Category Archive 'Leaks'
15 Feb 2017

An Intel Op Got Flynn

, , ,

Americans for Limited Government President Rick Manning condemned the Deep State surveillance followed by leaks that forced the resignation of Michael Flynn.

It is absurd that in today’s world, Gen. Flynn having an honest conversation with one of his foreign counterparts in preparation of the incoming administration in December was ever a firestorm in the first place. What is particularly disturbing and unacceptable is that the Obama administration engaged in surveillance of Flynn, who did nothing wrong or illegal by having the conversation, and then had it leaked to the press on Jan. 13, a week before President Trump took office, all with the purpose of actively undermining Trump and his proposed policies. And then after Trump was sworn in, the deep state bureaucratic establishment, our permanent government, decided it was necessary to leak the contents of the conversation to inflict more damage.

“These are police state tactics. Flynn, being an honorable man of unimpeachable character, took the political fall. But this must not stand.

“Every single person responsible for illegally surveilling the Trump campaign and then the transition and now the administration if it’s still going on should be prosecuted and/or fired. Every single person responsible for illegally leaking said surveillance to the press should be prosecuted and/or fired. This witch hunt turned bureaucratic coup that cost Flynn his job cannot be allowed to stand, because it is only the latest instance of apparent sabotage by career government employees. They will not stop.

“This should be immediate cause for Congress to address real civil service reform that will give the president discretion to remove government employees in every department and agency that actively undermine an administration. No career employees in the executive branch are entitled to their jobs, and it is time they learned that it is the president who makes policy, not them.”

10 Aug 2016

Assange Hints That Murdered DNC Staffer Was Wikileaks Informant

, , , , ,

ClintonsUntouchable

Gateway Pundit:

On July 8, 2016, 27 year-old Democratic staffer Seth Conrad Rich was murdered in Washington DC. The killer or killers took nothing from their victim, leaving behind his wallet, watch and phone.

Shortly after the killing, Redditors and social media users were pursuing a “lead” saying that Rich was en route to the FBI the morning of his murder, apparently intending to speak to special agents about an “ongoing court case” possibly involving the Clinton family.

Seth Rich’s father Joel told reporters, “If it was a robbery — it failed because he still has his watch, he still has his money — he still has his credit cards, still had his phone so it was a wasted effort except we lost a life.” …

On Tuesday Wikileaks offered a $20,000 reward for information on the murder of DNC staffer Seth rich.

Now this…
Julian Assange suggested on Tuesday that Seth Rich was a Wikileaks informant.

————————————-

————————————-

Anti-Hillary Wikileaks DNC emails: 19,252 emails and 8,034 attachments from the top of the US Democratic National Committee. The leaks come from the accounts of seven key figures in the DNC: Communications Director Luis Miranda (10770 emails), National Finance Director Jordon Kaplan (3797 emails), Finance Chief of Staff Scott Comer (3095 emails), Finanace Director of Data & Strategic Initiatives Daniel Parrish (1472 emails), Finance Director Allen Zachary (1611 emails), Senior Advisor Andrew Wright (938 emails) and Northern California Finance Director Robert (Erik) Stowe (751 emails). The emails cover the period from January last year until 25 May this year.

26 Jul 2016

Who Hacked the DNC?

, , , ,

APT29

Michael Isikoff reports that there are clues to the hackers’ identity.

Just weeks after she started preparing opposition research files on Donald Trump’s campaign chairman Paul Manafort last spring, Democratic National Committee consultant Alexandra Chalupa got an alarming message when she logged into her personal Yahoo email account.

“Important action required,” read a pop-up box from a Yahoo security team that is informally known as “the Paranoids.” “We strongly suspect that your account has been the target of state-sponsored actors.”

Chalupa — who had been drafting memos and writing emails about Manafort’s connection to pro-Russian political leaders in Ukraine — quickly alerted top DNC officials. “Since I started digging into Manafort, these messages have been a daily oc­­­­currence on my Yahoo account despite changing my p­­a­ssword often,” she wrote in a May 3 email to Luis Miranda, the DNC’s communications director, which included an attached screengrab of the image of the Yahoo security warning.

“I was freaked out,” Chalupa, who serves as director of “ethnic engagement” for the DNC, told Yahoo News in an interview, noting that she had been in close touch with sources in Kiev, Ukraine, including a number of investigative journalists, who had been providing her with information about Manafort’s political and business dealings in that country and Russia.

“This is really scary,” she said.

Chalupa’s message is among nearly 20,000 hacked internal DNC emails that were posted over the weekend by WikiLeaks as the Democratic Party gathered for its national convention in Philadelphia. Those emails have already provoked a convulsion in Democratic Party ranks, leading to the resignation of DNC Chair Debbie Wasserman Schultz in the wake of posted messages in which she and other top DNC officials privately derided Bernie Sanders and plotted to undercut his insurgent campaign against Hillary Clinton.

