WebProNews

Tag: CIA

  • Five Companies Win CIA Cloud Contract

    Five Companies Win CIA Cloud Contract

    Five companies have been awarded a multibillion-dollar cloud computing contract by the Central Intelligence Agency.

    The CIA has awarded its Commercial Cloud Enterprise (C2E) contract to AWS, Microsoft, Google, IBM and Oracle. The goal of the contract to provide “foundational cloud services, including infrastructure-, platform- and software-as-a-service capabilities, as well as professional services,” according to Nextgov.

    As Nextgov points out, awarding the contract to multiple firms opens the way for multiple companies to serve the intelligence community in mission-critical ways. At the time, AWS has the highest clearance levels, with Microsoft coming in at second place. As the other companies continue working on the contract however, it stands to reason they will eventually qualify for top-secret clearances as well.

    The contract award is also a big win for IBM and Oracle, both of whom are working to establish themselves as top competitors to the Big Three.

  • CIA Opens Door For Amazon Rivals to Bid On Cloud Contracts

    CIA Opens Door For Amazon Rivals to Bid On Cloud Contracts

    Bloomberg is reporting that the CIA is “planning to hire multiple companies for lucrative cloud computing deals,” a move that will likely hurt Amazon.

    Amazon was the first company to gain the coveted Impact Level 6 security certification, allowing it to store classified data in the cloud. This gave the company a huge advantage when bidding on government contracts involving sensitive data. However, Microsoft ultimately beat out Amazon for the Pentagon’s JEDI contract, worth some $10 billion. In December 2019, Microsoft also became the second company to gain the Impact Level 6 certification, opening the door to more competition for Amazon.

    With the CIA’s latest move, however, that door has been flung wide open, giving multiple companies the chance to compete with the leading cloud provider for lucrative and prestigious contracts.

    According to Bloomberg, “the government said the contracts could last up to 15 years with a five-year base period and two five-year renewals. The estimated award date is September 2020.

    “The CIA has previously indicated that it intended to spend ‘tens of billions’ of dollars on cloud computing, Bloomberg has reported. It’s unclear whether the agency has finalized an amount it plans to spend.”

    With analysts already predicting Microsoft could unseat Amazon as the reigning cloud leader, this latest report is not good news for Amazon. With Microsoft expecting a “halo effect” from the JEDI contact, Amazon may well find itself losing a considerable amount of government work.

  • Microsoft Acquires Pentagon Certification, Closes Gap With Amazon

    Microsoft Acquires Pentagon Certification, Closes Gap With Amazon

    According to the Washington Post, Microsoft has achieved Impact Level 6, the Pentagon’s highest IT security certification.

    Prior to December 12, Amazon was the only company to have achieved Impact Level 6. The certification allows a company to store classified data in the cloud. Under normal circumstances, “defense and intelligence agencies typically use air-gapped, local computer networks to store sensitive data rather than the cloud-based systems that most companies now use to harness far-off data centers.”

    As the Washington Post points out, the security clearance helps justify Microsoft beating Amazon for a lucrative Pentagon contract. Amazon, as well as many experts, thought the company was all but guaranteed to win the contract, in part because it was the only company to have Impact Level 6. In addition, the company has previously worked with the CIA, giving it valuable experience with sensitive or classified data. In spite of that, Microsoft managed to secure the contract, worth some $10 billion.

    Amazon has maintained the bidding process was compromised by comments President Trump made and is challenging the results in court. In the meantime, having Impact Level 6 will only help Microsoft as it continues to challenge Amazon for government work.

  • Vladimir Putin Still Using (Long) Unsupported Windows XP

    Vladimir Putin Still Using (Long) Unsupported Windows XP

    One would expect a former KGB officer to use the latest and greatest when it comes to computer security. Evidently, Vladimir Putin disagrees, as he is still relying on Windows XP, according to The Guardian.

    According to the story, “Putin, 67, appears to have the obsolete Microsoft Windows XP operating system installed on computers in his office at the Kremlin and at his official Novo-Ogaryovo residence near Moscow, according to images released by his press service.”

    Evidently, the opposition-friendly, Russian news site Open Media reported “that Mikhail Klimaryov, the head of Russia’s independent Internet Protection Society, had confirmed that Putin’s computers were running Windows XP in the photographs.”

    Microsoft stopped supporting Windows XP, as well as Office 2003, in April 2014. Despite the availability of newer versions of Windows, the Russian government has been trying to phase out Microsoft and Google software in favor of its own Linux distribution. As a result, government regulation is likely behind Putin’s archaic operating system choice.

    On the bright side, at least he’s not subjected to ads in his Windows applications. In other news, the CIA is dusting off its archive of Windows XP exploits.

