Warning: Undefined array key "rbname" in /data/rantburg.com/www/pgrecentorg.php on line 14
Hello !
Recent Appearances... Rantburg

Government Corruption
A band of innovators reimagines the spy game for a world with no cover By David Ignatius July 10, 2025
2025-07-11
[WAPO] Aaron Brown was working as a CIA case officer in 2018 when he wrote a post for an agency blog warning about what he called "gait recognition." He cautioned his fellow officers that computer algorithms would soon be able to identify people not just by their faces, or fingerprints, or DNA — but by the unique ways they walked.

Many of his colleagues, trained in the traditional arts of disguise and concealment, were skeptical. One called it "threat porn." But Brown’s forecast was chillingly accurate. A study published in May reported that a model called FarSight, using gait, body and face recognition, was 83 percent accurate in verifying an individual at up to 1,000 meters, and was 65 percent accurate even when the face was obscured. "It’s hard to overstate how powerful that is," Brown said.

Brown’s story illustrates a profound transformation that is taking place in the world of intelligence. For spies, there is literally no place to hide. Millions of cameras around the world record every movement and catalogue it forever. Every action leaves digital tracks that can be studied and linked with others. Your cellphone and social media accounts tell the world precisely who and where you are.

Further, attempts at concealment can backfire in the digital age. An intelligence source told me that the CIA gave burner phones to a network of spies in a Middle Eastern country more than a decade ago and instructed them to turn the phones on only when sending operational messages. But the local security service had devised an algorithm that could identify "anomalous" phones that were used infrequently. The network was exposed by its attempt at secrecy.

"The more you try to hide, the more you stand out," Brown explained. He wouldn’t discuss the Middle East case or any other operational details. But the lesson is obvious: If you don’t have a cellphone or a social media profile these days, that could signal you’re a spy or criminal who’s trying to stay off the grid.

Brown, a wiry former Army Ranger and CIA counterterrorism officer, is one of a small group of ex-spies who are trying to reinvent American intelligence to survive in this age of "ubiquitous technical surveillance," or UTS. He launched a new company this year called Lumbra. Its goal is to build AI "agents" that can find and assess — and act upon — data that reveals an adversary’s intentions.

Lumbra is one of nearly a dozen start-ups that I’ve examined over the past several months to explore where intelligence is headed in 2025. It’s a dazzling world of new technology. One company uses data to identify researchers who may have connections to Chinese intelligence. Another interrogates big data systems the way an advertising company might, to identify patterns through what its founder calls "ADINT." A third uses a technology it calls "Obscura" to bounce cellphone signals among different accounts so they can’t be identified or intercepted.

Most of these intelligence entrepreneurs are former CIA or military officers. They share a fear that the intelligence community isn’t adapting fast enough to the new world of espionage. "Technologically, the agency can feel like a sarcophagus when you see everything that’s happening outside," worries Edward Bogan, a former CIA officer. He now works with a nonprofit called 2430 Group — the number was an early CIA cover address in Washington — that tries to help technology companies protect their work from adversaries.

The Trump administration recognizes this intelligence revolution, at least in principle. CIA Director John Ratcliffe said during confirmation hearings he wants to ramp up covert operations, with officers "going places no one else can go and doing things no one else can do." That’s a commendable goal, but if the agency doesn’t reinvent its tradecraft, Ratcliffe’s bold talk may well fail. Traditional operations will only expose the CIA and its sources to greater risk.

A CIA spokesperson said this week in response to a query: "Today’s digital environment poses as many opportunities as it does challenges. We’re an adaptable agency, and it is well within the ingenuity and creativity of our officers to develop ways to navigate effectively in complex environments. In fact, we are exploiting many of the same technologies to recruit spies and steal information."

Brown takes hope from the work that younger CIA officers are doing to reimagine the spy business: "Some of the agency’s smartest people are working on these tradecraft problems from sunup to sundown, and they are coming up with unique solutions."

The CIA’s technology challenge is a little-noted example of a transformation that’s happening in every area of defense and security. Today, smart machines can outwit humans. I’ve written about the algorithm war that has revolutionized the battlefield in Ukraine, where no soldier is safe from drones and precision-guided missiles. We’ve just seen a similar demonstration of precision targeting in Israel’s war against Iran. For soldiers and spies everywhere, following the old rules can get you killed.

(Illustration by Raven Jiang/For The Washington Post)
The art of espionage is thousands of years old. The Bible speaks of it, as do ancient Greek, Persian and Chinese texts. Through the ages, it has been based on two pillars: Spies operate in secret, masking who they are and what they’re doing (call it "cover"), and they use techniques to hide their movements and communications (call it "tradecraft"). Modern technology has shattered both pillars.

To recall the mystique of the CIA’s old-school tradecraft, consider Antonio J. Mendez, the agency’s chief of disguise in the 1980s. He described in a memoir how he created ingenious facial masks and other deceptions that could make someone appear to be a different race, gender, height and profile. Some of the disguises you see on "The Americans" or "Mission Impossible" use techniques developed by Mendez and his colleagues.

The CIA’s disguises and forgeries back then were like works of fine art. But the agency in its first few decades was also a technology pioneer — innovating on spy planes, satellite surveillance, battery technology and covert communications. Its tech breakthroughs were mostly secret systems, designed and built in-house.

The Silicon Valley tech revolution shattered the agency’s innovation model. Private companies began driving change and government labs were lagging.

