Archive | C.I.A

The Six Day War and ‘Israeli’ Lies: What I Saw at the CIA

On too many occasions in U.S. history, the use of force has been justified with either corrupt intelligence or just plain lies.  Such was the case in the Mexican-American War; the Spanish-American War; the Vietnam War; and the 2003 Iraq War.  The checks and balances that were needed to prevent the misuse of intelligence were not operative, and Presidents Polk, McKinley, Johnson, and Bush deceived the American people, the U.S. Congress, and the press.  In 1967, Israeli officials at the highest level lied to the White House about the start of the Six-Day War.

As a junior analyst at the CIA, I helped to draft the report that described Israel’s attack against Egypt on the morning of June 5, 1967.  There were sensitive communications intercepts that documented Israeli preparations for an attack, and no evidence of an Egyptian battle plan.  The Israelis had been clamoring about indications of Egyptian preparations for an invasion, but we had no sign of Egyptian readiness in terms of its air or armored power.  The assumption was that the Israelis were engaging in disinformation in order to gain U.S. support.

My own view was that Egypt would be unlikely to start a war with Israel while half of its army was tied down fighting in a civil war in Yemen.  CIA’s Arabists believed that Egyptian President Nasser was bluffing, and cited the low quality of Cairo’s military equipment.

We were therefore shocked when President Johnson’s national security adviser, Walt Rostow, refused to accept our intelligence assessment on the Israeli attack.  Rostow cited “assurances” from the Israeli ambassador in Washington that under no circumstances would the Israelis attack first.  Over the protests of Israeli defense minister Moshe Dayan, the Israeli government lied to the White House about how the war started.  President Johnson was told that the Egyptians had initiated firing on Israeli settlements and that an Egyptian squadron had been observed heading toward Israeli. Neither statement was true.

whitleblowercia

As a result, our report describing surprise Israeli attacks against Egyptian, Jordanian, and Syrian airfields encountered a hostile response from the National Security Council.  Fortunately, CIA director Richard Helms supported our assessment, and the National Military Command Center corroborated the report as well.  Rostow summoned Clark Clifford, chairman of the President’s Foreign Advisory Board and a leading NSC Arabist Hal Saunders to examine our analysis, and both men provided corroboration.

In addition to lying to the White House about the start of the war, Israeli military officers lied to the American ambassador to Israel, Walworth Barbour, about non-existent Egyptian military movements.  The CIA, meanwhile, had the benefit of satellite photography that showed Egyptian planes parked on airfields wingtip-to-wingtip, which pointed to no plan to attack.

Twenty years later, I learned that a confident of the president, Harry McPherson, was in Israel at the start of the war and accompanied Ambassador Barbour to the meeting with Prime Minister Eshkol.  When Israeli air raid sirens began to wail during the meeting, Israeli intelligence chief General Aharon Yariv assured everyone there was no need to move to an underground bunker.  If we had this information in 1967, it would have corroborated our analysis that the Israelis had destroyed more than 200 Egyptian planes on the ground.

In addition to lying about the start of the war, the Israelis were even more deceitful three days later when they attributed their malicious attack on the USS Liberty to a random accident.  If so, it was a well planned accident.  The ship was a U.S. intelligence vessel in international waters, both slow-moving and lightly armed.  It brandished a five-foot-by-eight-foot Stars and Stripes in the midday sun, and didn’t resemble a ship in any other navy, let alone a ship in the arsenal of one of Israel’s enemies. Yet the Israelis claimed that they believed they were attacking an Egyptian ship.

The Israeli attack took place after six hours of intense, low-level reconnaissance.  It was conducted over a two-hour period by unmarked Mirage jets using cannons and rockets.  Israeli boats fired machine guns at close range at those helping the wounded, then machine-gunned the life rafts that survivors dropped in hope of abandoning the ship.  The NSA investigation of the disaster remains classified to this day.

Posted in USA, C.I.A0 Comments

Trump Moves to Keep CIA Torture Report Secret

NOVANEWS

Sen. Burr Wants All Copies Returned to Ensure They Never Get Out

 

The likelihood of the full version of the 2014 CIA torture report compiled by the Senate Intelligence Committee ever being made public has dropped precipitously, as President Trump has begun returning all copies of the still-classified document to the committee chairman Sen. Richard Burr (R – NC).