  • Russian Gov Hackers Were Stealing Info From Dems For Over A Year

    The Washington Post is reporting that Russian government hackers penetrated DNC computers over a year ago and have everything including all email and chat traffic. According to Washington Post sources their main purpose was to steal opposition research about Donald Trump.

    The Post said that Russian spies were also targeting the networks of presidential candidates Hillary Clinton and Donald Trump and some GOP political action committees, but it is unknown if breaches were made at this time.

    From the Washington Post:

    The DNC said that no financial, donor or personal information appears to have been accessed or taken, suggesting that the breach was traditional espionage, not the work of criminal hackers.

    The intrusions are an example of Russia’s interest in the U.S. political system and its desire to understand the policies, strengths and weaknesses of a potential future president — much as American spies gather similar information on foreign candidates and leaders.

    The depth of the penetration reflects the skill and determination of the United States’ top cyber adversary as Russia goes after strategic targets, from the White House and State Department to political campaign organizations.

    Shawn Henry, the president of CrowdStrike and former F.B.I. agent, spoke to MSNBC: “We were able to identify with a very high degree of confidence a group that we have attributed back to the Russian government targeting that D.N.C. network. Foreign intelligence services are constantly interested in political processes.”

    “We were actually called by the DNC through their Counsel when they saw that there were some irregularities,” stated Henry. “They were concerned about a potential breach within their environment. We came in and did our typical incident response, we deployed certain pieces of technology that we use to try to get some visibility into the extent, the depth and breadth of this particular breach. In the course of this working very closely with the staff of the DNC we were able to identify with a very high degree of confidence a group that we have attributed back to the Russian government.”

    Henry added, “We know with certainty, my time in the Bureau, that foreign intelligence services are constantly interested in political processes, their interested in strategies, their interested in foreign policies, ect. The DNC and others have been targeted over the years by this very very sophisticated group with a high degree of capability and some very very sophisticated technology.”

    “Typically on our network we’ve got corporate strategies, email communication, documents, spreadsheets, PDF, calendars, etc.,” commented Henry. “The foreign intelligence services understand and recognize that organizations maintain this information and they’re looking to get any type of advantage as the political process continues to help them better develop their political strategies and to have a deep understanding of candidates. In this particular case, this groups level of sophistication is very very high, very very difficult to detect and they are able to maintain persistence for long periods of time without being uncovered. Because of that ability to remain stealth in the environment they’re able to look at these communications and documents for a protracted period of time.”

  • Popular Songs The CIA Used To Torture Detainees

    One of the most potent ways of torture is without touch: first, confine the detainee in a windowless 6 x 9 ft. solitary cell, shackle them to the wall, leave a bucket for defecating and urination, and blast the Sesame Street theme song on repeat for a full 24 hours.

    The Senate Intelligence Committee’s CIA torture report  revealed the agencies’ assortment of “enhanced interrogation techniques” used in detention facilities on detainees after the Sept. 11, 2011 terrorist attacks on the World Trade Center.

    In 2008, Mother Jones reported a “torture playlist”, based on a leaked interrogation log, chosen by guards and interrogators at Guantanamo Bay.

    The songs include:

    • Christina Aguilera: “Dirrty
    • Drowning Pool: “Bodies
    • Janeane Garofalo/Ben Stiller: chapter from the Feel This Audiobook
    • Matchbox Twenty: “Cold
    • Rage Against the Machine: unspecified songs

    According to the CIA torture report, song repetition was an effective touch-less torture technique used to disorient detainees, induce sleep deprivation, signal the start of interrogations, create a “sense of hopelessness”, and drown out screams. White noise was also administered to manifest sensory deprivation and hallucinations.

    Although the recent CIA torture report itself never mentions specific songs, Andy Worthington, author of The Guantanamo Files, details some of the most popular songs used against detainees. “Hit Me Baby One More Time” by Britney Spears was one of them.

    “You lose the plot and it’s very scary to think that you might go crazy because of all the music, because of the loud noise, and because after a while you don’t hear the lyrics at all, all you hear is heavy banging,” Ruhal Ahmed, a released Guantanamo prisoner, explained to Worthington.

    Songs by Metallica, Eminem’s “Slim Shady” album, Nine Inch Nails, and Queen’s “We Will Rock You” were also mentioned in Worthington’s book.

    Trent Reznor of Nine Inch Nails wrote in a blog post condemning the use of his songs as a form of torture:

    “It’s difficult for me to imagine anything more profoundly insulting, demeaning and enraging than discovering music you’ve put your heart and soul into creating has been used for purposes of torture.”

    For more information on torture techniques, check out this ABC style comic featured on VICE, with text by Oscar Rickett, and illustrations by Krent Able.

