Government Corruption |
Rep. Curt Weldon: It's Time to Finally Tell the Truth About 9-11 |
2025-04-15 |
[The Tucker Carlson Show] After twenty years in congress, Curt Weldon was about to become chairman of the House Armed Services Committee when he publicly questioned the accuracy of the 9-11 report. In retaliation, the Bush administration sent federal agents to his daughter’s house and ended his political career. At 77, Weldon has decided to tell the truth about what actually happened on September 11, 2001. Related: Curt Weldon 10/21/2020 Did the U.S. Government Hide bin Laden In Iran? Alleged Whistleblower Releases Evidence to Make His Claim Curt Weldon 04/20/2007 Interview with Gaubatz: I found Saddams WMD bunkers Curt Weldon 03/20/2007 Sestak Speech to Muslim Group Creates Uproar |
Link |
Syria-Lebanon-Iran | |
Did the U.S. Government Hide bin Laden In Iran? Alleged Whistleblower Releases Evidence to Make His Claim | |
2020-10-21 | |
For years, Parrot tried to alert the public about his disturbing experience with American intelligence agencies that he says refused to take action against bin Laden’s encampment. "John Brennan and Clinton and Biden outsourced the imprisonment of Al Qaeda leaders to Iran," Parrot recently told Charles Woods, father of fallen Benghazi hero Tyrone Woods. (You can watch their conversation here.) "My team planned a program to go in and get bin Laden in Iran. We were going to catch him while he was falconry hunting." According to Parrot, U.S. intelligence agencies first ignored, then obstructed, and finally threatened him, warning they would alert the Iranians if he attempted to capture bin Laden. Eventually, Parrot says, Hillary Clinton arranged to move bin Laden to Pakistan for a "trophy kill" to ensure Obama’s reelection. In 2010, Parrott made a movie, "Feathered Cocaine," about his encounters with bin Laden, which was shown at the Tribeca Film Festival. (Here’s the trailer.) In 2011, his lawyer, John Loftus, alleged more details of U.S. intelligence’s complicity in sheltering bin Laden in an article that included this intriguing tidbit: "My friend laughed and said, "Don’t you get it, John? The last thing they want is for anyone to capture bin Laden alive. Think of what he could say on the stand in a public trial." I didn’t believe him at first." Last week, Parrot’s story started to get traction when Anna Khait, an independent journalist, published, via Twitter, documents and audio that she says Parrot had given her. The documents include a signed non-disclosure agreement between Parrot, Congressman Curt Weldon & Joe Biden's attorney (and fixer) Brian S. Ettinger, on information leading to the capture of Osama bin Laden, letters asking why the intelligence on bin Laden is being ignored, and audio of conversations between Parrot, Weldon, and Ettinger, in which Biden’s attorney acknowledges U.S. government policy is to shelter bin Laden in Iran: "He is being protected by us. We don’t really want to get him...we want him under the radar screen because he basically made a deal with us that he’s not gonna uh...hit us here in the US." Neither Ettinger nor Biden has issued a statement denying it. Parrot is not the only person making credible claims about bin Laden’s safe haven in Iran. Mike Moore, an intelligence expert and Pulitzer Prize-nominated journalist, came to the same conclusion after interviewing government intelligence operators, informants, and lawmakers. Moore notes that Robert Mueller was the FBI Director during these events and that John Brennan was "neck deep" in arranging the bin Laden deal with the Saudis and Iranians. Mueller and Brennan, of course, were key figures in the coup efforts against President Trump. Related: Parrot: 2020-10-13 Whistleblower Drops HARD Evidence, Biden, Obama, Hillary EXECUTED Seal Team 6, Audio Proof (video) Parrot: 2020-04-04 Coronaplague Roundup: Spain's daily coronavirus death toll falls for first time since March 26 Parrot: 2020-03-02 Carville: Klobuchar and Buttigieg ‘Will Probably Be Out by Wednesday’ | |
Link |
Iraq |
Interview with Gaubatz: I found Saddams WMD bunkers |
2007-04-20 |
Melanie Phillips interviews Gaubatz. New info compared to Sun article from last year Its a fair bet that you have never heard of a guy called Dave Gaubatz. Its also a fair bet that you think the hunt for weapons of mass destruction in Iraq has found absolutely nothing, nada, zilch; and that therefore there never were any WMD programmes in Saddams Iraq to justify the war ostensibly waged to protect the world from Saddams use of nuclear, biological or chemical weapons. Dave Gaubatz, however, says that you could not be more wrong. Saddams WMD did exist. He should know, because he found the sites where he is certain they were stored. And the reason you dont know about this is that the American administration failed to act on his information, lost his classified reports and is now doing everything it can to prevent disclosure of the terrible fact that, through its own incompetence, it allowed Saddams WMD to end up in the hands of the very terrorist states against whom it is so controversially at war. You may be tempted to dismiss this as yet another dodgy claim from a warmongering lackey of the world Zionist neocon conspiracy giving credence to yet another crank pushing US propaganda. If so, perhaps you might pause before throwing this article at the cat. Mr Gaubatz is not some marginal figure. Hes pretty well as near to the horses mouth as you can get. Having served for 12 years as an agent in the US Air Forces Office of Special Investigations, Mr Gaubatz, a trained Arabic speaker, was hand-picked for postings in 2003, first in Saudi Arabia and then in Nasariyah in Iraq. His mission was to locate suspect WMD sites, discover threats against US forces in the area and find Saddam loyalists, and then send such intelligence to the Iraq Survey Group and other agencies. Between March and July 2003, he says, he was taken to four sites in southern Iraq two within Nasariyah, one 20 miles south and one near Basra which, he was told by numerous Iraqi sources, contained biological and chemical weapons, material for a nuclear programme and UN-proscribed missiles. He was, he says, in no doubt whatever that this was true. This was, in the first place, because of the massive size of these sites and the extreme lengths to which the Iraqis had gone to conceal them. Three of them were bunkers buried 20 to 30 feet beneath the Euphrates. They had been constructed through building dams which were removed after the huge subterranean vaults had been excavated so that these were concealed beneath the river bed. The bunker walls were made of reinforced concrete five feet thick. Much more at link. The problem was that the ISG were concentrating their efforts in looking for WMD in northern Iraq and this was in the south, says Mr Gaubatz. They were just swept up by reports of WMD in so many different locations. But we told them that if they didnt excavate these sites, others would. That, he says, is precisely what happened. He subsequently learnt from Iraqi, CIA and British intelligence that the WMD buried in the four sites were excavated by Iraqis and Syrians, with help from the Russians, and moved to Syria. The location in Syria of this material, he says, is also known to these intelligence agencies. The worst-case scenario has now come about. Saddams nuclear, biological and chemical material is in the hands of a rogue terrorist state and one with close links to Iran. When Mr Gaubatz returned to the US, he tried to bring all this to light. Two congressmen, Peter Hoekstra, chairman of the House Intelligence Committee, and Curt Weldon, were keen to follow up his account. To his horror, however, when they tried to access his classified intelligence reports, they were told that all 60 of them which, in the routine way, he had sent in 2003 to the computer clearing-house at a US airbase in Saudi Arabia had mysteriously gone missing. These written reports had never even been seen by the ISG. One theory is that they were inadvertently destroyed when the computers database was accidentally erased in the subsequent US evacuation of the airbase. Mr Gaubatz, however, suspects dirty work at the crossroads. It is unlikely, he says, that no copies were made of his intelligence. And he says that all attempts by Messrs Hoekstra and Weldon to extract information from the Defence Department and CIA have been relentlessly stonewalled. In 2005, the CIA held a belated inquiry into the disappearance of this intelligence. Only then did its agents visit the sites to report that they had indeed been looted. Mr Gaubatzs claims remain largely unpublicised. Last year, the New York Times dismissed him as one of a group of WMD diehard obsessives. The New York Sun produced a more balanced report, but after that the coverage died. According to Mr Gaubatz, the reason is a concerted effort by the US intelligence and political world to stifle such an explosive revelation of their own lethal incompetence. After he and an Iraqi colleague spoke at last months Florida meeting of the Intelligence Summit, an annual conference of the intelligence world, they were interviewed for two hours by a US TV show only for the interview to be junked after the FBI repeatedly rang Mr Gaubatz and his colleague to say they would stop the interview from being broadcast. The problem the US authorities have is that they cant dismiss Mr Gaubatz as a rogue agent because they have repeatedly decorated him for his work in the field. In 2003, he received awards for his courage and resolve in saving lives and being critical for information flow. In 2001, he was decorated for being the lead agent in a classified investigation, arguably the most sensitive counter-intelligence investigation currently in the entire Department of Defence and because his reports were such high quality, many were published in the Air Forces daily threat product for senior USAF leaders or re-transmitted at the national level to all security agencies in US government. More on political angle at link. |