Government documents, even classified ones, are supposed to eventually be made public under the Freedom of Information Act, and while the federal government has long gone out of its way to skirt FOIA requirements anyhow, Congress is outright exempt, meaning if they get all the copies, they likely disappear forever.

This is actually a faction fight between Sen. Burr, eager to keep the document secret, and Sen. Dianne Feinstein (D – CA), who chaired the committee when it was written in the first place, and who ordered copies sent to numerous federal agencies specifically so that eventually one of them would release it under a FOIA request.

Burr’s call to recover all the documents is highly unusual, and Trump’s agreement to do so is even more-so. The 6,700 page document excoriated US torture policies after 9/11, and noted that not a single incident of a terrorist attack had been foiled because of the torture.

Posted in USA, C.I.A0 Comments

Who Controls the Information Space and Why

NOVANEWS

By Jean Perier – New Eastern Outlook 

Recently behind-the-scenes rules and restrictions being used by Facebook have fallen into the hands of Guardian reporters. According to their report, moderators employed by the tech giant are entitled to decide what exactly the 2 billion users of this social network can or cannot publish on their pages. This report has provoked a massive discussion on the absence of any ethical norms that could prevent the tech giant from exercising censorship, along with disputes about the determination of US intelligence agencies to spy on their citizens in violation of the USA Freedom Act.

The fact that the US created the Internet as a tool of exercising control over information space, as a convenient environment for espionage, collecting dirty facts and spreading lies has been established long ago. For those naive few who refuse to believe the facts, one can only be reminded of the old saying: There’s no such thing as a free lunchBut who owns the allegedly free Internet? Who created it and why?

According to Reuters, last year alone the US National Security Agency (NSA) intercepted 151 million phone calls of American citizens, in spite of the fact that Congress has allegedly limited the ability to exercise surveillance for intelligence agencies by adopting the USA Freedom Act, according to which courts must decide when to allow intelligence agencies to collect information about a person suspected of criminal activity.

However, the all-encompassing control of US intelligence services over the world’s information space has been uncovered by an unending stream of publications in American and foreign media sources, showing that the United States is grossly violating even the most basic human rights, by creating a system of electronic interception and processing of all sorts of data about users on the Internet.

It wouldn’t be an exaggeration to state that every aspect of our day-to-day lives is being controlled: phone conversations, short text messages, everything we write on social media networks or send via email. Thus, the British Guardian confirmed the existing exchange of information about intercepted electronic messages of both US citizens and British citizens established by US intelligence agencies and the British Government Communications Headquarters. Even British courts recognized that such cooperation that existed for at least seven years is unlawful, since they were carried out in violation of international conventions on human rights.

In addition, the Guardian has also revealed that phone tapping that Mi-5 and Mi-6 authorized in order to intercept private consultations between UK citizens and their lawyers in a bid to guarantee the authorities an upper hand during trials, constitutes a violation of both national laws and international norms.

The Intercept has also revealed that the US National Security Agency (NSA) and its British partners from the Government Communications Headquarters stole the encryption keys of the world’s largest SIM card manufacturer – Gemalto, situated in the Netherlands. This allowed intelligence agencies from both nations ever since to tap all sorts of phone conversations and intercept any data sent via a mobile device carrying a SIM card produced by Gemalto.

In late 2014, the Wall Street Journal has also revealed the practices that allowed US intelligence agencies to record information stored on millions of cell phones across the US through the use of special spyware. Additionally, Wikileaks released CIA documents that show this agency is capable of intercepting messages sent via encrypted message apps such as WhatsApp, Telegram and Signal.

It should be noted that US intelligence agencies have been pretty methodical in the collection of information that in one way or another could be used not just against ordinary citizens, but even against leading political figures. When in October 2013 a scandal erupted with the National Security Agency’s wiretapping of German Chancellor Angela Merkel’s phone, it turned out that the NSA had been carrying out such intrusions for more than ten years by that time. Back then, the scandal was downplayed and no actual changes in those malicious practices were pursued.

So how many more revelations about the total control that US intelligence agencies exercise over information space should be published before Washington’s open mockery of human rights and freedom of speech is finally challenged and stopped?

