Dontyouremember

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 8 August 2013

Ghost radar!

Posted on 18:21 by Unknown
I'm sick of writing NSA stories and you're sick of reading them. So right now, I'd like to talk about something that happened as I was walking home from breakfast at Mickey D's.

I heard a small boy sobbing and crying for aid: "Can somebody help me?" He stood just outside of his quaint row house.

"What's wrong?" I asked.

"My Mommy and Daddy aren't home and I can't go back in," he said.

"Why not?"

"There's a GHOST!" he cried.

"How do you know there's a ghost?" I asked.

"I was down in the basement and I heard it walking. Real loud. And it was on the radar."

"Radar...?" I asked.

"Ghost radar! iPhone!" He started crying again. I later learned that there is an iPhone app called Ghost Radar, which allegedly identifies paranormal activity in any given location.

I informed him that a lot of people don't believe that ghosts exist.

What really concerned me was the idea of a very young child being home alone. I questioned him as to where his mother and father worked.

At that point, a young lady -- of adult age, or nearly so -- popped out of the front door. She identified herself as the boy's sister. Naturally, I was gratified to learn that the youngster had not been left by himself.

I told her that her younger brother had become convinced of the presence of a ghost in the basement.

"No way," she said. "I sleep in that basement every night. No ghosts."

"Were you walking around on the floor above the basement just now?" I asked.

"I guess. Maybe."

A small dog escaped the front door. The boy -- no longer weeping or upset -- merrily went chasing after it.

Does this anecdote have a point? Well, not a political point -- although if you are imaginative enough to discover a political angle, you will have my deep respect.

But perhaps we can draw a practical lesson from this tale. Parents, please be careful as to which apps you let your child use without supervision. And if you do allow a kid to play with your "ghost radar," make sure the youngster understands the concept of the false positive.

So tell me: Has anyone ever had success using the Ghost Radar app?
Read More
Posted in | No comments

Anything you say can and will be used against you

Posted on 05:45 by Unknown
You'd have to be dense as concrete not to understand the unsettling implications of this NYT story...
The N.S.A. is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, a practice that government officials have openly acknowledged. It is also casting a far wider net for people who cite information linked to those foreigners, like a little used e-mail address, according to a senior intelligence official.
Inadvertently, this piece confirms what some of us have been saying for years: The NSA scoops up everything -- and by "everything" I mean everything -- but doesn't consider the email/phone call transcript to be truly "intercepted" until human eyes have seen the words. Human eyes will see those words only after the machines have data-mined the text for key phrases.

As a moment's thought will tell you, that technology can be used against you, against me, against anyone. It's the ultimate form of political control.

Of course, we are assured that right now, the targets are -- allegedly -- terrorists. Just terrorists. Nothing else. At least, so claims the New York Times; we shall soon see that the "target field" is actually rather wider.

We have only the word of our NSA and FBI overseers that they will not use this technology against political opponents.

Ah -- but if the spooks do find damning material against political opponents, how would anyone know? Our controllers have became very adept at the arcane art of using the NSA's eavesdropping against you while disguising the origins of that data.
Details of a U.S. Drug Enforcement Administration program that feeds tips to federal agents and then instructs them to alter the investigative trail were published in a manual used by agents of the Internal Revenue Service for two years.
A 350-word entry in the Internal Revenue Manual instructed agents of the U.S. tax agency to omit any reference to tips supplied by the DEA's Special Operations Division, especially from affidavits, court proceedings or investigative files. The entry was published and posted online in 2005 and 2006, and was removed in early 2007. The IRS is among two dozen arms of the government working with the Special Operations Division, including the Federal Bureau of Investigation, the National Security Agency and the Central Intelligence Agency.
The tactic is called "parallel construction"...
According to documents and interviews, agents use a procedure they call "parallel construction" to recreate the investigative trail, stating in affidavits or in court, for example, that an investigation began with a traffic infraction rather than an SOD tip.

The IRS document offers further detail on the parallel construction program.

"Special Operations Division has the ability to collect, collate, analyze, evaluate, and disseminate information and intelligence derived from worldwide multi-agency sources, including classified projects," the IRS document says. "SOD converts extremely sensitive information into usable leads and tips which are then passed to the field offices for real-time enforcement activity against major international drug trafficking organizations."

The 2005 IRS document focuses on SOD tips that are classified and notes that the Justice Department "closely guards the information provided by SOD with strict oversight." While the IRS document says that SOD information may only be used for drug investigations, DEA officials said the SOD role has recently expanded to organized crime and money laundering.
SOD (discussed in an earlier post) gets its intel from the NSA. So we now know that the tactics described by the NYT are not relegated entirely to the war against terrorists.
According to the document, IRS agents are directed to use the tips to find new, "independent" evidence: "Usable information regarding these leads must be developed from such independent sources as investigative files, subscriber and toll requests, physical surveillance, wire intercepts, and confidential source information. Information obtained from SOD in response to a search or query request cannot be used directly in any investigation (i.e. cannot be used in affidavits, court proceedings or maintained in investigative files)."

The IRS document makes no reference to SOD's sources of information, which include a large DEA telephone and Internet database.
Are you sure that these tactics will never be used against political opponents? Recall the Bush years, when the "no-fly" lists were used to harass left-wing critics of the administration...

The propaganda! It burns! I've cited The Moderate Voice from time to time. Previously, I've never really had much problem with (or interest in) that site. But this shows how thoroughly the anti-Snowden propaganda blitz has penetrated the national consciousness.

