Showing posts sorted by relevance for query cia. Sort by date Show all posts
Showing posts sorted by relevance for query cia. Sort by date Show all posts

Monday, December 19, 2016

Why the WaPo is a CIA Tool...,



nextgov |   One of the CIA’s top security officials said the cloud infrastructure built by Amazon Web Services is improving the spy agency’s cybersecurity posture and speed to mission handling national security threats.

“Cloud has been a godsend for folks trying to implement systems quickly and for us to secure workloads better,” said CIA Chief Information Security Officer Sherrill Nicely, speaking Thursday at an event hosted by Nextgov.

“We’re very happy with it,” Nicely added. “Our agency and other [intelligence community] components are busily working to move their workloads into the cloud, and off legacy and into the new.”

ICH | News media should illuminate conflicts of interest, not embody them. But the owner of the Washington Post is now doing big business with the Central Intelligence Agency, while readers of the newspaper’s CIA coverage are left in the dark.

The Post’s new owner, Jeff Bezos, is the founder and CEO of Amazon -- which recently landed a $600 million contract with the CIA. But the Post’s articles about the CIA are not disclosing that the newspaper’s sole owner is the main owner of CIA business partner Amazon.

Even for a multi-billionaire like Bezos, a $600 million contract is a big deal. That’s more than twice as much as Bezos paid to buy the Post four months ago.

And there’s likely to be plenty more where that CIA largesse came from. Amazon’s offer wasn’t the low bid, but it won the CIA contract anyway by offering advanced high-tech “cloud” infrastructure.

Bezos personally and publicly touts Amazon Web Services, and it’s evident that Amazon will be seeking more CIA contracts. Last month, Amazon issued a statement saying, “We look forward to a successful relationship with the CIA.”

Saturday, March 19, 2022

CIA Been Building Up Its Ukrainian Nazi Insurgency Since The Obama Administration...,

antiwar |  CIA paramilitaries had been training Ukrainian forces on the frontlines of the Donbas war against Russian-backed separatists since 2014 and were only pulled out by the Biden administration last month, Yahoo News reported on Wednesday, citing former US officials.

The CIA first sent a small number of paramilitaries to eastern Ukraine when the war started in 2014, which was sparked by a US-backed coup in Kyiv and the Donbas separatists declaring independence from the post-coup government.

As part of the training, CIA paramilitaries taught Ukrainian forces sniper techniques, how to operate US-provided Javelin anti-tank missiles, and how to avoid being tracked on the battlefield by using covert communications and other means. The former officials said at first the CIA was surprised at the capability of Russia and the separatists compared with US adversaries in the Middle East.

The US military held similar training programs for Ukrainian forces in western Ukraine that have been publicly acknowledged. In January, Yahoo News revealed that the CIA had also been holding a US-based training program for Ukrainian forces. A former CIA official said the US-based program was training “an insurgency” and taught Ukrainians how to “kill Russians.”

The secret CIA program in eastern Ukraine was much more provocative than the other training programs since it essentially meant the US was involved in a proxy war on Russia’s border. The former officials told Yahoo News that During the first year of the Trump administration, National Security Officials reviewed the program, which had begun under the Obama administration.

The CIA paramilitaries were directed to advise and train but not participate in combat. Trump administration officials feared the authorities were too broad and that the mission was too ambiguous. One former official said questions that were asked included: “How far can you go with existing covert action authorities? If, God forbid, they’ve shot some Russians, is that a problem? Do you need special authorities for that?”

The former official said that the Trump administration discussed what Russia’s redlines could be and determined the US support for Ukrainian forces fell within historically acceptable bounds. “There was a school of thought that the Russians spoke the good old language of proxy war,” the official said.

Despite the concerns, the secret program continued for years until February. The former officials said that when a Russian invasion became “increasingly acute,” the Biden administration pulled all CIA personnel out of Ukraine, including the paramilitaries. One former official said the Biden administration was “terrified of even clandestine folks being on the frontline.”

Although it’s hard to know what the military situation looks like in Ukraine, the US claims Ukraine is putting up a much fiercer resistance than Russia expected. The former officials who spoke with Yahoo News suggested the resistance was in part thanks to the CIA training program. The US continues to fuel the fighting as President Biden has already pledged over $1 billion in new military aid for Ukraine since the invasion started.

Sunday, July 23, 2023

The CIA Killed JFK - So Of Course It Opposes Long-Promised Records Releases

jacobin  |   his isn’t the only major revelation that has come out of President Joe Biden’s December declassification. One is a secret 1977 memo unearthed by Morley and other researchers that was written by an employee of the foreign intelligence branch of the CIA’s Miami station, showing that far from assuming that Oswald acted alone or that the KGB was involved, officers there considered anti-communist Cuban exiles prime suspects.

According to the memo, when Kennedy was still alive, station chief Theodore G. Shackley ordered scrutiny of the movements and plans of “known dangerous Cuban exile activists” while the president was traveling the country, to get wind of and halt any “conspiracies” in that community to “exploit or interfere with the president’s movement.” After Kennedy’s death, the memo states, Shackley and other top station officials ordered agents to gather information about Cuban exiles who may have been involved in the assassination.

Sure enough, the decades that followed have seen serious circumstantial evidence of anti-Castro exile involvement come to light. One anti-Castro militant, Antonio Veciana, admitted that he had been introduced to Oswald in Dallas by his CIA handler, a man whom he later identified as David Atlee Phillips, head of the agency’s anti-Cuban operations. In late 2021, the son of anti-Castro fighter and CIA contractor Ricardo “Monkey” Morales revealed that his father had told him that he had trained Oswald as a sniper at a secret CIA training camp for an invasion of Cuba, and that he had been ordered by his CIA handler to go to Dallas for a “clean-up” mission two days before Kennedy was shot.