Posted in USA, C.I.A, Media0 Comments

Your Daily Reminder: The War of Terror is A CIA-Sponsored PsyOp

NOVANEWS

Image result for SAUDI KING CARTOON

Corbett 

While people on both sides of the phoney left/right divide squabble over terrorist boogeymen and Trump’s CIA chief gives Saudi Arabia an award for “counter”terrorism, everyone has lost sight of the bigger picture:

The blithering morons who are the face of international terror are aided, funded, controlled and handled by the intelligence agencies. It is all part of the con to get you scared of your own shadow so the terror-industrial complex can laugh all the way to the bank. Today James breaks down the latest chapter in this never-ending psy-op saga.

SHOW NOTES
CIA honors Saudi Crown Prince for efforts against terrorism
Episode 279 – Who Is Really Behind the Syrian War?
Debunking the 28 Pages
Executive Order: “Protecting” the Nation From Foreign (CIA-sponsored) Terrorist Entry Into The United States
Trump’s Homeland Security Team Likely to Emphasize Facial Recognition and Biometric Surveillance
Chertoff pimps his company’s body scanners in WaPo
Beware the Terror Industrial Complex
Kennedy Admits the Intel Agencies Allowed the Underwear Bomber on the Plane
Interview 1019 – Michael Springmann on Visas for Terrorists

Posted in USA, C.I.A, Saudi ArabiaComments Off on Your Daily Reminder: The War of Terror is A CIA-Sponsored PsyOp

What Is the CIA Hack All About?

NOVANEWS

The danger lies in what might be coming next

Image result for CIA Hack CARTOON

By Philip Giraldi • Unz Review 

The WikiLeaks exposure of thousands of documents relating to the Central Intelligence Agency’s (CIA) hacking program, which was expanded dramatically under President Barack Obama between 2013 and 2016, has created something of a panic in the users of cell phones, online computers and even for smart television viewers. The documents describe “more than a thousand hacking systems, trojans, viruses and other ‘weaponized’ malware” and one document even identifies attempts to enable CIA controllers to take control of automobiles that have “On Star” or similar satellite interactive features.

According to analysts who have gone through the documents, any electronic device that is connected to the internet is reported to be vulnerable to being taken over and “weaponized,” manipulated through its microphone or camera function even if it appears to be turned off. Apple, Google, Android and Microsoft products were among the technologies that were targeted, with the security systems being constantly probed for vulnerabilities. When a flaw was discovered it was described as “zero day” because the user would have zero time to react to the detection and exploitation of the vulnerability.

And they are indeed everywhere. Ron Paul has described a woman’s test on the Amazon marketed interactive voice controlled device called Alexa, asking it if it were reporting to the CIA. Alexa, which allegedly cannot tell a lie, refused to answer.

According to Wikipedia, “Alexa is an intelligent personal assistant developed by Amazon Lab126, made popular by the Amazon Echo. It is capable of voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, playing audiobooks, and providing weather, traffic, and other real time information.” One reviewer observed “In a good but scary feature, Amazon Echo can learn a person’s habits over time. It will get used to the way a person talks, his/her habits and routines and will save all the data in the cloud.”

Alexa demonstrates that CIA and NSA intrusion into the lives of ordinary people is not unique. In the cyber-sphere there are many predators. Amazon has apparently run special sales to get Alexa devices into as many homes as possible, presumably for commercial reasons, to have a machine in one’s home that will eventually replace the cookies on computers that collect information on what people are interested in buying. The company’s president Jeff Bezos also recently completed a deal worth $600 million for Amazon to provide cloud hosting services for the Agency. And there are, of course, two clear conflicts of interest in that deal as Bezos is selling a device that can be hacked by the government while he also owns The Washington Post newspaper, which, at least in theory, is supposed to be keeping an eye on the CIA.

But spying for profit and spying by the government are two different things and the WikiLeaks revelations suggest that the CIA has had a massive program of cyberespionage running for a number of years, even having created a major new division to support the effort called the Directorate for Digital Innovation, with an operation component called the Center for Cyber Intelligence. Media reports also suggest that a major hub for the operation was the American Consulate General in Frankfurt Germany, where the Agency established a base of operations.

First of all, it is necessary to make an attempt to understand why the CIA believes it needs to have the capability to get inside the operating systems of phones and other devices which rely on the internet. It should be pointed out that the United States government already has highly developed capabilities to get at phones and other electronics. It is indeed the principal raison d’etre of the National Security Agency (NSA) to do so and the FBI also does so when it initiates wiretaps during criminal and national security investigations.