Link |
Home Front: Politix | |
Sestak Speech to Muslim Group Creates Uproar | |
2007-03-20 | |
Freshman Rep. Joe Sestak (D-Pa.) has ignited a controversy after agreeing to be the keynote speaker at an April 7 banquet and fundraiser hosted by the Council on American-Islamic Relations Philadelphia chapter. CAIR is the largest Muslim civil rights group in the country, with 30 chapters nationwide. Jewish organizations and conservative groups have criticized CAIR for not labeling Hamas and Hezbollah as terrorist organizations, and for not speaking out specifically against suicide bombings against Israelis. Sestaks acceptance of the invitation has particularly enraged members of the Philadelphia Jewish community, who bombarded him with critical questions at a forum last week. Most of the questions during the two-hour meeting dealt with the CAIR fundraiser. The brouhaha began two weeks ago when Sestaks outreach coordinator, Adeeba Al-Zaman, booked the congressman for an event his aides presented as a banquet. But CAIRs Philadelphia chapter put out fliers billing the congressman as the featured speaker at a fundraiser. Al-Zaman is the former director of communications for CAIRs Philadelphia chapter. Sestak said he will reiterate his strong support for Israel and criticize the terrorist groups in his speech. He added that he hasnt seen any instance where CAIR has specifically singled out Hamas and Hezbollah for criticism. I cant find where its ever condemned Hamas and Hezbollah by name, Sestak said.
In 2006 Sestak handily defeated GOP Rep. Curt Weldon, aided in part by a pre-election Department of Justice investigation into the Republicans lobbying ties. Damn poor trade the voters of my district made... | |
Link |
Home Front: Culture Wars |
Cher attends hearing on soldiers' helmets |
2006-06-16 |
The subject was whether to modify helmets for soldiers in Iraq, but all eyes were on Cher. As photographers clicked away, the singer and actress entered a Capitol Hill hearing room through a back door 20 minutes after the session was scheduled to start. The hearing soon got under way. Cher has donated more than $130,000 to the group Operation Helmet, which pays about $100 to modify the inside of soldiers' helmets to make them better able to absorb shock from a bomb blast. Cher, wearing a white lace top under a black pant suit, looked solemn as she sat behind the group's founder, Dr. Bob Meaders, while he testified. Meaders said she didn't want to cause a distraction by testifying herself. Rep. Curt Weldon, R-Pa., chairman of the House Armed Services Subcommittee on Tactical Air and Land Forces, noted that Cher's ex-husband, the late Rep. Sonny Bono, had served on the subcommittee. He called it a "special irony and really great tribute" to have her there. The Army now equips its soldiers with padded helmets designed to be shock absorbent. The Marine Corps has commissioned a study to determine whether to change its helmets but has said the ones Marines use now are effective. |
Link |
Africa North |
Intelligence Success: Details of How Khadhafi Came to Give Up His WMD, and What We Learned |
2006-05-17 |
This is too important to excerpt, I think, so I present it here complete. From the Wall Street Journal's OpinionJournal.com. Moderators, edit for length if you feel it's necessary. Gadhafi's Leap of Faith: Libya's strongman feared appearing weak. BY JUDITH MILLER On Dec. 16, 2003, three days after Saddam Hussein was pulled from his hole near Tikrit, Robert G. Joseph, who headed counterproliferation on the White House National Security Council, flew to London for a secret meeting with his British and Libyan counterparts to discuss how and when Libya would announce the abandonment of its weapons of mass destruction. "The trip was so close-hold that it was cleared neither with the British Embassy in Washington nor the American Embassy in London," a senior U.S. official recalled. Neither Donald Rumsfeld nor Colin Powell knew of it in advance. Seated around an antique wooden table with senior British and Libyan officials at the Traveler's Club in London--chosen by the British for being a discreet place to meet--Mr. Joseph was stunned by the evasiveness of the draft announcement initially presented by Musa Kusa, Libya's U.S.-educated foreign intelligence chief and de facto head of its six-man delegation. The statement failed to mention even the existence of banned weapons or programs in Libya, nor did it say that Moammar al-Gadhafi, Libya's strongman, was prepared to abandon them. Instead, the draft spoke of the "spirit of Christmas," of all things, and Libya's desire to establish a "WMD-free zone" in the Middle East, according to an official who saw several early drafts. "It was a mushy mess," he recalled. The Libyans also wanted an explicit quid pro quo: In exchange for Libya's renunciation of WMD, the U.S. would abandon any effort to foment "regime change" in Libya, ensure that sanctions were lifted, and restore diplomatic relations. Mr. Joseph balked. There would be no such deal, or even negotiations about it, he insisted. Libya and the West still had differences to resolve on terrorism and other fronts. Pan Am 103 Of all the U.S. officials involved in the secret talks, Mr. Joseph was the most skeptical of Col. Gadhafi's intentions, colleagues recalled. He had reason to be. "Bob and I were supposed to be on Pam Am 103 the day it crashed," said Ron Lehman, who heads the Center for Global Security Research at California's Lawrence Livermore National Laboratory. Messrs. Lehman and Joseph had arrived at Heathrow Airport early enough that morning to get seats on Pan Am 107, direct to Washington, without stopping in New York, 103's destination. So they switched flights. Mr. Joseph later told friends he had seen the long lines of Americans assembling at the gate for the flight that exploded over Lockerbie soon after takeoff. He recalled a lively group of students and thought of his own son and daughter. Mr. Joseph never said a word about his narrow escape to his Libyan interlocutors. But he had no illusions about those with whom he negotiated. Did Libya not want the world to believe that it had made a voluntary, strategic decision to renounce its weapons and programs? Mr. Joseph asked Musa Kusa, rumored to have been a coordinator of the Pan Am attack, and Abdullahi Obeidi, Col. Gadhafi's close aide who was then Libya's ambassador in Rome. It was not in Libya's or the West's interests for critics to think that Col. Gadhafi had been forced, or bribed, into doing so, Mr. Joseph argued. Libya, moreover, had to be specific about what "eliminating" its programs meant. Would it commit to destroying and removing all dangerous equipment and material? Would it destroy empty chemical munitions and lethal agents, as well as sign the treaty banning such weapons? Would Libya destroy its imported centrifuges? Would it eliminate conventional missiles that violated a treaty banning weapons capable of carrying a 500-kilo payload with a range of more than 300 kilometers? Because nothing is ever easy with Col. Gadhafi, Tony Blair had to phone the Libyan leader the next day--their first conversation ever--to encourage him to be bold in announcing his decision. Col. Gadhafi was still hesitant, a diplomat recalled, concerned about appearances that he was caving in to pressure. Mr. Blair assured him that both he and George W. Bush would be supportive if Col. Gadhafi's renunciation were explicit. "But until the last minute," said an official who watched amended drafts of Libya's statement as they were faxed back and forth between Tripoli, London and Washington less than four hours before the announcement was scheduled, "we really weren't sure we would have an agreement." As it happened, the announcement of the renunciation of Libya's WMD programs was delayed by an official reluctance to interrupt the broadcast of a major soccer game that Col. Gadhafi was watching. The statement he was supposed to deliver was read, instead, by Libya's foreign minister. The Brother Leader, as Col. Gadhafi styles himself, had suddenly gotten a cold--in his feet, a diplomat suggested. He had a sore throat and couldn't talk, the Libyans said. The date: Dec. 19, 2003. Afraid that Col. Gadhafi might change his mind even after having publicly renounced his WMD, U.S. officials rushed to move sensitive nuclear equipment and material out of Libya. The mission fell to the State Department, and specifically to John Bolton, then undersecretary of state for verification and arms control, and Assistant Secretary Paula DeSutter. Donald Mahley, a veteran Foreign Service officer and former Army colonel who was deputy assistant secretary for arms control implementation, was chosen as "on the ground" coordinator. Over Christmas, a team of experts assembled by Ms. DeSutter pieced together an emergency plan. Because the Libyans insisted on a "small footprint" in Libya, the size of a joint U.S.