Seeing the disconnect, CIA Director George Tenet in 1999 launched the agency’s own venture capital firm called "In-Q-Tel" to connect with tech start-ups that had fresh ideas that could help the agency. In-Q-Tel’s first CEO was Gilman Louie, who had previously been a video game designer. In-Q-Tel made some smart early investments, including in the software company Palantir and the weapons innovator Anduril.

But the CIA’s early attempts to create new tradecraft sometimes backfired. To cite one particularly disastrous example: The agency developed what seemed an ingenious method to communicate with its agents overseas using internet addresses that appeared to be news or hobby sites. Examples included an Iranian soccer site, a Rasta music page and a site for Star Wars fans, and dozens more, according to investigations by Yahoo News and Reuters.

The danger was that if one agent was caught, the technology trick could be exposed — endangering scores of other agents. It was like mailing secret letters that could be traced to the same postbox — a mistake the CIA had made with Iran years before.

Iran identified the internet ruse and began taking apart CIA networks around 2010. China soon did the same thing. The agency’s networks in both countries were largely destroyed from 2010 to 2012.

In a 2012 speech during his stint as CIA director, Gen. David H. Petraeus warned that the fundamentals of spying had changed: "We have to rethink our notions of identity and secrecy. ... Every byte left behind reveals information about location, habits, and, by extrapolation, intent and probable behavior."

But machines moved faster than humans in the spy world. That’s what I learned in my weeks of on-the-record discussions with former CIA officers working to develop the espionage tools of the future. They describe a cascade of commercial innovations — instant search, mobile phones, cheap cameras, limitless accessible data — that came so quickly the CIA simply couldn’t adapt at the speed of change.

Duyane Norman was one of the CIA officers who tried to move the system. In 2014, he returned from overseas to take a senior operations job. The agency was struggling then to recover from the collapse of its networks in Iran and China, and the fallout from Edward Snowden’s revelation of CIA and NSA secrets. Norman remembers thinking that "the foundations of our tradecraft were being disrupted," and the agency needed to respond.

Norman convinced his superiors that in his next overseas assignment, he should try to create what came to be called "the station of the future," which would test new digital technology and ideas that could improve offensive and defensive operations. This experiment had some successes, he told me, in combating surveillance and dropping outmoded practices. But the idea of a "station," usually based in an embassy, was still a confining box.

"You’re the CEO of Kodak," Norman says he warned Director Gina Haspel when he retired in 2019, recalling the camera and film company that dominated the industry before the advent of digital photography. Kodak missed the chance to change, and the world passed it by.

When I asked Norman to explain the CIA’s resistance to change, he offered another analogy. "If Henry Ford had gone to transportation customers and asked what they wanted, they would have said ’faster horses.’

"That’s what the CIA has been trying to build. Faster horses."

The intelligence community’s problem was partly that it didn’t trust technology that hadn’t been created by the government’s own secret agencies.

Mike Yeagley, a data scientist who runs a company called cohort.ID, discovered that in 2016 when he was working with commercial mobile phone location data. His business involved selling advertisers the data generated by phone apps. As a cellphone user moves from work to home — visiting friends, stores, doctors and every other destination — his device reveals his interests and likely buying habits.

Yeagley happened to be studying refugee problems back then, and he wondered if he could find data that might be useful to NGOs that wanted to help Syrians fleeing the civil war into Turkey. He bought Syrian cellphone data — cheap, because it had few commercial applications. Then, on a whim, he began looking for devices that dwelled near Fort Bragg, North Carolina — where America’s most secret Special Operations forces are based — and later appeared in Syria.

And guess what? He found a cluster of Fort Bragg phones pinging around an abandoned Lafarge cement plant in the northeast Syrian desert.

Bingo! The cement factory was the headquarters of the Joint Special Operations Command task force that was running America’s war against the Islamic State. It was supposed to be one of the most secret locations on the planet. When I visited several times over the past decade as an embedded journalist, I wasn’t allowed to walk more than 50 yards without an escort. And there it was, lighting up a grid on a commercial advertising data app.

Yeagley shared that information with the military back in 2016 — and they quickly tightened phone security. Commanders assumed that Yeagley must have hacked or intercepted this sensitive data.

"I bought it," Yeagley told them. Even the military’s security experts didn’t seem to realize that mobile phones had created a gold mine of information that was being plundered by advertisers but largely ignored by the government.

Thanks to advice from Yeagley and many other experts, data analytics is now a growing source of intelligence. Yeagley calls it "ADINT," because it uses techniques developed by the advertising industry. Who would have imagined that ad salespeople could move faster than secret warriors?

(Illustration by Raven Jiang/For The Washington Post)
Glenn Chafetz had been station chief in three countries when he returned to Langley in 2018 to take an assignment as the first "Chief of Tradecraft" in the operations directorate. It was the agency’s latest attempt to adapt to the new world, succeeding the Ubiquitous Technical Surveillance Working Group, which in turn had replaced the CCTV Working Group.

"People realized that the problem wasn’t just cameras, but payment systems, mobile apps, WiFi hubs — any technology that produced data that lived permanently," Chafetz recalls. But there was still a lack of understanding and resistance from many officers who had joined the CIA when there were no cellphones, digital cameras or Google.

For the older generation, tradecraft meant executing "surveillance detection routes" to expose and evade trackers. Case officers had all gone through field training to practice how to detect surveillance and abort agent meetings that might be compromised. They met their assets only if they were sure they were "black," meaning unobserved. But when cameras were everywhere, recording everything, such certainty was impossible.