  • Andrea Tantaros On CIA Torture: ‘America is Awesome’

    Responding to a declassified CIA torture report concerning post-9/11 detainees, which included mentions of extreme waterboarding and “rectal feeding,” conservative political analyst and commentator Andrea Tantaros declared that “America is awesome.”

    The Senate Intelligence Committee poured $50 million into an investigation of the CIA’s torture tactics of the 119 captured militants after 9/11, and the 499 page report was released Tuesday. The document summarizes methods of torture utilized by CIA operatives that exceeded guidelines authorized by the White House, CIA officials and the Justice Department.

    The report describes severe methods allegedly incorporated by some CIA officers, who “deceived their superiors at the White House, members of Congress and even sometimes their own peers about how the interrogation program was being run and what it had achieved.”

    The report reveals that one detainee died of hypothermia while being shackled to a concrete floor, one was placed in total darkness for 17 days and some were kept awake for up to 180 hours. Waterboarding sessions which lead to repeated near drownings were described, and some prisoners were forced to stand on their broken legs. At least five were subjected to “rectal feeding” and “rectal rehydration.”

    During an appearance on FOX’s Outnumbered, a visibly perturbed Tantaros commented on the released documents – “the United States of America is awesome, we are awesome. We’ve closed the book on torture, and we’ve stopped doing it. And the reason they want to have this discussion is not to show how awesome we are. This administration wants to have this discussion to show us how we’re not awesome.”

    Tantaros added, “Sunlight at the CIA? I’m sorry, that’s one place I don’t need sunlight. I don’t think they need to give me a lot of transparency at the CIA. Look, thousands of Americans were killed after 9/11. The Bush administration did what the American public wanted, and that was do whatever it takes to keep us safe. These terror tactics have been stopped because as a country, we decided we are better than this. Which is my point. Then why are we putting out this memo?”

    Tantaros likewise took her frustration to Twitter:

    Tantaros presently rotates as a co-host on the Fox News Channel program The Five.

  • CIA Joins Twitter to Do Throwback Thursday

    The Central Intelligence Agency, apparently bored out of their collective f*cking minds, has decided to ‘go social.’

    This popped up a couple of hours ago:

    Ok. Not bad. Now read this from the CIA’s official news page:

    Follow us on Twitter @CIA and on Facebook for the latest CIA updates, #tbt (Throwback Thursday) photos, reflections on intelligence history, and fun facts from the CIA World Factbook. You’ll also receive updates on CIA career postings and get the latest glimpse into CIA’s Museum—the best museum most people never get to see. Our social media expansion will put CIA.gov content right at your fingertips.

    Throwback Thursday! Wooooooooooooo!

    Is it weird that I really, really want a “@CIA is following you” Twitter notification?

    Image via Wikimedia Commons

  • ‘Doctor Zhivago’ Used by CIA as Propaganda Tool, Book Reveals

    The CIA praised Boris Pasternak’s novel, Doctor Zhivago, not necessarily because of its literary merits, but because the agency saw it as a propaganda tool during the Cold War, the Washington Post reported Saturday.

    The U.S. intelligence agency viewed Pasternak’s novel as a challenge to Communism, and supporting it as a way to make Soviet citizens question why their government was suppressing one of their greatest writers, according to recently declassified CIA documents that disclose the agency’s involvement in the publication of the book, the Post said.

    The Soviet government had banned the novel in 1958. Recognizing the book’s value as a piece of propaganda then, British intelligence sent the CIA two rolls of film of the pages of Doctor Zhivago, and suggested it be dispersed through the Soviet Union and Eastern Europe.

    “This book has great propaganda value,” a CIA memo to all branch chiefs of the agency’s Soviet Russia Division stated, “not only for its intrinsic message and thought-provoking nature, but also for the circumstances of its publication: we have the opportunity to make Soviet citizens wonder what is wrong with their government, when a fine literary work by the man acknowledged to be the greatest living Russian writer is not even available in his own country in his own language for his own people to read.”

    Pasternak’s romantic epic follows the life of Yuri Zhivago, a physician and poet, and his love for two women through decades of revolutions, wars, civil war and Communist oppression. Doctor Zhivago had a religious tone, and its main character did not follow official Marxist ideology.

    Russian critics denounced Pasternak as a traitor and the Soviet publishing industry would not publish the novel. An Italian literary scout took a copy of the manuscript out of the Soviet Union and an Italian company published Doctor Zhivago in 1957.

    Shortly after the book was published, the CIA became involved, according to recently declassified memos obtained by authors Peter Finn and Petra Couvee in their research for the book The Zhivago Affair: The Kremlin, the CIA and the Battle Over a Forbidden Book.

    Pasternak was later awarded the Nobel Prize in Literature in 1958, and the story was adapted into a critically acclaimed film by David Lean in 1965. The film won five Academy Awards and was nominated for Best Picture.