-U.K. team was limited to 15 experts (10 Americans and five Brits). They had to rotate in and out of Libya to stay under the limit. Even getting to Libya was challenging. "Americans were not allowed to travel there," Ms. De Sutter said. "So when our first team secretly flew in, the airline's computer kicked their reservations and tickets out of the system." The teams also needed licenses for everything, given the sanctions--even to buy Libyan officials a cup of coffee. And there was the map problem. "I wanted a detailed, but nonclassified, map of the country," said Mr. Mahley. "But there was none in the entire U.S. government." Mr. Mahley said that nothing he had done before, including commanding two companies in Vietnam, facing down the Russians over arms-control disputes, or negotiating the germ and chemical weapons treaties in Geneva, was as complicated as dismantling Libya's WMD infrastructure in less than four months between January and April 2004. Several things surprised him: first, the relatively small number of Libyans involved in the WMD programs. "Though the Libyans I dealt with were knowledgeable, dedicated, and innovative," he said, "there was almost no bench." "The same six people--most of them American-educated--did almost everything," said Harry L. Heintzelman IV, senior adviser on noncompliance. A second lesson was how relatively easy it was to hide elements of a WMD program, even in an open desert, "if there is a national dedication to do so," Mr. Mahley wrote in a "Lessons Learned" paper for an arms-control newsletter. "Tony" Sylvester Ryan, known as "Chemical Tony" to distinguish him from the team's other Tony who helped dismantle banned missiles, recalled being taken to a place they wound up calling the "turkey farm." Other officials said that the site, previously unknown to U.S. intelligence, was where Libyans had hidden unfilled chemical bombs and where they were going to set up centrifuges to enrich uranium. Libya, Mr. Ryan said, came clean in stages: "They'd start by saying 'I think we have only 1,500 unfilled bombs,' and by the end of the visit, they'd acknowledge having stored about 3,000. But we never would have found the place at all if the Libyans hadn't shown it to us." Team members were also struck by the extent to which sanctions had complicated Libya's hunt for unconventional weapons, especially biological. Though U.S. intelligence officials still debate whether Libya has disclosed all aspects of its early effort to make or acquire germ weapons--in particular, how much help, if any, was provided by Wouter Basson, head of South Africa's illicit germ-warfare program under apartheid--sanctions apparently helped dissuade Col. Gadhafi from building an indigenous program. "The program, if you can call it that, just kind of fizzled out," said a member of the British-led biological team that first toured suspect Libyan sites and interviewed some 25 scientists during a two-week trip in the late spring of 2004. In 1985, for example, the three Libyans who headed the germ-weapons program, known as the Scientific Medical Research Establishment, got $55 million to build a medical lab with Bio-safety Level Three and Four capacity to handle the most dangerous germs. Though the Libyans said the facility was for peaceful medical purposes, two companies they approached--from Finland and South Korea--both declined, citing the sanctions ban on selling Libya dual-use facilities, officials disclosed. Sanctions also meant that Libya often imported shoddy merchandise at exorbitant prices: for instance, four different systems to fill white plastic bottles with mustard agent, none of which worked. One German system "leaked all over the place," Mr. Mahley recalled. "Seeing the liquid on the warehouse floor, we were hesitant even to look inside without protective gear." The Italians had sold Libya a system that involved filling containers atop trucks. That, too, was a disaster. "In the end," said Mr. Ryan, "they manufactured small tanks themselves, set them on metal legs, put a petcock on the tanks, put on their protective gear, and filled the plastic containers by hand. Not exactly high-tech, but it worked." Then the Libyans seemingly forgot about the chemical weapons they had stored away. Libyan officials insisted that, contrary to Western intelligence reports, they had never used the weapons in their war with Chad, or anywhere else; and while they had tested agents for potency and filled shells with nonlethal material, they had never field-tested shells filled with chemical agents. The Libyans also shrugged when team members asked about some of the more antiquated spare parts Libya had bought on the black market for its chemical weapons program. "They told us, 'Yeah, we know we've been had. But what were we going to do? Take them to small claims court for selling us junk?' " Mr. Ryan recalled. "They knew they had no recourse if they were sold a pig in a poke." Although sanctions had made acquisition more expensive and time-consuming, it had not stopped the programs. Instead, Libyans had turned to one-stop shops, like the network run by Abdul Qadeer Khan, "father" of the Pakistani bomb, for their nuclear program; and for chemical weapons they improvised. "Libya still pursued WMD, but sanctions raised the cost sharply and impeded the programs" Ms. DeSutter said. The dismantlement effort did not always go smoothly. A chartered 747 that was supposed to take team member Christopher T. Yeaw and the sensitive warhead design blueprints back to Washington, for instance, broke a wing flap while landing at Metiga Airport, the former Wheelus Air Force Base, which the U.S. vacated in 1970. Because Libya had no spare parts, his return was delayed until the part could be flown in and the wing repaired. In the meantime, Dr. Yeaw, one of the few team members whose "Q" security clearance authorized him to handle such sensitive drawings, could not find a safe enough place to store the blueprints. So for the next two days, "I took it to restaurants, to the restroom. I even slept alongside it in the double bed in our villa," he said. "It was closer to me than my wife--like a baby, which is what the Libyans called it: Chris's 'baby.' " Aides to Ma'atouq Mohammed Ma'atouq, head of Libya's nuclear program, recalled that the "baby" was the focus of tension between the Americans who came to his office to retrieve the documents and the International Atomic Energy Agency inspectors, who arrived even earlier that same day at the Ministry of Scientific Research, well in advance of the Americans, to examine the two-inch thick sheaf of Xeroxed engineering blueprints. The IAEA thought it should keep the blueprints and asked the U.S. to turn them over, prompting a standoff before the bewildered Libyans. "My mandate was clear: Collect the documents and deliver them to Paula DeSutter in Washington," said Dr. Yeaw, a nuclear engineer who now teaches at the Naval War College in Rhode Island. "So unless they wanted to remove them from my hand, they were not going to get them." Ms. DeSutter, in fact, was waiting at the airport when the unmarked 747 finally taxied into Dulles on Jan. 22, 2004. Dr. Yeaw, fellow members of his team and his "baby" were the only cargo. Tanks and Bulldozers The dismantlement mission was completed in record time. In four months, the U.S.