The topic is the National Review's recent -- and uncharacteristically reasonable -- call to give Snowden immunity in exchange for testimony. The MV response:
Second, Snowden’s megalomania means that Snowden would be unlikely to accept any such offer. He views himself as a transcendent global figure, allying with a host of authoritarian regimes and anarchist groups against the United States generally. He appears to believe that he is at the heart of a global conspiracy, that the CIA is out to kill him, and that his disclosures caused the CIA to threaten to assassinate the entire families of any congressional representatives who voted against an anti-NSA bill. Why would Snowden’s massively inflated self-image deflate from a grant of immunity?
What nonsense. Megalomania? Is this guy kidding? Did that soft-spoken fellow in those interviews seem very megalomaniacal to you?
Snowden’s media handler Greenwald would also probably object. Snowden’s testimony to Congress would cut off the one thing that Greenwald values most: exclusive ownership of the spotlight. Indeed, evidence is mounting that Greenwald groomed Snowden as a sock puppet for his anti-NSA crusade long before Snowden decamped for Hong Kong and Russia.
Now this is paranoia of the lowest form. Are we really supposed to believe these baseless accusations that evil journalists are plotting to "turn" those who toil within the spook empire? I would expect this sort of idiocy from Ann Coulter or Michelle Malkin, but not from any site labeled "The Moderate Voice."

Needless to say, there's no evidence for any of this nonsense. A hundred years from now, Greenwald will be remembered as one of the few remaining real journalists. And Snowden will be known as one of the few willing to sacrifice a life of ease in order to pursue the dictates of conscience.

Always remember the words of Malcolm X:

“If you're not careful, the newspapers will have you hating the people who are being oppressed, and loving the people who are doing the oppressing.”

"I've had enough of someone else's propaganda. I'm for truth, no matter who tells it. I'm for justice, no matter who it's for or against. I'm a human being first and foremost, and as such I am for whoever and whatever benefits humanity as a whole."
Read More
Posted in | No comments

Wednesday, 7 August 2013

America is under the SOD (and other NSA stories)

Posted on 02:24 by Unknown
Y'know, I really really really REALLY would prefer to address any topic other than the NSA right now. But that topic is Not So Avoidable.

Yemen. We've just learned that the Big Plot uncovered by those stalwart lads and lasses at NSA involved an Al Qaeda scheme to take over Yemen.
Yemeni government spokesman Rajeh Badi said the plot involved blowing up oil pipelines and taking control of certain cities - including two ports in the south, one of which accounts for the bulk of Yemen's oil exports and is where a number of foreign workers are employed.
Sources have told BBC Newsnight that the US is preparing special operations forces for possible strike operations against al-Qaeda in Yemen.

Although the US has previously sent special forces to train counter-terrorist units, there are now suggestions that the Joint Special Operations Command (JSOC), may be preparing units for strike operations, the sources said.
All very exciting. And, I suspect, all very fictional.

Faraway Yemen is a great place to set your Wag-the-Dog yarn. Who can double-check?

Congress. NSA defenders say that everything they do has congressional approval and oversight. To the contrary...
On MSNBC on Wednesday night, Sen. Richard Blumenthal (D-Ct) was asked by host Chris Hayes: "How much are you learning about what the government that you are charged with overseeing and holding accountable is doing from the newspaper and how much of this do you know?" The Senator's reply:
The revelations about the magnitude, the scope and scale of these surveillances, the metadata and the invasive actions surveillance of social media Web sites were indeed revelations to me."
But it is not merely that members of Congress are unaware of the very existence of these programs, let alone their capabilities. Beyond that, members who seek out basic information - including about NSA programs they are required to vote on and FISA court (FISC) rulings on the legality of those programs - find that they are unable to obtain it.
Denial of access for members of Congress to basic information about the NSA and the FISC appears to be common. Justin Amash, the GOP representative who, along with Democratic Rep. John Conyers, co-sponsored the amendment to ban the NSA's bulk collection of Americans' phone records, told CNN on July 31: "I, as a member of Congress, can't get access to the court opinions. I have to beg for access, and I'm denied it if I - if I make that request."
What about the intel committees?
Its members typically receive much larger contributions from the defense and surveillance industries than non-Committee members. And the two Committee Chairs - Democrat Dianne Feinstein in the Senate and Republican Mike Rogers in the House - are two of the most steadfast NSA loyalists in Congress. The senior Democrat on the House Committee is ardent NSA defender Dutch Ruppersberger, whose district not only includes NSA headquarters in Fort Meade, but who is also himself the second-largest recipient of defense/intelligence industry cash.

Moreover, even when members of the Intelligence Committee learn of what they believe to be serious abuses by the NSA, they are barred by law from informing the public.
Dutch -- who is also my congressman -- is a Democrat, and has a "good" voting record (from a blue-state perspective) on most issues. This dichotomy is what makes his NSAttitude so annoying.

It's simple: We long ago reached the point where we no longer run the spooks. The spooks run us.