Another document from the December tranche found by researchers is a 1976 CIA memo attesting to the agency’s heavy involvement in the Warren Commission’s investigation. According to the memo, thirty-nine CIA personnel were involved, including “nine of whom were involved daily.” As Morley pointed out at the time, several of those listed in the memo are known to have misled the Warren Commission about the CIA’s interest in and knowledge of Oswald.

It’s further evidence of what even the agency’s own in-house historian in 2013 charitably called a “benign cover-up” by the CIA in its dealings with the commission, aimed at pushing it in the direction of what it considered the “best truth” — that Oswald acted alone in killing Kennedy, for his own, inexplicable motives.

It builds on previous disclosures that show that the CIA had a keen and extensive interest in Oswald before the assassination that went right up to the agency’s senior officials.

Tuesday, November 14, 2017

CIA False-Flagging and Impersonating Kaspersky

wikileaks |  Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. "perfectly-boring-looking-domain.com") for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a "hidden" CIA server called 'Blot'.
The cover domain delivers 'innocent' content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users - a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate - it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb(see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

Friday, March 01, 2024

Why Did The NYTimes Report On CIA Operations In Ukraine?

scheerpost  |  We can start, logically enough, with that desperation evident among those dedicated to prolonging the war. The outcome of the war, in my read and in the view of various military analysts, does not depend on the $61 billion in aid that now hangs in the balance. But the Biden regime seems to think it does, or pretends to think it does. The Times’s most immediate intent, so far as one can make out from the piece, is to add what degree of urgency it can to this question.

Entous and Schwirtz report that the people running Ukrainian intelligence are nervous that without a House vote releasing new funds “the CIA will abandon them.” Good enough that it boosts the case to cite nervous Ukrainians, but we should recognize that this is a misapprehension. The CIA has a very large budget entirely independent of what Congress votes one way or another. William Burns, the CIA director, traveled to Kyiv two weeks ago to reassure his counterparts that “the U.S. commitment will continue,” as Entous and Schwirtz quote him saying. This is perfectly true, assuming Burns referred to the agency’s commitment.

More broadly, The Times piece appears amid flagging enthusiasm for the Ukraine project. And it is in this circumstance that Entous and Schwirtz went long on the benefits accruing to the CIA in consequence of its presence on the ground in Ukraine. But read these two reporters carefully: They, or whoever put their piece in its final shape, make it clear that the agency’s operations on Ukrainian soil count first and most as a contribution to Washington’s long campaign to undermine the Russian Federation. This is not about Ukrainian democracy, that figment of neoliberal propagandists. It is about Cold War II, plain and simple. It is time to reinvigorate the old Russophobia, thus—and hence all the baloney about Russians corrupting elections and so on. It is all there for a reason.  

To gather these thoughts and summarize, This piece is not journalism and should not be read as such. Neither do Entous and Schwirtz serve as journalists. They are clerks of the governing class pretending to be journalists while they post notices on a bulletin board that pretends to be a newspaper.

Let’s dolly out to put this piece in its historical context and consider the implications of its appearance in the once-but-fallen newspaper of record. Let’s think about the early 1970s, when it first began to emerge that the CIA had compromised the American media  and broadcasters.

Jack Anderson, the admirably iconoclastic columnist, lifted the lid on the agency’s infiltration of the media by way of a passing mention of a corrupted correspondent in 1973. A year later a former Los Angeles Times correspondent named Stuart Loory published the first extensive exploration of relations between the CIA and the media in the Columbia Journalism Review. Then, in 1976, the Church Committee opened its famous hearings in the Senate. It took up all sorts of agency malfeasance—assassinations, coups, illegal covert ops. Its intent was also to disrupt the agency’s misuse of American media and restore the latter to their independence and integrity.

The Church Committee is still widely remembered for getting its job done. But it never did. A year after Church produced its six-volume report, Rolling Stone published “The CIA and the Media,” Carl Bernstein’s well-known piece. Bernstein went considerably beyond the Church Committee, demonstrating that it pulled its punches rather than pull the plug on the CIA’s intrusions in the media. Faced with the prospect of forcing the CIA to sever all covert ties with the media, a senator Bernstein did not name remarked, “We just weren’t ready to take that step.”

We should read The Times’s piece on the righteousness of the CIA’s activities in Ukraine—bearing in mind the self-evident cooperation between the agency and the newspaper—with this history in mind.

America was just emerging from the disgraces of the McCarthyist period when Stuart Loory opened the door on this question, the Church Committee convened, and Carl Bernstein filled in the blanks. In and out of the profession there was disgust at the covert relationship between media and the spooks. Now look. What was then viewed as top-to-bottom objectionable is now routinized. It is “as usual.” In my read this is one consequence among many of the Russiagate years: They again plunged Americans and their mainstream media into the same paranoia that produced the corruptions of the 1950s and 1960s.

Alas, the scars of the swoon we call Russiagate are many and run deep

Wednesday, November 29, 2023

CIA Office Of Global Access Is The Crash Retrieval Portfolio Manager

dailymail  |  Sources who spoke to DailyMail.com shed light on how the CIA has allegedly coordinated the secret recovery and storage of these alleged crashed or landed UFOs.

Late CIA expert Jeffrey Richelson wrote in his 2016 book, The US Intelligence Community, that the Office of Global Access helped provide 'worldwide collection capability' 

'There's at least nine vehicles. There were different circumstances for different ones,' one source briefed by UFO program insiders told DailyMail.com. 'It has to do with the physical condition they're in. If it crashes, there's a lot of damage done. Others, two of them, are completely intact.'

The source said the CIA has a 'system in place that can discern UFOs while they're still cloaked,' and that if the 'non-human' craft land, crash or are brought down to earth, special military units are sent to try to salvage the wreckage.