-U.K. team managed to airlift 55,000 pounds of the most sensitive documents and nuclear components, including several containers of uranium hexafluoride and two P-2 centrifuges, of some 10,000 that Libya had ordered from the Khan Research Laboratories in Pakistan. By mid-February, the inspection team and a representative from the Hague-based Organization for the Prevention of Chemical Weapons, which Libya had finally agreed to join, watched Libyans crush with tanks and bulldozers more than 3,200 unfilled chemical weapons shells they had laid out on the desert floor. By March, the team had sent out by chartered ship over 1,000 tons of additional centrifuge and missile parts, including the five SCUD-C missiles (minus warheads), launchers and related equipment. And Russia had removed 13 kilos of fresh, 80% highly enriched uranium from the Tajura reactor--a uniquely successful joint venture in WMD disarmament. Libya's continuing political repression and human rights abuses have prompted officials to cite Reagan's motto for dealing with the Soviet Union during its own tumultuous transformation: Trust, but Verify. "And this is exactly how we approached the case of Libya," said Mr. Bolton, now U.S. ambassador to the U.N., in a July 2004 speech. But not even the very conservative Mr. Bolton defends the halfhearted effort to assure Col. Gadhafi that he was right to renounce WMD. Calling Libya's about-face "an important nonproliferation success" because it "proves that a country can renounce WMD and keep its regime in power," Mr. Bolton told me recently that preventing the spread of nuclear, biological and chemical weapons "requires long-term strategic thinking and concentration." The preoccupation with the continuing insurgency in Iraq, the inability to stop Iran and North Korea from pursuing nuclear weapons, and plunging domestic support at home for Mr. Bush may explain Washington's distraction. Libya's removal from the list of state sponsors of terror was also delayed by its alleged plot to assassinate King Abdullah of Saudi Arabia, as late as 2003. A new factor that complicated the U.S.-Libyan rapprochement was Congress's refusal to permit a company based in Dubai, a key ally in the war on terror, to operate U.S. ports. Blindsided by the virulence of the opposition, the White House was even less inclined to inform Congress that it intended to remove Libya from the terrorism sponsor list. Moreover, apart from a few men--notably Reps. Tom Lantos (D., Calif.), Curt Weldon (R., Pa.) and Peter Hoekstra, the Intelligence Committee chairman; and Sens. Richard Lugar, who chairs the Foreign Relations Committee, and Joe Biden--few legislators have taken the time to monitor Libyan affairs closely. Libyan exile groups expressed dismay yesterday over Libya's removal from the terrorist list. And there will undoubtedly be objections from Congress and elsewhere. But for all the possible questions, Libya stands as one of the few countries to have voluntarily abandoned its WMD programs, and out of options for countering Iran's stonewalling, the White House belatedly opted to do more to make Libya a true model for the region. Human rights abuses are more likely to be remedied in a full bilateral relationship. Ms. Miller, a former New York Times reporter, is a writer in Manhattan. This concludes a two-part essay on Libyan WMD. |
Link |
Syria-Lebanon-Iran | |
Curt Weldon: Bin Laden Is Dead | |
2006-03-17 | |
![]() Weldon made the stunning claim during an interview Wednesday with the Philadelphia Inquirer, which reported: "Weldon is making explosive new allegations. He says a high-level source has told him that terrorist leader Osama bin Laden has died in Iran, where he has been in hiding." Weldon cited as his source an Iranian exile code-named Ali, telling the paper: "Ali's told me that Osama bin Laden is dead. He died in Iran." Weldon said he last spoke to Ali three weeks ago. The Iranian exile was a prominent source for his 2005 book, "Countdown to Terror." The book also contained the first mention of the Able Danger data mining operation. The Pennsylvania Republican has long alleged that bin Laden has been using Iran for sanctuary. In June last year, Weldon said in a TV interview: "I'm confident that I know for sure that [bin Laden] has been in and out of Iran ... Two years ago, he was in the southern town of Ladis, 10 kilometers inside the Pakistan border. I also know that earlier this year, he had a meeting with al-Zarqawi in Tehran ...
| |
Link |
Home Front: WoT |
Lawmakers go after UAE on ties to Saddam, al-Qaeda |
2006-03-08 |
Lawmakers from both parties say the United Arab Emirates has helped shuttle weapons components around the Middle East, has ties to al Qaeda and shouldn't be trusted to operate terminals in U.S. ports. The legislators, disputing the Bush administration's contention that the United Arab Emirates has been a loyal ally in the war on terror, are citing findings by the Wisconsin Project on Nuclear Arms Control and the September 11 commission report among their evidence. According to the Wisconsin Project, an anti-proliferation group, United Arab Emirates officials in 2003 allowed 66 switches used in nuclear weapons to be sent to a Pakistani man. In the mid-1990s, they also allowed representatives of Dr. Abdul Qadeer Khan, the father of Pakistan's nuclear program, to ship technology through Dubai to Iran. It also says the Iraq Survey Group, which oversaw United Nations sanctions against Iraq, in 2004 listed 20 UAE firms suspected of having acted as intermediaries or front companies for Saddam Hussein's Iraq, and said the United Arab Emirates was a transit area for prohibited goods, such as rocket fuel ingredients, with companies using deceptive trade practices. "I don't think those are the folks you want running your ports," House Armed Services Committee Chairman Duncan Hunter, California Republican, said yesterday. Mr. Hunter said he gave the Wisconsin Project information to top administration officials last week, who were unaware of the details and have begun reviewing them. He said he discussed the issue with President Bush yesterday, and gave White House aides more documentation. Mr. Hunter also introduced legislation yesterday that would block the $6.8 billion DP World bid to purchase terminal operations in six major U.S. ports and kick out all foreign companies that own port terminals or other U.S. infrastructure. The initial Bush administration approval of the Dubai-owned company's bid for the operations now privately owned by London-based Peninsular & Oriental Steam Navigation Co. prompted national security concerns on Capitol Hill. It's now under a 45-day executive review. Mr. Bush, who along with top security officials and Cabinet members did not find out about the deal until its approval by an interagency panel, has final say over the proposal he continues to support. "A terrorist will try to exploit every possible means to carry out their evil plans. The fact remains, however, that the United Arab Emirates has been a strong and valuable partner in the global war on terror," said White House spokeswoman Dana Perino. Meanwhile, lawmakers such as Rep. Curt Weldon, Pennsylvania Republican, and Sen. Byron L. Dorgan, North Dakota Democrat, have pointed to a 1999 incident, detailed in the September 11 commission report, in which the U.S. military refrained from striking an Afghan terrorist camp where Osama bin Laden was located because they didn't want to kill a top official from the United Arab Emirates. Mr. Weldon said the U.S. warned the United Arab Emirates of the coming attack and a week later the camp was gone, which he said means emirate officials "tipped off" the terrorists. Mr. Dorgan also noted that two of the September 11 hijackers were United Arab Emirates citizens and that the United Arab Emirates functioned as a "crossroads" through which the notorious Dr. Khan moved nuclear material and knowledge to other countries. "I don't wish to offend the United Arab Emirates, but neither should we be offending common sense," Mr. Dorgan said last week before he too introduced a bill to block the DP World deal. Both Mr. Weldon and Mr. Dorgan also point to a June 2002 memo from al Qaeda to top officials in the United Arab Emirates, including Dubai. The memo demands the United Arab Emirates stop cooperating with the United States, and states that al Qaeda has "infiltrated" United Arab Emirates' security, monetary and other vital systems, and can easily shut the country down. Neither Mr. Weldon nor Mr. Dorgan knows whether the memo is credible or not, but Mr. Weldon said when he questioned Bush administration officials during a hearing last week, most didn't know about it. "To me that's troubling," he said. Mr. Weldon said he doesn't think the 1999 incident or the al Qaeda memo were given adequate weight by the administration in approving the deal. "To me, they're both substantive issues that should have been thoroughly reviewed," he said. |
Link |
Home Front: Politix |
Able Danger gets even more complicated |
2006-02-16 |