Beyond that, since the NSA basically collects all electronic communications in the United States as well as more of the same fairly aggressively overseas, it would seem to be redundant for the CIA to be doing the same thing. The CIA rationale is that it has a different mission than the NSA. It exists to conduct espionage against foreign intelligence targets, which frequently requires being able to tap into their personal phones or other electronic devices by exploiting vulnerabilities in the operating systems. As the targets would be either sources or even prospective agents, the Agency would have to protect their identity in the highly compartmented world of intelligence, making outsourcing to NSA problematical.

This need to develop an independent capability led to the development of new technologies by the CIA working with its British counterparts. There were apparently successful efforts to target Samsung “smart” televisions, which would use their speakers to record conversations even when the set was turned off. The project was called “Weeping Angel,” and other hacking programs were called “Brutal Kangaroo,” “Assassin,” “Hammer Drill,” “Swindle,” “Fine Dining” and “Cutthroat,” demonstrating that government bureaucrats sometimes possess a dark sense of humor.

Being able to enter one’s home through a television would be considered a major success in the intelligence world. And the ability to access cell phones at source through obtaining full control of the operating system rather than through their transmissions means that any security system will be ineffective because the snoopers will be able to intrude and hear the conversation as it is spoken before any encryption is applied. CIA and its British allies were reportedly able to take control of either Android or i-Phones through vulnerabilities in their security systems by using their attack technologies.

WikiLeaks claims to have 8,761 documents detailing efforts to circumvent the security features on a broad range of electronic devices to enable them to be remotely tapped, the information having apparently been passed to WikiLeaks by a disgruntled government contractor, though the Russians are perhaps inevitably also being blamed. The U.S. government has apparently been aware of the theft of the information for the past year and one presumes it has both done damage control and is searching for the miscreant involved. Also, there have been security fixes on both Apple and Android phones in the past year that might well have rendered the attack technologies no longer effective.

So many will shrug and wonder what the big deal is. So the CIA is tapping into the electronics of suspected bad guys overseas. Isn’t that what it’s supposed to do? That question has to be answered with another question: How do we know if that is all the CIA is doing? Technology that can attack and take control of a telephone or television or computer overseas can also do the same inside the United States. And the Agency can always plausibly claim that a connection with a suspect overseas leads back to the U.S. to enable working on related targets on this side of the Atlantic.

Another issue is the possibility to engage in mischief, with potentially serious consequences. The WikiLeaks documents suggest that the CIA program called UMBRAGE had been able to acquire malware signatures and attack codes from Russia, China, Iran and other places. It does that so it can confuse detection systems and preserve “plausible denial” if its intrusion gets caught, disguising its own efforts as Russian or Chinese to cast the blame on the intelligence services of those countries. It has been alleged that the hack of the Democratic National Committee computers was carried out by Moscow employed surrogates and part of the evidence produced was signature malware that had left “fingerprints” linked to Russian military intelligence in Ukraine. What if that hack was actually done by the CIA for domestic political reasons?

Critics have also pointed out that President Obama in 2014 had come to an agreement with major communications industry executives to share with manufacturers information regarding the vulnerabilities in their systems so they could be addressed and made secure. This would have benefited both the industry and the general public. The agreement was obviously ignored in the CIA case and is just another sign that one cannot trust the government.

However, the real downside regarding the CIA hacking is something that might not even have occurred yet. It is an unfortunate reality that government spying operations largely lack regulation, oversight or any effective supervision by Congress or anyone else outside the agencies themselves. Even if knowledge about communications vulnerabilities has not been employed illegally against American targets or to mislead regarding domestic hacks, the potential to use those capabilities once they are in place will likely prove too hard to resist. As such, no home or work environment will any more be considered a safe place and it is potentially, if not actually, the greatest existing threat to Americans’ few remaining liberties.

Posted in USA, C.I.AComments Off on What Is the CIA Hack All About?

A CIA Cyber False Flag

NOVANEWS

Image result for CIA LOGO

By Federico PIERACCINI | Strategic Culture Foundation 

New revelations from Wikileaks’ ‘Vault 7’ leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies.