Snowden. Speaking of dichotomies, we have a doozie when it comes to everyone's favorite whistleblower. The official spookland spokespersons have, at various times, said that Snowden never had access to the programs he has revealed...
First up, we've got intelligence officials claiming that Snowden didn't get the really deep dark secrets of the NSA:
U.S. intelligence now believes Edward Snowden did not gain access to the "crown jewels" of National Security Agency programs that secretly intercept and monitor conversations around the world, CNN has learned.
Note that comes from CNN reporter Barbara Starr who is well known for basically spreading the NSA official line so much that she's been called "the Pentagon spokesperson who works for CNN." However, just a day later, another site published a quote from General Bob Kehler, who "oversees cyber warfare" and is "sort of" NSA chief Keith Alexander's boss, claiming something quite different:
He referred to the type of information Snowden released as ”the deepest of the deep secrets.”
So... he didn't get access to the "crown jewels" but has already released "the deepest of the deep secrets"? How does that work?
You can't claim a man is the new Benedict Arnold while simultaneously dismissing him as unimportant. It's got to be one or the other. Propagandists should follow the KYSS principle -- Keep Your Stories Straight!

Speaking of double-dealing... Why is it okay for the Obama administration to reveal the details of (allegedly) intercepted Al Qaeda emails? I mean, doesn't that get into a Snowden-esque "sources and methods" area?

Toss out your V mask: Ed Snowden is the new Guy Fawkes.

How to use your secret info: This story from a couple of days ago notes the main problem facing our spook overlords. Since we have not yet entered the era of open technofascism, the feds face what we might call a "Coventry" dilemma: How do you use the information you've obtained without revealing the methods by which you obtained it?

If you're a fan of the BBC's Sherlock series, you know the story about how Churchill allegedly let the Nazis bomb Coventry because preventing the raid would have revealed that he had obtained an Enigma machine. Although that story is questionable (much of it derives from a fantasy writer named William Stephenson), the basic idea illustrates one of the major problems that all intelligence officials have faced. If, for example, you use information from an agent planted within an enemy government, you may not be able to act on that information without exposing your source.

In the current situation, the spooks have access to your every email and telephone conversation, but they don't want to broadcast that fact in any official way. In a sense, the Coventry problem is the only thing keeping you safe right now. Until the day comes when your masters decide to drop all pretense of democracy, you must be granted the illusion of privacy.

So what happens when FBI agents want to build a case based on data that they can't let the world know they know? Retuers gives us a few clues...
A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.
The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred.
So...you might say that America is under the SOD. The unit is located "in Virginia." Reuters won't say where in Virginia, apparently at SOD's request -- national security and all that -- so I will happily give you the bits that Reuters left out. The Special Operations Division is located at 14560 Avion Parkway, Chantilly, VA 20151, a stone's throw away from the National Air and Space Museum (not the one on the Mall, but the really cool Udvar-Hazy center where they keep the space shuttle Discovery). Phone number: 703-488-4200. SOD is run by a fellow named Joseph Keefe. If you know where to look online, you may be able to find the address and phone number for a Joseph Keefe living in Chantilly. If you stop by, say "Hi" to Joey and tell him that Cannon sends his love.

Back to our Reuters story...
But two senior DEA officials defended the program, and said trying to "recreate" an investigative trail is not only legal but a technique that is used almost daily.

A former federal agent in the northeastern United States who received such tips from SOD described the process. "You'd be told only, ‘Be at a certain truck stop at a certain time and look for a certain vehicle.' And so we'd alert the state police to find an excuse to stop that vehicle, and then have a drug dog search it," the agent said.
Well, that's one solution to the Coventry problem.

Remember the TOR spyware? In our previous installment, we said that it was an FBI thing. Some white-hat hackers did a little digging and found that it transmits info to an IP address owned and operated by the NSA. Go here and scroll down.
Read More
Posted in | No comments

Tuesday, 6 August 2013

News

Posted on 11:54 by Unknown
Everyone is talking about Jeff Bezo's purchase of the Washington Post. I don't think this decision will be as "culturally cataclysmic" as some say, since it continues the hoary tradition of a CIA link to the Post.

Bezos and the CIA? Yes. They started working together last year. Maybe earlier. Bezos and the CIA's investment arm have sunk a lot of money in a quantum computer called DWave which will make it easier for the NSA to break encryption systems.

(Seems like every story these days is related to the NSA...)

Of course, the intelligence connection is hardly surprising to anyone who knows the backgrounds of Katherine Graham and Ben Bradlee -- or, for that matter, Bob Woodward. I would be surprised if there weren't an intelligence connection to Bezos.

Bezos is generally considered a liberal, but I'm guessing this means (as it usually means) "liberal on social issues." By now, we all know what to expect from a liberal-on-social-issues megacapitalist: Gay marriage? All for it! A decent minimum wage and single-payer health insurance? Er...let me get back to you on that. Meanwhile, here's a copy of "Atlas Shrugged" for you to read!

An immodest proposal. Bezos famously has said that printed newspapers will disappear within twenty years, and that most readers will refuse to pay for internet news. So how to fund journalism?

I propose that we use the BBC as a model. A modest annual tax on internet service providers can be distributed equally among internet newspapers, enabling them to hire more staff and do more overseas and investigative reporting. Of course, there will be endless wrangling over what constitutes a "newspaper" on the internet -- blogs, obviously, are out -- and also over what constitutes objective reportage. But if everyone understood that an obviously skewed news publisher would lose its subsidy, there would be an incentive to provide unbiased coverage.
Read More
Posted in | No comments

Ending privacy? There's an app for that!

Posted on 01:39 by Unknown
I may have mentioned this before, but: You know that when folding money gets old, it is sent to an official location for disposal, right? Well, do you know how the aged bills get where they need to go?