But Chalupa’s message, which had not been previously reported, stands out: It is the first indication that the reach of the hackers who penetrated the DNC has extended beyond the official email accounts of committee officials to include their private email and potentially the content on their smartphones. After Chalupa sent the email to Miranda (which mentions that she had invited this reporter to a meeting with Ukrainian journalists in Washington), it triggered high-level concerns within the DNC, given the sensitive nature of her work. “That’s when we knew it was the Russians,” said a Democratic Party source who has knowledge of the internal probe into the hacked emails. In order to stem the damage, the source said, “we told her to stop her research.” …

In mid-June, Democratic Party suspicions about the hackers seemed to be confirmed when CrowdStrike, an outside security firm retained by the DNC, reported that it traced the hackers to two separate units linked to Russia’s security services: the FSB, Russia’s equivalent of the FBI, and GRU, the country’s military intelligence agency. The company noted strong similarities between the attack on the DNC by the suspected GRU hackers and previous cyberintrusions of unclassified systems at the White House, the State Department and the offices of the Joint Chiefs of Staff. (After discovering the data breach, a DNC security source said its cyberexperts noted that the hackers’ exfiltration of files took place “9 to 5, Moscow time.”)

—————————–

Patrick Tucker, at the Atlantic, has more details.

Considerable evidence shows that the Wikileaks dump was an orchestrated act by the Russian government, working through proxies, to undermine Hillary Clinton’s presidential campaign.

“This has all the hallmarks of tradecraft. The only rationale to release such data from the Russian bulletproof host was to empower one candidate against another. The Cold War is alive and well,” Tom Kellermann, the CEO of Strategic Cyber Ventures said.

Here’s the timeline: On June 14, the cybersecurity company CrowdStrike, under contract with the DNC, announced in a blog post that two separate Russian intelligence groups had gained access to the DNC network. One group, FANCY BEAR or APT 28, gained access in April. The other, COZY BEAR, (also called Cozy Duke and APT 29) first breached the network in the summer of 2015.

The cybersecurity company FireEye first discovered APT 29 in 2014 and was quick to point out a clear Kremlin connection. “We suspect the Russian government sponsors the group because of the organizations it targets and the data it steals. Additionally, APT29 appeared to cease operations on Russian holidays, and their work hours seem to align with the UTC +3 time zone, which contains cities such as Moscow and St. Petersburg,” they wrote in their report on the group. Other U.S. officials have said that the group looks like it has sponsorship from the Russian government due in large part to the level of sophistication behind the group’s attacks.

25 Jul 2016

WikiLeaks Weaponized By Putin to Influence US Election

, , , ,

PutinTrump

Defense One:

Evidence suggests that a Russian intelligence group was the source of the most recent Wikileaks intel dump, which was aimed to influence the U.S. election.

Close your eyes and imagine that a hacking group backed by Russian President Vladimir Putin broke into the email system of a major U.S. political party. The group stole thousands of sensitive messages and then published them through an obliging third party in a way that was strategically timed to influence the United States presidential election. Now open your eyes, because that’s what just happened.

On Friday, Wikileaks published 20,000 emails stolen from the Democratic National Committee. They reveal, among other things, thuggish infighting, a push by a top DNC official to use Bernie Sanders’ religious convictions against him in the South, and attempts to strong-arm media outlets. In other words, they reveal the Washington campaign monster for what it is.

But leave aside the purported content of the Wikileaks data dump (to which numerous other outlets have devoted considerable attention) and consider the source. Considerable evidence shows that the Wikileaks dump was an orchestrated act by the Russian government, working through proxies, to undermine Hillary Clinton’s Presidential campaign.

“This has all the hallmarks of tradecraft. The only rationale to release such data from the Russian bulletproof host was to empower one candidate against another. The Cold War is alive and well,” Tom Kellermann, the CEO of Strategic Cyber Ventures told Defense One.

Here’s the timeline: On June 14, cybersecurity company CrowdStrike, under contract with the DNC, announced in a blog post that two separate Russian intelligence groups had gained access to the DNC network. One group, FANCY BEAR or APT 28, gained access in April. The other, COZY BEAR, (also called Cozy Duke and APT 29) first breached the network in the summer of 2015.

Cybersecurity company FireEye first discovered APT 29 in 2014 and was quick to point out a clear Kremlin connection. “We suspect the Russian government sponsors the group because of the organizations it targets and the data it steals. Additionally, APT 29 appeared to cease operations on Russian holidays, and their work hours seem to align with the UTC +3 time zone, which contains cities such as Moscow and St. Petersburg,” they wrote in their report on the group. Other U.S. officials have said that the group looks like it has sponsorship from the Russian government due in large part to the level of sophistication behind the group’s attacks.

Read the whole thing.

04 Nov 2012

The Obama Classic Three-Step

, , , , ,

\

Bing West identifies the Obama Administration’s standard methodology for burying a scandal.

The following is a lead story about Benghazi from the Washington Post on November 2:

    U.S. intelligence officials said they decided to offer a detailed account of the CIA’s role to rebut media reports that have suggested that agency leaders delayed sending help. . . . The decision to give a comprehensive account of the attack five days before the election is likely to be regarded with suspicion, particularly among Republicans who have accused the Obama administration of misleading the public.

Suspicion? The accurate word is confirmation.

Identical stories appeared in the Wall Street Journal and the New York Times. The Times explained that, “The account, given by the senior officials who did not want to be identified, provided the most detailed description to date of the C.I.A.’s role.”

