FBI WATCH MAKING CRUELTY VISIBLE

Moderators: Elvis, DrVolin, Jeff

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Fri Nov 08, 2013 2:46 am

see link for full story

http://investigations.nbcnews.com/_news ... 2-election

Agent feared FBI was stalling Petraeus investigation until after 2012 election

A veteran FBI counterterrorism agent repeatedly raised concerns last year that senior bureau officials were stalling an investigation into then-CIA Director David Petraeus’ extramarital affair to avoid a distraction prior to the 2012 presidential election, according to a former FBI official and two sources with direct knowledge of the agent’s account.

New details about the claims of Fred Humphries, a 17-year FBI veteran who is assigned to the bureau’s Tampa office, are expected to be included in a legal filing soon by Jill Kelley, a Tampa Bay socialite who became embroiled in the Petraeus investigation. NBC News independently learned how Humphries raised concerns about possible interference in the investigation with a former senior bureau official and Republican lawmakers, arguing that it could pose a potential national security risk.

Kelley, who had close social connections to a wide array of senior U.S. military and intelligence officials, many of whom she met at parties she threw at her home, is suing current and former Obama administration officials for allegedly leaking her name and smearing her reputation after the case became public. Kelley’s lawsuit threatens to force a re-examination of the details of Petraeus’ resignation and to require a number of key players — including former Defense Secretary Leon Panetta, Deputy FBI Director Sean Joyce (who announced his resignation this week), Homeland Security Secretary nominee Jeh Johnson and many others — to answer questions under oath.

Petraeus resigned as CIA director one year ago this week after an FBI “cyberstalking” investigation into harassing emails sent to Kelley uncovered a sexual relationship between the CIA director and his biographer, Paula Broadwell.

Humphries’ claims about high-level interference from FBI headquarters were raised in multiple conversations last year with his former boss, Charles Mandigo, a former special agent in charge of the FBI’s Seattle office, where Humphries had previously been assigned. Mandigo then helped arrange for Humphries to raise his concerns with two Republican members of Congress, including House Majority Leader Rep. Eric Cantor, R-Va.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Sat Nov 09, 2013 1:21 am

see link for full story
http://www.independent.co.uk/news/world ... 29976.html

I, Robprof: FBI feared much-loved science fiction author Isaac Asimov was Soviet agent

Friday 08 November 2013


Isaac Asimov was one of America’s most prolific and best-loved science fiction authors, publishing more than 500 volumes in a career that spanned five decades.

But newly released papers show that, in the 1960s, he was unknowingly embroiled in intrigue more suited to a John Le Carre novel, as the FBI investigated him on suspicion of being a Soviet spy.

Never-before-seen documents reveal that the agency acted to investigate Asimov in 1965 receiving a leaked US Communist Party list which included the I, Robot author’s name. The list was of individuals who had either been contacted by the party or were considered “possibly amenable to such as supporters”.

There were no notations behind the writer’s name and the informant – the New England District chairman of the US Communist Party – said he “could not determine why his name was listed or whether he had been contacted”.

The FBI files on Asimov show that the agency scrutinised his records to see if he was a notorious Soviet informant codenamed Robprof. Asimov had been working as a biochemist at Boston University for more than a decade, and the FBI memo reviewed his work in academia to see if he could be Robprof who, they said, was a “noted person in the field of microbiology”.

“[The FBI office in] Boston is not suggesting that Asimov is Robprof,” the memo commented, “But it should be considered as a possibility in light of his background, which contains information inimical to the best interests of the United States.”

The FBI continued to monitor Asimov for at least the next two years. In 1967 a memo in the files noted a change of address, as well as checks on his credit history and criminal record. Those, and his immigration files, failed to unearth any issues. That marked the last note in Asimov’s FBI file.

News of the FBI’s suspicions about the sci-fi writer’s political leaning emerged after the US open government campaign group MuckRock put in a freedom of information request to see his FBI file.

The request also turned up the suspicions of an unnamed informer who accused Asimov of being a communist.