Chafetz lead a team that tried to modernize tradecraft until he retired in 2019. But he remembers that an instructor in the agency’s training program admonished him, "New officers still need to learn the basics." The instructor didn’t seem to understand that the "basics" could compromise operations.

The tradecraft problem wasn’t just pervasive surveillance, but the fact that data existed forever. In the old days, explains Chafetz, "If you didn’t get caught red-handed, you didn’t get caught." But now, hidden cameras could monitor a case officer’s meandering route to a dead drop site and his location, long before and after. His asset might collect the drop a week later, but his movements would be recorded, before and after, too. Patterns of travel and behavior could be tracked and analyzed for telltale anomalies. Even when spies weren’t caught red-handed, they might be caught.

The CIA’s default answer to tradecraft problems, for decades, was greater reliance on "nonofficial cover" officers, known as NOCs. They could pose as bankers or business consultants, say, rather than as staffers in U.S. embassies. But NOCs became easier to spot, too, in the age of social media and forever-data. They couldn’t just drop into a cover job. They needed an authentic digital history including things like a "LinkedIn" profile that had no gaps and would never change.

For some younger CIA officers, there was a fear that human espionage might be nearly impossible. The "station of the future" hadn’t transformed operations. "Cover" was threadbare. Secret communications links had been cracked. The skeptics worried that the CIA model was irreparably broken.

After all my conversations with veteran CIA officers, I’ve concluded that the agency needs an entirely new tool kit. Younger officers inside recognize that change is necessary. Pushing this transformation from the outside are scores of tech-savvy officers who have recently left the CIA or the military. It’s impossible at this stage to know how many of these ventures will prove successful or important; some won’t pan out. The point is the urgent need to innovate.

Let’s start with cellular communications. That’s a special worry after Chinese intelligence penetrated deep inside the major U.S. telecommunications companies using a state-sponsored hacking group known as "Salt Typhoon." A solution is offered by a company called Cape, which sells customers, in and out of government, a mobile network that can disappear from the normal cellular grid and protect against other vulnerabilities.

Cape was founded in 2022 by John Doyle, who served as a U.S. Army Special Forces sergeant from 2003 to 2008 and then worked for Palantir. His "Obscura" technology bounces mobile phone identifiers among thousands of customers so it’s impossible to trace any of them. He calls his tactic "opportunistic obfuscation."

One of the most intriguing private intelligence companies is Strider Technologies, founded in 2019 by twin brothers Greg and Eric Levesque and chief data officer Mike Brown. They hired two prominent former CIA officers: Cooper Wimmer, who served in Athens, Vienna, Baghdad and Peshawar, and other locations; and Mark Pascale, a former station chief in both Moscow and Beijing. The company also recruited David Vigneault, former head of Canadian intelligence.

Strider describes itself as a "modern-day economic security agency." To help customers secure their innovation and talent, it plucks the secrets of adversaries like China and Russia that steal U.S. commercial information. China is vulnerable because it has big open-source databases of its own, which are hard to protect.

Using this data, Strider can analyze Chinese organizations and their employees; it can study Chinese research data, and how it was obtained and shared; it can analyze the "Thousand Talents" programs China uses to lure foreigners; it can track the contacts made by those researchers, at home and abroad; and it can identify connections with known Chinese intelligence organizations or front companies.

Eric Levesque explained to me how Strider’s system works. Imagine that a software engineer is applying to work for an international IT company. The engineer received a PhD from a leading American university. What research did he conduct there? Was it shared with Chinese organizations? What research papers has he published? Who in China has read or cited them? What Chinese companies (or front companies) has he worked for? Has this prospective employee touched any branch of the Chinese civil-military conglomerate?

Strider can operate inside what China calls the "Great Firewall" that supposedly protects its data. I didn’t believe this was possible until Levesque gave me a demonstration. On his computer screen, I could see the links, from a researcher in the West, to a "Thousand Talents" program, to a Ministry of State Security front company. It turns out that China hasn’t encrypted much of its data — because the authorities want to spy on their own citizens. China is now restricting more data, but Levesque says Strider hasn’t lost its access.

We’ve entered a new era where AI models are smarter than human beings. Can they also be better spies? That’s the conundrum that creative AI companies are exploring.

Scale AI sells a product called "Donovan," named after the godfather of the CIA, William J. "Wild Bill" Donovan. The product can "dig into all available data to rapidly identify trends, insights, and anomalies," says the company’s website. Alexandr Wang, the company’s founding CEO (who was just poached by Meta), explains AI’s potential impact by quoting J. Robert Oppenheimer’s statement that nuclear weapons produced "a change in the nature of the world."

Vannevar Labs, another recent start-up, is creating tools to "influence adversary behavior and achieve strategic outcomes." Its website explains: "We develop sophisticated collection, obfuscation, and ML (machine learning) techniques to provide assured access to mission relevant data."

The company’s name evokes Vannevar Bush, an MIT engineer who headed the U.S. Office of Scientific Research and Development, which oversaw all major U.S. research projects during World War II, including the launch of the Manhattan Project.

Lumbra.ai, the company launched in March by Brown, seeks to create what he describes as a "central nervous system" that will connect the superintelligence of future AI models with software "agents." After leaving the CIA in 2021, Brown met with Sam Altman, the founder of Open AI, to refine his thinking. To describe what agentic AI can do, he offers this hypothetical: "We can find every AI researcher, read all the papers they’ve ever written, and analyze any threats their research may pose for the United States." Human spies could never be so adept.