So what’s going on here? The national-security staff in the Obama White House has a standard operating procedure. If a military action, such as killing bin Laden, succeeds, then immediately leak selected details to shape the narrative to the political advantage of Mr. Obama. If the action is botched, as in Benghazi, then say nothing and tell the quiescent press that there is no story worth pursuing. If questions persist, the second line of defense is an investigation that wlll drag on for months. For instance, bureaucrats in the Justice Department are still investigating the leaks last spring about the U.S. cooperation with Israel in the software sabotage — cyber warfare — of Iranian centrifuges.

If pesky Fox News persists in asking questions, then the third line of defense is to give the nod to the CIA to leak a diversionary story to favored news outlets and reporters. Thus the leaks to the Washington Post and New York Times showing that CIA operatives did try to rescue their comrades. Then authorize the CIA to go public with the same timeline, further throwing the press off the trail. The New York Times, the recipient of record for White House leaks, published on November 3 a diversionary story on its front page, fixating upon the CIA director, General Petraeus. This implied that the main issue about Benghazi centered around CIA secrecy — a tautology irrelevant to the real cover-up.

The intent is to cause the press and the public to lose interest in a story that seems exhaustively repetitive, while the key issues are never addressed.

Read the whole thing.

02 Nov 2012

Intelligence Officials Leak to Contradict Fox News Libya Reporting

, ,


Past official accounts have been discredited. Will today’s stand up to scrutiny?

Today pushback leaks from “senior US intelligence officials” arrived offering a new version of events which directly contradicts previously-reported accounts on key damaging details.

A major news agency reported:

Just days before the presidential election, U.S. officials are striking back at allegations they failed to respond quickly or efficiently against the deadly attack on the U.S. Consulate in Benghazi, Libya, detailing for the first time a broad CIA rescue effort.

Senior U.S. intelligence officials said Thursday that CIA security officers went to the aid of State Department staff less than 25 minutes after they got the first call for help from the consulate, which was less than a mile from a CIA annex. The detailed timeline provides the first in-depth look at how deeply the CIA was involved in the rescue attempt, and it comes amid persistent questions about whether the Obama administration responded as quickly and effectively as it could to the siege. …

The intelligence officials told reporters Thursday that when the CIA annex received a call about the assault, about a half dozen members of a CIA security team tried to get heavy weapons and other assistance from the Libyans. But when the Libyans failed to respond, the security team, which routinely carries small arms, went ahead with the rescue attempt. At no point was the team told to wait, the officials said.

Instead, they said the often outmanned and outgunned team members made all the key decisions on the ground, with no second-guessing from senior officials monitoring the situation from afar.

The officials spoke on condition of anonymity because they were not authorized to provide intelligence information publicly. …

The officials’ description Thursday of the attack provided details about a second CIA security team in Tripoli that quickly chartered a plane and flew to Benghazi but got stuck at the airport. By then, however, the first team had gotten the State Department staff out of the consulate and back to the CIA annex.

As the events were unfolding, the Pentagon began to move special operations forces from Europe to Sigonella Naval Air Station in Sicily. U.S. aircraft routinely fly in and out of Sigonella and there are also fighter jets based in Aviano, Italy. But while the U.S. military was at a heightened state of alert because of 9/11, there were no American forces poised and ready to move immediately into Benghazi when the attack began.

The Pentagon would not send forces or aircraft into Libya — a sovereign nation — without a request from the State Department and the knowledge or consent of the host country. And Defense Secretary Leon Panetta has said the information coming in was too jumbled to risk U.S. troops.

According to the detailed timeline senior officials laid out Thursday, the first call to the CIA base came in at about 9:40 p.m., and less than 25 minutes later about the team headed to the consulate. En route they tried to get additional assistance, including some heavier weapons, but were unable to get much aid from the Libyan militias.

The team finally got to the consulate, which was engulfed in heavy diesel smoke and flames, and they went in to get the consulate staff out. By 11:30 p.m., all of the U.S. personnel, except Stevens, left and drove back to the annex, with some taking fire from militants along the way.

By that time, one of the Defense Department’s unarmed Predator drones had arrived to provide overhead surveillance.

At the CIA base, militants continued the attack, firing guns and rocket-propelled grenades. The Americans returned fire, and after about 90 minutes, or around 1 a.m., it subsided.

Around that time, the second CIA team, which numbered about six and included two military members, arrived at the airport, where they tried to figure out where Stevens was and get transportation and added security to find him.

Intelligence officials said that after several hours, the team was finally able to get Libyan vehicles and armed escorts, but by then had learned that the ambassador was probably dead and the security situation at the hospital was troublesome. The State Department has said a department computer expert, Sean Smith, also was killed.

The second CIA team headed to the annex, and arrived after 5 a.m., just before the base came under attack again.

According to officials, militants fired mortar rounds at the building, killing two of the security officers who were returning fire. The mortar attack lasted just 11 minutes.

And less than an hour later, a heavily armed Libyan military unit arrived and was able to take the U.S. personnel to the airport.

—————–

The LA Times version makes it clear that today’s unofficial release was intended specifically to contradict Fox News’ reporting of events.