The source wrote to J Edgar Hoover, the first director of the FBI, in 1960: “Asimov may be quite all right. On the other hand … ” He enclosed his correspondence with Asimov and said his reason for airing his suspicions was “because I question the position he takes with respect to the first nuclear power plants being built by Soviet Russia”. In fact, Asimov was correct: the USSR had built the first nuclear reactor.

Despite the later scrutiny of Asimov, at this stage Hoover dismissed the anonymous writer’s concerns and returned the correspondence with pamphlets on communism. He noted to himself: “We have no particular interest in these observations”.

Asimov is seen as one of the most important science fiction writers in history, possibly best known for his Foundation series. He drew up the Three Laws of Robotics, which govern how artificial intelligence should behave.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Sun Nov 10, 2013 11:47 pm

see link for full story
http://www.bendbulletin.com/apps/pbcs.d ... ry=NEWS01#


FALCON OUT OF PRISON
November 10. 2013 4:00AM PST
Chris Boyce — who sold secrets to the Soviets, robbed more than a dozen banks and served two decades in prison — holds Higher Power, the name of his gyrfalcon, near his home in Central Oregon on Friday. Boyce, 60, has been interested in falconry most of his life and frequently hunts with his bird. It's part of what drew him to the area, somewhere he could do his hobby. “Because of my background and I'm kind of a loner anyway, I keep to myself. To me, going out and flying falcons is like going to church. Central Oregon, to me, every day is a Sunday."
more photos more photos | order photo

Chris Boyce — who sold secrets to the Soviets, robbed more than a dozen banks and served two decades in prison — holds Higher Power, the name of his gyrfalcon, near his home in Central Oregon on Friday. Boyce, 60, has been interested in falconry most of his life and frequently hunts with his bird. It's part of what drew him to the area, somewhere he could do his hobby. “Because of my background and I'm kind of a loner anyway, I keep to myself. To me, going out and flying falcons is like going to church. Central Oregon, to me, every day is a Sunday."
Joe Kline / The Bulletin

On crisp fall days so common in Central Oregon, Chris Boyce likes to take his falcon out to open lands and watch him soar.

After spending more than two decades surrounded by the cement of prison walls, you'd forgive the 60-year-old for wanting a little space around him.

“When I go out there on the grasslands and I put that falcon up into the air and watch it climb up into the clouds, I'm forever grateful," Chris said. “I love it here. I love flying falcons here. I love our little house. I love working in the yard and our flower garden. ... I've found a peace here in Central Oregon."

Let's back up some 35 years. Maybe you've read the book or seen the movie “The Falcon and The Snowman."

Chris Boyce is the Falcon.



Chris was released from prison in September 2002.

They married the following month, and shortly thereafter discovered Central Oregon on a fishing trip with the Boyce family to the Metolius River. His parents lived in the area for a decade. Chris' father, an FBI agent before working as the security director for McDonnell Douglas, an aerospace manufacturer and defense contractor, dedicated much of his retirement to fly-fishing.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Mon Nov 11, 2013 12:01 am

The U.S. Secret State and the Internet: “Dirty Secrets” and “Crypto Wars” from “Clipper Chip” and ECHELON to PRISM
By Tom Burghardt
Global Research, November 10, 2013
Antifascist Calling and Global Research


Back in the 1990s, security researchers and privacy watchdogs were alarmed by government demands that hardware and software firms build “backdoors” into their products, the millions of personal computers and cell phones propelling communication flows along the now-quaint “information superhighway.”

Never mind that the same factory-installed kit that allowed secret state agencies to troll through private communications also served as a discrete portal for criminal gangs to loot your bank account or steal your identity.

To make matters worse, instead of the accountability promised the American people by Congress in the wake of the Watergate scandal, successive US administrations have worked assiduously to erect an impenetrable secrecy regime backstopped by secret laws overseen by secret courts which operate on the basis of secret administrative subpoenas, latter day lettres de cachet.