LUMBRA

"No one said we have to collect intelligence only from humans," Brown tells me. "When a leader makes a decision, someone in the system has to take a step that’s observable in the data we can collect." Brown’s AI agents will create a plan and then build and use tools that can gather the observable information.

Brown imagines what he calls a "Case Officer in a Box." Conceptually, it would be a miniaturized version of an agentic system running a large language model, like Anthropic’s Claude. As an offline device, it could be carried in a backpack by anyone and left anywhere. It would speak every language and know every fact ever published. It could converse with an agent, asking questions that elicit essential information.

"Did you work in the Iranian weaponization program?" our Case Officer in a Box might ask a hypothetical Iranian recruit. "Where was your lab? In the Shariati complex? Okay, then, was it in the Shahid Karimi building or the Imam Khomeini building? Did you work on neutron triggers for a bomb? How close to completion was your research? Where did you last see the prototype neutron triggers? Show me on a map, please."

The digital case officer will make a great movie, but it’s probably unrealistic. "No one is going to put their life in the hands of a bot," cautioned Wimmer, a fabled CIA recruiter. The agent would suspect that the AI system was really a trick by his own country’s spies. Brown agrees that recruiting a human spy will probably always require another human being who can build the necessary bond of trust. But once that bond is achieved, he believes technology will enhance a spy’s impact in astonishing ways.

Here’s the final, essential point. Human spies in the field will become rare. Occasionally, a piece of information will be so precious that the CIA will risk the life of one of its officers, and the life of an agent, to collect the intelligence in person. But that kind of face-to-face spying will be the exception. The future of espionage is written in zeros and ones. The CIA will survive as a powerful spy agency only if it makes a paradigm shift.

Link


Home Front: Politix
Robert Kennedy, Jr. explains that the U.S. military-industrial complex's goal is to prolong the War in Ukraine, maximizing the loss of lives while continuing to expand NATO and advocating for regime change in Russia:
2023-05-11
Fourteen minutes excerpt from the two-hour long video can be seen at the link.
[Twitter - KanekoaTheGreat] "This is no longer a humanitarian mission, and all the decisions the United States has made since the start has been about prolonging the war, maximizing the violence of the war, and being absolutely intransigent against the many opportunities to actually settle the war. My understanding of the war is not that Zelensky is pushing this war as hard as he can but that the neocons in the White House want this war. They want regime change with the Russians. They want to exhaust the Russian army.

That's what Defense Secretary Lloyd Austin said in 2022, our objective is to exhaust and degrade Russian forces so they cannot fight anywhere else. President Biden acknowledged that one of his objectives in the war was regime change in Russia and removing Vladimir Putin. If those are the objectives, that is the opposite of a humanitarian mission. That is a mission to maximalize casualties to prolong the war. It's essentially a war of attrition, and that's what we are seeing, and the brunt of this is being paid by the flower of Ukrainian youth.

This is something that the Ukrainian government and the United States government have worked hard to hide, the number of catastrophic casualties. This is the most violent conflict since World War II that's probably occurred anywhere worldwide, and the casualties are enormous. Over 300,000 Ukrainians are dead... The real story starts in 2014 when the U.S. government and, in particular, the neocons in the White House and elsewhere participated and supported the violent overthrow, a coup de tat, against the democratically elected government of Ukraine and put in a very, very anti-Russian government.

This prompted the Russians, who believed the U.S. Navy would be invited into the Black Sea to have a port in Crimea. It prompted the Russians to pre-emptively invade Crimea. At the same time, the government that came into Ukraine began enacting a series of laws that turned the Russian populations of the Donbas region into second-class citizens. They essentially criminalized their culture and language and ultimately began killing them. They killed 14,000 of them, prompting a civil war in the country. And the Russian response was illegal; I have no sympathy towards Vladimir Putin. Vladimir Putin is a gangster and a thug, but his response to the Donbas is not irrational...

We have been doing integrative military exercises with the Ukrainian military. We were actively integrating them into NATO forces. There's no question. The one thing Putin said from the onset is that this is the redline... We're putting these intermediate missile systems all along the Russian border. Romania, Poland, and in Ukraine, and those missiles can hit Moscow in a few minutes... We should be de-escalating these provocations... George Tenet asked after the Soviet Union collapsed, why do we even have NATO anymore? Why don't we do a Marshall Plan for Russia?

We won the war; they are the losers and admit they are the losers. They want to join the European community. Let's make it easy for them. Let's not continue to treat them as if they are the enemy because that is a self-fulfilling prophecy, and that is, unfortunately, what we did... Why are we trying to expand NATO? We gave our word that we would not expand NATO one inch to the east, and now we've gone into thirteen countries. It is a provocation."
300,000 dead humans is child's play. Remember when Secretary of State Madeline Albright was OK with starving half a million Iraqi children to death? She said it was "worth it". Yes, these people really are that evil.
She may have been ok with that, but of course Saddam Hussein was lying about the number of dead children — both in total and directly caused by international sanctions.
Link


Home Front: Politix
A China Story Bob Woodward Chose Not to Tell
2021-09-20
[American Spectator] In a just world, if the reporting of Bob Woodward and Robert Costa in their new book Peril is accurate, Chairman of the Joint Chiefs of Staff Gen. Mark A. Milley would be sharpening his ceremonial sword and planning seppuku. Woodward and Costa have reported that Milley circumvented the chain of command and made unauthorized calls to CCP Gen. Li Zuocheng.