    The Finn-Couvee book will be released in June.

    Image via Wikimedia Commons

  • Edward Snowden Appears At SXSW; Calls For Better Online Security Measures

    In a rare public appearance, fugitive and National Security Agency whistleblower Edward Snowden addressed the audience of the SXSW conference regarding Internet privacy and surveillance.

    The conference, which was held on Monday in Austin, Texas, put the controversial U.S. intelligence leaker through via Google Hangouts all the way from Russia, where Snowden currently resides. The U.S. Constitution backdrop gave a touch of patriotism to his emphatic speech, which discussed a variety of topics that revolved around the importance of encryption software in people’s private communications.

    Declaring that the NSA was “setting fire to the future of the Internet”, Snowden urged the techie-dominated audience to be more vigilant in “fighting the fire”. Snowden also called for the proactive participation of public advocates from the tech community who will make sure that mass surveillance problems are acknowledged and resolved accordingly.

    The annual event, which lasted an hour, was hosted by Snowden’s lawyer and director of the American Civil Liberties Union’s Speech, Privacy & Technology Project, Ben Wizner. It also featured the comments and opinion of ACLU’s security and privacy researcher Christopher Soghoian who said that services must be secure from the get-go. This means that developers have to be better at anticipating security issues as opposed to simply coming up with ways to deal with them later on.

    Soghoian added that several technology companies have made vast improvements on their security functions ever since Snowden leaked highly classified information on the U.S. government’s spy programs last year. Despite these developments, Soghoian maintained that the advertising-based models of these companies require the collection of user data, which is eventually accessed by the government.

    Snowden concluded his speech by negating rumors that the NSA has broken into popular encryption standards and saying that “encryption does work”. He also declared that he would do what he did again “regardless of what happens” to him because he believed that the U.S. Constitution “was being violated on a massive scale”.

    Watch Snowden speak at SXSW

    Image via YouTube

  • Edward Snowden Elected Rector At University Of Glasgow

    Edward Snowden, who made headlines last year for revealing details about U.S. phone and Internet surveillance, is now the student rector at UK’s Glasgow University. The post is a symbolic one, and is decided by a student election. As rector, Snowden represents the student populace and is expected to work with the student representative council, bring student concerns to the attention of university management, and attend the university court.

    Snowden was nominated by a group of students who had received his prior approval through his legal representative. The group stated that Glasgow University has a tradition of making noteworthy and relevant statements through their rectors. Electing Snowden to the post was their way of showing him and other whistleblowers that they stand in solidarity with them and their cause—in this case, the opposition to surveillance, the immoral and pervasive intrusion by the state into the private lives of its people.

    “Whistleblowers should be honored and they’re heroes rather than traitors,” Lubna Nowak said in an interview. She is part of the student group who nominated Snowden to the post.

    The other nominees to the post were author Alan Bissett, local clergyman Kelvin Holdsworth, and champion cyclist Graeme Obree. Snowden succeeds former Liberal Democrat leader Charles Kennedy. Previous Glasgow University student rectors include Mordechai Vanunu and Winnie Mandela.

    Snowden will hold the post for three years, after which there will be another round of nominations for the next rector. This year’s election was done using a single transferable vote system. During the first round, he received 3,124 votes, and got 3,347 in the second round of voting.

    Snowden, a former analyst for the United States National Security Agency, became known for disclosing classified documents to the media. The documents revealed that the NSA had been running surveillance on Internet use and telecommunications on a global scale. He has been granted temporary asylum in Russia after fleeing the US in May 2013.

    Edward Snowden is elected as rector

    Image via YouTube

  • Edward Snowden: NSA Memo Confirms He Stole Co-Worker’s Password

    According to a memo issued by the National Security Agency to members of Congress, former contractor Edward Snowden may have resorted to stealing his coworkers’ login credentials in order to gain entry to the agency’s highly classified database.  Snowden has denied the accusation and claimed the report to be incorrect.

    The memo also relates how Snowden obtained the Public Key Infrastructure password of an NSA civilian employee by getting him to type it on his work computer. The unnamed employee was not aware that Snowden was able to secure the password, thereby providing him with complete access to confidential NSA information. After a temporary suspension of his security clearance, the agency made it permanent toward the end of last year. The NSA civilian handed his official resignation last month after informing the FBI of the oversight.

    The NSA has also revoked the security clearance of two other individuals connected with the agency due to their involvement in the controversial leakage. The memo also states that one of them is a military member in active duty and the other is an unnamed contractor. They have also been banned from using their official workstations, although their employers maintain discretion over the extent of their accountability.