But now that all their dirty secrets are popping out of Edward Snowden’s “bottomless briefcase,” we also know the “Crypto Wars” of the 1990s never ended.

Documents published by The Guardian and The New York Times revealed that the National Security Agency “actively engages the US and IT industries” and has “broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.”

“Those methods include covert measures to ensure NSA control over setting of international encryption standards,” The Guardian disclosed, along with “the use of supercomputers to break encryption with ‘brute force’, and–the most closely guarded secret of all–collaboration with technology companies and internet service providers themselves.”

According to The New York Times, NSA “had found ways inside some of the encryption chips that scramble information for businesses and governments, either by working with chipmakers to insert back doors or by surreptitiously exploiting existing security flaws, according to the documents.”

In fact, “vulnerabilities” inserted “into commercial encryption systems” would be known to NSA alone. Everyone else, including commercial customers, are referred to in the documents as “adversaries.”

The cover name for this program is Project BULLRUN. An agency classification guide asserts that “Project BULLRUN deals with NSA’s abilities to defeat the encryption used in specific network communication technologies. BULLRUN involves multiple sources, all of which are extremely sensitive. They include CNE [computer network exploitation], interdiction, industry relationships, collaboration with other IC entities, and advanced mathematical techniques.”

In furtherance of those goals, the agency created a “Commercial Solutions Center (NCSC) to leverage sensitive, cooperative relationships with industry partners” that will “further NSA/CSS capabilities against encryption used in network communications technologies,” and already “has some capabilities against the encryption used in TLS/SSL. HTTPS, SSH, VPNs, VoIP, WEBMAIL, and other network communications technologies.”

Time and again, beginning in the 1970s with the publication of perhaps the earliest NSA exposé by Ramparts Magazine, we learned that when agency schemes came to light, if they couldn’t convince they resorted to threats, bribery or the outright subversion of the standard setting process itself, which destroyed trust and rendered all our electronic interactions far less safe.

Tunneling underground, NSA, telcos and corporate tech giants worked hand-in-glove to sabotage what could have been a free and open system of global communications, creating instead the Frankenstein monster which AT&T whistleblower Mark Klein denounced as a “Big Brother machine.”

The Secret State and the Internet

Five years after British engineer Tim Berners-Lee, Belgian computer scientist Robert Cailliau and their team at CERN developed a system for assembling, and sharing, hypertext documents via the internet, which they dubbed the World Wide Web, in 1994 the Clinton administration announced it would compel software and hardware developers to install what came to known as the “Clipper Chip” into their products.

The veritable explosion of networked communication systems spawned by the mass marketing of easy-to-use personal computers equipped with newly-invented internet browsers, set off a panic amongst political elites.

How to control these seemingly anarchic information flows operating outside “normal” channels?

In theory at least, those doing the communicating–academics, dissidents, journalists, economic rivals, even other spies, hackers or “terrorists” (a fungible term generally meaning outsider groups not on board with America’s imperial goals)–were the least amenable users of the new technology and would not look kindly on state efforts to corral them.

As new communication systems spread like wildfire, especially among the great unwashed mass of “little people,” so too came a stream of dire pronouncements that the internet was now a “critical national asset” which required close attention and guidance.

President Clinton’s Commission on Critical Infrastructure Protection released a report that called for a vast increase in funding to protect US infrastructure along with one of the first of many “cyberwar” tropes that would come to dominate the media landscape.

“In the cyber dimension,” the report breathlessly averred, “there are no boundaries. Our infrastructures are exposed to new vulnerabilities–cyber vulnerabilities–and new threats–cyber threats. And perhaps most difficult of all, the defenses that served us so well in the past offer little protection from the cyber threat. Our infrastructures can now be struck directly by a variety of malicious tools.”

And when a commercial market for cheap, accessible encryption software was added to the mix, security mandarins at Ft. Meade and Cheltenham realized the genie would soon be out of the bottle.