Another source with knowledge of the OGA's role said that they specialize in allowing the US military to secretly access areas around the world where they would usually be 'denied' – for example behind enemy lines.

'They are basically a facilitator for people to get in and out of countries,' the source said. 'They are very clever at being able to get anywhere in the world they want to.'

Multiple sources briefed on the OGA's activities told DailyMail.com that most of its operations involve more conventional retrieval missions, such as stray nuclear weapons, downed satellites or adversaries' technology.

But they claimed some missions coordinated by the OGA have involved retrieval of UFOs.

'The task at hand is simply to get it into custody and protect the secrecy of it,' one source said. 'The actual physical retrieval is by the military. But it's not kept under military control, because they have to keep too many records. So they start moving it out fairly quickly into private hands.'

Documents published by the National Archives and Records Administration (NARA) in December 2016 showed that the OGA was one of 56 offices in the CIA, with its chief and deputy making up two of a total 286 director-level officials in the spy agency.

An unclassified organizational chart published by the CIA in October 2015 lists the OGA among nine offices in the 'Science and Technology' wing of the agency.

Late CIA expert Jeffrey Richelson wrote in a 2016 book on the agency that the OGA was established in 2003, and cited a CIA description that it 'integrate[s] analysis, technology, and tradecraft to attack the most difficult targets, and to provide worldwide collection capability.'

A 255-word biography of former OGA deputy director Doug Wolfe, published by an aerospace conference in 2017, says that he 'helped start the Office of Global Access'.

Wolfe's bio cryptically adds that he 'was responsible for leading and managing strategic, unwarned access programs that deliver intelligence from the most challenging denied areas' and 'served as program manager with responsibility for the end-to-end system acquisition of an innovative new source and method for the IC [Intelligence Community].'

Two sources told DailyMail.com that the OGA coordinates with Special Operations Forces such as SEAL teams or Delta Force under the Pentagon's Joint Special Operations Command (JSOC), or nuclear weapons experts such as the Nuclear Emergency Support Team (NEST), to collect the crashed or landed craft.

But another source, who has briefed members of Congress on alleged crash retrievals, said that NEST had not been involved in any of these operations.

A spokesperson for the agency also denied involvement.

'[NEST] personnel encounter materials from unknown origins on a regular basis,' a spokesperson said. 'In fact, one of NEST's missions is to help determine the origin of nuclear material interdicted outside of regulatory control or used in a nuclear device.

'During its operations, NEST has never encountered any material related to UAP.'

In a written statement, a JSOC spokesperson told DailyMail.com: 'We have nothing for you on this.'

A former SEAL team member told DailyMail.com that they had been on operations coordinated by the CIA to retrieve high-value stray enemy weapons, and that they knew of colleagues who had been on similar operations where they recovered technology that appeared highly advanced – though not necessarily out-of-this-world.

'Absolutely that happens,' the ex-SEAL said. 'Even ordinance or a weapon that we've never seen, we recover and bring it back.'

One source said that the Air Force Special Operations Command's 24th Special Tactics Squadron, based at Pope Field Army Airbase in North Carolina, has also been involved in securing areas for UFO crash retrievals.

Sources said the CIA office then often hands the wreckage or material over to private aerospace contractors for analysis, where it is not subject to rigorous government audits and can be shielded with protections for trade secrets.

'The CIA is the portfolio manager or owner of the UAP [Unidentified Anomalous Phenomena] crash retrieval operation,' one source, who has shared their information with Congress, told DailyMail.com.

'The Department of Energy national labs are materials analysis contractors whenever recovered radioisotopes are involved but not always just radioisotope materials. The aerospace-defense industry are also contractors that specifically do not handle any recovered radioisotopes, but they handle the other non-radioactive material – and intact craft.'

Wednesday, March 12, 2014

sissy pit pretends a hissy fit, but who is calling the tune?


firstlook | Two top Senate leaders declared Tuesday that the CIA’s recent conduct has undermined the separation of powers as set out in the Constitution, setting the stage for a major battle to reassert the proper balance between the two branches.

Intelligence Committee chair Dianne Feinstein (D-Calif.), in a floor speech (transcript; video) that Judiciary Committee chair Patrick Leahy (D-Vt.) immediately called the most important he had heard in his career, said the CIA had searched through computers belonging to staff members investigating the agency’s role in torturing detainees, and had then leveled false charges against her staff in an attempt to intimidate them.

“I have grave concerns that the CIA’s search may well have violated the separation of powers principle embodied in the United States Constitution, including the speech and debate clause,” she said. “It may have undermined the constitutional framework essential to effective congressional oversight of intelligence activities or any other government function.”

She concluded: “The recent actions that I have just laid out make this a defining moment for the oversight of our intelligence community. How Congress responds and how this is resolved will show whether the Intelligence Committee can be effective in monitoring and investigating our nation’s intelligence activities, or whether our work can be thwarted by those we oversee. I believe it is critical that the committee and the Senate reaffirm our oversight role and our independence under the Constitution of the United States.”

She also accused the CIA of obstructing her committee’s torture inquiry in general, and of disputing findings that its own internal inquiry had substantiated.

The document at the heart of this confrontation is an internal review conducted by the CIA of the materials it had turned over to Feinstein’s committee during the course of the four-year congressional investigation into the Bush-era torture practices.

Feinstein said the document, which has become known as the Panetta Review after then-director of the CIA Leon Panetta, was first discovered by committee staff using CIA-provided search tools in 2010. It became particularly relevant later, after the committee completed a scathing 6,300-page report in December 2012, and the CIA sent its official response in June 2013.

The committee’s detailed report is still classified, but it is known to be highly critical of both the CIA’s role in the torture regime and its campaign to deceive Congress about it. The CIA vehemently took issue with those conclusions.