The Pentagon's top intelligence official told Congress yesterday that his investigation turned up no chart or photo depicting hijacker Mohamed Atta before the September 11, 2001, terrorist attacks, but a Republican lawmaker accused the Bush administration of ignoring evidence. Testimony before two House Armed Services subcommittees marked the first time that Stephen Cambone, undersecretary of defense for intelligence, testified in public about an intelligence collection program from 1999 through 2000 called Able Danger. But the hearing did not appear to answer the question about whether Able Danger singled out Atta as an al Qaeda-connected operative more than a year before the attacks. Mr. Cambone said his probe, which took "6,500 man-hours" and 50 interviews, found no documents to support the statements of five former or current officials who say they remember seeing Atta's name or photo among the thousands that turned up in Able Danger's computer-generated data mining that started in 1999. "The review did not uncover a chart or charts with information on 9/11 hijacker Mohamed Atta that predated the 9/11 attack," Mr. Cambone testified. "Nor did the review discover any data -- hard copy or soft -- that provided information on Atta prior to the 9/11 attacks." Rep. Curt Weldon, Pennsylvania Republican, has been on a campaign to prove that such an identification was made. "There has been no investigation," Mr. Weldon said during a hearing in which several members deferred their 10-minute allotment to him. "There has been no analysis by the 9/11 commission or anyone else." Mr. Weldon has said the Clinton administration destroyed Able Danger documents, shut down the program and prevented intelligence officers from sharing the information with the FBI. He has said the September 11 commission ignored evidence from Defense Intelligence Agency officer Army Lt. Col. Anthony Shaffer and failed to include anything about Able Danger in the commission's report. He also has charged that the Bush administration refuses to follow leads he finds. "Is this a massive effort to deny reality?" he asked. Mr. Weldon leveled new charges yesterday: A retired official told him that an aide to Mr. Cambone said the Pentagon wanted to kill the Able Danger story. Another retired intelligence officer is ready to sign an affidavit saying that he, too, remembers hearing the name Mohamed Atta before September 11, 2001. Reporters for Time magazine and CNN told Mr. Weldon that Pentagon officials told them that the reason he was investigating Able Danger was because one of the whistleblowers was having an affair with one of the lawmaker's staffers. Mr. Weldon said he knew of no affair. Mr. Cambone testified that the reason the documents were destroyed during the Clinton administration was to comply with laws prohibiting keeping data for more than 90 days. He also said the FBI maintains that no one blocked meetings between Mr. Shaffer and federal agents. |
Link |
Terror Networks |
Another Able Danger hit |
2006-02-15 |
![]() The suicide bombing of the Cole killed 17 sailors on Oct. 12, 2000. If anyone had told the Cole's commander that there was any indication of a problem in Aden, "he would not have gone there," Weldon told reporters. "He had no clue." Weldon would not say who provided evidence of such intelligence to him. Since August, Weldon, vice chairman of the House Armed Services Committee, has pushed Congress and the Pentagon to investigate the workings of Able Danger, which used data mining to identify links that might indicate the workings of terrorists. If he is correct, it would change the timeline for when government officials first became aware of Atta's links to al-Qaida. Former members of the Sept. 11 commission have dismissed Weldon's findings. Cmdr. Greg Hicks, a Pentagon spokesman, released a statement saying that Pentagon officials welcome the opportunity to address these issues during a hearing scheduled Wednesday before a subcommittee of the House Armed Services Committee. |
Link |
Home Front: WoT |
Able Danger shows promise and shortcomings of data mining |
2005-12-10 |
In the spring of 2000, a year and a half before the 9/11 attacks, Erik Kleinsmith made a decision that history may judge as a colossal mistake. Then a 35-year-old Army major assigned to a little-known intelligence organization at Fort Belvoir in Virginia, Kleinsmith had compiled an enormous cache of information -- most of it electronically stored -- about the Al Qaeda terrorist network. It described the group's presence in countries around the world, including the United States. It was of great interest to military planners eager to strike the terrorists' weak spots. And it may have contained the names of some of the 9/11 hijackers, including the ringleader, Mohamed Atta. The intelligence data totaled 2.5 terabytes, equal to about 12 percent of all printed pages held by the Library of Congress. Neither the FBI nor the CIA had ever seen the information. And that spring, Kleinsmith destroyed every bit of it. Why did he do that? And how did a midlevel officer in a minor intelligence outfit obtain that information in the first place? Those questions lie behind the latest phase of a simmering controversy in Washington: whether something could have been done to prevent the terror attacks of September 11. Kleinsmith worked for an Army project code-named "Able Danger." This past summer, a number of former project members -- none of whom had worked for Kleinsmith -- came forward to say that Able Danger had identified Atta and linked him to a convicted terrorist who is still serving time in federal prison for his role in the 1993 bombing of the World Trade Center. The Able Danger members recalled charts showing names and pictures of suspects, and their links to each other. Rep. Curt Weldon, an outspoken Pennsylvania Republican and longtime supporter of intelligence reform, has demanded to know why the charts were never shared with an agency positioned to halt the attacks. He also points out that the 9/11 commission failed to include any mention of Able Danger in its final report, which is regarded as an authoritative history of the attacks. The Pentagon searched more than 80,000 documents and found no chart with the name "Mohamed Atta." Weldon has accused the government of a cover-up and called for a criminal investigation. But Able Danger, for all its intrigue, is just one piece of the unusual intelligence practices that Kleinsmith was engaged in, years before 9/11. In the late 1990s, Kleinsmith was the chief of intelligence for the Army's Land Information Warfare Activity, a support unit assigned to the Intelligence and Security Command. LIWA had broad authority to assist the Army and all military commands in conducting "information operations," a broad discipline that includes information warfare, public deception in combat, and intelligence analysis. The Army's hub in this effort was the aptly named Information Dominance Center, based at Fort Belvoir. Since the late 1990s, the IDC has been home to some of the most innovative, unconventional, and controversial minds in the intelligence business. In its futuristic-style building -- its interior spaces designed by a Hollywood set artist to mimic the bridge of the starship Enterprise, complete with a large captain's chair in the center of the main room -- the IDC covered a range of topics. Analysts tracked computer hackers who were targeting military networks, watched for potential avenues of Chinese government espionage, and charted the working relationships among foreign terrorists. To do this, the IDC relied heavily on a novel technique called "data mining." On a recent afternoon at a coffee shop in Springfield, Va., not far from the IDC, Kleinsmith explained how data mining works. Putting pen to paper, Kleinsmith sketched clumps of circles, then surrounded some with concentric, wavy perimeters, until he'd drawn a crude version of a topographical map. In data mining, he explained, a powerful search engine is used to "harvest" tens of thousands of Web pages that contain key words of interest -- "Al Qaeda" and "bin Laden," for instance. Another tool, called a data visualization program, then creates a three-dimensional map showing which words appear most often and how they relate. The features and contours of the map tell an analyst about the underlying information's significance, Kleinsmith said. High peaks represent words that appear frequently. Peaks close together signal words that share some context. The analysts can click on a peak and pull up the information that helped create it. With data mining, analysts don't just read information, they "see" it. Kleinsmith called this kind of data mining "intelligence on steroids," and it was the IDC's hallmark. Data mining works best with large sets of information, so it's particularly useful for Internet searches. At the IDC, Kleinsmith and three colleagues mapped Al Qaeda for Able Danger by mining open sources and fusing their results with classified government intelligence. But in addition to the mass of information they returned on suspected terrorists, they collected thousands of names of U.S. citizens. People's names and personal information litter the Internet. Data harvesting, by its very nature, is indiscriminate and sweeping. Unavoidably, along with "Osama Bin Laden," an often-mentioned name like "Bill Clinton" will be harvested. That says a lot about the power, and the limits, of data mining, and why Kleinsmith destroyed what he had; the military is not supposed to be gathering information on U.S. citizens. From its earliest days, the IDC was a haven for renegades who wanted to use technology to step outside traditional intelligence-gathering, which relies heavily on classified sources and labor-intensive analysis. The center had high-level champions, including Lt. Gen. Keith Alexander, who from 2000 to 2003 directed the Intelligence and Security Command, the IDC's parent. Alexander now heads the National Security Agency, which