After all they reasoned, NSA and GCHQ were the undisputed masters of military-grade cryptography who had cracked secret Soviet codes which helped “win” the Cold War. Were they to be out maneuvered by some geeks in a garage who did not share or were perhaps even hostile to the “post-communist” triumphalism which had decreed America was now the world’s “indispensable nation”?

Technological advances were leveling the playing field, creating new democratic space in the realm of knowledge creation accessible to everyone; a new mode for communicating which threatened to bypass entrenched power centers, especially in government and media circles accustomed to a monopoly over the Official Story.

US spies faced a dilemma. The same technology which created a new business model worth hundreds of billions of dollars for US tech corporations also offered the public and pesky political outliers across the political spectrum, the means to do the same.

How to stay ahead of the curve? Why not control the tempo of product development by crafting regulations, along with steep penalties for noncompliance, that all communications be accessible to our guardians, strictly for “law enforcement” purposes mind you, by including backdoors into commercially available encryption products.

Total Information Awareness 1.0

Who to turn to? Certainly such hush-hush work needed to be in safe hands.

The Clinton administration, in keeping with their goal to “reinvent government” by privatizing everything, turned to Mykotronx, Inc., a California-based company founded in 1983 by former NSA engineers, Robert E. Gottfried and Kikuo Ogawa, mining gold in the emerging information security market.

Indeed, one of the firm’s top players was Ralph O’Connell, was described in a 1993 document published by Computer Professionals for Social Responsibility (CPSR) as “the father of COMSEC” and the “Principle NSA Technical Contact” on Clipper and related cryptography projects.

A 1993 Business Wire release quoted the firm’s president, Leonard J. Baker, as saying that Clipper was “a good example of the transfer of military technology to the commercial and general government fields with handsome cost benefits. This technology should now pay big dividends to US taxpayers.”

It would certainly pay “big dividends” to Mykotronx’s owners.

Acquired by Rainbow Technologies in 1995, and eventually by Military-Industrial-Surveillance Complex powerhouse Raytheon in 2012, at the time the Los Angeles Times reported that “Mykotronx had been privately held, and its owners will receive 1.82 million shares of Rainbow stock–making the deal worth $37.9 million.”

The Clipper chip was touted by the administration as a simple device that would protect the private communications of users while also allowing government agents to obtain the keys that unlocked those communications, an early manifestation of what has since become know as law enforcement’s alleged “going dark” problem.

Under color of a vague “legal authorization” that flew in the face of the 1987 Computer Security Act (CSA), which sought to limit the role of the National Security Agency in developing standards for civilian communications systems, the administration tried an end-run around the law through an export ban on Clipper-free encryption devices overseen by the Commerce Department.

This wasn’t the first time that NSA was mired in controversy over the watering down of encryption standards. During the development of the Data Encryption Standard (DES) by IBM in the 1970s, the agency was accused of forcing developers to implement changes in the design of its basic cipher. There were strong suspicions these changes had weakened the algorithm to such a degree that one critical component, the S-box, had been altered and that a backdoor was inserted by NSA.

Early on, the agency grasped CSA’s significance and sought to limit damage to global surveillance and economic espionage programs such as ECHELON, exposed by British and New Zealand investigative journalists Duncan Campbell and Nicky Hager.

Before the 1987 law was passed however, Clinton Brooks, a Special Assistant to NSA Director Lieutenant General William Odom, wrote a Top Secret Memorandum which stated: “In 1984 NSA engineered a National Security Decision Directive, NSDD-145, through the Reagan Administration that gave responsibility for the security of all US information systems to the Director of NSA, removing NBS [National Bureau of Standards] from this.”

Conceived as a follow-on to the Reagan administration’s infamous 1981 Executive Order 12333, which trashed anemic congressional efforts to rein-in America’s out-of-control spy agencies, NSDD-145 handed power back to the National Security Agency and did so to the detriment of civilian communication networks.

Scarcely a decade after Senator Frank Church warned during post-Watergate hearings into government surveillance abuses, that NSA’s “capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter . . . there would be no place to hide,” the agency was at it with a vengeance.