    Edward Snowden is responsible for what is considered the most important information leak in the history of the United States, according to author Daniel Ellsberg. A computer systems administrator by profession, Snowden used to work for the Central Intelligence Agency and the NSA. He started exposing highly confidential agency data on June 2013 to such well-known publications as The Washington Post and The Guardian.

    Snowden is currently residing in Russia on a yearlong temporary asylum. The US government regards him as a fugitive from justice and his charges include theft of government property and espionage. The NSA memo was first released through the NBC News website and has since been included by the agency in their report to the Judiciary Committee.

    Image via YouTube

  • Robert Levinson Revealed To Be CIA Agent

    In 2007, Robert Levinson went to Kish Island, an Iranian resort, where he was said to have been kidnapped. His family has pleaded for nearly six years for the United States government to save his life and bring him home. Details surrounding his disappearance had been sketchy. It was known that he was a retired FBI agent and it was feared that his service to the government had made him a target.

    However, there was some suspicion that there was more to the story. Had Levinson gone to Iran on a secret mission? This wasn’t known to be the case until Levinson admitted to being in the country as an agent for the CIA. This contradicts previous reports that had Levinson in Iran to conduct private business. It has now been revealed that he in fact sent to Iran to gather intelligence for members of the CIA.

    The Associated Press had information on the matter. In their notes it was stated that three veteran analysts were fired and several individuals were disciplined over the botched mission.

    CNN also claims to have a source close to the ongoing situation that can confirm that Levinson’s allegations of CIA involvement are true.

    It appears that Levinson’s mission was an unauthorized one. Despite this, he remains angry at the Obama administration for abandoning him and not doing enough to make arrangements for his release.

    The revelation of what Levinson called a “rogue mission” raises the question of just how many unapproved missions involving the CIA are currently ongoing in the world. It makes one wary of what the ramifications there may be for American citizens from fallout regarding bad dealings.

    Dealings that Americans aren’t even aware of.

    Image: Help Bob Levinson Facebook

  • Doomsday Cache of Classified Data Raises Fears

    Doomsday Cache of Classified Data Raises Fears

    Intelligence forces from the United States and the United Kingdom are concerned over what is being called a “doomsday cache” relating to a data cloud of highly sensitive, encrypted, and classified information under the control of former NSA contractor, Edward Snowden. The information includes the names of intelligence personnel, present and former U.S. officials (seven in total), and other government-sensitive information. Through Snowden’s employment with Dell Inc. and, eventually, Booz Allen Hamilton, the former NSA contractor was exposed to a wide span of information. Reports claim that Snowden downloaded somewhere between 50,000 and 200,000 NSA and British documents.

    According to website, Cryptome, that published leaked documents prior to WikiLeaks, Snowden has made public around 500 of those documents. The remaining documents are being kept as part of the “doomsday cache” for potential use in the future. However, accessing this data is not an easy, readily-available process. Numerous levels of password-protected steps must be completed in order to reach the viewing phase. This detailed encryption process involves at least three individuals knowing specific passwords that are only active for a limited time period each day. The names and whereabouts of these individuals are unknown.

    According to Glenn Greenwald, who was among the first to interview Snowden, Edward established a system to ensure that information could and would be made public. “If anything happens at all to Edward Snowden, he has arranged for them to get access to the full archives. I don’t know for sure whether has more documents than the ones he has given me… I believe he does.”

    Snowden’s use of multiple parties to maintain passwords was explained by Greenwald. Snowden has “taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published,” Greenwald said.

    In lieu of Time’s most recent poll for person of the year, which placed Edward Snowden as a top contender, the populace has been vocal about how this man known as a modern day “whistleblower” is perceived by the masses in spite of the recent “doomsday cache” concerns.

    [Image Via Wikimedia Commons]

  • Osama bin Laden Raid: New Details Leaked

    While President Barack Obama’s administration prepares to annually declassify the number of people and businesses covered by National Security Agency surveillance, the Washington Post this week divulged details on NSA targeting that helped exterminate al-Qa’ida head honcho Osama bin Laden. The revelation comes from classified documents leaked by NSA-contractor-turned-fugitive Edward Snowden; the documents detail US intelligence budgets for 2013 and only make brief reference to the events surrounding the offensive.

    The May 2011 assault on the compound in Abbottabad, Pakistan in which Bin Laden was killed, is marked as a banner success for US intelligence and the Obama administration. The Post article describes how the documents exposed some of the methods employed by the various agencies involved, including a group of satellites aimed at Pakistan in order to collect electronic and signals intelligence about al-Qa’ida whereabouts. Leading up to the operation, NSA tracked cell phone use of al-Qa’ida operatives and the National Reconnaissance Office collected almost 400 images of the location. Central Intelligence Agency analysts combined that data with other reporting to locate Bin Laden’s hideout. A team of US Navy SEALs conducted the strike and, in the hours afterward, Defense Intelligence Agency analysts confirmed the corpse indeed was Bin Laden. Despite employing the full arsenal of tools and techniques, intelligence provides analysis (not evidence), and US intelligence officials reported to the President that the odds were 40/60 that Bin Laden would be present.