At every level in the chain of command, from the senior officers in Libya to the most senior officials in Washington, everyone was fully engaged in trying to provide whatever help they could,” a senior intelligence official said in a statement. “There were no orders to anybody to stand down in providing support.” …

Fox News asserted in a story last week that CIA managers had ordered agency security officers to “stand down” and remain in their own facility, known as the Annex, when the attack on the diplomatic compound began about 9:40 p.m. and that there was an hour delay before officers disobeyed orders and went to help repel the attack that killed Ambassador J. Christopher Stevens and State Department officer Sean Smith.

Among those who rushed to help was Tyrone Woods, a former Navy SEAL who was part of the CIA security team and who later died in the attacks.

The Fox story also asserted that the CIA “chain of command” refused to pass along requests from its officers for military aid and that special operations forces in nearby Sicily could have been sent to help but were not. Intelligence and Pentagon officials strenuously denied that Thursday.

They insisted there was no viable military option to disrupt what amounted to a series of sporadic attacks in a crowded city full of people sympathetic to the U.S. There were no armed drones in the region and airstrikes were not called for, officials said.

“Let’s say we were able to get an aircraft there. Do you go in and start strafing a populated area without knowing where friend or foe is?” a senior Defense official asked. “If you did that, you could kill the very people you are trying to help.”

A special operations team was sent to Naval Air Station Sigonella in Sicily, but the team arrived after the attack ended, said the senior Defense official, who would not be quoted by name discussing potentially classified information.

Defense Secretary Leon E. Panetta learned of the attack shortly after it began, about 4:30 p.m Eastern time, Defense officials said, and discussed it in a previously scheduled meeting with the president. Obama ordered him to pursue whatever options were feasible, a Defense official said.

Panetta “ordered all appropriate forces to respond to the unfolding events in Benghazi, but the attack was over before those forces could be employed,” Pentagon spokesman George Little said.

Shortly after 11 p.m. a surveillance drone had arrived from elsewhere in Libya — about an hour after it was requested, officials said. But the video feed was not seen by the president, contrary to some news reports. And the feed did not offer analysts a clear understanding of what was happening on the ground, officials said.

After the CIA team arrived at the compound, “over the next 25 minutes, team members approach the compound, attempt to secure heavy weapons [from Libyans], and make their way onto the compound itself in the face of enemy fire,” the senior U.S. intelligence official said.

The senior intelligence official disclosed that the CIA also sent a second six-member team from Tripoli on a chartered plane to help repel the attack. The team included Glen Doherty, another former SEAL, who was later killed when attackers fired mortar rounds at the CIA Annex.

The team arrived around midnight but got bogged down at the airport. Ultimately, it learned that “the ambassador was almost certainly dead” and headed to the agency facility “to assist with the evacuation,” the official said.

It arrived with Libyan support at the Annex at 5:15 a.m., just before mortar rounds began to strike. Woods and Doherty were killed as they fired on militants from the roof. The mortar attack lasted 11 minutes, the official said.

The drone overhead was not armed. Even if it had been, there were no viable targets, officials said.

14 Sep 2012

Ambassador Stevens Was Deliberately Targeted by Al-Qaeda

, , , , , ,

The British Independent today delivered the inside story on the attack on the US consulate in Benghazi and the murder of Ambassador Stevens.

According to senior diplomatic sources, the US State Department had credible information 48 hours before mobs charged the consulate in Benghazi, and the embassy in Cairo, that American missions may be targeted, but no warnings were given for diplomats to go on high alert and “lockdown”, under which movement is severely restricted. …

Eight Americans, some from the military, were wounded in the attack which claimed the lives of Mr Stevens, Sean Smith, an information officer, and two US Marines. …

Senior officials are increasingly convinced, however, that the ferocious nature of the Benghazi attack, in which rocket-propelled grenades were used, indicated it was not the result of spontaneous anger due to the video, called Innocence of Muslims. Patrick Kennedy, Under-Secretary at the State Department, said he was convinced the assault was planned due to its extensive nature and the proliferation of weapons.

There is growing belief that the attack was in revenge for the killing in a drone strike in Pakistan of Mohammed Hassan Qaed, an al-Qa’ida operative who was, as his nom-de-guerre Abu Yahya al-Libi suggests, from Libya, and timed for the anniversary of the 11 September attacks. …

According to security sources the consulate had been given a “health check” in preparation for any violence connected to the 9/11 anniversary. In the event, the perimeter was breached within 15 minutes of an angry crowd starting to attack it at around 10pm on Tuesday night. There was, according to witnesses, little defence put up by the 30 or more local guards meant to protect the staff. Ali Fetori, a 59-year-old accountant who lives near by, said: “The security people just all ran away and the people in charge were the young men with guns and bombs.”

Wissam Buhmeid, the commander of the Tripoli government-sanctioned Libya’s Shield Brigade, effectively a police force for Benghazi, maintained that it was anger over the Mohamed video which made the guards abandon their post. “There were definitely people from the security forces who let the attack happen because they were themselves offended by the film; they would absolutely put their loyalty to the Prophet over the consulate. The deaths are all nothing compared to insulting the Prophet.”

Mr Stevens, it is believed, was left in the building by the rest of the staff after they failed to find him in dense smoke caused by a blaze which had engulfed the building. He was discovered lying unconscious by local people and taken to a hospital, the Benghazi Medical Centre, where, according to a doctor, Ziad Abu Ziad, he died from smoke inhalation.