operates the most-sophisticated electronic eavesdropping devices in the world. Alexander also worked closely with James Heath, who headed the IDC in the late 1990s and whom former employees recall as a mix of driven genius and mad scientist. According to one such former employee of the center, Heath saw the IDC as "an experimentation table" on which to try out all kinds of new tools, depending on what the Army wanted at the time. Analysts and technicians worked together, "speaking the same language" and building useful data-mining tools. This dynamic didn't exist in other intelligence agencies, the former employee noted. The IDC earned a reputation for innovation, but it also stepped over the bounds of traditional military intelligence. One of its first outside fans was Curt Weldon. Rep. Weldon had been advocating a "national collaborative center" to fuse law enforcement and intelligence units, and their information, from across the government. In 1997, as the U.S. intervened in the Balkan War, senior Russian officials wanted Weldon (who had had good and long-standing contacts with the Russians) to meet in Belgrade with Yugoslavia's then-president, Slobodan Milosevic, to negotiate a peace settlement. As Weldon stated on the House floor in 2002, the Russians offered to arrange a meeting between Weldon and Dragomir Karic, a rich Serb closely tied to Milosevic. Perhaps, the Russians said, Karic could act as a go-between with the Serbian president. But according to Weldon, State Department officials said they'd never heard of Karic, and thought the meeting was a ploy to manipulate the congressman. Weldon met with Karic on neutral territory, in Vienna. But before leaving the States, he asked then-CIA Director George Tenet for background on the Serb. Tenet "called me back the next day and gave me two or three sentences ... and said they thought he was tied in with the corruption in Russia, but did not know much else about him," Weldon said. Unsatisfied, Weldon contacted his "friends at the Information Dominance Center," which he considered a model for his own intelligence collaboration venture. The IDC "came back to me with eight pages about this man," who the analysts said "was very close to Milosevic personally." Former IDC employees confirmed that they provided Weldon with detailed information on Karic. The talks with Karic bore no fruit. But when Weldon returned to Washington, he said, the FBI and CIA asked to debrief him on what he knew about Karic. Weldon delivered a thorough dossier. "I told them that there were four Karic brothers; that they were the owners of the largest banking system in the former Yugoslavia; that they employed some 60,000 people; that their bank had tried to finance the sale of an SA-10 [missile system] from Russia to Milosevic; that their bank had been involved in a $4 billion German bond scam; that one of the brothers had financed Milosevic's election; that the house Milosevic lived in was really their house; that, in fact, the Karic brothers' wives were best of friends with Milosevic's wife; and that they were the closest people to this leader." Surprised to hear such details on a man they barely knew of, the agents presumed Weldon got the information from the Russians. When he told them that the facts came from the Army's Information Dominance Center, Weldon recalls, the agents replied, "What ... is the Information Dominance Center?" The event convinced Weldon that the CIA and the FBI didn't "get it," and that the IDC was the wave of the future. He became its biggest proponent in Congress, and sang its praises to the highest levels of the Defense Department. After Weldon submitted the Karic dossier, word of the IDC's work spread outside the Army realm, Kleinsmith said. He had put just two analysts on the Weldon project, and they had taken only a day to generate the Karic profile. It "shocked me that we were outdoing these other organizations," namely the CIA, Kleinsmith said. Intrigued with the Karic work, senior Pentagon officials decided to see if the tiny band of analysts could prove their mettle on a bigger problem. Officials were concerned about the possible leakage of U.S. military technology abroad, through unauthorized exports or through espionage. In the spring of 1999, the Pentagon "initiated a onetime project, to use data-correlation tools to decide if we could use those methods as a superior approach for counterintelligence," said John Hamre, the deputy Defense secretary at the time. "It was an experiment." The people involved said the experiment looked specifically at technology transfers to China, whose military posed the gravest post-Cold War threat to the United States. Kleinsmith says the particular technology the IDC researched was arbitrary. "I think we flipped a coin" to decide. The point was to show the Pentagon that data mining could identify front companies, potential leaks of technology, and other vulnerabilities. "What we found was absolutely enormous," Kleinsmith said. Former IDC employees and others familiar with the work say the China research exposed a variety of avenues through which military technology designs could end up in Chinese government hands. The IDC created a diagram showing how organizations and people in the United States were connected to the Chinese. Hamre had visited the center, and according to Weldon, reported back, "It is amazing what they are doing there." The experiment "went well," the former IDC employee said. "Unfortunately, it went too well." During construction of those link diagrams, the names of a number of U.S. citizens popped up, including some very prominent figures. Condoleezza Rice, then the provost at Stanford University, appeared in one of the harvests, the by-product of a presumably innocuous connection between other subjects and the university, which hosts notable Chinese scholars. William Cohen, then the secretary of Defense, also appeared. As one former senior Defense official explained, the IDC's results "raised eyebrows," and leaders in the Pentagon grew nervous about the political implications of turning up such high-profile names, or those of any American citizens who were not the subject of a legally authorized intelligence investigation. Rumors still abound about other notable figures caught up in the IDC's harvest. "I heard they turned up Hillary Clinton," the official said. The experiment was not continued. "We determined that there were significant methodological problems," Hamre said of the IDC's techniques. Data-correlation analyses on raw information "produce impossibly large numbers of potential correlations. The numbers are too large to be operationally helpful." But it appears not everyone in the military establishment agreed. Over the next several months, Kleinsmith estimated he gave more than 200 briefings on the IDC to members of Congress, generals, and senior government officials. "I could tell in three to four minutes if someone 'got it,' " Kleinsmith said. Hamre got it, he noted. And so, it seems, did officials with the Army's Special Operations Command, who, despite the unease over the China experiment, came to the IDC asking for information about a then-shadowy organization called Al Qaeda. In the fall of 1999, top officials in the Special Operations Command were looking for a way to take the nascent fight on terrorism to its source. Al Qaeda had recently destroyed the U.S. embassies in Kenya and Tanzania. Special Operations' top officers, including the commander, Gen. Peter Schoomaker, "wanted the mission of 'putting boots on the ground' to get at [Osama] bin Laden and Al Qaeda," according to the 9/11 commission report. But the military leadership believed that without concrete intelligence about Al Qaeda, a strike on the group was doomed to fail. President Clinton told the 9/11 commission, "If we had really good intelligence about ... where [bin Laden] was, I would have done it." Plans were already under way to attack Al Qaeda using AC-130 gunships. What was lacking was actionable intelligence to tell the military whom to hit and where. Kleinsmith said that a pair of Special Operations officials visited him at the IDC in December 1999. At the instruction of the Joint Chiefs of Staff, the officials wanted as much intelligence on Al Qaeda and other transnational terrorists that could be mustered. They called the project Able Danger. (The word "able" has been commonly used for military exercises for more than two decades.) The officials asked Kleinsmith about the technologies the IDC was using. "They didn't talk specifics," Kleinsmith said, but it was clear that "we had something they could really use." Later, he offered to "run some data" and produce a preliminary analysis. Within 90 minutes, Kleinsmith said, his analysts found evidence that Al Qaeda had a "worldwide footprint," including "a surprising presence in the U.S. That's when we started losing sleep." In January 2000, Special Operations gave Kleinsmith and his team the green light to find as much information as they could. "They told us, 'Start with the words "Al Qaeda," and