Saturday, December 20, 2014

CIA: Power Moves Involved in the Overthrow of an Unfriendly Government

CIA: Power Moves Involved in the Overthrow of an Unfriendly Government


NBC News yesterday called her a “key apologist” for the CIA’s torture program. A follow-up New Yorker article dubbed her “The Unidentified Queen of Torture” and in part “the model for the lead character in ‘Zero Dark Thirty.’” Yet in both articles she was anonymous.

The person described by both NBC and The New Yorker is senior CIA officer Alfreda Frances Bikowsky. Multiple news outlets have reported that as the result of a long string of significant errors and malfeasance, her competence and integrity are doubted — even by some within the agency.

The Intercept is naming Bikowsky over CIA objections because of her key role in misleading Congress about the agency’s use of torture, and her active participation in the torture program (including playing a direct part in the torture of at least one innocent detainee). Moreover, Bikowsky has already been publicly identified by news organizations as the CIA officer responsible for many of these acts...

Thursday, December 18, 2014

The FBI Used the Web’s Favorite Hacking Tool to Unmask Tor Users

For more than a decade, a powerful app called Metasploit has been the most important tool in the hacking world: An open-source Swiss Army knife of hacks that puts the latest exploits in the hands of anyone who’s interested, from random criminals to the thousands of security professionals who rely on the app to scour client networks for holes.

Now Metasploit has a new and surprising fan: the FBI. WIRED has learned that FBI agents relied on Flash code from an abandoned Metasploit side project called the “Decloaking Engine” to stage its first known effort to successfully identify a multitude of suspects hiding behind the Tor anonymity network.

That attack, “Operation Torpedo,” was a 2012 sting operation targeting users of three Dark Net child porn sites. Now an attorney for one of the defendants ensnared by the code is challenging the reliability of the hackerware, arguing it may not meet Supreme Court standards for the admission of scientific evidence. “The judge decided that I would be entitled to retain an expert,” says Omaha defense attorney Joseph Gross. “That’s where I am on this—getting a programming expert involved to examine what the government has characterized as a Flash application attack of the Tor network...”

'HAARP' TTA SHOCKS THE WORLD with Ascension Isle Hydroacoustic SOUTH ATL...

Sunday, December 14, 2014

CIA Funding: Never Constrained by its Congressional Budget

Since it first began to be involved in covert operations, the CIA has always been able to draw on funds that were not specifically authorized by Congress for that purpose. Allen Dulles, while still a lawyer at the influential Wall Street firm of Sullivan and Cromwell in New York, was able to arrange for this.

In 1946, General Vandenberg, as Director of Central Intelligence (DCI), recruited Dulles “to draft proposals for the shape and organization of what was to become the Central Intelligence Agency in 1947.” (1) Even earlier, Dulles began campaigning successfully to reconstruct Western Europe through what became known as the Marshall Plan. (2) Together with George Kennan and James Forrestal, Dulles also “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.” (3)

Funds diverted from the Marshall Plan were soon used to establish a ‘compatible left’ labor union in Marseilles with Pierre Ferri-Pisani. On behalf of Brown and the CIA, Ferri-Pisani (a drug smuggler connected with Marseilles crime lord Antoine Guerini), hired goons to shellack striking Communist dock workers.” (4)

The CIA also made systematic use in Asia of self-financing drug trafficking forces to increase its covert influence—in Thailand and Burma, then in Laos and Vietnam, and most recently in Afghanistan. (5) With America’s expansion overseas, we have seen more and more covert programs and agencies, all using drug traffickers to different and opposing ends...

The NYPD’s Use of Long Range Acoustic Devices for Crowd Control

The NYPD’s Use of Long Range Acoustic Devices for Crowd Control

9/11 - Anatomy of a Great Deception - Complete Version

Tuesday, December 9, 2014

An Inside View On The Purpose And Implications Of The Torture Report

While some will, no doubt, be embarrassed by the Senate Intelligence Committee’s report on the CIA’s Detention and Interrogation program, as one of the staffers who helped make the case for the Committee’s investigation when it was initiated in 2009, I can tell you that was not its intention.

(For the record, all I did was help make the initial case for the investigation and maybe put out a press release or two. I am in no way taking credit for the tremendous work that Chairman Feinstein and her committee’s staff did on this report. By the way, I know those staffers did not trek out to the CIA site in Virginia — often in their free time — in search of our thanks and recognition, but I hope you will join me in giving it to them anyway. Because reports like this do not materialize from thin air.)

The dedicated SSCI staff — who spent tens of thousands of hours over the better part of five years researching, writing and editing this report — did so in order to ensure our nation’s interrogation programs would be grounded in what has, for too long, been missing from our nation’s interrogation debate: facts.