Saturday, January 10, 2015

necropolitics: from interrogation to extermination in a climate of perpetration


WSWS |  One month ago, the Senate Intelligence Committee released the 525-page summary of its voluminous report on the torture of prisoners in secret CIA facilities overseas, conducted between 2002 and 2007. In grisly detail, the report documented such practices as waterboarding, systematic beatings, and hitherto unknown tortures such as “rectal feeding.” But in practice, the report has been buried, its evidence of government criminality ignored, the perpetrators and organizers of torture going scot-free.

As the World Socialist Web Site declared at the time, “Two irrefutable conclusions flow from the release of the Senate Intelligence Committee report on CIA torture: 1) The United States, during the Bush administration, committed criminal acts of the most serious character, in violation of international and domestic law; and 2) None of those responsible for these crimes will be arrested, indicted or prosecuted for their actions.”

Far from being shamed or humiliated by the detailed exposure of their criminality, those most implicated in the establishment and operation of the torture chambers have brazenly defended their conduct. From former Vice President Dick Cheney to ex-CIA directors George Tenet, Michael Hayden and Porter Goss, to the operational head of the interrogation program, Jose Rodriguez, they have displayed a well-justified confidence that the Obama administration will protect them from any consequences.

The Obama administration has officially shut down the secret CIA prisons and adopted a policy of blowing up its enemies with drone-fired missiles rather than capturing them. The shift from interrogation to extermination has increased the number of innocent victims many-fold. Whereas dozens of those jailed in CIA prisons were found to have no connection to terrorism, the drone-missile strikes have killed thousands of civilians in Afghanistan, Pakistan, Yemen and other countries.

Two recent incidents demonstrate the complicity of the Obama administration with the torturers. On December 30, the outgoing chairman of the Senate Intelligence Committee, Senator Dianne Feinstein, sent a nine-page letter to the president outlining proposed legislative and administrative actions to be taken on the basis of the torture report.

The changes were largely cosmetic, such as enacting into law the ban on waterboarding and other forms of torture imposed by executive order after Obama took office in 2009. Even these minimal legislative actions will go nowhere in the new Republican-controlled Congress, and the proposed administrative actions will be ignored by the military-intelligence apparatus. The White House has not bothered to respond to Feinstein’s letter.

In a statement issued January 5, the CIA announced that after four years in office, the agency’s inspector-general, David Buckley, was resigning, effective the end of the month, to “pursue an opportunity in the private sector.” Buckley ran afoul of the CIA top brass with a report last July acknowledging that five CIA operatives had penetrated the computers used by Senate Intelligence Committee staffers who prepared the torture report, in an effort to find out how the Senate panel had obtained certain CIA internal documents the agency had decided to withhold from the committee that has legal oversight authority.

This electronic surveillance of the legislative branch was so brazenly criminal that Senator Feinstein felt compelled to deliver a one-hour address on the floor of the Senate last March denouncing the agency’s actions. She charged that the agency “may well have violated the separation-of-powers principle embodied in the United States Constitution,” and also “the Fourth Amendment, the Computer Fraud and Abuse Act, as well as Executive Order 12333, which prohibits the CIA from conducting domestic searches or surveillance.”

Friday, March 31, 2017

Wikileaks Vault 7 Marble Framework


wikileaks | Today, March 31st 2017, WikiLeaks releases Vault 7 "Marble" -- 676 source code files for the CIA's secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding ("obfuscating") text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA's anti-forensics approach and the CIA's Core Library of malware code. It is "[D]esigned to allow for flexible and easy-to-use obfuscation" as "string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop."

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, --- but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.

Thursday, July 27, 2017

Operation CHAOS - CIA Started 60's Riots


wikipedia |  Operation CHAOS or Operation MHCHAOS was the code name for an American domestic espionage project conducted by the Central Intelligence Agency from 1967 to 1974, established by President Johnson and expanded under President Nixon, whose mission was to uncover possible foreign influence on domestic race, anti-war and other protest movements. The operation was launched under Director of Central Intelligence (DCI) Richard Helms, by chief of counter-intelligence, James Jesus Angleton, and headed by Richard Ober. [1][2] The "MH" designation is to signify the program had a worldwide area of operations.[3]

The CIA began domestic recruiting operations in 1959 in the process of finding Cuban exiles they could use in the campaign against communist Cuba and Fidel Castro. As these operations expanded, the CIA formed a Domestic Operations Division in 1964. In 1965, President Lyndon Johnson requested that the CIA begin its own investigation into domestic dissent—independent of the FBI's ongoing COINTELPRO.[4]
The CIA developed numerous operations targeting domestic dissent, many operating under the CIA's Office of Security. These included:[2]
  • HTLINGUAL – Directed at letters passing between the United States and the then Soviet Union, the program involved the examination of correspondence to and from individuals or organizations placed on a watchlist.
  • Project 2 – Directed at infiltration of foreign intelligence targets by agents posing as dissident sympathizers and which, like CHAOS, had placed agents within domestic radical organizations for the purposes of training and establishment of dissident credentials.
  • Project MERRIMAC – Designed to infiltrate domestic antiwar and radical organizations thought to pose a threat to security of CIA property and personnel.
  • Project RESISTANCE – Worked with college administrators, campus security and local police to identify anti-war activists and political dissidents without any infiltration taking place
  • Domestic Contact Service – Focused on collecting foreign intelligence from willing Americans.
When President Nixon came to office in 1969, existing domestic surveillance activities were consolidated into Operation CHAOS.[5] Operation CHAOS first used CIA stations abroad to report on antiwar activities of United States citizens traveling abroad, employing methods such as physical surveillance and electronic eavesdropping, utilizing "liaison services" in maintaining such surveillance. The operations were later expanded to include 60 officers.[3] In 1969, following the expansion, the operation began developing its own network of informants for the purposes of infiltrating various foreign antiwar groups located in foreign countries that might have ties to domestic groups.[2] Eventually, CIA officers expanded the program to include other leftist or counter-cultural groups with no discernible connection to Vietnam, such as groups operating within the women's liberation movement.[1] The domestic spying of Operation CHAOS also targeted the Israeli embassy, and domestic Jewish groups such as the B'nai B'rith. In order to gather intelligence on the embassy and B'nai B'rith, the CIA purchased a garbage collection company to collect documents that were to be destroyed.[6]
Targets of Operation CHAOS within the antiwar movement included:[5]
Officially, reports were to be compiled on "illegal and subversive" contacts between United States civilian protesters and "foreign elements" which "might range from casual contacts based merely on mutual interest to closely controlled channels for party directives." At its finality, Operation CHAOS contained files on 7,200 Americans, and a computer index totaling 300,000 civilians and approximately 1,000 groups.[8] The initial result of investigations lead DCI Richard Helms to advise then President Johnson on November 15, 1967, that the agency had uncovered "no evidence of any contact between the most prominent peace movement leaders and foreign embassies in the U.S. or abroad." Helms repeated this assessment in 1969.[1] In total 6 reports were compiled for the White House and 34 for cabinet level officials.[2]