If Woodward and Costa got the story wrong, however, they should be the ones sharpening their swords. Although more reliable than most in Big Media, Woodward has reported many stories of questionable accuracy over the years. There was the dubious "potted plant" signal for the equally dubious "Deep Throat," the imaginative deathbed confession of CIA Director William Casey, and the misinterpreted "slam dunk" quote by former CIA Director George Tenet among others.

More troubling than what Woodward may have misreported is what he did not report at all. Like so many of his colleagues, he has repeatedly betrayed the American public by ignoring stories of major consequence. As it happens, his single greatest oversight involves China, specifically its role in the 1996 presidential election.

Woodward was not lacking opportunity. He wrote a book about the 1996 election, The Choice, and had better access to key players than any reporter in Washington. Yet somehow he failed to mention that Chinese interests bought and paid for President Bill Clinton’s victory over Bob Dole. To miss the most striking feature of a campaign he covered in depth suggests not incompetence on Woodward’s part, but complicity.

There was a lot to miss. In the way of background, the Democrats got drubbed in the 1994 mid-terms and blamed Clinton for the losses. The media were as dismayed as the Democrats. Historians tracing the date of their shift from a tolerable bias to an intolerable corruption should look to this election and the two years that followed. Few reporters wanted to give the scary new House Speaker Newt Gingrich a Republican president, and many did what they had to do to prevent it. Woodward was among them.

With an approval rating at a dangerously low 45 percent, Clinton was looking at a one-term presidency. If he were to have any chance in 1996, he would have to raise money, lots of it. With the financially strapped DNC hesitant to pony up, he and Hillary promptly headed to the one place that welcomed his business, the Riady crime family HQ in Indonesia.

The ethnically Chinese Riadys, Mochtar and son James, had started investing in Clinton while he was still governor of Arkansas. More than once they bailed him out during the 1992 campaign and not just for the sport of it. In 1994, Clinton paid his Chinese loan sharks some of their vig by getting their "man in America," John Huang, a job in the Commerce Department. In May of that same year, Clinton paid more of it by "delinking" human rights from the renewal of China’s most favored nation status.
Link


Government Corruption
9/11 Was a Day of Unforgivable Government Failure
2021-09-12
Lengthy, but well worth the read.
[MISES Wire] Perhaps more than anything else, the rationale given for the necessity of the state—and the necessity of supporting the regime at any given time—is that it "keeps us safe." This permeates thinking about government institutions at all levels, from "thin blue line" sloganeering at the local level, all the way up to jingoism surrounding the Pentagon.

Presumably, the hundreds of billions of dollars extracted from taxpayers, year after year after year, is all both necessary and laudable because without it, chaos would reign on our streets, and foreign invaders would slaughter Americans.

Yet this rationale for state power also presumes that the nation's alleged defenders are actually competent at their jobs.

Whether or not this is the case certainly remains debatable, as the recent military disasters in Afghanistan have made clear. The Pentagon brass pushed for continued war in Afghanistan for twenty years, and, ultimately, lost the entire country to the Taliban, the very people Pentagon generals assured us they would eliminate "soon."

[Read More: "The Pentagon and the Generals Wanted This Disastrous War" by Ryan McMaken]

Moreover, the so-called intelligence community in the United States has repeatedly failed in its mission at crucial times. This can be seen in the fact the CIA was asleep at the switch in the lead-ups to both the Iranian Revolution in 1979 and the Cuban Missile Crisis in 1962—both of which constituted an immense blow to American "safety" by the American regime's metrics.

Needless to say, the terrorist attacks of 9/11 were made possible by an immense military and intelligence failure on the part of the United States government. Not only did the US government provide the motivation for the attacks—through endless meddling in Middle Eastern regimes—but the US regime failed to protect its own citizens when the blowback arrived.

Yet, as is so common following displays of incompetence by government bureaucrats, virtually no government agents were held accountable for this failure. The head of the CIA on 9/11, George Tenet, continued at his post for years afterward. There certainly was no "house cleaning" at the FBI either.
Link


Home Front: Politix
Colin Powell: Trump has 'drifted away' from the Constitution (video)
2020-06-08
Washington (CNN) Former Republican Secretary of State Colin Powell said Sunday that President Donald Trump has "drifted away" from the Constitution, adding to a growing list of former top military officials who have strongly criticized the President's response to the nationwide protests surrounding the police killing of George Floyd.

"We have a Constitution. And we have to follow that Constitution. And the President has drifted away from it," Powell, a retired general who served under President George W. Bush, told CNN's Jake Tapper on "State of the Union."
The comments from Powell, the first African American secretary of state and chairman of the Joint Chiefs of Staff, add to a growing list of rebukes made in recent days by former top officials who have expressed discontent with Trump's strongman approach to the protests sparked by the death of Floyd, a black man who was killed in late May by a white police officer in Minneapolis.
Under the watchful eye of Klingon Director George Tenet, Speaking at the UN on Iraqi WMD trailers, which were actually were not.
Powell said he's "proud" of what a number of former generals, admirals and diplomats have said about Trump's response last week to the widespread protests, adding that he hadn't released a public statement denouncing Trump's response because he felt he had demonstrated his displeasure with Trump in 2016 when he voted against him.

"I think what we're seeing now, is (the most) massive protest movement I have ever seen in my life, I think it suggests the country is getting wise to this and we're not going to put up with it anymore," the retired general told Tapper.