“This [NSDD-145] also stated,” Brooks wrote, “that we would assist the private sector. This was viewed as Big Brother stepping in and generated an adverse reaction” in Congress that helped facilitate passage of the Act.

Engineered by future Iran-Contra felon, Admiral John Poindexter, President Reagan’s National Security Adviser who would later serve as President George W. Bush’s Director of DARPA’s Information Awareness Office, the Pentagon satrapy that brought us the Total Information Awareness program, NSDD-145 stated that the “Director, National Security Agency is designated the National Manager for Telecommunications and Automated Information Systems Security.”

NSA’s new mandate meant that the agency would “act as the government focal point for cryptography, telecommunications systems security, and automated information systems security.”

Additionally, NSA would “conduct, approve, or endorse research and development of techniques and equipment for telecommunications and automated information systems security for national security information.”

But it also authorized the agency to do more than that, granting it exclusive authority to “review and approve all standards, techniques, systems and equipments for telecommunications and automated information systems security.” As well, NSA was directed to “enter into agreements for the procurement of technical security material and other equipment, and their provision to government agencies, where appropriate, to private organizations, including government contractors, and foreign governments.”

In other words, NSA was the final arbiter when it came to setting standards for all government and private information systems; quite a coup for the agency responsible for standing-up Project MINARET, the Cold War-era program that spied on thousands of antiwar protesters, civil rights leaders, journalists and members of Congress, as recently declassified documents published by the National Security Archive disclosed.

NSA Games the System

Although the Computer Security Act passed unanimously by voice vote in both Houses of Congress, NSA immediately set-out to undercut the law and did so by suborning the National Bureau of Standards, now the National Institute of Standards and Technology (NIST).

The battle over the Clipper Chip would be the template for future incursions by the agency for the control, through covert infiltration, of regulatory bodies overseeing civilian communications.

According to the Clinton White House, Clipper “would provide Americans with secure telecommunications without compromising the ability of law enforcement agencies to carry out legally authorized wiretaps.”

Neither safe nor secure, Clipper instead would have handed government security agencies the means to monitor all communications while giving criminal networks a leg up to do the same.

In fact, as the Electronic Privacy Information Center (EPIC) discovered in documents unearthed through the Freedom of Information Act, the underlying algorithm deployed in Clipper, Skipjack, had been developed by NSA.

Cryptography expert Matt Blaze wrote a now famous 1994 paper on the subject before the algorithm was declassified, Protocol Failure in the Escrowed Encryption Standard: “The EES cipher algorithm, called ‘Skipjack’, is itself classified, and implementations of the cipher are available to the private sector only within tamper-resistant modules supplied by government-approved vendors. Software implementations of the cipher will not be possible. Although Skipjack, which was designed by the US National Security Agency (NSA), was reviewed by a small panel of civilian experts who were granted access to the algorithm, the cipher cannot be subjected to the degree of civilian scrutiny ordinarily given to new encryption systems.”

This was precisely as NSA and the Clinton administration intended.

A partially declassified 1993 NSA memo noted that “there will be vocal public doubts expressed about having a classified algorithm in the device we propose for the US law enforcement problem, the CLIPPER chip, we recommend the following to address this.” We don’t know what those agency recommendations were, however; more than 20 years after the memo was written they remain secret.

The memo continued: “If such people agree to this clearance and non disclosure process, we could go over the algorithm with them to let them develop confidence in its security, and we could also let them examine the detail design of the CLIPPER chip made for the US law enforcement problem to assure themselves that there were no trapdoors or other techniques built in. This would likely require crypto-mathematicians for the algorithm examination and microelectronics chip design engineers for the chip examination.”

But the extreme secrecy surrounding Skipjack’s proposed deployment in commercial products was the problem. Even if researchers learned that Clipper was indeed the government-mandated backdoor they feared, non-disclosure of these facts, backed-up by the threat of steep fines or imprisonment would hardly assure anyone of the integrity of this so-called review process.