Thursday, November 05, 2020

Military And Law Enforcement Collaboration To Violate Rights And Grift Taxpayer Dollars

newyorker  |  Before dawn on January 23, 2019, Mark McConnell arrived at the Key West headquarters of the military and civilian task force that monitors drugs headed to the United States from the Southern Hemisphere. McConnell, a prosecutor at the Department of Justice and a former marine, left his phone in a box designed to block electronic transmissions, and passed through a metal detector and a key-card-protected air lock to enter the building. On the second floor, he punched in the code for his office door, then locked it behind him. On a computer approved for the handling of classified information, he loaded a series of screenshots he had taken, showing entries in a database called Helios, which federal law enforcement uses to track drug smugglers. McConnell e-mailed the images to a classified government hotline for whistle-blowers. Then he printed backup copies and, following government procedures for handling classified information, sealed them in an envelope that he placed in another envelope, marked “SECRET.” He hid the material behind a piece of furniture.

McConnell had uncovered what he described as a “criminal conspiracy” perpetrated by the C.I.A. and the F.B.I. Every year, entries in the Helios database lead to hundreds of drug busts, which lead to prosecutions in American courts. The entries are typically submitted to Helios by the Drug Enforcement Administration, the F.B.I., and a division of the Department of Homeland Security. But McConnell had learned that more than a hundred entries in the database that were labelled as originating from F.B.I. investigations were actually from a secret C.I.A. surveillance program. He realized that C.I.A. officers and F.B.I. agents, in violation of federal law and Department of Justice guidelines, had concealed the information’s origins from federal prosecutors, leaving judges and defense lawyers in the dark. Critics call such concealment “intelligence laundering.” In the nineteen-seventies, after C.I.A. agents were found to have performed experiments with LSD on unwitting Americans and investigated Vietnam War protesters, restrictions were imposed that bar the agency from being involved in domestic law-enforcement activities. Since the country’s founding, judges, jurors, and defendants have generally had the right to know how evidence used in a trial was gathered. “This was undisclosed information, from an agency working internationally with different rules and standards,” Nancy Gertner, a retired federal district judge and a senior lecturer at Harvard Law School, told me. “This should worry Trump voters who talk about a ‘deep state.’ This is the quintessential deep state. This is activities beyond your view, fundamentally affecting what happens in American courts.”

But the scheme benefitted the C.I.A. and the F.B.I.: the former received information obtained during operations, and the latter reported increased arrests and was able to secure additional federal funding as a result. The scope of the scheme was corroborated in hundreds of pages of e-mails, transcripts, and other documents obtained by The New Yorker.

For weeks, C.I.A. officials had been trying to stop McConnell from revealing the agency’s activities. They sent a lawyer to Key West with nondisclosure agreements, but McConnell refused to sign. A day before his early arrival at the office, McConnell had learned of an order to delete the screenshots on his computer. “I knew that I had to get the electronic evidence to outside investigators,” he told me. “There was no doubt about what I needed to do, and there was no doubt retaliation against me would follow.” He worked quickly, not knowing when security officers would arrive. Later that day, they came to McConnell’s office and deleted the images.

A little more than a month later, after C.I.A. officials accused McConnell of “spilling” classified information, the director of the task force suspended him. Soon, the C.I.A. director, Gina Haspel, visited the task force and was briefed on the matter. According to a sworn affidavit that McConnell filed with the Senate Intelligence Committee, and to a source with knowledge of the meeting, Haspel said that there needed to be repercussions for McConnell. (A C.I.A. spokesperson, Timothy Barrett, called the allegation “inaccurate and a gross mischaracterization.”) The military leadership of the task force ignored McConnell’s appeal of his suspension, and discussions about future assignments came to an abrupt halt. Six officials said that they believed the C.I.A. had retaliated against McConnell, leaving him nominally employed but unable to find a new post after decades of public service.

Tuesday, November 05, 2019

Why the Deep State Must Kill Julian Assange


theconservativetreehouse |  According to recent reports U.S. Attorney John Durham and U.S. Attorney General Bill Barr are spending time on a narrowed focus looking carefully at CIA activity in the 2016 presidential election.  One recent quote from a media-voice increasingly sympathetic to a political deep-state notes:
“One British official with knowledge of Barr’s wish list presented to London commented that “it is like nothing we have come across before, they are basically asking, in quite robust terms, for help in doing a hatchet job on their own intelligence services””. (Link)
It is interesting that quote comes from a British intelligence official, as there appears to be mounting evidence of an extensive CIA operation that likely involved U.K. intelligence services.  In addition, and as a direct outcome, there is an aspect to the CIA operation that overlaps with both a U.S. and U.K. need to keep Wikileaks founder Julian Assange under tight control.  In this outline we will explain where corrupt U.S. and U.K. interests merge.