go,' " he said. A month later, the IDC conducted the first Able Danger harvest. The initial results, while impressive, were hardly what Special Operations forces needed to put boots on the ground. The harvest "was a mile wide and an inch deep," Kleinsmith said. It included more than two terabytes of information, too vast an amount to provide specific targets. The IDC analysts could see the broad outlines of Al Qaeda, particularly its transformation from an idealistic movement into an operational network that could possibly inflict damage. Names, locations, and capabilities, and even the group's financial sources, were "coming together," Kleinsmith said. But the data set was still too big. That didn't stop the analysts from trying to pare the information down. The former IDC employee said analysts played what they called "the Kevin Bacon game," referring to the popular notion that the prolific film actor can be linked to any other actor through no more than five people. (The game is based on the "six degrees of separation" theory that anyone on Earth can be linked to anyone else through five intermediaries.) "Let's say you had a bad guy at each end of a string," the employee said. The analysts looked for the people between them, and then those people's ties to each other and to still others, asking whether any of the links came back to the initial bad guys. The analysts played this game routinely to firm up the connections in the large data sets. Eventually, they were able to isolate some 20 people about whom Special Operations wanted further, deeper analysis, Kleinsmith said. The team developed charts to serve as "simplified explanations" of what they found. But those charts, now famously alluded to by Weldon and others as having named Mohamed Atta, sometimes measured 20 feet in length and were covered with small type, the former IDC employee said. The charts were so big, in fact, that analysts had to hang them on walls just to read them. The former employee doesn't remember seeing Atta's picture. The IDC might have followed Atta's trail if it had been told to do so, the former employee said. But just pulling names at random from the chart was pointless. And a simple connection between two people on a chart was not evidence of any criminality or pending attack. "Do you have any idea how many people on the planet would go to jail just because they knew somebody bad?" the former employee asked. The IDC produced an impressive array of intelligence, but it also came dangerously close to an important legal line. The basic harvesting methodology guaranteed that the names of U.S. citizens would appear. "You'll pull in 16,000 people in a harvest," Kleinsmith said. It's "100 percent likely" that an American will be there. And sometimes the names themselves seemed meaningless. If an analyst found "Clinton," Kleinsmith noted, that could mean George Clinton, the funk musician, or the town of Clinton, Md. Was the collection accidental or intentional? Regulations that restrict domestic surveillance of U.S. citizens don't necessarily apply to names that are swept up inadvertently in a data harvest. The IDC team pulled in hundreds of names every hour, Kleinsmith said. When asked which prominent Americans were included, he replied, "Everybody was coming up." As quickly as the IDC garnered powerful fans, it also earned some enemies. The center was not a chartered member of the formal intelligence community -- the 14 agencies that in 1999 officially constituted the country's spy apparatus. For a support organization, buried several layers deep in the Army, to tread on territory normally reserved for big-name agencies like the CIA and the Defense Intelligence Agency, and to present intelligence gleaned from the Internet, of all places, was simply anathema to people steeped in decades of intelligence rules and culture. The IDC analysts were mavericks. In particular, the Defense Intelligence Agency questioned the analysts' results on a number of projects, not just Able Danger, the former IDC employee said. "We'd show them our stuff, and they'd say, 'Show us the math.' " But the answers didn't always add up so neatly. The combination of data mining and hunches sometimes produced results that the bigger intelligence agencies viewed as murky, even if military commanders found them compelling. At a Pentagon briefing on Able Danger in September of this year, Thomas Gandy, the Army's director of counterintelligence and human intelligence, cautioned reporters about inferring too much information from the "links" the IDC established, particularly because its data-mining tools were far less sophisticated than the ones used today. "Just that there are links established doesn't really mean anything," Gandy said. "In the primacy of this technology, you get some very goofy links that require research." Kleinsmith and the former employee, as well as others who worked tangentially to the IDC over the years, insisted that the IDC analysts were senior and seasoned, and that they recognized the fact that simple links required further investigation. Yet the analysts' enthusiasm for a less tidy sort of inquiry, which often raised more questions than answers, divided intelligence professionals. Some former government officials, who declined to be named, derided the IDC analysts as "zealots" and said their work never produced the eureka-like results that some, particularly former Able Danger members, now claim. One senior IDC analyst, Eileen Preisser, who worked with Kleinsmith on Able Danger and other projects, was characterized by a former Defense official as "an uncontrolled flake." Kleinsmith, who called Preisser an "analytical genius," admitted that she "has constant trouble in working with others in the community." Preisser has worked in several intelligence jobs, inside and outside the government, and those who know her see her as the prototypical IDC believer. She "is especially critical of those folks who she feels did not, or do not, 'get' the technology," Kleinsmith said. "Instead of working within the system, maneuvering around the tough spots, negotiating and dealing, she tends to burn her way through an issue to get where she needs to go." Preisser now works for the National Geospatial Intelligence Agency. A spokeswoman there said Preisser declined all requests for interviews. In early 2000, in the midst of Able Danger, a lawyer with the Army's general counsel visited Kleinsmith. As Kleinsmith testified before the Senate Judiciary Committee in September, the lawyer reminded him that under Army regulations, any data the IDC collected on U.S. persons -- even inadvertently -- had to be destroyed within 90 days. If analysts could establish a legitimate reason to investigate a person further, they could keep the corresponding data. But with potentially tens of thousands of names, checking each one would have been impossible, Kleinsmith said. In the Pentagon briefing, Gandy concurred: "I don't think they had the capability to scrub it in the fashion that the oversight rules could live with." By the spring of 2000, Kleinsmith said, the IDC had the list of 20 individuals whom Special Operations wanted investigated further under Able Danger. But in March, Kleinsmith was ordered to cease all work on the project. He believes the order came from outside the IDC's command. From May to June, Kleinsmith and his team destroyed the information, and possibly the linkages between Mohamed Atta, Al Qaeda, and convicted terrorists already sitting in U.S. prisons. "It was terrible," Kleinsmith said. After the data purge, the heartbeat of the IDC slowed. In late September 2000, the center was authorized to begin new work on Able Danger, Kleinsmith said. A data harvest would take no time to replicate, but the analysis on people and locations was much harder to reproduce. But Able Danger never ramped up a second time. On October 12, while the USS Cole was docked in Yemen's port city of Aden, Al Qaeda suicide bombers rammed the destroyer with a small explosive-laden boat, killing 17 U.S. sailors and wounding 39. From then on, U.S. Central Command, responsible for the Middle East, became the IDC's primary customer, Kleinsmith said. Special Operations Command, unhappy because the IDC's attention had shifted, moved Able Danger to a private intelligence research center run by Raytheon in Garland, Texas, Kleinsmith said. A Raytheon spokesman did not respond to a request for comment. But Eileen Preisser, the IDC analyst who had worked on Able Danger with Kleinsmith, was working for Raytheon after the September 11 attacks. In a 2001 interview with National Journal, she spoke of projects she was involved with that were essentially the same as those at the IDC. After the Cole bombing, the IDC concentrated on projects not related to Al Qaeda. "We went on to do some other things, other projects," the former IDC employee said. Less than a year later, the 9/11 attackers struck. Looking back, Kleinsmith doesn't claim that he saw the attacks coming. Rather, he felt resigned. "I wasn't surprised," he said. He had studied Al