“By far, the most controversial aspect of the EES system,” Blaze wrote, “is key escrow.”

“As part of the crypto-synchronization process,” Blaze noted, “EES devices generate and exchange a ‘Law Enforcement Access Field’ (LEAF). This field contains a copy of the current session key and is intended to enable a government eavesdropper to recover the cleartext.”

“The LEAF copy of the session key is encrypted with a device-unique key called the ‘unit key,’ assigned at the time the EES device is manufactured. Copies of the unit keys for all EES devices are to be held in ‘escrow’ jointly by two federal agencies that will be charged with releasing the keys to law enforcement under certain conditions.”

What those conditions were however, was far from clear. In fact, as we’ve since learned from Snowden’s cache of secret documents, even when the government seeks surveillance authorization from the FISA court, the court must rely on government assurances that dragnet spying is critical to the nation’s security. Such assurances, FISA court judge Reggie B. Walton noted, were systematically “misrepresented” by secret state agencies.

That’s rather rich considering that Walton presided over the farcical “trial” that upheld Bush administration demands to silence FBI whistleblower Sibel Edmonds under the state secrets privilege. Edmonds, a former contract linguist with the Bureau charged that top FBI officials had systematically covered-up wrongdoing at its language division and had obstructed agents’ attempts to roll-up terrorist networks before and after the 9/11 provocation, facts attested to by FBI whistleblower Coleen Rowley in her 2002 Memo to then-FBI Director Robert Mueller.

In 2009, Walton wrote that “The minimization procedures proposed by the government in each successive application and approved and adopted as binding by the orders of the FISC have been so frequently and systemically violated that it can fairly be said that this critical element of the overall BR regime has never functioned effectively.”

“The Court,” Walton averred, “must have every confidence that the government is doing its utmost to ensure that those responsible for implementation fully comply with the Court’s orders. The Court no longer has such confidence.”

Predating those critical remarks, a heavily-redacted 1993 Memo to then-Special Assistant to the President and future CIA chief, George Tenet, from FBI Director William Sessions noted that NSA “has developed a new encryption methodology and computer chip which affords encryption strength vastly superior to DES [Digital Encryption Standard], yet which allows for real time decryption by law enforcement, acting pursuant to legal process. It is referred to as ‘Clipper’.”

[Two redacted paragraphs] “if the devices are modified to include the ‘Clipper’ chip, they would be of great value to the Federal, state and local law enforcement community, especially in the area of counter narcotics, investigations, where there is a requirement to routinely communicate in a secure fashion.”

But even at the time Sessions’ memo was written, we now know that AT&T provided the Drug Enforcement Administration “routine access” to “an enormous AT&T database that contains the records of decades of Americans’ phone calls,” The New York Times reported, and had done so since 1987 under the auspices of DEA’s Hemisphere Project.

Furthermore, in the wake of Snowden revelations we also learned that listening in on the conversations of drug capos is low on NSA’s list of priorities. However, programs like X-KEYSCORE and TEMPORA, which copies all data flowing along fiber optic cables, encrypted and unencrypted alike, at petabyte scales, is supremely useful when it comes to building profiles of internet users by intelligence agencies.

This was an implicit goal of Clinton administration maneuvers to compel developers to insert Clipper into their product designs.

According to Sessions, “the ‘Clipper’ methodology envisions the participation of three distinct types of parties.” [Redacted] It is proposed that the second party, the two custodians of the ‘split’ key infostructure [sic], be comprised of two disinterested and trustworthy non law enforcement Government agencies or entities. Although, such decision and selection are left for the Administration, a list of reccommended [sic] agencies and entities has been prepared (and included in the text), [redacted]. This party would administer and oversee all facets of the ‘Clipper’ program and methodology.”

Based on NSDD-145′s mandate, one can assume “this party” would be NSA, the agency that designed the underlying algorithm that powered Clipper.