Related: CBS - Colin Powell announces he'll vote for Biden, saying Trump "lies all the time"
Link


-Lurid Crime Tales-
Sheriff David Clarke (Ret): What Is John Brennan Hiding?
2018-08-21
[Townhall] President Trump was correct in pulling back the security clearance held by former CIA Director John Brennan. It should have happened under Barack Obama. Former CIA Director John Brennan has weaponized national security status and has uncharacteristically been on a mission trashing the Trump administration while defending the Obama administration and its meddling in the 2016 presidential campaign that included trying to place a spy inside the Trump campaign.

I say uncharacteristically because most of his predecessors who left the position faded into anonymity rarely to be heard from again. In fact I had to go back and look up the last few people who held the position going back to 1981. They include William Casey, William Webster, Robert Gates, James Woolley, John Deutch, and George Tenet. Other than Robert Gates who went on to become Secretary of Defense in the George W. Bush administration, I am willing to wager that most people could not tell me what those men are doing today. That has been the pattern with former CIA directors. They serve and fade into obscurity. But not John Brennan.

John Brennan is working overtime using an anti-Trump agenda driven liberal media platform while claiming to be protecting the reputation and integrity of our intelligence agencies that have come under scrutiny since it has been exposed that they may have engaged in political hi-jinx or worse, colluded with the FBI to subvert the will of the people in choosing Donald Trump for president.
Link


Terror Networks
Book of the Day: Marc Thiessen, 'Courting Disaster'
2017-06-17
Courting Disaster - Here is an excerpt:

Just before dawn on March 1, 2003, two dozen heavily armed Pakistani tactical assault forces move in and surround a safe house in Rawalpindi. A few hours earlier they had received a text message from an informant inside the house. It read: "I am with KSM."

Bursting in, they find the disheveled mastermind of the 9/11 attacks, Khalid Sheikh Mohammed, in his bedroom. He is taken into custody. In the safe house, they find a treasure trove of computers, documents, cell phones and other valuable "pocket litter."

Once in custody, KSM is defiant. He refuses to answer questions,informing his captors that he will tell them everything when he gets to America and sees his lawyer. But KSM is not taken to America to see a lawyer Instead he is taken to a secret CIA "black site" in an undisclosed location.

Upon arrival, KSM finds himself in the complete control of Americans. He does not know where he is, how long he will be there, or what his fate will be. Despite his circumstances, KSM still refuses to talk. He spews contempt at his interrogators, telling them Americans are weak, lack resilience, and are unable to do what is necessary to prevent the terrorists from succeeding in their goals. He has trained to resist interrogation. When he is asked for information about future attacks, he tells his questioners scornfully: "Soon, you will know."

It becomes clear he will not reveal the information using traditional interrogation techniques. So he undergoes a series of "enhanced interrogation techniques" approved for use only on the most high-value detainees. The techniques include waterboarding. He begins telling his CIA de-briefers about active al Qaeda plots to launch attacks against the United States and other Western targets. He holds classes for CIA officials, using a chalkboard to draw a picture of al Qaeda's operating structure, financing, communications, and logistics. He identifies al Qaeda travel routes and safe havens, and helps intelligence officers make sense of documents and computer records seized in terrorist raids. He identifies voices in intercepted telephone calls, and helps officials understand the meaning of coded terrorist communications. He provides information that helps our intelligence community capture other high-ranking terrorists.

KSM's questioning, and that of other captured terrorists, produces more than 6,000 intelligence reports, which are shared across the intelligence community, as well as with our allies across the world. In one of these reports, KSM describes in detail the revisions he made to his failed 1994-1995 plan known as the "Bojinka plot" to blow up a dozen airplanes carrying some 4,000 passengers over the Pacific Ocean. Years later, an observant CIA officer notices the activities of a cell being followed by British authorities appear to match KSM's description of his plans for a Bojinka-style attack. In an operation that involves unprecedented intelligence cooperation between our countries, British officials proceed to unravel the plot.

On the night of Aug. 9, 2006 they launch a series of raids in a northeast London suburb that lead to the arrest of two dozen al Qaeda terrorist suspects. They find a USB thumb-drive in the pocket of one of the men with security details for Heathrow airport, and information on seven Trans-Atlantic flights that were scheduled to take off within hours of each other:

* United Airlines Flight 931 to San Francisco departing at 2:15 PM
* Air Canada Flight 849 to Toronto departing at 3:00 PM
* Air Canada Flight 865 to Montreal departing at 3:15 PM
* United Airlines Flight 959 to Chicago departing at 3:40 PM
* United Airlines Flight 925 to Washington departing at 4:20 PM
* American Airlines Flight 131 to New York departing at 4:35 PM
* American Airlines Flight 91 to Chicago departing at 4:50 PM

They seize bomb-making equipment and hydrogen peroxide to make liquid explosives. And they find the chilling martyrdom videos the suicide bombers had prepared.

Today, if you asked an average person on the street what they know about the 2006 airlines plot, most would not be able to tell you much. Few Americans are aware of the fact al Qaeda had planned to mark the fifth anniversary of 9/11 with an attack of similar scope and magnitude. And still fewer realize the terrorists' true intentions in this plot were uncovered thanks to critical information obtained through the interrogation of the man who conceived it: Khalid Sheikh Mohammed.

This is only one of the many attacks stopped with the help of the CIA interrogation program established by the Bush Administration in the wake of the Sept. 11, 2001 terrorist attacks. In addition to helping break up these specific terrorist cells and plots, CIA questioning provided our intelligence community with an unparalleled body of information about al Qaeda.