Reading the revelations contained in the documents released by WikiLeaks and adding them to those already presented in recent years by Snowden, it now seems evident that the technological aspect regarding espionage is a specialty in which the CIA, as far as we know, excels. Hardware and software vendors that are complicit — most of which are American, British or Israeli — give the CIA the opportunity to achieve informational full-spectrum dominance, relegating privacy to extinction. Such a convergence of power, money and technology entails major conflicts of interest, as can be seen in the case of Amazon AWS (Amazon’s Cloud Service), cloud provider for the CIA, whose owner, Jeff Bezos, is also the owner of The Washington Post. It is a clear overlap of private interests that conflicts with the theoretical need to declare uncomfortable truths without the need to consider orders numbering in the millions of dollars from clients like the CIA.

While it is just one example, there are thousands more out there. The perverse interplay between media, spy agencies and politicians has compromised the very meaning of the much vaunted democracy of the land of the Stars and Stripes. The constant scandals that are beamed onto our screens now serve the sole purpose of advancing the deep interest of the Washington establishment. In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and détente between the United States and Russia. In terms of news, the Wikileaks revelations shed light on the methods used by US intelligence agencies like the CIA to place blame on the Kremlin, or networks associated with it, for the hacking that occurred during the American elections.

Perhaps this is too generous a depiction of matters, given that the general public has yet to see any evidence of the hacking of the DNC servers. In addition to this, we know that the origin of Podesta’s email revelations stem from the loss of a smartphone and the low data-security measures employed by the chairman of Hillary Clinton’s presidential campaign. In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations based on the fact that Moscow, together with RT and other media (not directly linked to the Kremlin), finally enjoy a major presence in the mainstream media. The biggest problem for the Washington establishment lies in the revelation of news that is counterproductive to the interests of the deep state. RT, Sputnik, this site and many others have diligently covered and reported to the general public every development concerning the Podesta revelations or the hacking of the DNC.

Now what is revealed through Wikileaks’ publications in Vault 7 is the ability of a subsection of the CIA, known as Umbrage, to use malware, viruses, trojans and other cyber tools for their own geopolitical purposes. The CIA’s Umbrage collects, analyzes and then employs software created variously from foreign security agencies, cyber mafia, private companies, and hackers in general. These revelations become particularly relevant when we consider the consequences of these actions. The main example can be seen in the hacking of the DNC. For now, what we know is that the hacking – if it ever occurred – is of Russian origin. This does not mean at all that the Kremlin directed it. It could actually be very much the opposite, its responsibility falling into the category of a cyber false-flag. One thing is for sure: all 16 US intelligence agencies are of the view that “the Russians did it”. That said, the methods used to hack vulnerabilities cannot be revealed, so as to limit the spread of easily reusable exploits on systems, such as the one that hosted the DNC server. It is a great excuse for avoiding the revelation of any evidence at all.

So, with little information available, independent citizens are left with very little information on which to reliably form an opinion on what happened. There is no evidence, and no evidence will be provided to the media. For politicians and so-called mainstream journalists, this is an acceptable state of affairs. What we are left with instead is blind faith in the 16 spy agencies. The problem for them is that what WikiLeaks revealed with Vault 7 exposes a scenario that looks more likely than not: a cyber false-flag carried out by the Central Intelligence Agency using engineered malware and viruses made in Russia and hypothetically linking them back to hacking networks in Russia. In all likelihood, it looks like the Democrats’ server was hacked by the CIA with the clear objective of leaving Russian fingerprints and obvious traces to be picked up by other US agencies.

In this way, it becomes easier to explain the unique views of all 16 spy agencies. Thus, it is far more likely that the CIA intentionally left fake Russian fingerprints all over the DNC server, thereby misleading other intelligence agencies in promoting the narrative that Russia hacked the DNC server. Of course the objective was to create a false narrative that could immediately be picked up by the media, creating even more hysteria surrounding any rapprochement with Russia.

Diversification of computer systems.

The revelations contained in the Wikileaks vault 7 (less than 1 % of the total data in Wikileaks’ possession has been released to date) have caused a stir, especially by exposing the astonishing complicity between hardware and software manufacturers, often intentionally creating backdoors in their products to allow access by the CIA and NSA. In today’s digital environment, all essential services rely on computer technology and connectivity. These revelations are yet more reason why countries targeted by Washington, like China, Russia, Iran and North Korea, should get rid of European and American products and invest in reducing technological dependence on American products in particular.