The Sessions memo averred: “The Clipper chip provides law enforcement access by using a special chip key, unique to each device. In the AT&T TSD 3600, a unique session key is generated, external to the Clipper chip for each call.”

“This session key,” the memo explained, “is given to the chip to control the encryption algorithm. A device unique ‘chip key’ is programmed into each Clipper at the time of manufacture. When two TSD 3600s go to secure operation, the device gives out its identification (ID) number and the session key encrypted in its chip key.”

Underlining a key problem with Clipper technology Sessions noted, “Anyone with access to the chip key for that identified device will be able to recover the session key and listen to the transmission simultaneously with the intended receiver. This design means that the list of chip keys associated with the chip ID number provides access to all Clipper secured devices, and thus the list must be carefully generated and protected. Loss of the list would preclude legitmate [sic] access to the encrypted information and compromise of the list could allow unauthorized access.”

In fact, that “anyone” could include fabulously wealthy drug gangs or bent corporations with the wherewithal to buy chip keys from suborned government key escrow agents!

Its ubiquity would be a key selling-point for universal deployment. The memo explained, “the NSA developed chip based ‘Clipper’ solution works with hardware encryption applications, such as those which might be used with regard to certain telecommunications and computers devices,” which of course would allow unlimited spying by “law enforcement.”

Such vulnerabilities built into EES chip keys by design not only enabled widespread government monitoring of internet and voice traffic, but with a few tweaks by encryption-savvy “rogues” could be exploited by criminal organizations.

In his 1994 paper Blaze wrote that “a rogue system can be constructed with little more than a software modification to a legal system. Furthermore, while some expertise may be required to install and operate a rogue version of an existing system, it is likely that little or no special skill would be required to install and operate the modified software.”

“In particular,” Blaze noted, “one can imagine ‘patches’ to defeat key escrow in EES-based systems being distributed over networks such as the Internet in much the same way that other software is distributed today.”

In the intervening years since Blaze observed how easy it would be to compromise key escrow systems by various bad actors, governments or criminals take your pick, the proliferation of malware powered botnets that infect hundreds of thousands of computers and smart phones every day–for blanket surveillance, fraud, or both–is a fact of life.

It didn’t help matters when it emerged that “escrow agents” empowered to unlock encrypted communications would be drawn from the National Institute of Standards and Technology and the Automated Services Division of the Treasury Department, government outposts riddled with “No Such Agency” moles.

As EPIC pointed out, “Since the enactment of the Computer Security Act, the NSA has sought to undercut NIST’s authority. In 1989, NSA signed a Memorandum of Understanding (MOU) which purported to transfer back to NSA the authority given to NIST.”

The MOU required that NIST request NSA’s “assistance” on all matters related to civilian cryptography. In fact, were NIST and NSA representatives on the Technical Working Group to disagree on standards, the ultimate authority for resolving disputes would rest solely with the Executive Branch acting through the President, the Secretary of Defense and the National Security Council, thus undercutting the clear intent of Congress when they passed the 1987 Computer Security Act.

EPIC noted:

“The memorandum effectively returned to NSA many of the powers rejected by the Computer Security Act. The MOU contained several key goals that were to NSA’s benefit, including: NSA providing NIST with ‘technical security guidelines in trusted technology, telecommunications security, and personal identification that may be used in cost-effective systems for protecting sensitive computer data;’ NSA ‘initiating research and development programs in trusted technology, telecommunications security, cryptographic techniques and personal identification methods’; and NSA being responsive to NIST ‘in all matters related to cryptographic algorithms and cryptographic techniques including but not limited to research, development, evaluation, or endorsement’.”

A critique of the Memorandum in 1989 congressional testimony by the General Accounting Office (GAO) emphasized: “At issue is the degree to which responsibilities vested in NIST under the act are being subverted by the role assigned to NSA under the memorandum. The Congress, as a fundamental purpose in passing the act, sought to clearly place responsibility for the computer security of sensitive, unclassified information in a civil agency rather than in the Department of Defense. As we read the MOU, it would appear that NIST has granted NSA more than the consultative role envisioned in the act.”