Until the program was temporarily suspended in 2006, intelligence officials say, well over half of the information our government had about al Qaeda-how it operates, how it moves money, how it communicates, how it recruits operatives, how it picks targets, how it plans and carries out attacks-came from the interrogation of terrorists in CIA custody.

Former CIA Director George Tenet has declared: "I know this program has saved lives. I know we've disrupted plots. I know this program alone is worth more than what the FBI, the Central Intelligence Agency, and the National Security Agency put together have been able to tell us." Former CIA Director Mike Hayden has said: "The facts of the case are that the use of these techniques against these terrorists made us safer. It really did work." Even Barack Obama's Director of National Intelligence, Dennis Blair, has acknowledged:

"High-value information came from interrogations in which those methods were used and provided a deeper understanding of the al Qaeda organization that was attacking this country." Leon Panetta, Obama's CIA Director, has said: "Important information was gathered from these detainees. It provided information that was acted upon. John Brennan, Obama's Homeland Security Advisor, when asked in an interview if enhanced-interrogation techniques were necessary to keep America safe, replied : "Would the U. S. be handicapped if the CIA was not, in fact, able to carry out these types of detention and debriefing activities, I would say yes."

On Jan. 22, 2009, President Obama issued Executive Order 13491, closing the CIA program and directing that, henceforth, all interrogations by U. S. personnel must follow the techniques contained in the Army Field Manual. The morning of the announcement, Mike Hayden was still in his post as CIA Director, He called White House Counsel Greg Craig and told him bluntly: "You didn't ask, but this is the CIA officially non-concurring".

The president went ahead anyway, overruling the objections of the agency. A few months later, on April 16, 2009, President Obama ordered the release of four Justice Department memos that described in detail the techniques used to interrogate KSM and other high-value terrorists. This time, not just Hayden (who was now retired) but five CIA directors -including Obama's own director, Leon Panetta objected. George Tenet called to urge against the memos' release. So did Porter Goss. So did John Deutch. Hayden says: "You had CIA directors in a continuous unbroken stream to 1995 calling saying, 'Don't do this.' In addition to objections from the men who led the agency for a collective 14 years, the President also heard objections from the agency's covert field operatives.

A few weeks earlier, Panetta had arranged for the eight top officials of the Clandestine Service to meet with the President. It was highly unusual for these clandestine officers to visit the Oval Office, and they used the opportunity to warn the President that releasing the memos would put agency operatives at risk.

The President reportedly listened respectfully, and then ignored their advice. With these actions, Barack Obama arguably did more damage to America's national security in his first 100 days of office than any President in American history.
Link


Syria-Lebanon-Iran
Kerry: Time to retire 'slam-dunk' on intel
2013-09-02
[THEHILL] The idea of "slam dunk" intelligence should disappear from national security discussions, Secretary of State John F. I was in Vietnam, you know Kerry
Former Senator-for-Life from Massachussetts, self-defined war hero, speaker of French, owner of a lucky hat, conqueror of Cambodia, and current Secretary of State...
said Sunday.

"The word 'slam-dunk' should be retired from the American national security issues," Kerry said on NBC's "Meet The Press."

"We are saying that the high confidence that the intelligence community has expressed and the case that I laid out the other day is growing stronger by the day," he continued.
During the George W. Bush administration, then-CIA chief George Tenet reportedly told Bush that intelligence showing Iraq had weapons of mass destruction was a "slam dunk."

The phrase became a symbol for the botched intelligence that the Bush White House used to justify the invasion.

Kerry spoke in response to his claim that evidence shows sarin gas was used in the Assad regime's alleged chemical attack in the suburbs of Damascus last month.

"Individuals who were engaged as first responders in East Damascus, I can report to you today that they have tested positive for signatures of sarin," he said on Fox News. "So this case is going to build stronger and stronger."

Kerry, who was to appear on five networks on Sunday, made the case that evidence of a chemical attack is strong.

"We know where this attack came from. We know exactly where it went. We know what happened exactly afterwards," he said on Meet the Press, according to a transcript.

"We know the preparations were being taken before for this attack, we know people were told to use their gas mask to prepare for the use of the chemical barrage. We also know that after it took place, they acknowledged that they had done it and were worried about the consequences and whether the U.N. inspectors were going to find out," Kerry said.
Link


India-Pakistan
US-Pak drone deal exposes Kashmir rider
2013-04-08
[TIMESOFINDIA.INDIATIMES] Pakistain's former military strongman Pervez Perv Musharraf
... former dictator of Pakistain, who was less dictatorial and corrupt than any Pak civilian government to date ...
allowed the CIA to conduct Drone strikes in Pakistain's tribal areas as long as the United States kept away from the country's nuclear facilities and mountain camps where faceless myrmidons were being trained for attacks on India, according to explosive new disclosures that break the wall of silence from both sides on the controversial Predator attacks, and if accurate, again exposes U.S duplicity on terrorism.

The breakthrough moment reportedly occurred in 2004 when Pakistain, which had till then resisted pressure from the US to allow it to conduct Drone strikes, was humiliated militarily by a tribal warlord named Nek Mohammad.

"Muhammad's rise to power forced them to reconsider," the New York Times
...which still proudly displays Walter Duranty's Pulitzer prize...
related in an account of the deal in Sunday. "The CIA had been monitoring the rise of Mr. Muhammad (in South Wazoo) but officials considered him to be more Pakistain's problem than America's. In Washington, officials were watching with growing alarm the gathering of Qaeda operatives in the tribal areas, and George Tenet, the CIA director, authorized officers in the agency's Islamabad station to push Pak officials to allow armed drones."