The People’s Republic has already started down this track, with the replacement of many network devices with local vendors like Huawei in order to avoid the type of interference revealed by Snowden. Russia has been doing the same in terms of software, even laying the groundwork to launch of its own operating system, abandoning American and European systems. In North Korea, this idea was already put into practice years ago and is an excellent tool for deterrence for external interference. In more than one computer security conference, US experts have praised the capabilities of the DPRK to isolate its Internet network from the rest of the world, allowing them to have strong safety mechanisms. Often, the only access route to the DPRK systems are through the People’s Republic of China, not the easiest way for the CIA or NSA to infiltrate a protected computer network.

An important aspect of the world in which we live today involves information security, something all nations have to deal with. At the moment, we still live in a world in which the realization of the danger and effect of hacking attacks are not apparent to many. On the other hand, militarily speaking, the diversification and rationalization of critical equipment in terms of networks and operability (smartphones, laptops, etc) has already produced strong growth in non-American and European manufacturers, with the aim of making their systems more secure.

This strengthening of technology also produces deleterious consequences, such as the need for intelligence agencies to be able to prevent the spread of data encryption so as to always enjoy access to any desired information. The birth of the Tor protocol, the deployment of Bitcoin, and apps that are more and more encrypted (although the WikiLeaks documents have shown that the collection of information takes place on the device before the information is encrypted) are all responses to an exponential increase in the invasion of privacy by federal or American government entities.

We live in a world that has an enormous dependence on the Internet and computer technology. The CIA over the years has focused on the ability to make sure vulnerable systems are exploited as well as seeking out major security flaws in consumer products without disclosing this to vendors, thereby taking advantage of these security gaps and leaving all consumers with a potential lack of security. Slowly, thanks to the work and courage of people like Snowden and Assange, the world is beginning to understand how important it is to keep personal data under control and prevent access to it by third parties, especially if they are state actors. In the case of national security, the issue is expanded exponentially by the need to protect key and vital infrastructure, considering how many critical services operate via the Internet and rely on computing devices.

The wars of the future will have a strong technological basis, and it is no coincidence that many armed forces, primarily the Russian and Chinese, have opted in recent years toward training troops, and conducting operations, not completely relying on connectivity. No one can deny that in the event of a large-scale conflict, connectivity is far from guaranteed. One of the major goals of competing nations is to penetrate the military security systems of rival nations and be able to disarm the internal networks that operate major systems of defense and attack.

The Wikileaks revelations are yet another confirmation of how important it is to break the technological unipolar moment, if it may be dubbed this way, especially for nations targeted by the United States. Currently Washington dictates the technological capacities of the private and government sectors of Europe and America, steering their development, timing and methods to suit its own interests. It represents a clear disadvantage that the PRC and its allies will inevitably have to redress in the near future in order to achieve full security for its vital infrastructure.

Posted in C.I.A, MediaComments Off on A CIA Cyber False Flag

CIA Trying to Hack Cars for ‘Undetectable Assassinations’

NOVANEWS
Image result for CIA Hack Cars CARTOON

In the explosive “Vault 7” CIA secrets published by WikiLeaks on Tuesday, the organization has warned that the CIA, among a myriad of other intrusive exploits, has been investigating ways to hack and manipulate the control systems of cars and trucks for use in covert operations.

According to WikiLeaks, the CIA’s interest in hacking vehicles is not specified, but could be used in sinister ways, including assassinations.

“As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks,” WikiLeaks said in a statement. “The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

Many current vehicles are now mainly controlled by computer systems — including brake control, air bags, acceleration, steering, door locks, and other vital systems.

In 2014, hackers Charlie Miller and Chris Valasek using their laptops while in the car, took over a Jeep Grand Cherokee driven by a reporter for Wired, as they were traveling on the highway. The demonstration was shocking, and lead to the recall of 1.4 million vehicles. The previous year, hackers compromised a Ford Escape and a Toyota Prius, while sitting in the backseat.

The vehicle hacking reports were contained in the first batch of CIA leaks, titled “Year Zero.” Wikileaks published 8,761 documents and files which they claim are from the CIA’s Center for Cyber Intelligence in Langley, Virginia.

WikiLeaks has a 100-percent track record for publishing authentic documents.