To understand the risk that Julian Assange represented to CIA interests, it is important to understand just how extensive the operations of the CIA were in 2016.  It is within this network of foreign and domestic operations where FBI Agent Peter Strzok is clearly working as a bridge between the CIA and FBI operations.

By now people are familiar with the construct of CIA operations involving Joseph Mifsud, the Maltese professor now generally admitted/identified as a western intelligence operative who was tasked by the CIA (John Brennan) to run an operation against Trump campaign official George Papadopoulos in both Italy (Rome) and London. {Go Deep}

In a similar fashion the CIA tasked U.S. intelligence asset Stefan Halper to target another Trump campaign official, Carter Page.  Under the auspices of being a Cambridge Professor Stefan Halper also targeted General Michael Flynn.  Additionally, using assistance from a female FBI agent under the false name Azra Turk, Halper also targeted Papadopoulos.

The initial operations to target Flynn, Papadopoulos and Page were all based overseas.  This seemingly makes the CIA exploitation of the assets and the targets much easier.

Thursday, October 15, 2015

the deep state board was set up long before kissinger and brzezinski got to play...,



democracynow |  It’s been over half a century since Allen Dulles resigned as director of the CIA, but his legacy lives on. Between 1953 and '61, under his watch, the CIA overthrew the governments of Iran and Guatemala, invaded Cuba, was tied to the killing of Patrice Lumumba, Congo's first democratically elected leader.

A new biography of Allen Dulles looks at how his time at the CIA helped shape the current national security state. Biographer David Talbot writes, quote, "The Allen Dulles story continues to haunt the country. Many of the practices that still provoke bouts of American soul-searching originated during Dulles’s formative rule at the CIA." Talbot goes on to write, "Mind control experimentation, torture, political assassination, extraordinary rendition, mass surveillance of U.S. citizens and foreign allies—these were all widely used tools of the Dulles reign."

AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report. I’m Amy Goodman. Our guest is David Talbot. His book is The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government. He’s the founder and former CEO and editor-in-chief of Salon. Let’s start with the title, The Devil’s Chessboard. Why did you call it that, David?

DAVID TALBOT: The Devil’s Chessboard refers to the fact that the Dulles brothers—John Foster Dulles, who’s secretary of state under Eisenhower, and his brother, Allen Dulles, who I focus on, head of the CIA—they loved to play chess with each other. They would go at it for hours, even when Allen Dulles was about to be married. He kept his wife-to-be waiting around while the two brothers went at it. And they tended to look at the world as their chessboard. People were pawns to be manipulated. So I felt that was a—you know, an apt metaphor.

But, Amy, I wanted to go back to what you were talking about—alternative media—before this. I think—I just want to underline what you were saying about how essential it is to have countervoices. They are the lifeblood of democracy. And shows like yours and public radio are just essential. You know, my book is having a hard time getting through the media gatekeepers. They don’t want to hear about this, and in part because the CIA, particularly under Allen Dulles, but even today, are masters at manipulating the media. I’ve been on shows and been bumped. I was scheduled to be on shows at the last minute, strangely. I was supposed to write something for Politico magazine. Someone there called the book a "masterpiece." They wanted the book to be, you know, showcased there. Instead, I was bumped from Politico. And an article based on recently leaked CIA documents—conveniently leaked—was written by a former New York Times reporter, Phil Shenon, and what he did was to basically accuse Fidel Castro of assassinating President Kennedy. This has been a CIA disinformation line for years. So the CIA is still manipulating the media, and it’s essential that independent media exists, like this.

AMY GOODMAN: Can you talk about the relationship between The New York Times publisher, Arthur Hays Sulzberger, and Allen Dulles?

Wednesday, March 08, 2017

Did the NSA Clown and Depants the CIA?


libertyblitzkrieg |  By now, most of you have heard about the largest ever release of confidential CIA documents published by Wikileaks, known as Vault7. Many of you have also read various summaries of what was released, but reading the take of others is not the same as analyzing it yourself. As such, I strongly suggest you check out the original Wikileaks summary. It’s mostly written for the layperson without much technical expertise (like myself), and I think you’ll get a lot out of it.
In this post, I’m going to republish the entire press release, as well as provide key excerpts from the larger summary along with some personal observations. Let’s get started…
From Wikileaks:
Press Release
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
Lovely. Just lovely.
“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.
This leak might very well be from a competing government agency concerned about the unaccountable power and sloppiness of the CIA, or it could simply be a turf war.

Sunday, December 14, 2014

current director of wrecked'em operations not about to discard $billions/generations of agency best practices...,


fp |  “I look back at the record and I see that this is a workforce that was trying to do the right thing,” Brennan said. But still, “I cannot say with certainty whether or not individuals acted with complete honesty,” he said about some officers who may have misled Congress and other U.S. officials. 

Brennan criticized the Senate committee for not interviewing CIA officials who ran the interrogation program when it functioned and instead relying only on memos and documents to compile the report.
Pressed by a reporter to answer if a future American president could turn to the now discredited techniques, Brennan said the CIA was out of the business of detentions.

“What happens in the future? The Army Field Manual is the established basis for interrogation,” Brennan said, referring to the September 2006 Army manual titled “Human Intelligence Collector Operations,” which prohibits “acts of physical or mental torture” meted out to captured prisoners. 

“We, the CIA are not in the detention program, we are not contemplating at all getting back into detention program, using any of those EITs. I defer to policymakers in [the] future,” Brennan said.

In 2009 when Obama ordered the closing of the CIA’s detention and interrogation program, the agency gave up its formal role in interrogations. Obama also ordered the creation of the High-Value Detainee Interrogation Group also known as HIG, which includes experts from several U.S. intelligence agencies but is overseen by the National Security Council.