    Flown up with the satellites, an RQ-170 stealth drone collected electronic transmissions and the CIA recruited individuals to try using DNA evidence to identify Bin Laden or his relatives. A Pakistani doctor and public health workers attempted to obtain blood samples through a vaccination program.

    The doctor, Shakil Afridi, is currently confined in a Peshawar jail while awaiting a new trial. Thursday, a Pakistani appeals court overturned a 33-year jail sentence convicting the doctor of “conspiring against the state” by providing funds and medical help to a banned militant group, Lashkar-e-Islam. Afridi denies the charges.

    Washington has been vocal about Afridi’s heroism in the Bin Laden raids and Congress withheld $33 million in aid (assigning $1 million per year of Afridi’s original sentence). Islamabad considers the US operation illegal, which puts a spotlight on Pakistani officials for not taking action, and they consider the doctor a traitor for his involvement. Health workers and vaccination teams have been the victims of increased threats and even killings in the aftermath.

    UK officials reported on Friday that the Snowden-leaked documents confiscated this week at Heathrow airport include over 58,000 classified British files. The documents apparently contain revealing, identifying details of British intelligence workers in-country and abroad. London assesses, based on Snowden’s travel record, that the data was exposed to foreign governments. The materials were obtained under special terrorism authorities from David Miranda who was en route to Brazil. Miranda is the boyfriend of Glen Greenwald, British journalist and the mouthpiece for most of Snowden’s leaks.

    [Image via US Government.]

  • Area 51: CIA Releases Spy Plane Papers; LA Reporter Finds More?

    It’s right out of an “X-Files” episode. But is it true?

    A government agency declassifies information they’ve been sitting on for years. The revelation sparks further controversy. A reporter writes a book about it. It seems the real controversy is just beginning.

    The CIA recently declassified information about a secret military installation in Nevada; a military site approximately the size of Connecticut. According the reports about the CIA releases, the area designated as “Area 51,” was first established as place to build and experiment with more advanced defense technology. The U-2 high-altitude reconnaissance plane and the OXCART project were two such programs the CIA kept under wraps during heightened tensions between the United States and Russia years ago.

    Annie Jacobsen, a Los Angeles Times writer recently wrote a book about Area 51 entitled “Area 51: An Unsensored History.” She says she’s interviewed engineers, pilots, spies, and other personnel, who previous to now, were ordered to keep silent about tests that took place at Area 51. She says she has concluded the U-2 and OXCART projects were not the only reason for the government’s devout secrecy.

    “It stunned me when one of them said it and it made my jaw drop,” she said in an ABC television report. “Everything the myth of Roswell has come to be has an element of truth in it,” she said.

    Roswell, New Mexico was the site of an alleged UFO landing in 1947. For years afterward, people speculated the U.S. government found alien remains in a spacecraft, then hid them away at the Area 51 installation. According to Jacobsen, the spacecraft was not from space at all.

    “There were horribly disfigured children inside about 13 years old,” she said. “They’d been manipulated surgically and genetically to appear as if they were alien.”

    In Jacobsen’s book, she says her sources told her that Joseph Stalin employed infamous Nazi physician, Josef Mengele to surgically alter children in order to make them appear as if they were from outer space, according to the ABC report.  She says the dictator ordered that the children be sent over to the United States.  The plan was to incite a mass panic after the “War of the Worlds” radio scare.

    “One man and four other engineers were the recipients of what they said were the equipment and people inside,” she said. “Two of them were still alive.”

    Some scholars say Jacobsen’s story just isn’t true.  Amy Knight, a Cold-War historian, says there just isn’t any proof.

    “It’s just not conceivable,” she said in an ABC television report. “It is highly unlikely that Mengele would have been drawn in to any agreement with Stalin or the Soviet government.”

    When asked to substantiate her claims, Jacobsen says she need only do her job.

    “I am not sure if it is my job to prove anything, but only to report it,” she said. “And that’s what I did.”

     

     

     

     

     

  • ‘Benghazi Bombshell’: CNN Alleges CIA is Intimidating Operatives to Keep Quiet on Benghazi

    CNN is alleging that the CIA is acting in an “unprecedented attempt to keep Benghazi secrets from ever leaking out.” Apparently, CIA agents have been frequently polygraphed in relation to the Benghazi disaster and repeatedly questioned about the possibility of media leaks of sensitive information. The reporter describes the entire situation as “pure intimidation.”

    The report contains allegations related to “exclusive correspondence obtained by CNN” that sound like Tony Soprano-styled suggestions that anyone who leaks could not only “jeopardize yourself, [but] you jeopardize your family as well.”