An eight-strong American rescue team was sent from Tripoli and taken by troops under Captain Fathi al- Obeidi, of the February 17 Brigade, to the secret safe house to extract around 40 US staff. The building then came under fire from heavy weapons. “I don’t know how they found the place to carry out the attack. It was planned, the accuracy with which the mortars hit us was too good for any ordinary revolutionaries,” said Captain Obeidi. “It began to rain down on us, about six mortars fell directly on the path to the villa.”

Libyan reinforcements eventually arrived, and the attack ended. News had arrived of Mr Stevens, and his body was picked up from the hospital and taken back to Tripoli with the other dead and the survivors.

——————————-

Mossad-mouthpiece DebkaFile adds a few details.

Debkafile’s counter-terror sources report exclusively that far from being a spontaneous raid by angry Islamists, it was a professionally executed terrorist operation by a professional Al Qaeda assassination team, whose 20 members acted under the orders of their leader Ayman al Zawahri after special training. They were all Libyans, freed last year from prisons where they were serving sentences for terrorism passed during the late Muammar Qaddafi’s rule.

In a video tape released a few hours before the attack, Zawahri called on the faithful to take revenge on the United States for liquidating one of the organization’s top operatives, Libyan-born Abu Yahya al-Libi in June by a US drone in northwestern Pakistan.

Its release was the “go” signal for the hit team to attack the US diplomats in Benghazi. …

The operation is rated by terror experts as the most ambitious outrage al Qaeda has pulled off in the last decade. According to our sources, the gunmen split into two groups of 10 each and struck in two stages:

1. They first fired rockets at the consulate building on the assumption that the ambassador’s bodyguards would grab him, race him out of the building and drive him to a safe place under the protection of the US secret service;

2. The second group was able to identify the getaway vehicle and the ambassador’s armed escort and lay in wait to ambush them. The gunmen then closed in and killed the ambassador and his bodyguards at point blank range.

Debkafile’s intelligence sources report that the investigation launched by US counter-terror and clandestine services is focusing on finding out why no clue was picked up of the coming attack by any intelligence body and how al Qaeda’s preparations for the attack which took place inside Libya went unnoticed by any surveillance authority.

——————————-

Eleven years after 9/11, al Qaeda clearly retains the ability to plan and execute international operations striking at American citizens and officials.

The success of the attack on the consulate in Benghazi, and the obviously coordinated embassy attacks in Cairo and Yemen, do seem to confirm the validity of complaints from critics of the Obama Administration that the administration’s rush to cash in on the PR results of the success of the raid that killed Osama bin Ladin wasted priceless opportunities to exploit captured intelligence, and leaks from somewhere in the Obama Administration really did do serious harm to American interests.

Now we also learn that, despite specific known threats and with the anniversary date of 9/11 looming, the Obama Administration and its State Department failed to warn Ambassador Stevens and failed to take steps to protect embassies and American diplomatic personnel.

17 Aug 2012

“Dishonorable Disclosures”

, , , , , ,

In this political ad, a variety of retired military and intelligence officers and special forces operatives go after Barack Obama and the Obama Administration for leaking sensitive national security information for political gain.

18 May 2012

Inside Story Worse Than the Rumors

, , , , , ,


John O. Brennan, Deputy National Security Advisor for Homeland Security and Counterterrorism, and Assistant to the President

Michael A. Walsh, in the New York Post, spills the beans on the damaging leak which has seriously compromised relations between British and American intelligence services.

So that “CIA coup” in Yemen against another al Qaeda underwear bomber turns out to actually have been a joint Saudi-British intelligence operation — which apparently was prematurely terminated thanks to flapping lips on this side of the Atlantic.

So the leak didn’t just blow our chances to nail the notorious bomb designer behind the plot, Ibrahim al-Asiri, and put the life of the double agent in mortal danger for no reason.

It also seriously damaged Langley’s relationship with its foreign counterparts, who now understand that operational security and the lives of their operatives mean nothing to us (not in an election year, anyway).

Which makes it even more important to find out: Who leaked?

The betting starts with former CIA official John Brennan, the White House’s deputy nationalsecurity adviser for counterterrorism. Shortly after details about the operation leaked to the Associated Press via unnamed “officials,” Brennan took to the airwaves to crow publicly about how the wedgie bomber was “no longer a threat to the American people.”

And the AP admitted it cleared its story with the feds in advance.

The uncharitable immediately saw this naked self-aggrandizement as a blatant attempt by the Obama administration to take political credit for something it had almost nothing to do with.

Read the whole thing.

03 May 2011

Did Obama Really Decide?