In some areas, Brennan went further in acknowledging CIA missteps than he has before, particularly when it comes to letting specific CIA officers involved in the program off the hook. “We fell short when it came to holding some officers accountable for their mistakes,” he said.

The Senate report noted multiple instances where CIA leadership refused to punish officers who severely abused detainees, even when that behavior was specifically called out. “On two occasions in which the CIA inspector general identified wrongdoing, accountability recommendations were overruled by senior CIA leadership. In one instance, involving the death of a CIA detainee,” reads the report.

Tuesday, December 09, 2014

michael vick did more time for dogfighting than the "rape by instrumentality" crew will do for crimes against humanity...,


motherjones |  On Tuesday morning, the Senate intelligence committee released an executive summary of its years-long investigation into the CIA's detention and interrogation program. President George W. Bush authorized the so-called "enhanced interrogation" program after the 9/11 attacks. The United States government this week has warned personnel in facilities abroad, including US embassies, to be ready in case protests erupt in response.

The full report includes over 6,000 pages and 35,000 footnotes. You can read the executive summary here. Here are some of the lowlights:

1. The CIA used previously unreported tactics, including "rectal feeding" of detainees (p. 100, footnote 584):
rectal feeding

2. CIA officers threatened the children of detainees (p. 4):
cia threatened children

3. Over 20 percent of CIA detainees were "wrongfully held." One was an "intellectually challenged" man who was held so the CIA could get leverage over his family (p. 12):
wrongfully held detainees

4. One detainee, Abu Hudhaifa, was subjected to "ice water baths" and "66 hours of standing sleep deprivation" before being released because the CIA realized it probably had the wrong man (p. 16, footnote 32):

abu hudhaifa sleep deprivation

5. The CIA, contrary to what it told Congress, began torturing detainees before even determining whether they would cooperate (p. 104):
torture before questioning

6. CIA officers began torturing Khalid Sheikh Mohammed "a few minutes" after beginning to question him (p. 108):
ksm tortured within minutes

7. The CIA planned to detain KSM incommunicado for the rest of his life, without charge or trial (p. 9):
incommunicado forever

8. During waterboarding sessions, KSM made up a story that Al Qaeda was trying to recruit African-American Muslims…in Montana (p. 118):
montana muslims

Sunday, December 14, 2014

the history of cia interrogation from the cold war to the war on terror


democracynow |  AMY GOODMAN: Right, but also on prisoners, were there experiments?

ALFRED McCOY: There were some in prisons in the United States and also the Drug Treatment Center in Lexington, Kentucky. The Federal Drug Treatment Center in Lexington, Kentucky, had this. All of this research, all this very elaborate research —

AMY GOODMAN: On unwitting Americans?

ALFRED McCOY: Unwitting Americans, produced nothing, okay? What they found time and time again is that electroshock didn’t work, and sodium pentathol didn’t work, LSD certainly didn’t work. You scramble the brain. You got unreliable information. But what did work was the combination of these two rather boring, rather mundane behavioral techniques: sensory disorientation and self-inflicted pain.

And in 1963, the C.I.A. codified these results in the so-called KUBARK Counterintelligence Manual. If you just type the word "KUBARK" into Google, you will get the manual, an actual copy of it, on your computer screen, and you can read the techniques [ Read the report. But if you do, read the footnotes, because that’s where the behavioral research is. Now, this produced a distinctively American form of torture, the first real revolution in the cruel science of pain in centuries, psychological torture, and it’s the one that’s with us today, and it’s proved to be a very resilient, quite adaptable, and an enormously destructive paradigm.

Let’s make one thing clear. Americans refer to this often times in common parlance as "torture light." Psychological to torture, people who are involved in treatment tell us it’s far more destructive, does far more lasting damage to the human psyche than does physical torture. As Senator McCain said, himself, last year when he was debating his torture prohibition, faced with a choice between being beaten and psychologically tortured, I’d rather be beaten. Okay? It does far more lasting damage. It is far crueler than physical torture. This is something that we don’t realize in this country.
Now, another thing we see is those photographs is the psychological techniques, but the initial research basically developed techniques for attacking universal human sensory receptors: sight, sound, heat, cold, sense of time. That’s why all of the detainees describe being put in dark rooms, being subjected to strobe lights, loud music, okay? That’s sensory deprivation or sensory assault. Okay, that was sort of the phase one of the C.I.A. research. But the paradigm has proved to be quite adaptable.

Now, one of the things that Donald Rumsfeld did, right at the start of the war of terror, in late 2002, he appointed General Geoffrey Miller to be chief at Guantanamo, alright, because the previous commanders at Guantanamo were too soft on the detainees, and General Miller turned Guantanamo into a de facto behavioral research laboratory, a kind of torture research laboratory. And under General Miller at Guantanamo, they perfected the C.I.A. torture paradigm. They added two key techniques. They went beyond the universal sensory receptors of the original research. They added to it an attack on cultural sensitivity, particularly Arab male sensitivity to issues of gender and sexual identity.

And then they went further still. Under General Miller, they created these things called "Biscuit" teams, behavioral science consultation teams, and they actually had qualified military psychologists participating in the ongoing interrogation, and these psychologists would identify individual phobias, like fear of dark or attachment to mother, and by the time we’re done, by 2003, under General Miller, Guantanamo had perfected the C.I.A. paradigm, and it had a three-fold total assault on the human psyche: sensory receptors, self-inflicted pain, cultural sensitivity, and individual fears and phobia.

