told Candy Crowley, CNN's chief political correspondent. "If you want to gut it, you make us much less safe, and you're putting our nation at risk. We need to have policies in place that can deal with the threats that exist, and they are real, and they are growing."
Subtle. Real subtle.

Do we need any further evidence? This whole thing is bullshit. Just look at the timing, for chrissakes: In recent days, we've seen the rise of an unprecedented left/right (or liberal/libertarian) coalition against NSA abuses. And suddenly...this.

If anything "goes boom" in the Middle East, my initial suspicions will point to a little-known terrorist called Mohammed Al-FortMeadi. Here's my message to Keithy-poo, the head of No Such Agency: Nobody with a three-digit IQ is gonna buy this crap, General. It's all just too effing convenient, and your mouthpieces are too effing obvious.

Lindsay's on a roll:
Graham, who’s on the Senate Armed Services Committee, said this was the appropriate action, compared with actions before last year’s terror attack against a U.S. diplomatic mission in Benghazi, Libya.

“The threats were real there. The reporting was real. And we basically dropped the ball,” he said. “We've learned from Benghazi, thank God, and the administration is doing this right.”
Yeah. About Benghazi... The right has been crowing, in recent days, that the recent revelation that there were (gasp!) CIA operatives in the Benghazi consulate proves everything they've ever said about what happened there. What nonsense.

First: There are CIA guys crawling all over every U.S. embassy and consulate on the planet. Everyone knows this. It's hardly a surprise.

Second: Just because Benghazi got into the news headlines (via Jake Tapper of ABC) doesn't mean that the far right's inane theories -- which received an airing in the presidential debates -- ever had any merit.

If you will recall, the big complaint then was that the Obama administration had tried to blame the attack on a spontaneous demonstration by locals outraged by the Innocence of Muslims movie (a SpookWays Presentation). In fact, Obama had labeled the attack an "act of terror" early on. On the day of the attack, administration officials told newsmen that evidence indicated that the attackers were well-equipped and had "some level of advanced planning." Yes, outraged locals did launch a demonstration; their protest offered cover to the militants.

In the real world, that's how it all went down. But the far-rightists said otherwise, over and over and over and over. They maintained their "party line" on Benghazi in total defiance of the emerging facts. Why? Because they wanted their doltish followers to think that Obama was protecting the terrorists. And why would Obama protect the terrorists? Because, in their fevered imaginations, Obama himself is a secret Mooooooo-zlim.

Needless to say, this charge was, and is, ludicrous.

That ludicrous charge has no relationship -- none, nada, zippo -- to anything that Jake Tapper wrote about. Tapper discovered that CIA operatives in Libya have been polygraphed repeatedly to determine whether anyone has blabbed about what the CIA was getting up to.
"Agency employees typically are polygraphed every three to four years. Never more than that," said former CIA operative and CNN analyst Robert Baer.

In other words, the rate of the kind of polygraphs alleged by sources is rare.

"If somebody is being polygraphed every month, or every two months it's called an issue polygraph, and that means that the polygraph division suspects something, or they're looking for something, or they're on a fishing expedition. But it's absolutely not routine at all to be polygraphed monthly, or bi-monthly," said Baer.
I've thought from the beginning that the right's focus on Benghazi -- an obsession continually in search of a justification -- had its origin point in a leak from a right-wing American intelligence operative.

Here's my suggested scenario: A leaker told the right-wing press that the CIA was doing something really important and really secret at the Benghazi consulate. A plan then formed around that small nugget of information. If the CIA had a super-secret project going on at that consulate, the administration would have to hide it. And once the administration went into "hide the shit" mode, the right-wing propagandists could pretend that the shit being hidden was...well, whatever nonsensical thing their feverish minds could come up with. Benghazi became a screen onto which one could project all sorts of fantasies. As in: "Obama's working with the terrorists because he's a Mooooooooo-zlim!"

So the polygraphs were almost certainly instituted to find out who acted as a mole for the Murdochian hordes. But we're still left with an obvious question: Just what was the CIA up to in that consulate?

Tapper:
In the aftermath of the attack, Wolf said he was contacted by people closely tied with CIA operatives and contractors who wanted to talk.

Then suddenly, there was silence.

"Initially they were not afraid to come forward. They wanted the opportunity, and they wanted to be subpoenaed, because if you're subpoenaed, it sort of protects you, you're forced to come before Congress. Now that's all changed," said Wolf.