The mail.

You probably thought that armored cars might come into the picture, but they don't. An armored car tells crooks where the money is. A long time ago, the government discovered that old money travels safer when "hidden in plain sight" within the postal system.

Computers are like that. If you try to hide your IP address by using TOR or some other proxy system, you are telling Uncle: "Hey, Uncle -- looky here! Secret stuff! I'm doing secret stuff that I don't want you to know about!" Using TOR is, in this sense, like driving an armored car.

The fiends who dote on kiddie porn have long relied on TOR. Some of them recently learned all about the principle described above. The folks at the FBI (and SAIC, it seems) have come up with a spyware called CIPAV which is designed to crack the anonymity provided by TOR.
Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor.

The code has been used sparingly in the past, which kept it from leaking out and being analyzed or added to anti-virus databases.

The broad Freedom Hosting deployment of the malware coincides with the arrest of Eric Eoin Marques in Ireland on Thursday on an U.S. extradition request. The Irish Independent reports that Marques is wanted for distributing child pornography in a federal case filed in Maryland, and quotes an FBI special agent describing Marques as “the largest facilitator of child porn on the planet.”
I put the words "and others" in boldface for a reason.

The problem with CIPAV and cognate technologies should be obvious: If we allow the feds to use spyware against people we hate -- like child pornographers -- we inevitably allow its use against...others. If you read the Wired article at the other end of the link above, you'll come across a comment from a right-wing reader which deserves to be noted here:
Terrorists, drug dealers, child porn scum & Tea Party members are the current "enemies" of the FBI, etc. How easy would it be to expand that list to "anyone who gives $ to the political opponents of the current (liberal or conservative) administration"?
I may not agree with this guy's conservative political stance, and I hardly believe that the Tea Party has been treated as an "enemy." (The baggers certainly are having an easier time of it than did members of the Communist Party in the old days.) Nevertheless, the principle expressed here is sound.

Child pornographers are scum. But software designed to end privacy for scum may also be used against non-scum. And if you think you have nothing to hide -- well, one day you may live a more interesting life. One day you may decide that the government has gone too far, has changed too much, has strayed from our founding principles -- has ceased to be a true democracy. You may decide that the time has come to restore what was lost.

But you won't be able to do so. Uncle will always be one step ahead of you, watching everything you do.

And remember: If Uncle can access your system, then he can also plant things on it -- after all, he knows your passwords. Uncle can even insert items into your twitter feed or use your email account to send contraband.

Contraband like child porn.
Read More
Posted in | No comments

Monday, 5 August 2013

Egypt

Posted on 15:06 by Unknown
Pro-Morsi Egyptians blame Obama for supporting the coup against Morsi. Anti-Morsi Egyptians blame Obama for supporting Morsi.

Barack Obama has become a blank slate upon which one may write any story one chooses.
Read More
Posted in | No comments

New spook stuff

Posted on 00:27 by Unknown
You've probably seen all the headlines about the very, very serious Al Qaeda threat that those brave folks at the NSA have uncovered. See, for example, here...
Sen. Saxby Chambliss (R-Ga.), the top Republican on the Senate Intelligence Committee, revealed on Sunday that the National Security Agency's controversial surveillance programs uncovered information about current terrorist threats to the United States.

"These programs are controversial, we understand that," Chambliss said on NBC's "Meet the Press." "But they are also very important... If we did not have these programs, then we simply would not be able to listen in on the bad guys."
Subtle. Real subtle.

Of course, you don't get to run an intel committee unless the spooks already have you in their collective pocket.

Also see here:
Sen. Lindsey Graham, R-South Carolina, said Sunday that the terror threats, which forced the U.S. to close 22 embassies and consulates Sunday, further verify why the NSA surveillance programs need to be kept in place.

"The NSA program is proving its worth yet again," he said on "State of the Union."

"To the members of Congress who want to reform the NSA program, great," he told Candy Crowley, CNN's chief political correspondent. "If you want to gut it, you make us much less safe, and you're putting our nation at risk. We need to have policies in place that can deal with the threats that exist, and they are real, and they are growing."
Subtle. Real subtle.

Do we need any further evidence? This whole thing is bullshit. Just look at the timing, for chrissakes: In recent days, we've seen the rise of an unprecedented left/right (or liberal/libertarian) coalition against NSA abuses. And suddenly...this.

If anything "goes boom" in the Middle East, my initial suspicions will point to a little-known terrorist called Mohammed Al-FortMeadi. Here's my message to Keithy-poo, the head of No Such Agency: Nobody with a three-digit IQ is gonna buy this crap, General. It's all just too effing convenient, and your mouthpieces are too effing obvious.

Lindsay's on a roll:
Graham, who’s on the Senate Armed Services Committee, said this was the appropriate action, compared with actions before last year’s terror attack against a U.S. diplomatic mission in Benghazi, Libya.

“The threats were real there. The reporting was real. And we basically dropped the ball,” he said. “We've learned from Benghazi, thank God, and the administration is doing this right.”
Yeah. About Benghazi... The right has been crowing, in recent days, that the recent revelation that there were (gasp!) CIA operatives in the Benghazi consulate proves everything they've ever said about what happened there. What nonsense.

First: There are CIA guys crawling all over every U.S. embassy and consulate on the planet. Everyone knows this. It's hardly a surprise.