AMY GOODMAN: And then they sent General Miller to, quote, "Gitmo-ize" Abu Ghraib. Professor McCoy, we’re going to break for a minute, and then we’ll come back. Professor Alfred McCoy, professor of history at the University of Wisconsin, Madison. His latest book is called A Question of Torture: C.I.A. Interrogation, from the Cold War to the War on Terror.
[break]

AMY GOODMAN: We are talking to Alfred McCoy, professor of history at the University of Wisconsin, Madison, author of a number of books. The Politics of Heroin: C.I.A. Complicity in the Global Drug Trade almost had him killed. Afterwards, the C.I.A. tried to have the book squelched, but ultimately it was published. Then A Question of Torture: C.I.A. Interrogation from the Cold War to the War On Terror is his latest book, and we’re talking about the history of torture. Continue with what you were saying, talking about the Biscuit teams, the use of psychologists in Guantanamo, and then Geoffrey Miller, going from Guantanamo to, quote, "Gitmo-ize" Abu Ghraib.

ALFRED McCOY: In mid-2003, when the Iraqi resistance erupted, the United States found it had no intelligence assets; it had no way to contain the insurgency, and they — the U.S. military was in a state of panic. And at that moment, they began sweeping across Iraq, rounding up thousands of Iraqi suspects, putting many of them in Abu Ghraib prison. At that point, in late August 2003, General Miller was sent from Guantanamo to Abu Ghraib, and he brought his techniques with him. He brought a CD, and he brought a manual of his techniques. He gave them to the M.P. officers, the Military Intelligence officers and to General Ricardo Sanchez, the U.S. Commander in Iraq.

In September of 2003, General Sanchez issued orders, detailed orders, for expanded interrogation techniques beyond those allowed in the U.S. Army Field Manual 3452, and if you look at those techniques, what he’s ordering, in essence, is a combination of self-inflicted pain, stress positions and sensory disorientation, and if you look at the 1963 C.I.A. KUBARK Counterintelligence Interrogation Manual, you look at the 1983 C.I.A. Interrogation Training Manual that they used in Honduras for training Honduran officers in torture and interrogation, and then twenty years later, you look at General Sanchez’s 2003 orders, there’s a striking continuity across this forty-year span, in both the general principles, this total assault on the existential platforms of human identity and existence, okay? And the specific techniques, the way of achieving that, through the attack on these sensory receptors.

Wednesday, November 08, 2017

NSA Whistleblower Meets With CIA Director On DNC Leaks


theintercept | CIA Director Mike Pompeo met late last month with a former U.S. intelligence official who has become an advocate for a disputed theory that the theft of the Democratic National Committee’s emails during the 2016 presidential campaign was an inside job, rather than a hack by Russian intelligence.

Pompeo met on October 24 with William Binney, a former National Security Agency official-turned-whistleblower who co-authored an analysis published by a group of former intelligence officials that challenges the U.S. intelligence community’s official assessment that Russian intelligence was behind last year’s theft of data from DNC computers. Binney and the other former officials argue that the DNC data was “leaked,” not hacked, “by a person with physical access” to the DNC’s computer system.

In an interview with The Intercept, Binney said Pompeo told him that President Donald Trump had urged the CIA director to meet with Binney to discuss his assessment that the DNC data theft was an inside job. During their hour-long meeting at CIA headquarters, Pompeo said Trump told him that if Pompeo “want[ed] to know the facts, he should talk to me,” Binney said.

A senior intelligence source confirmed that Pompeo met with Binney to discuss his analysis, and that the CIA director held the meeting at Trump’s urging. The Intercept’s account of the meeting is based on interviews with Binney, the senior intelligence source, a colleague who accompanied Binney to CIA headquarters, and others who Binney told about the meeting. A CIA spokesperson declined to comment. “As a general matter, we do not comment on the Director’s schedule,” said Dean Boyd, director of the CIA’s Office of Public Affairs.

Binney said that Pompeo asked whether he would be willing to meet with NSA and FBI officials to further discuss his analysis of the DNC data theft. Binney agreed and said Pompeo said he would contact him when he had arranged the meetings.

It is highly unorthodox for the CIA director to reach out to someone like Binney, a 74-year-old ex-government employee who rose to prominence as an NSA whistleblower wrongfully persecuted by the government, for help with fact-finding related to the theft of the DNC emails. It is particularly stunning that Pompeo would meet with Binney at Trump’s apparent urging, in what could be seen as an effort to discredit the U.S. intelligence community’s own assessment that an alleged Russian hack of the DNC servers was part of an effort to help Trump win the presidency.



Friday, July 22, 2011

CIA exhales: 99 out of 101 torture cases dropped...,

Wired | This is how one of the darkest chapters in U.S. counterterrorism ends: with practically every instance of suspected CIA torture dodging criminal scrutiny. It’s one of the greatest gifts the Justice Department could have given the CIA as David Petraeus takes over the agency.

Over two years after Attorney General Eric Holder instructed a special prosecutor, John Durham, to “preliminar[ily] review” whether CIA interrogators unlawfully tortured detainees in their custody, Holder announced on Thursday afternoon that he’ll pursue criminal investigations in precisely two out of 101 cases of suspected detainee abuse. Some of them turned out not to have involved CIA officials after all. Both of the cases that move on to a criminal phase involved the “death in custody” of detainees, Holder said.

But just because there’s a further criminal inquiry doesn’t necessarily mean there will be any charges brought against CIA officials involved in those deaths. If Holder’s decision on Thursday doesn’t actually end the Justice Department’s review of torture in CIA facilities, it brings it awfully close, as outgoing CIA Director Leon Panetta noted.

“On this, my last day as Director, I welcome the news that the broader inquiries are behind us,” Panetta wrote to the CIA staff on Thursday. “We are now finally about to close this chapter of our Agency’s history.”

Politicians Owned By The Tiny Minority Pass Bill To Protect Zionism

AP  |   The House passed legislation Wednesday that would establish a broader definition of antisemitism for the Department of Education t...