    Former CIA operatives have told CNN that the repeated polygraphing typically means that CIA officials are on a “fishing expedition,” but monthly or bi-monthly tests were absolutely “not routine.”

    The Director of the CIA’s Public Affairs office, Dean Boyd, issued a statement that said “The CIA has worked closely with its oversight committees to provide them with an extraordinary amount of information related to the attack on U.S. facilities in Benghazi.”

    The statement went on to say “CIA employees are always free to speak to Congress if they want… The CIA enabled all officers involved in Benghazi the opportunity to meet with Congress. We are not aware of any CIA employee who has experienced retaliation, including any non-routine security procedures, or who has been prevented from sharing a concern with Congress about the Benghazi incident.”

    The CNN news report reveals that the number of Americans on the ground at the time was 35, with 7 seriously wounded during the attack. The CNN source reports 21 Americans were working in the CIA’s Annex building at the time.

    Congressman Frank Wolf (R-VA), who’s district includes the CIA’s headquarters in Langley, Virginia, has repeatedly gone to the House demanding a committee to investigate the failures of Benghazi. No Democrats have signed on, but Wolf says that people tied to contractors initially wanted to talk.

    “People wanted the opportunity, and they wanted to be subpoena’d, which sort of protected them for testifying in Congress,” Wolf said. “Now, that’s all changed.”

    Conor Friedersdorf over at the Atlantic joined the fray, jumping in on the side that wants to know what’s really going on: “… if CNN’s report is correct, the CIA is at minimum trying to hide something huge from Congress, something that CIA agents might otherwise want to reveal — itself a reason for Congress to press hard for information. And if speculation about moving weapons is grounded in anything substantive, that would be an additional reason to investigate what the CIA is doing in Libya. Dozens of CIA agents were apparently on the ground in Benghazi, Libya last September… What I want to know is why.”

    Congressman Wolf also believes a cover-up took place, all in spite of the White House’s and CIA’s repeated denials of all accusations of any kind of cover-up. If you want to watch the CNN special report for yourself, here it is.

  • CIA Deputy Director Michael Morell Retires After 33 Years at the Agency

    After 33 years of service and 3 years at his current title, CIA Deputy Director Michael Morell has decided to step down. The retirement will be official on August 9th.

    Morell says that it is now time for him to spend more time with his family.

    “I am passionate about two things in this world – the Agency and my family. And while I have given everything I have to the Central Intelligence Agency and its vital mission for a third of a century, it is now time for me to give everything I have to my family,” said Morell.

    In his time at the CIA, Morell served as the Presidential Briefer, Associate Deputy Director, Director for Intelligence, Deputy Director, and Acting Director.

    “I will miss many things about this Agency and about the job that I have been blessed with for the last three years. But most of all, I will miss the people – the talented and dedicated officers on the senior leadership team, my colleagues on the Deputies Committee with whom I have spent countless hours in the Situation Room, and, most of all, the CIA workforce – the heroes of this place, the people at the pointy end of the spear, the patriots who do the work of keeping the country safe every day.”

    Morell has been appointed to the President’s Intelligence Advisory Board – a kind of retired intelligence officers’ club that helps advise the White House on important security matters.

    “As much as I would selfishly like to keep Michael right where he is for as long as possible, he has decided to retire to spend more time with his family and to pursue other professional opportunities. In many respects, Michael has come to personify the strengths and qualities of this great organization, and it is difficult for me to imagine CIA without Michael’s exceptionally sharp mind, tremendous energy, and absolute dedication to mission. But I am comforted by the fact that Michael will be able to spend more time with his wonderful family,” said CIA Director John Brennan.

    The CIA announced that Avril Haines will be replacing Morell as Deputy Director. She formerly served as Deputy Assistant to the President and Legal Adviser to the National Security Council. She will be the first woman to hold the position.

  • Kim Dotcom Was Subject To Illegal Surveillance From New Zealand’s CIA

    It’s been relatively quiet on the Megaupload front for the past few weeks. The last major event saw Kim Dotcom winning $4.83 million in his bid to have funds released to him. For now, he’s still fighting to have the charges against him and his company dropped. That fight may have become a little easier as New Zealand’s Prime Minister, John Key, revealed that the Government Communications Security Bureau acted without his consent in the weeks leading up to Dotcom’s arrest.

    For a little background information, the GCSB is essentially the CIA in New Zealand. They are a task force dedicated to the interception of information from terrorists, criminals and the like. They are required to have a warrant when intercepting foreign information, but New Zealand law says that the organization is not allowed to spy on domestic citizens or residents.