Second: Just because Benghazi got into the news headlines (via Jake Tapper of ABC) doesn't mean that the far right's inane theories -- which received an airing in the presidential debates -- ever had any merit.

If you will recall, the big complaint then was that the Obama administration had tried to blame the attack on a spontaneous demonstration by locals outraged by the Innocence of Muslims movie (a SpookWays Presentation). In fact, Obama had labeled the attack an "act of terror" early on. On the day of the attack, administration officials told newsmen that evidence indicated that the attackers were well-equipped and had "some level of advanced planning." Yes, outraged locals did launch a demonstration; their protest offered cover to the militants.

In the real world, that's how it all went down. But the far-rightists said otherwise, over and over and over and over. They maintained their "party line" on Benghazi in total defiance of the emerging facts. Why? Because they wanted their doltish followers to think that Obama was protecting the terrorists. And why would Obama protect the terrorists? Because, in their fevered imaginations, Obama himself is a secret Mooooooo-zlim.

Needless to say, this charge was, and is, ludicrous.

That ludicrous charge has no relationship -- none, nada, zippo -- to anything that Jake Tapper wrote about. Tapper discovered that CIA operatives in Libya have been polygraphed repeatedly to determine whether anyone has blabbed about what the CIA was getting up to.
"Agency employees typically are polygraphed every three to four years. Never more than that," said former CIA operative and CNN analyst Robert Baer.

In other words, the rate of the kind of polygraphs alleged by sources is rare.

"If somebody is being polygraphed every month, or every two months it's called an issue polygraph, and that means that the polygraph division suspects something, or they're looking for something, or they're on a fishing expedition. But it's absolutely not routine at all to be polygraphed monthly, or bi-monthly," said Baer.
I've thought from the beginning that the right's focus on Benghazi -- an obsession continually in search of a justification -- had its origin point in a leak from a right-wing American intelligence operative.

Here's my suggested scenario: A leaker told the right-wing press that the CIA was doing something really important and really secret at the Benghazi consulate. A plan then formed around that small nugget of information. If the CIA had a super-secret project going on at that consulate, the administration would have to hide it. And once the administration went into "hide the shit" mode, the right-wing propagandists could pretend that the shit being hidden was...well, whatever nonsensical thing their feverish minds could come up with. Benghazi became a screen onto which one could project all sorts of fantasies. As in: "Obama's working with the terrorists because he's a Mooooooooo-zlim!"

So the polygraphs were almost certainly instituted to find out who acted as a mole for the Murdochian hordes. But we're still left with an obvious question: Just what was the CIA up to in that consulate?

Tapper:
In the aftermath of the attack, Wolf said he was contacted by people closely tied with CIA operatives and contractors who wanted to talk.

Then suddenly, there was silence.

"Initially they were not afraid to come forward. They wanted the opportunity, and they wanted to be subpoenaed, because if you're subpoenaed, it sort of protects you, you're forced to come before Congress. Now that's all changed," said Wolf.

Lawmakers also want to know about the weapons in Libya, and what happened to them.

Speculation on Capitol Hill has included the possibility the U.S. agencies operating in Benghazi were secretly helping to move surface-to-air missiles out of Libya, through Turkey, and into the hands of Syrian rebels.

It is clear that two U.S. agencies were operating in Benghazi, one was the State Department, and the other was the CIA.

The State Department told CNN in an e-mail that it was only helping the new Libyan government destroy weapons deemed "damaged, aged or too unsafe retain," and that it was not involved in any transfer of weapons to other countries.

But the State Department also clearly told CNN, they "can't speak for any other agencies."

The CIA would not comment on whether it was involved in the transfer of any weapons.
So the signs point to an arms shipment to the Syrian rebels. Which raises one point that seems staggeringly obvious -- so staggeringly obvious that no-one has bothered to mention it: Why would jihadist groups in Libya want to disrupt those shipments?

Think about it. If arms were indeed being transferred from Libya to Syria, they almost certainly went to Al Nusrah, because that group has been the real muscle in the fight to topple Assad of Syria. Nusrah is very jihad-oriented, and very nasty. (They killed a priest not long ago.) Compared to them, the guys in Ansar al Shariah -- the militant group which (probably) attacked the embassy in Benghazi -- are a bunch of daisy-sniffers.

Instead of burning down the consulate, the Ansar al Shariah militants should have offered to help.

As near as I can tell, the only writer who has noticed this issue is right-wing blogger John Hinderaker...
It seems unlikely that the CIA mission prompted the attack: we now know that the Syrian rebels consist in substantial part of al Qaeda elements, and if arms were sent from Libya to Syria, al Qaeda probably wound up with some of them. So why would al Qaeda want to interrupt the CIA mission via an attack on the American compound in Benghazi?
I hate to link to a guy who has Brietbart on his blogroll, but the man has a point. He's also honest enough to admit that, at the time, many right-wingers supported arming the Syrian rebels. (Many still do.)
Read More
Posted in | No comments

Sunday, 4 August 2013

Old spook stuff

Posted on 03:33 by Unknown
A few readers have asked me to drop the other shoe. An earlier post mentioned the late former CIA Director Richard Helms, and I hinted that I knew a cute story about him. Time to tell it.

In 1993, PBS broadcast a rather infamous Frontline special on Lee Harvey Oswald. I say "infamous" not just because the show favored the lone nut scenario -- no surprise there -- but because, during production, certain spooked-up pseudo-journalists associated with the show (I'm thinking particularly of a guy named Gus) privately told JFK researchers that the program would establish, once and for all, that LHO had worked for the CIA. This lie bought a lot of cooperation which otherwise might not have been forthcoming.