NSA whistleblower Edward Snowden has also chimed in on the issue, tweeting, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

Posted in USA, C.I.AComments Off on CIA Trying to Hack Cars for ‘Undetectable Assassinations’

Russia to blame for ‘every civilian death’ in Syria, Zionist Fallon says

NOVANEWS
Image result for Michael Fallon CARTOON

British Defense Secretary Michael Fallon has accused Russia of being complicit in the ongoing bloodshed in Syria, saying Moscow is to blame for “every civilian death” in a recent suspected chemical attack in the Arab country.

Moscow is responsible “by proxy” for the deaths of civilians as the “principle backer” of the Syrian government, Fallon told British media.

Fallon further accused Russia of not doing enough to stop the conflict that has been raging on since 2011.

“Someone who uses barrel bombs and chemicals to kill his own people simply cannot be the future leader of Syria,” he said of President Bashar al-Assad.

The defense secretary also voiced his support for the US missile strikes that hit an airbase and surrounding villages in the western province of Homs in the early hours of Friday.

On President Donald Trump’s personal order, the US military launched 59 cruise missiles on al-Shayrat airfield in Homs. Trump said the attack was in response to “the Syrian government’s recent chemical attack in Idlib province.”

“By sending Tomahawk missiles to attack the airfield, aeroplane and equipment believed to be involved, it (the US) has sent a strong signal to the Syrian regime to think twice before using gas in the future,” Fallon said.

The remarks came as British Foreign Secretary Boris Johnson cancelled a trip to Russia citing a fundamental change to the situation in Syria.

The visit, on Moscow’s invitation, would have been the first by a top British diplomat in the last five years.

Reports suggest that Johnson will instead work with his American counterpart, Rex Tillerson, on a joint plan to demand Moscow withdraw military support for Damascus.

According to the Kremlin, Syrian jets had struck a terrorist warehouse in Idlib that contained toxic chemicals, leading to a gas leak in the area. More than 80 people were killed in Tuesday’s incident.

Damascus, which categorically denied responsibility for the suspected chemical attack, slammed the missile attack by the US, calling it a clear sign of Washington’s support for terrorism.

The Syrian government also vowed to intensify operations against foreign-backed militants in the country.

The US attack has sparked angry reactions from Russia and several Middle Eastern countries including Iran.

European Union foreign policy chief, Federica Mogherini, said the missile strike was not within the framework of the United Nations.

Posted in USA, C.I.A, Russia, SyriaComments Off on Russia to blame for ‘every civilian death’ in Syria, Zionist Fallon says

Where Was CIA’s Pompeo on Syria?

NOVANEWS

President Trump meeting with his advisers at his estate in Mar-a-Lago on April 6, 2017
By Robert Parry | Consortium News 

There is a dark mystery behind the White House-released photo showing President Trump and more than a dozen advisers meeting at his estate in Mar-a-Lago after his decision to strike Syria with Tomahawk missiles: Where is CIA Director Mike Pompeo and other top intelligence officials?

Before the photo was released on Friday, a source told me that Pompeo had personally briefed Trump on April 6 about the CIA’s belief that Syrian President Bashar al-Assad was likely not responsible for the lethal poison-gas incident in northern Syria two days earlier — and thus Pompeo was excluded from the larger meeting as Trump reached a contrary decision.

At the time, I found the information dubious since Trump, Secretary of State Rex Tillerson and other senior U.S. officials were declaring quite confidently that Assad was at fault. Given that apparent confidence, I assumed that Pompeo and the CIA must have signed off on the conclusion of Assad’s guilt even though I knew that some U.S. intelligence analysts had contrary opinions, that they viewed the incident as either an accidental release of chemicals or an intentional ploy by Al Qaeda rebels to sucker the U.S. into attacking Syria.

As strange as the Trump administration has been in its early months, it was hard for me to believe that Trump would have listened to the CIA’s views and then shooed the director away from the larger meeting before launching a military strike against a country not threatening America.

After the strike against Syria by 59 Tomahawk missiles, which Syrian officials said killed seven people including four children, Trump gave a speech to the American people declaring flatly:

“On Tuesday, Syrian dictator Bashar al-Assad launched a horrible chemical weapons attack on innocent civilians. Using a deadly nerve agent, Assad choked out the lives of helpless men, women, and children. It was a slow and brutal death for so many. Even beautiful babies were cruelly murdered in this very barbaric attack. No child of God should ever suffer such horror.”