, , , , ,


President Barack Obama and Vice President Joe Biden, along with members of the national security team, receive an update on the mission against Osama bin Laden in the Situation Room of the White House, May 1, 2011. Seated, from left, are: Brigadier General Marshall B. “Brad” Webb, Assistant Commanding General, Joint Special Operations Command; Deputy National Security Advisor Denis McDonough; Secretary of State Hillary Rodham Clinton; and Secretary of Defense Robert Gates. Standing, from left, are: Admiral Mike Mullen, Chairman of the Joint Chiefs of Staff; National Security Advisor Tom Donilon; Chief of Staff Bill Daley; Tony Binken, National Security Advisor to the Vice President; Audrey Tomason Director for Counterterrorism; John Brennan, Assistant to the President for Homeland Security and Counterterrorism; and Director of National Intelligence James Clapper. (click for full-sized image)

Looking at the Times’s photograph (by Pete Souza) of the White House National Security team once again, I am struck by how much Barack Obama appears to be a passive outsider on the sidelines, while the group sitting and standing on the right side of the picture, including Defense Secretary Robert Gates and Secretary of State Hillary Clinton, seems to be in command and in charge.

It’s just an impression I got looking at the photograph, and it may not mean anything, but I then came upon what purports to be a leak from a knowledgeable insider.

This alleged witness claims that Barack Obama was taken in hand by his senior military and intelligence staff and steamrollered into permitting the mission to go ahead.

From Ulsterman via Theo.

HC = Hillary Clinton

BD = Bill Daley

LP = Leon Panetta

CoC = Chain of Command/Commander in Chief

[There was a s]ignificant push to take [bin Laden] out months ago. Senior WH staff resisted. This was cause of much strain between HC and Obama/Jarrett. HC and LP were in constant communication over matter – both attempted to convince administration to act. Administration feared failure and resulting negative impact on president. Intel disgusted over politics over national security. Staff resigned/left. Check timeline to corroborate.

Now Intel already leaking to media facts surrounding how info obtained. Namely from enhanced interrogation efforts via GITMO prisoners. Obama administration placed in corner on this. Some media aware of danger to president RE this and attempting protection. Others looking for further investigation. We are pushing for them to follow through and already meeting with some access.

Point of determination made FOR Obama not BY Obama. Will clarify as details become more clear. Very clear divide between Military and WH. Jarrett marginalized 100% on decision to take out OBL. She played no part. BD worked with LP and HC to form coalition to force CoC to engage.

IMPORTANT SPECIFIC: When 48 hour go order issued, CoC was told, not requested. Administration scrambled to abort. That order was overruled. This order did not originate from CoC. Repeat – this order did not originate from CoC. He complied, but did not originate.

There is no way to know if there is any truth in all this. If so, I expect we will hear more along these lines.

If the report is false, I would say that it was dastardly and outrageous to fabricate such a thing libeling a president who has just made a courageous decision.

I was persuaded to pass it along because the source is right: anti-Obama Intel leaks are popping out all over, identifying the crucial roles played by enhanced interrogations and renditions in making the operation that killed Osama bin Laden possible. I would still file it in the “Interesting, But Not Known to Be True” category.

31 Mar 2011

Our New “Professional” Friends

, , ,

Reuters is reporting a leak disclosing that President Obama signed a finding “within the last two or three weeks” authorizing the covert arming of rebel forces seeking to oust Muamar Qaddafi.

We certainly wouldn’t want weapons we supplied winding up in the wrong hands.

Members of Congress have expressed anxiety about U.S. government activities in Libya. Some have recalled that weapons provided by the U.S. and Saudis to mujahedeen fighting Soviet occupation forces in Afghanistan in the 1980s later ended up in the hands of anti-American militants.

There are fears that the same thing could happen in Libya unless the U.S. is sure who it is dealing with. The chairman of the House intelligence committee, Rep. Mike Rogers, said on Wednesday he opposed supplying arms to the Libyan rebels fighting Gaddafi “at this time.”

“We need to understand more about the opposition before I would support passing out guns and advanced weapons to them,” Rogers said in a statement.

————————————-

But, President Obama assured CBS News that he knows what he’s doing.

Well, first of all, I think it’s important to note that — the people that we’ve met with have been fully vetted. So, we have — a clear sense of who they are. And so far, they’re saying the right things. And most of them are professionals, lawyers, doctors — people who appear to be credible.

Pundit & Pundette responds with this photo from The Guardian:

photo: Anja Niedringhaus
A credible professional brandishes his machete over the heads of captured Subsaharan mercenaries loyal to Qaddafi.

and comments:

Relax: They’re “professionals.”

The enemies of our enemy are doctors and lawyers. I for one am greatly relieved.

Quick — someone from the White House — get that man a labcoat!

Hat tip to Vanderleun.

07 Feb 2011

WikiLeaks Defectors Found OpenLeaks

, , ,

According to the New York Times, Julian Assange’s disgruntled former collaborators objected to his self promotion and flamboyant left-wing politics.

As the WikiLeaks founder Julian Assange fights extradition to Sweden to face allegations of sexual wrongdoing, a dozen of his former colleagues are creating an alternative Web site for leaks to be governed by what they characterize as a revised vision of radical transparency.

The new organization, OpenLeaks, will begin work in earnest this summer, said Herbert Snorrason, an Icelandic programmer who is involved. It aims, he said, to avoid the “influence of a single figurehead” by refusing to handle documents itself. Instead, it will act as a neutral conduit to connect leakers with media and human rights organizations.

OpenLeaks emerges from the ashes of a struggle between Mr. Assange and many of his closest associates last September. About a dozen members of WikiLeaks left that month, accusing Mr. Assange of imperious behavior and of jeopardizing the project by conflating the allegations of sexual wrongdoing, which he denies, with the site’s work. The defectors, Mr. Snorrason said, decided to start their own project.