The program featured an interview with Helms, perhaps the cagiest and shiftiest of the CIA chieftains. Oliver Stone's Nixon originally contained a deleted scene in which the whites of Helms' eyes suddenly go black. The scene should have stayed in the movie, because its poetic truth is undeniable.

Former Army Intelligence officer John Newman, author of a supremely important work called Oswald and the CIA, also appeared on that Frontline special. After his scenes were shot, he remained on the set while Richard Helms took his turn in front of the cameras.

Before we proceed with this story, you must understand one thing: Over the years, the CIA has always maintained that no-one from the Agency -- indeed, no-one from the entire government -- had debriefed Lee Harvey Oswald after the supposed defector returned to the United States. During the interview, Helms repeated this story.

When the cameras stopped, Newman stepped forward and asked: ""Mr. Director, what would be so bad about the CIA interviewing Oswald on his return from Russia? I mean, isn't that what they were supposed to do? Doesn't it therefore look bad if you say you didn't?"

Helms thought it over, and somewhere beneath those all-ebony eyes, a lightbulb went on. He said: "You're right."

And then he told the director that he wanted to re-film part of the interview. This time, he would say that the CIA did debrief Oswald!

The director decided not to roll the cameras again. Too bad. I would have loved to see the two versions of that statement spliced together. Such a comparison not only would have proved the CIA's willingness to lie in the JFK case, it would have told Americans how to react whenever the spook leadership (I'm thinking particularly of a guy named Keith) says: "Hey, you can trust us...!"

The question arises: Why wouldn't the CIA debrief Oswald?

Turns out, they did. We know this from a guy named Don Deneselya, who had worked as a translator for CIA in 1962. Deneselya told Professor Joan Mellen that, to his certain knowledge, Oswald was indeed a fake defector, working for the CIA all along. Upon his return, LHO was interviewed by one Andy Anderson, who reported directly to Robert Crowley, who was very close to...

...wait for it...

...Jim Angleton. The ultra-paranoid Angleton, ostensibly the head of counterintelligence, ran a CIA-within-the-CIA. He was (as that guy in Inception might have put it) a man of some radical notions. For one thing, Angleton denied the reality of the split between China and the USSR. For another thing, he concluded that British PM Harold Wilson and Swedish PM Olaf Palme were Soviet agents.

Some of you may be familiar with what happened to those two guys. Wilson was the victim of an epic smear campaign; Palme was murdered. 

Angleton drank a lot (and by "a lot," I mean a lot) and he had private motives for his many resentments. A dangerous man to hold such power.

I believe that Angelton masterminded the hit against JFK. This review of Newman's book gives some of my reasons. Basically, we have much evidence indicating that Angleton ran LHO all along. The whole "Oswald in Mexico" excursion has Angleton's fingerprints all over it.

I don't think that Oswald ever actually went to Mexico. His wife denied it. J. Edgar Hoover privately said LHO had been impersonated. Oswald was seen in Texas at a time when he was supposedly traveling south. The "Oswald" photographed and recorded by CIA operatives in Mexico looked and sounded nothing like the real guy.

The CIA station chief in Mexico, Win Scott, had tapes of the psuedo-Oswald stashed in his safe. When Scott died in 1971, a high-ranking CIA officer -- in such a rush that he forgot his passport -- flew down to Mexico to grab the contents of that safe. The name of that officer was...

...wait for it...

...James Jesus Angleton.

He had a history of such burglaries. There was the time when his "mole" in French intelligence, Philippe di Vosjoli, helped him break into the French embassy. (Alfred Hitchock's worst movie, Topaz, gives a ludicrously false accounting of the Angleton/di Vosjoli relationship.) Ben Bradlee, editor of the Washington Post, reported that Angleton broke into Mary Pinchot Meyer's pad after she had been murdered. (Meyer, the estranged wife of CIA man Cord Meyer, reportedly had an affair with Kennedy.)

But my favorite tale of Angletonian burglary involves J. Edgar Hoover's blackmail files.

Cool story, that. I'll tell you all about it on some other Sunday.
Read More
Posted in | No comments

Saturday, 3 August 2013

Has Uncle Sam partnered up with Al Qaeda?

Posted on 04:07 by Unknown
According to the NYT, a message from Al Qaeda is the reason why so many embassies went on alert:
The United States intercepted electronic communications this week among senior operatives of Al Qaeda, in which the terrorists discussed attacks against American interests in the Middle East and North Africa, American officials said Friday.
As I suspected would happen, we're seeing stories designed to emphasize the wonderful, heroic efforts of our noble NSA eavesdroppers, thereby justifying the great anti-Snowden campaign.

Remember the heightened terrorist "threat level" alerts throughout the 2004 campaign? Remember how those orange alerts completely disappeared after the election? Same shit.

Back to the current story:
It is unusual for the United States to come across discussions among senior Qaeda operatives about operational planning — through informants, intercepted e-mails or eavesdropping on cellphone calls. So when the high-level intercepts were collected and analyzed this week, senior officials at the C.I.A., State Department and White House immediately seized on their significance. Members of Congress have been provided classified briefings on the matter, officials said Friday.