    Prime Minister Key revealed that he had not been made aware of any ongoing investigation into the Dotcom case. It’s required by New Zealand law that any GCSB operation be signed off by the Prime Minister. Key said that he had not been informed of the GCSB’s involvement in the Dotcom case until today.

    Warrants have been an ongoing issue in the Dotcom case since the beginning. The legality of the warrant used by police during the raid on Dotcom’s mansion had been called into question numerous times since his arrest, but a judge finally declared the warrant illegal in late June.

    In response to the allegations that the GCSB acted illegally, Prime Minister Key has opened up an investigation into the matter. He doesn’t believe that the organization intentionally violated the law with their actions, but he wants to know the extent of their actions.

    Dotcom’s U.S. lawyer, Ira Rothken, is also requesting the investigation look into U.S. involvement. He told Bloomberg that Dotcom’s legal team wants to know if the “U.S. was aiding or abetting domestic spying in New Zealand.”

    For his part, Dotcom has been tweeting about the revelation that he had been subject to illegal surveillance:

    [h/t: NZ Herald]

  • Israel, U.S. Team Up To Create Flame Computer Virus

    Back in the mid-2000’s The need to start to keep Iran’s nuclear goals in check was obvious. So the United States, led by George Bush, and Israel started to develop a massive piece of malware that secretly mapped and monitored Iran’s computer networks, sending back a steady stream of intelligence to prepare for a cyber­warfare campaign. This virus, called Flame, is believed to be the first sustained campaign of cyber-sabotage against an adversary of the United States.

    “This is about preparing the battlefield for another type of covert action,” said one former high-ranking U.S. intelligence official, who added that Flame and Stuxnet were elements of a broader assault that continues today. “Cyber-collection against the Iranian program is way further down the road than this.”

    The Flame virus was first revealed last month when Iranian officials detected a cyber attack on its oil refineries. The United States was not too happy that Israel decided to launch this phase of their attack without notifying American officials. In doing so they have effectively wiped out a virus that has been quietly doing its job for 5 plus years.

    The Flame virus seems to be a precursor to the now infamous Stuxnet virus that directly effected almost 1,000 centrifuges and caused them to spin out of control. The damage occurred gradually, over months, and Iranian officials initially thought it was the result of incompetence.

    “The scale of the espionage and sabotage effort is proportionate to the problem that’s trying to be resolved,” the former intelligence official said. “Although Stuxnet and Flame infections can be countered, it doesn’t mean that other tools aren’t in play or performing effectively.”

    It is not yet clear the extent of the United Staes’ involvement in the development in making the virus, but it is believed that the U.S. relied on its 2 top spy agencies: The C.I.A. and the N.S.A.. The NSA, known mainly for its electronic eavesdropping and code-breaking capabilities, has extensive expertise in developing malicious code that can be aimed at U.S. adversaries, including Iran. The CIA lacks the NSA’s sophistication in building malware but is deeply involved in the execution of the cyber-campaign.

    The disruptions from the Americans and Israelis has led the Iranians to ask a Russian security firm and a Hungarian cyber-lab for help.

    So it looks as though any questions about Iran’s true intentions are already known by our government because this virus has been sending back info for years. The U.S. will know the day Iran gains the ability to build a nuclear weapon and they will put a stop to it.

  • Taliban And Polio: Vaccine Drive Halted Due To CIA Fears

    The Taliban has halted the polio vaccination campaign that was scheduled to be distributed to over 161,000 children starting on Wednesday, citing worries that the U.S. drone strikes are indicative of a possible undercover CIA operation tied to the vaccine campaign.

    The fears stem from an operation last year in which the CIA acted with Dr. Shakil Afridi, who used the vaccine campaign as a means to try and flush out Osama bin Laden with a door-to-door drive in Abbottabad. Dr. Afridi has been convicted for his part in the operation and was sentenced to 33 years by a tribal court.

    Polio is still heavily prevalent in Pakistan, most notably in the North Waziristan tribal belt; this is where Pakistani officials are focusing their crackdown since the U.S. drone strikes. Taliban leader Hafiz Gul Bahadur says no vaccines will be given until he gets assurances that the drone strikes will cease.

    Polio ran rampant in Pakistan last year; almost 200 new cases were reported last year, the highest amount at that time in the world. UNICEF says 143,000 of the area’s 161,000 children were reached by the last round of vaccinations earlier this year, which were given from June 4th to the 6th, but the ban on the upcoming round will hamper all their work.

    The CIA has come under fire in recent years by aid workers for their use of health care providers in their operations, saying it only leads to undue suspicion towards the people who really just want to help.

    Dr. Muhammad Sadiq, the North Waziristan surgeon general, said he had received Taliban orders to cancel the vaccination drive and is only carrying out his duty.

    “Under these circumstances, we cannot continue,” he said in a telephone interview.