As much as Trump stood to benefit politically by acting aggressively in attacking Syria — and thus winning praise even from his harshest critics — the idea that he would ignore the views of the U.S. intelligence community on an issue of war or peace was something that I found hard to believe.

So, I put aside what I had heard from the source about the discordant Pompeo-Trump meeting as the sort of tidbit that may come from someone who lacks first-hand knowledge and doesn’t get all the details right.

After all, in almost every similar situation that I had covered over decades, the CIA Director or the Director of National Intelligence has played a prominent role in decisions that depend heavily on the intelligence community’s assessments and actions.

For instance, in the famous photo of President Obama and his team waiting out the results of the 2011 raid to kill Al Qaeda leader Osama bin Laden, CIA Director Leon Panetta is the one on the conference screen that everyone is looking at.

Even when the U.S. government is presenting false information, such as Secretary of State Colin Powell’s 2003 speech laying out the bogus evidence of Iraq hiding WMDs, CIA Director George Tenet was seated behind Powell to lend credibility to the falsehoods.

At the Table

But in the photo of Trump and his advisers, no one from the intelligence community is in the frame. You see Trump, Secretary of State Tillerson, National Security Adviser H.R. McMaster, White House chief of staff Reince Priebus, strategic adviser Steve Bannon, son-in-law Jared Kushner and a variety of other officials, including some economic advisers who were at Mar-a-Lago in Florida for the meeting with Chinese President Xi Jinping.

However, you don’t see Pompeo or Director of National Intelligence Dan Coats or any other intelligence official. Even The New York Times noted the oddity in its Saturday editions, writing: “If there were C.I.A. and other intelligence briefers around, … they are not in the picture.”

That made me wonder whether perhaps my original source did know something. The claim was that CIA Director Pompeo had briefed Trump personally on the analysts’ assessment that Assad’s forces were not responsible, but – then with Pompeo sidelined – Trump conveyed his own version of the intelligence to his senior staff.

In other words, the other officials didn’t get the direct word from Pompeo but rather received a second-hand account from the President, the source said. Did Trump choose to rely on the smug certainty from the TV shows and the mainstream news media that Assad was guilty, rather than the contrary view of U.S. intelligence analysts?

After the attack, Secretary of State Tillerson, who is not an institutional intelligence official and has little experience with the subtleties of intelligence, was the one to claim that the U.S. intelligence community assessed with a “high degree of confidence” that the Syrian government had dropped a poison gas bomb on civilians in Idlib province.

While Tillerson’s comment meshed with Official Washington’s hastily formed groupthink of Assad’s guilt, it is hard to believe that CIA analysts would have settled on such a firm conclusion so quickly, especially given the remote location of the incident and the fact that the initial information was coming from pro-rebel (or Al Qaeda) sources.

Thus, a serious question arises whether President Trump did receive that “high degree of confidence” assessment from the intelligence community or whether he shunted Pompeo aside to eliminate an obstacle to his desire to launch the April 6 rocket attack.

If so, such a dangerous deception more than anything else we’ve seen in the first two-plus months of the Trump administration would be grounds for impeachment – ignoring the opinion of the U.S. intelligence community so the President could carry out a politically popular (albeit illegal) missile strike that killed Syrians.

 

Posted in C.I.A, SyriaComments Off on Where Was CIA’s Pompeo on Syria?

How the CIA Plants News Stories in the Media ‘VIDEO’

NOVANEWS

Image result for CIA MEDIA CARTOON

Boiling Frogs Post | September 30, 2011

It is no longer disputed that the CIA has maintained an extensive and ongoing relationship with news organizations and journalists, and multiple, specific acts of media manipulation have now been documented. But as long as the public continues to ignore the influence of intelligence agencies in shaping or even fabricating news stories, the agency will continue to be able to set the policy that drives the American war machine at will.

TRANSCRIPT AND SOURCES: https://www.corbettreport.com/?p=22238

 

Posted in C.I.A, MediaComments Off on How the CIA Plants News Stories in the Media ‘VIDEO’

Shoah’s pages

www.shoah.org.uk

KEEP SHOAH UP AND RUNNING

June 2017
M T W T F S S
« May    
 1234
567891011
12131415161718
19202122232425
2627282930