“This was a lot more than the usual chatter,” said one senior American official who had been briefed on the information but would not provide details.
Odd. Very odd. Any number of previous stories have established that the jihadis know full well that their communications are not secure. Even before 9/11, as you will recall, Al Qaeda referred to the great event as a "big wedding." Are we to believe that now -- after the Snowden revelations have everyone on the whole freakin' planet talking about the NSA -- the jihadis have suddenly turned as chatty as a bunch of teenaged girls on the phone? No caution, no euphemisms, no nothin'?
Some analysts and Congressional officials suggested Friday that emphasizing a terrorist threat now was a good way to divert attention from the uproar over the N.S.A.’s data-collection programs, and that if it showed the intercepts had uncovered a possible plot, even better.
Looks like I'm not alone in my cynicism.

Y'know why I'm so cynical? Because there is increasing evidence that -- at least in certain parts of the world, on certain occasions -- the US has partnered up with Al Qaeda, or at least with whatever is left of Al Qaeda.

Take Syria, for example. Despite all of the planted bullshit stories that have attempted to divert us from the truth, the world knows that the actual muscle behind the U.S.-backed Syrian rebellion is an Al Qaeda-related group called the Al-Nusrah Front. You may recall this piece from the London Telegraph:
The group is well funded – probably through established global jihadist networks – in comparison to moderates. Meanwhile pro-democracy rebel group commanders say money from foreign governments has all but dried up because of fears over radical Islamists.
The funding did not come from "established jihadist networks," unless you want to interpret that phrase in a very ironic way. The Obama administration has been backing the Syrian rebellion, in which Al Nusah has been both the most effective force and something of a public-relations nightmare.

And now we learn that the same pattern has re-asserted itself in Afghanistan. The following comes from Bloomberg:
Supporters of the Taliban and al-Qaeda in Afghanistan have been getting U.S. military contracts, and American officials are citing “due process rights” as a reason not to cancel the agreements, according to an independent agency monitoring spending.

The U.S. Army Suspension and Debarment Office has declined to act in 43 such cases, John Sopko, the Special Inspector General for Afghanistan Reconstruction, said today in a letter accompanying a quarterly report to Congress.

“I am deeply troubled that the U.S. military can pursue, attack, and even kill terrorists and their supporters, but that some in the U.S. government believe we cannot prevent these same people from receiving a government contract,” Sopko said.
Regarding the 43 cases of contractors with militant connections, Sopko said the Army should “enforce the rule of common sense” in its suspension and debarment program. “They may be enemies of the United States but that is not enough to keep them from getting government contracts,” according to the agency’s report.
George Wright, another Army spokesman, said by e-mail that cutting off the contracts based only on information from Sopko’s office “would fail to meet due-process requirements and would likely be deemed arbitrary if challenged in court.”

Sopko said the Army “appears to believe that suspension or debarment of these individuals and companies would be a violation of their due-process rights if based on classified information” or on Commerce Department reports.
Well, at least the government is willing to protect someone's rights.

Maybe the granting of those contracts was linked to a request for a little favor...

"If you want the money, Mustapha, fine -- but you have to do something for us in return. Next time you're on the phone with your buddies, say something about a plan to blow up an American embassy. An embassy in -- oh, I dunno. Cairo. Jordan. Something like that. Speak very clearly. Not too fast. Our transcription software is still a little buggy..."
Read More
Posted in | No comments

Friday, 2 August 2013

Spooky times

Posted on 07:26 by Unknown
Too bad I have to dash off and do some errands today, because much is happening. Quickly:

1. A terror threat linked to Al Qaeda has shut down embassies around the Middle East.
A terror threat prompted the State Department on Thursday to direct its embassies in key Middle East nations, including Egypt and Israel, to close on Sunday with the possibility they could remain idle longer.

A U.S. official not authorized to speak publicly on the matter called the threat "credible and serious."

It was "directed at American targets overseas," but may not be confined to main diplomatic facilities, the official said.
I'm not sure how much a threat Al Qaeda actually poses these days. There are those who will tell you that Al Qaeda is no longer, like, a thing, or at least not a large thing, not as large as it once was. At any rate, this Wag-the-Doggish business certainly seems awfully well-timed, coming as it does on the heels of the Snowden affair.

Speaking of which...

2. Michael Hayden, former DCI, has expressed a "hang 'em high" attitude toward Snowden.
Mr. Hayden said he does not endorse some forms of exemplary punishment, “what the French call ‘for the encouragement of others.’”

But if hackers “have this attachment to transparency, perhaps the intelligence community is not where they should be,” he said, adding that the government needs to use the Snowden case to show that it is “serious.”

The former director of both the NSA and CIA said it is “very appropriate” for the U.S. government to pursue Mr. Snowden relentlessly and make his fate an issue in its bilateral relations with any nation that harbors him.
In other words, Hayden DOES endorse exemplary punishment. He reminds me of the 1920s Klan member who said "I don't endorse lynching, but..."

By the way, the above link takes you to a Moonie Times piece. Guess I should have warned you about that. The article opens with a truly delicious bit:
When retired Air Force Gen. Michael V. Hayden headed the CIA, one question vexed him so much that he set up a special working group of his private-sector advisory board to help him answer it: “Will America be able to conduct espionage in the future, inside a political culture that every day demands more and more transparency in every facet of national life?”

Mr. Hayden said the working group, headed by former Hewlett-Packard CEO Carly Fiorina, “came back with the answer, more or less: ‘We’re not sure.’”
Yeah. As if that's the problem with today's U.S.: Too much transparency.