Lawmakers also want to know about the weapons in Libya, and what happened to them.

Speculation on Capitol Hill has included the possibility the U.S. agencies operating in Benghazi were secretly helping to move surface-to-air missiles out of Libya, through Turkey, and into the hands of Syrian rebels.

It is clear that two U.S. agencies were operating in Benghazi, one was the State Department, and the other was the CIA.

The State Department told CNN in an e-mail that it was only helping the new Libyan government destroy weapons deemed "damaged, aged or too unsafe retain," and that it was not involved in any transfer of weapons to other countries.

But the State Department also clearly told CNN, they "can't speak for any other agencies."

The CIA would not comment on whether it was involved in the transfer of any weapons.
So the signs point to an arms shipment to the Syrian rebels. Which raises one point that seems staggeringly obvious -- so staggeringly obvious that no-one has bothered to mention it: Why would jihadist groups in Libya want to disrupt those shipments?

Think about it. If arms were indeed being transferred from Libya to Syria, they almost certainly went to Al Nusrah, because that group has been the real muscle in the fight to topple Assad of Syria. Nusrah is very jihad-oriented, and very nasty. (They killed a priest not long ago.) Compared to them, the guys in Ansar al Shariah -- the militant group which (probably) attacked the embassy in Benghazi -- are a bunch of daisy-sniffers.

Instead of burning down the consulate, the Ansar al Shariah militants should have offered to help.

As near as I can tell, the only writer who has noticed this issue is right-wing blogger John Hinderaker...
It seems unlikely that the CIA mission prompted the attack: we now know that the Syrian rebels consist in substantial part of al Qaeda elements, and if arms were sent from Libya to Syria, al Qaeda probably wound up with some of them. So why would al Qaeda want to interrupt the CIA mission via an attack on the American compound in Benghazi?
I hate to link to a guy who has Brietbart on his blogroll, but the man has a point. He's also honest enough to admit that, at the time, many right-wingers supported arming the Syrian rebels. (Many still do.)
Read More
Posted in | No comments
Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • More Syrian weirdness
    This post is a follow-up to the one below. Although most Americans aren't paying much attention to the Syrian rebellion, that situation ...
  • Has Uncle Sam partnered up with Al Qaeda?
    According to the NYT, a message from Al Qaeda is the reason why so many embassies went on alert: The United States intercepted electronic c...
  • EPIC news!
    This is interesting. A privacy group called The Electronic Privacy Information Center wants to bring suit against the NSA over, basically, ...
  • News
    Everyone is talking about Jeff Bezo's purchase of the Washington Post. I don't think this decision will be as "culturally catac...
  • Bout steak
    The horsemeat-sold-as-beef scandal took a parapolitical turn recently, when it was revealed that the mastermind may be the notorious Viktor ...
  • Weird connections galore!
    The more you look into the background of the people behind the inflammatory pseudo-film "Innocence of Muslims," the stranger they ...
  • Ghost radar!
    I'm sick of writing NSA stories and you're sick of reading them. So right now, I'd like to talk about something that happened as...
  • Ending privacy? There's an app for that!
    I may have mentioned this before, but: You know that when folding money gets old, it is sent to an official location for disposal, right? We...
  • The Romney campaign is getting weird in these final days
    Am I the only person to notice that Team Romney is acting in an unfathomable fashion as election day approaches? Money should be tight right...
  • AP spying: Were other news journals targeted too?
    Not much time to write, but I did want to mention the one real Obama administration scandal to emerge in recent days. Benghazi and the IRS ...

Blog Archive

  • ▼  2013 (314)
    • ▼  August (11)
      • Ghost radar!
      • Anything you say can and will be used against you
      • America is under the SOD (and other NSA stories)
      • News
      • Ending privacy? There's an app for that!
      • Egypt
      • New spook stuff
      • Old spook stuff
      • Has Uncle Sam partnered up with Al Qaeda?
      • Spooky times
      • Snowden's out! Plus: XKeyscore
    • ►  July (45)
    • ►  June (40)
    • ►  May (36)
    • ►  April (54)
    • ►  March (37)
    • ►  February (34)
    • ►  January (57)
  • ►  2012 (186)
    • ►  December (37)
    • ►  November (41)
    • ►  October (47)
    • ►  September (61)
Powered by Blogger.

About Me

Unknown
View my complete profile