“It’s no secret that we had disagreements with how WikiLeaks was being managed,” he said, “and a large part of what we hope to accomplish with OpenLeaks is to avoid those problems.” …

Though those behind OpenLeaks are at pains not to criticize Mr. Assange, and have repeatedly made it clear that they do not see themselves as his competitors, their aims address many of the barbs leveled at him, the man who has defined a new era of online mass leaks.

It is partly run by Daniel Domscheit-Berg, a precise programmer from Berlin who was once Mr. Assange’s deputy. Since he left WikiLeaks in September, he has been working on a book which he promises will reveal “the evolution, finances and inner tensions” inside WikiLeaks.

At a recent gathering of the Chaos Computer Club, a hacker community in Berlin, Mr. Domscheit-Berg said OpenLeaks would be neutral and would not rely on secrecy as WikiLeaks does. Those who seek transparency, he said, should “stand in the sunlight ourselves and enjoy that we are creating a more transparent society, not create a transparent society while sneaking around in the shadows.”

The new site must not, he added, “contain any politics and personal preferences or personal dislikes about whatever you’re going to publish or what you must not publish.”

It is not obvious at all why a world that has the New York Times, the Washington Post, Spiegel, and the Guardian needs another venue for leaking official secrets. It also seems likely that any non-establishment media leaking venue would be highly likely to face criminal prosecution by Western governments. If genuinely neutral, the leakers would also be compromising state secrets from non-liberal Western governments, like Russia’s, which would not necessarily restrict negative responses to legal processes. Lots of luck with that, guys.

07 Jan 2011

Former CIA Officer Arrested For Leaking Iran Operations

, , , , , , ,

James Risen‘s source for the MERLIN story has been arrested.

It is a bit ironical, but there can be no doubt that the Obama Administration has been taking a much tougher line with leakers of National Security information than the Bush Administration ever did.

Washington Post:

A former CIA officer involved in spying efforts against Iran was arrested Thursday on charges of leaking classified information to a reporter, continuing the Obama administration’s unprecedented crackdown on the flow of government secrets to the media.

Jeffrey A. Sterling, 43, of O’Fallon, Mo., was charged with 10 felony counts, including obstruction of justice and unauthorized disclosure of national defense information. A federal indictment made public Thursday in the Eastern District of Virginia accuses Sterling of leaking secrets after he was fired from the CIA and the agency refused to settle a racial discrimination claim he made.

The intensified campaign against leaks comes as the U.S. government is confronting a potent new threat to its ability to keep secrets from public view. Over the past year, the WikiLeaks Web site has posted and shared with multiple media organizations thousands of classified U.S. military records and State Department cables.

The indictment, returned under seal last month, does not identify the alleged recipient of the classified information. But former U.S. intelligence officials and lawyers familiar with the case said that the journalist is New York Times reporter James Risen.

The officials said Sterling has long been suspected within the agency of providing Risen with extensive information about CIA efforts to sabotage Iran’s nuclear program, material that is believed to have formed the basis for a prominent chapter in Risen’s 2006 book, “State of War.” …

Other cases brought during the Obama administration include the indictment in April last year of Thomas A. Drake, a former executive at the National Security Agency accused of leaking information to the Baltimore Sun; as well as a State Department contractor indicted last August on charges of leaking information to Fox News.

The latest indictment includes details about dozens of phone calls and e-mails exchanged between Sterling and a journalist identified in the document only as Author A, beginning in 2002.

Sterling was the subject of a lengthy New York Times article by Risen in March of that year that reported Sterling’s assertion that his career had been repeatedly derailed by racial discrimination within the CIA.

Sterling was described in the piece as the “sole black officer” assigned to the Iran Task Force in January 1995. He handled Iranian sources, was subsequently trained in Farsi and was sent to a station in Germany to recruit Iranian spies.

Sterling asserts in the article that he was undermined in that job and that he was passed over for others by senior CIA officials who considered him a liability because of his skin color. At one point, he said, a supervisor told him that he couldn’t function as a spy because “you kind of stick out as a big black guy.”

Sterling, a lawyer who also sparred with senior CIA officials over his plans to publish a memoir, filed a complaint with the CIA’s antidiscrimination office in 2000 and subsequently sued the agency.

According to the indictment, about two weeks after the CIA rejected a third settlement offer from Sterling, he “placed an interstate telephone call” from his home in Herndon to the Maryland residence of Author A.

In subsequent calls and e-mails, the Justice Department alleges, Sterling shared details of sensitive CIA operations against Iran. Among them was a classified effort code-named Merlin that was designed to degrade Iran’s alleged nuclear weapons program by sabotaging materials and blueprints being acquired by Iran.

The indictment indicates that Risen planned to write about the program, which Sterling portrayed as deeply flawed. The New York Times did not publish a story, but details about the Merlin operation appeared in Risen’s book.

One chapter describes a CIA plan to employ a Russian agent to offer Iran nuclear weapons blueprints that contained fatal flaws. But because the flaws were obvious and possible to overcome, the plan risked providing useful information that could “help Iran leapfrog one of the last remaining engineering hurdles blocking its path to a nuclear weapon,” according to the book.