Good old Mikey. He always did know how to make me laugh. In the real world, of course, our spook infrastructure is about as transparent as concrete.

By the way -- wasn't Mikey the one who called in Booz-Hamilton to do work for the NSA...?

So let's put item one and item two together into one cohesive narrative. The Spookland chieftains are attending a hackers' conference in Vegas, where they hope to do some recruiting. Of course, the hackers are asking those chieftains to justify Spookland's Orwellian ways, because anyone who has looked deeply into the matter (as have most of those hackers in Vegas) can tell you that the NSA's cyber-totalitarianism hasn't even foiled any actual terror plots.

And so now, today, on cue, we have some really scary news headlines about...

I don't really need to finish that thought, do I?
Read More
Posted in | No comments

Thursday, 1 August 2013

Snowden's out! Plus: XKeyscore

Posted on 08:58 by Unknown
He has been granted a year in Russia.

I'd like to think that my letter to the Minister of Justice had something to do with this turn of events, but it didn't.

What does it say about what this country has come to, if we have reached the point where an American spy agency employee goes the Russia for asylum -- and he claims potential political persecution if he goes back to the U.S. -- and most Americans approve of his actions?

What does it say about America that the man's father, a gung-ho pro-America type, tells reporters that he's glad his son isn't coming home?
“If he comes back to the United States, he is going to be treated horribly,” Lon Snowden said. “He is going to be thrown into a hole. He is not going to be allowed to speak.”
Meanwhile, the latest Glenn Greenwald piece on the NSA talks about something called XKeyscore, which scoops up everything you do on the internet, including emails.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.
Remember when so many people scoffed at Snowden's claim that he could wiretap anyone, even as he sat at his desk?
US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
Things get particularly hair-raising when we look at the legal justification. FISA? We don't need no stinkin' FISA!
Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
Does this mean that if you chat with someone overseas, or your chat is routed through a foreign server, or you visit a foreign website, the NSA gets to log everything? I can't see how anyone's internet activity can stay 100 percent domestic for very long.

But it gets worse...
But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
Even if the NSA claims that they will not use XKeyscore technology on American citizens without a warrant, we have to take them at their word. Yet the head of the NSA, Keith Alexander, has been caught lying to Congress (although he explained away his lies via the usual slippery rationalizations). So how we can we trust the NSA?

There is no oversight. Congress is obviously clueless -- and the congressfolk themselves are open to blackmail.

Think about it: The NSA would not build a system capable of real time interception of your internet activity unless it was going to do just that.

Incidentally, Keith -- we might as well be on a first-name basis with him, since he knows all of us so well -- spoke to the big hackers conference in Vegas, and braved a great deal of heckling. The following exchange seems straight out of Stephen Colbert...
"Our nation takes stopping terrorism as one of the most important things," he said, standing in short sleeves with a slide on the screen behind him showing a timeline and the number of foiled plots.

"Freedom!" one man shouted from the middle of the standing-room crowd.
View gallery."

"Exactly. And with that, when you think about it, how do we do that? Because we stand for freedom," Alexander said.

"Bulls--t," the heckler said.
Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • More Syrian weirdness
    This post is a follow-up to the one below. Although most Americans aren't paying much attention to the Syrian rebellion, that situation ...
  • Has Uncle Sam partnered up with Al Qaeda?
    According to the NYT, a message from Al Qaeda is the reason why so many embassies went on alert: The United States intercepted electronic c...
  • EPIC news!
    This is interesting. A privacy group called The Electronic Privacy Information Center wants to bring suit against the NSA over, basically, ...
  • News
    Everyone is talking about Jeff Bezo's purchase of the Washington Post. I don't think this decision will be as "culturally catac...
  • Bout steak
    The horsemeat-sold-as-beef scandal took a parapolitical turn recently, when it was revealed that the mastermind may be the notorious Viktor ...
  • Weird connections galore!
    The more you look into the background of the people behind the inflammatory pseudo-film "Innocence of Muslims," the stranger they ...
  • Ghost radar!
    I'm sick of writing NSA stories and you're sick of reading them. So right now, I'd like to talk about something that happened as...
  • Ending privacy? There's an app for that!
    I may have mentioned this before, but: You know that when folding money gets old, it is sent to an official location for disposal, right? We...
  • The Romney campaign is getting weird in these final days
    Am I the only person to notice that Team Romney is acting in an unfathomable fashion as election day approaches? Money should be tight right...
  • AP spying: Were other news journals targeted too?
    Not much time to write, but I did want to mention the one real Obama administration scandal to emerge in recent days. Benghazi and the IRS ...

Blog Archive

  • ▼  2013 (314)
    • ▼  August (11)
      • Ghost radar!
      • Anything you say can and will be used against you
      • America is under the SOD (and other NSA stories)
      • News
      • Ending privacy? There's an app for that!
      • Egypt
      • New spook stuff
      • Old spook stuff
      • Has Uncle Sam partnered up with Al Qaeda?
      • Spooky times
      • Snowden's out! Plus: XKeyscore
    • ►  July (45)
    • ►  June (40)
    • ►  May (36)
    • ►  April (54)
    • ►  March (37)
    • ►  February (34)
    • ►  January (57)
  • ►  2012 (186)
    • ►  December (37)
    • ►  November (41)
    • ►  October (47)
    • ►  September (61)
Powered by Blogger.

About Me

Unknown
View my complete profile