According to the report, negotiations were handled primarily by the Islamabad station of the CIA, with the station chief calling on then ISI Director General Ehsan ul Haq to discuss terms of the deal: The CIA would kill Mohammad if ISI allowed armed Drone flights over tribal areas. Pakistain's terms: they should be allowed to approve each drone strike, giving them tight control over the list of targets; and nuclear facilities and terror camps directed against India would be no-go areas.

Implicit in the report is Washington's acceptance of the terms, considering that India-specific terror camps remain untouched by Drones.

The report says the ISI and the CIA agreed that all drone flights in Pakistain would operate under the CIA's covert action authority - meaning that the United States would never acknowledge the missile strikes and that Pakistain would either take credit for the individual killings or remain silent. As it turned out, Pakistain did take credit for killing Nek Mohammad, even though the CIA had done the job.

The deal also had the stamp of approval from Musharraf, who the NYT says, did not think that it would be difficult to keep up the ruse.

"In Pakistain, things fall out of the sky all the time," it cites him as telling a CIA officer, in a callous remark that is certain to make his already torrid situation in Pakistain even more difficult.
Link


Africa North
Obama and NATO Turn Libya, and a $30B Check, Over to Jihadists
2011-07-24
How would Americans feel if they knew the Obama administration just agreed to hand people affiliated with a designated terrorist group a $30 billion dollar check and recognize them as the legitimate rulers of Libya?

Things weren’t looking so good for the Libyan Islamic Fighting Group back in 2004 when they were designated a foreign terrorist group by the State Department. In chilling testimony, then-CIA Director George Tenet warned the Senate Intelligence Committee in 2004 that even if Osama bin Laden's al-Qaeda was completely destroyed, “a global network of Islamic extremists bent on killing Americans had emerged.” Tenet listed the Libyan Islamic Fighting Group (LIFG) as one of those groups.

In 2007, the LIFG formally joined al-Qaeda, an event so well documented that even Reuters covered it. Its goals, which it is now close to achieving thanks to airpower help from President Obama and NATO, include killing Libyan leader Muammar Gaddafi, setting up an Islamic caliphate in Libya and waging international jihad.

The known leaders of the Libyan rebel forces on the ground are all former LIFG fighters, some with documented personal connections to al-Qaeda. The Transitional National Council, which the Obama administration recognized last week as the official government of Libya, is packed with pro-LIFG activists, lawyers who have advocated for imprisoned LIFG fighters, and Islamic scholars from LIFG strongholds.

Something smells strongly of jihad here.
Link


Home Front: Culture Wars
HRW: Prosecute Bush for Torture
2011-07-12
A US human rights group has called on foreign governments to prosecute George W Bush and some of his senior officials for war crimes if the Obama administration fails to investigate a growing body of evidence against the former president over the use of torture.

The New York-based Human Rights Watch said in a report released on Tuesday that the US authorities were legally obliged to investigate the top echelons of the Bush administration over crimes such as torture, abduction and other mistreatment of prisoners. It says that the former administration's legal team was part of the conspiracy in preparing opinions authorizing abuses that they knew to have no standing in US or international law.

Besides Bush, HRW names his vice-president, Dick Cheney, the former defense secretary, Donald Rumsfeld, and the ex-CIA director, George Tenet, as likely to be guilty of authorizing torture and other crimes.

HRW says an investigation should also examine roles played by Bush's national security adviser, Condoleezza Rice, and the then attorney general, John Ashcroft, and administration lawyers in crafting the legal justifications for torture.
Link


Iraq
Abu Ayyub al Masri in Iraq since 2002 for Al Qaeda
2010-04-21
Will we hear that the rest of the Al Qaeda in Iraq leadership was killed over the next few days?

Nb: The original article has embedded links to supporting documentation which I did not reproduce here. Click on the headline to go there.
The U.S. military has confirmed that the two most senior members of al Qaeda in Iraq were killed in a joint raid conducted with Iraqi forces Sunday morning. The two terrorists killed in the raid are: Abu Ayyub al Masri (aka Abu Hamzah al-Muhajir, the military leader of al Qaeda in Iraq) and Hamid Dawud Muhammad Khalil al Zawi (aka Abu Umar al-Baghdadi, the overall leader of AQI).

But here is one fact the press is not likely to trumpet: Abu Ayyub al Masri set up shop in Saddam's Iraq roughly ten months prior to the U.S.-led invasion in 2003. His presence there was tracked by the CIA. The agency was even concerned that al Masri and his al Qaeda compatriots might be planning terrorist attacks outside of Iraq from Baghdad.

In his book, At the Center of the Storm, George Tenet details some of the evidence the CIA collected on the relationship between Saddam's Iraq and al Qaeda prior to March 2003. Tenet revealed that the agency, which was divided on the extent of the relationship, had compiled "more than enough evidence" connecting the two. In other words, contrary to what is now the conventional wisdom, there was a relationship between the Baathist regime and the jihadist terror network. The CIA just wasn't sure how close the relationship was.

In particular, the CIA tracked Abu Musab al Zarqawi, who would go on to lead al Qaeda in Iraq, as well as an al Qaeda affiliate named Ansar al Islam (AI). Tenet says that AI established training camps in northeastern Iraq and as many as 200 al Qaeda terrorists relocated to the camps, which became a "hub for al-Qa'ida operations."
Link



Warning: Undefined property: stdClass::$T in /data/rantburg.com/www/pgrecentorg.php on line 132
-12 More