The indictment says that a description of the plan also appeared in drafts of a memoir that Sterling submitted to CIA reviewers. CIA spokesman George Little declined to comment on the case, except to say that the agency “deplores the unauthorized disclosure of classified information.”

Federal authorities pressured Risen at least twice to testify before a grand jury investigating the case. Kelley, Risen’s attorney, said that the reporter declined to comply and that he does not expect Risen to be called as a witness if there is a trial.

According to the indictment, Sterling was aware by 2003 that the FBI was investigating him for alleged illegal disclosure of classified information. In 2004, he filed for bankruptcy protection, listing debts of $150,000.

Sterling was arrested Thursday in St. Louis. U.S. officials said he will remain in custody pending a detention hearing scheduled for Monday. He faces six charges of unauthorized disclosure and retention of national defense information, each carrying a maximum penalty of 10 years in prison. Potential penalties on the remaining four charges include a 20-year prison sentence and a fine of up to $250,000.

EmptyWheel explains that Sterling has sued the CIA twice, and has a timeline.

[The first lawsuit was] an employment discrimination suit filed in NY on August 2, 2000. On April 18, 2002, the CIA first invoked state secrets in his case. On March 7, 2003, the judge in NY granted the CIA’s venue complaint and moved the case to Alexandria, VA–basically the CIA’s very own district court. On March 3, 2004, the case was dismissed. And on September 28, 2005, the Appeals Court rejected Sterling’s appeal.

Sterling’s second suit was filed on March 4, 2003 (that is, the day after his employment discrimination suit was dismissed in VA). It charges that Sterling submitted his memoirs for pre-publication review in 2002. His second submission was held up, not least to give CIA’s Office of General Counsel a review. Sterling claims that OGC got involved to give them an advantage in the NY employment discrimination suit. In December 2002, the CIA told him some of the information was classified (after having earlier said that similar information was not). Upon rejecting his submission on January 3, 2003, the CIA not only told him some of the information was classified, but they “informed Sterling that he should add information into the manuscript that was blatantly false.”

01 Dec 2010

“Every Other Government in the World Knows the United States Government Leaks Like a Sieve”

, , ,

Michael Yon passed along this email from the office of Defense Secretary Robert Gates, in which Gates magisterially dismisses the significance of Julian Assange’s latest revelations.

One of the common themes that I heard from the time I was a senior agency official in the early 1980s in every military engagement we were in was the complaint of the lack of adequate intelligence support. That began to change with the Gulf War in 1991, but it really has changed dramatically after 9/11.

And clearly the finding that the lack of sharing of information had prevented people from, quote/unquote, “connecting the dots” led to much wider sharing of information, and I would say especially wider sharing of information at the front, so that no one at the front was denied — in one of the theaters, Afghanistan or Iraq — was denied any information that might possibly be helpful to them. Now, obviously, that aperture went too wide. There’s no reason for a young officer at a forward operating post in Afghanistan to get cables having to do with the START negotiations. And so we’ve taken a number of mitigating steps in the department. I directed a number of these things to be undertaken in August.

First, the — an automated capability to monitor workstations for security purposes. We’ve got about 60 percent of this done, mostly in — mostly stateside. And I’ve directed that we accelerate the completion of it.

Second, as I think you know, we’ve taken steps in CENTCOM in September and now everywhere to direct that all CD and DVD write capability off the network be disabled. We have — we have done some other things in terms of two-man policies — wherever you can move information from a classified system to an unclassified system, to have a two-person policy there. …

[L]et me just offer some perspective as somebody who’s been at this a long time. Every other government in the world knows the United States government leaks like a sieve, and it has for a long time. And I dragged this up the other day when I was looking at some of these prospective releases. And this is a quote from John Adams: “How can a government go on, publishing all of their negotiations with foreign nations, I know not.”

To me, it appears as dangerous and pernicious as it is novel.”

When we went to real congressional oversight of intelligence in the mid-’70s, there was a broad view that no other foreign intelligence service would ever share information with us again if we were going to share it all with the Congress. Those fears all proved unfounded.

Now, I’ve heard the impact of these releases on our foreign policy described as a meltdown, as a game-changer, and so on. I think — I think those descriptions are fairly significantly overwrought. The fact is, governments deal with the United States because it’s in their interest, not because they like us, not because they trust us, and not because they believe we can keep secrets. Many governments — some governments deal with us because they fear us, some because they respect us, most because they need us. We are still essentially, as has been said before, the indispensable nation.

So other nations will continue to deal with us. They will continue to work with us. We will continue to share sensitive information with one another.

Is this embarrassing? Yes. Is it awkward? Yes. Consequences for U.S. foreign policy? I think fairly modest.

Ouch! One can picture Julian Assange’s flaccid lower lip protruding glumly at being so contemptuously dismissed, and in the middle of his most recent 15 minutes of fame, too.

Your are browsing
the Archives of Never Yet Melted in the 'Leaks' Category.


celebrity_dresses_for_sale1




celebrity_dresses_for_sale1




What:
Where:
Country:
vacatures Netherlands arbeit Deutschland work United Kingdom Lavoro Italia Emploi France trabajo Espana











Feeds
Entries (RSS)
Comments (RSS)
Feed Shark