Qaeda's evolution and believed he knew its capabilities. "I thought, 'So it begins.' The 9/11 attacks breathed some new life into the Information Dominance Center. In late 2001, retired Navy Adm. John Poindexter, who had served as President Reagan's national security adviser, met with the director of the Defense Advanced Research Projects Agency, where Poindexter was soon to be employed. Poindexter was looking for a site to test new technologies under his Total Information Awareness program, which, not unlike the IDC, aimed to use open-source data and government information to understand terrorism. TIA also looked at tools to examine commercial databases containing information on U.S. citizens, within the context of privacy regulations. Poindexter wanted a proving ground staffed by seasoned, technology-inclined analysts, a "Manhattan Project" for counterterrorism, he said. The DARPA director, Tony Tether, told him to consider the IDC. After meeting with Gen. Alexander, the Army commander overseeing the center, Poindexter agreed to test some of the TIA tools at the IDC. "TIA was a very good concept," the former IDC employee said. The center offered TIA "a high-speed testing bed" for its new technologies. "Some of the tools sucked, and some of them were good ideas," the employee said. The frustration came from officials' reluctance to use the tools for active intelligence projects. Poindexter emphasized that TIA was a research project and wasn't using data mining as part of any real intelligence operations. TIA was an experiment. But the experiment was short-lived. In late 2002, Poindexter's role in TIA was revealed in the press. The controversial retired admiral's past caught up with him -- Poindexter was the central figure in the Iran-Contra scandal, which diverted the profits from covert arms sales to Iran to anti-Communist rebels in Nicaragua. Members of Congress derided TIA as an Orwellian excess of the post-9/11 era. The funding was pulled. Kleinsmith, who had left the Army by the time TIA arrived, seemed perplexed by lawmakers' concerns. "We've had this capability for years," he remembered thinking. "Who cares?" TIA's detractors declared a victory for privacy protection when they killed the project. Poindexter was forced to resign in August 2003. But research on TIA tools has hardly ceased. Rather, it has moved into the intelligence agencies, where the work and the budgets for it are classified, Poindexter said, noting that now Congress has more-limited oversight and should be more concerned about privacy infringements. The former IDC employee concurred, saying "The [TIA] concept hasn't died off. It continues. And it continues elsewhere now, and I can't talk about that. The tools are continuing to be developed." Five years after Able Danger, Erik Kleinsmith seems oddly at ease for a key figure in a brewing political controversy. Inevitably, Kleinsmith would be a major witness in any investigation of the project. No one has suggested he did anything other than follow Army regulations in destroying the Able Danger documents. Kleinsmith remains unconvinced that, despite the IDC's innovations, the 9/11 attacks were foreseeable. But "I do go to bed every night ... [thinking] that if we had not been shut down, we would have at least been able to prevent something or assist the United States in some way," Kleinsmith told the Senate Judiciary Committee during September's hearing. "Could we have prevented 9/11?" He paused, and then said: "I don't think I can ever speculate to that extent, that we could have done that." Today, Kleinsmith is an employee with Lockheed Martin, working as a contractor to the Army's Information Operations Center, an IDC spin-off that is chartered to support the global war on terrorism. He oversees an intelligence training team of about 28 instructors, five of whom are working in Iraq to train U.S. analysts in data mining. "One of the most amazing aspects of the Able Danger team is that, for a time, you had what I believe was the perfect combination of technology, data, and expert analysts that combined to create analysis that was above and beyond what the intelligence community was producing," Kleinsmith said. The results of the China experiment brought Special Operations Command to the IDC. That's proof enough for Kleinsmith that his group was providing what no one else could. "I have been asked by several folks on Capitol Hill, members and staffers alike, whether the capability still exists to do what we did," Kleinsmith said. "My answer is, 'yes and no.' " Paradoxically, analysts are being trained to rely on the technological tools -- what Kleinsmith called "buttonology" -- too much, instead of thinking creatively on their own, he explained. The technology is powerful, but needs to augment the analyst's work, he said. "There are still those who want to train analysts on how the engine of the car works instead of how to drive the car." Kleinsmith recognized that the IDC's methods caused some consternation, but he takes pride in his former work and looks at the controversy pragmatically. "We understood that [there were objections], but we also understood that a lot of our customers didn't care." Today, Kleinsmith is still struggling with the same puzzles. And, to hear him tell it, apart from the advancements in technology, little has changed. So much is still unknown, and undone, about the terrorist threat to the United States, he said. He can simply watch television to know that law enforcement isn't rounding up the terrorist cells he believes his team identified in the United States five years ago. Ultimately, Kleinsmith sounds less like a man burdened by his past than one nervous about the future. No one seems to be acting on the information the IDC found that terrorists had taken up residence in the United States, far from New York, he said. And, as if they were listening, waiting for him to tip his hand, Kleinsmith cautiously added, "I'd just prefer not to say where they are." |
Link |
Home Front: Politix |
General Shelton admits authorizing Able Danger |
2005-12-09 |
Gen. Hugh Shelton has confirmed that four years before the 2001 attacks, he authorized a secret computer data-mining initiative to track down Osama bin Laden and operatives in al-Qaida. Shelton was the militaryâs top commander during the attacks. In his first public comments on the initiative, which some former intelligence officers say was code-named Able Danger, Shelton confirmed that he received two briefings on the mission â both well before the Sept. 11, 2001, attacks. âRight after I left SOCOM (Special Operations Command), I asked my successor to put together a small team, if he could, to try to use the Internet and start trying to see if there was any way that we could track down Osama bin Laden or where he was getting his money from or anything of that nature,â Shelton said Monday in an interview. âIt was just kind of an experiment,â Shelton said. âWhat can we do? So, he pulled together a bunch of really bright, computer-literate guys from across the services.â Sheltonâs assertions raise new questions about the governmentâs knowledge of the al-Qaida network before the Sept. 11, 2001, attacks, and about the subsequent findings of a commission set up to investigate the attacks. Shelton was responding to allegations by former Pentagon intelligence officers, who say they used a data-mining program code-named Able Danger to identify terrorist Mohammed Atta and three other hijackers in early 2000, but that Pentagon lawyers blocked them from relaying their findings to the FBI. Before the Defense Department issued a gag order that prevented them from testifying to Congress in September, the former intelligence officers said they were assigned to use sophisticated software to perform complex computer searches of âopen-sourceâ data to locate links among al-Qaida operatives. Navy Capt. Scott Phillpott said he led the program that identified Atta in January or February 2000. Army Lt. Col. Anthony Shaffer said that Shelton had issued a directive establishing Able Danger, and that he and other intelligence officers on the top-secret program briefed Shelton on its findings in early 2001. While Shelton said he never heard the program referred to as âAble Dangerâ until news reports on it first emerged in the summer, the retired general said he authorized a data-mining effort aimed at bin Laden and his associates. Shelton said he did not recall hearing or seeing Attaâs name in briefings or before the attacks. Shelton said he also did not recall seeing a large chart that the former Able Danger officers claim to have produced, displaying as many as 60 al-Qaida operatives, including Atta. In its final report last year, the Sept. 11 commission spread blame across the government but said it had not identified any of the 19 hijackers before the attacks. Rep. Curt Weldon, a Pennsylvania Republican who has led a congressional push for the Pentagon to allow open Able Danger hearings, said the Sept. 11 commission failed to adequately investigate the program or its findings. |
Link |