Five years after the GAO’s critical appraisal, NSA’s coup was complete.

“In 1994,” EPIC noted,

“President Clinton issued Presidential Decision Directive (PDD-29). This directive created the Security Policy Board, which has recommended that all computer security functions for the government be merged under NSA control.”

Since PDD-29 was issued matters have only gotten worse. In fact, NIST is the same outfit exposed in Snowden documents published by The Guardian and The New York Times that allowed NSA to water down encryption and build backdoors into the Dual EC DRBG standard adopted by the Institute in 2006.

“Eventually, NSA became the sole editor.”

Besieged by widespread opposition, the Clinton administration was out maneuvered in the court of public opinion and by 1996 had abandoned Clipper. However, this proved to be a pyrrhic victory for security-minded researchers and civil libertarians as we have since learned from Edward Snowden’s revelations.

Befitting a military-intelligence agency, the dark core of America’s deep state, NSA was fighting a long war–and they were playing for keeps.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Mon Nov 11, 2013 1:41 am

The FBI should be investigated

Says Livio Di Celmo, brother of the young Italian killed by a bomb placed in a Havana hotel by order of Posada Carriles

BY JEAN-GUY ALLARD — Granma International staff writer—

BY failing to act after receiving information from businessman Antonio Álvarez, who exposed Posada Carriles as he was directing the 1997 attacks in Havana, “by not acting on this information, the FBI becomes, then, another entity to add to the list of those directly and indirectly responsible for terrorism-related activities and as such should be investigated, denounced and exposed for the all world to see.”

That was the affirmation of Livio Di Celmo, brother of Fabio Di Celmo, victim of a bomb explosion on Sept. 4, 1997 in the Hotel Copacabana in the Cuban capital.

In an interview with GI, the Italian-born Canadian explained how, after reading the article by Ann Louise Bardach published on Nov. 12 The Washington Post, he became convinced that if the FBI had used Álvarez’ information like it should have, the attack could have been prevented.

Álvarez shared an office in Guatemala with buddies of Posada and had alerted the FBI regarding anti-Cuba terrorist activities that were going on before his very eyes.

“Reading that intelligence-related detectives in the Miami MDPD force have family ties with anti-Castro right-wing extremists (involved in bombings, etc..); the fact that Ed Pesquera (son of Hector Pesquera FBI director in Florida in 2003) has destroyed key evidence relating to Carriles in the summer of 2003, clearly point out a level of corruption, criminal intent, and obstruction of justice that show the degenerated level of American institutions.”

Fabio di Celmo’s brother said that “the level of corruption at Miami FBI has played a crucial role in the terrorist acts” that were carried out at that time in Cuba. “...It is evident, even to a child, that had not the FBI in Miami been infiltrated by Cuban-American terrorists (with Pesquera and his friends), and had the FBI acted on the information they had, perhaps Fabio would still be alive.”

According to Livio di Celmo, the problem does not lie solely with the FBI but also in U.S. policy toward Cuba.

“...If institutions such the FBI, CIA or Justice Department have been so much infiltrated by supporters of terrorism against Cuba, we must look at the role played by the Bush family,” Livio said, commenting that the Bush clan maintains “a tradition of fostering and courting terrorism,” and he noted the relationship between Prescott Bush – grandfather of the current U.S. president – and the Nazis in Germany.

In addition, Livio di Celmo said he was outraged by the four-year sentence handed down to Santiago Álvarez and Osvaldo Mitat: “I wonder: if they were Arabs caught with all these weapons, what sentence would they get?”
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Fri Nov 15, 2013 12:48 am

see link for full story
http://www.theindychannel.com/news/loca ... rn-charges

FBI agent gets 140 months for information leaks, child porn charges
Don Sachtleben pleaded guilty to charges
11/14/2013

INDIANAPOLIS - A former FBI agent from Carmel was sentenced Thursday after pleading guilty to charges of leaking national security information and child pornography.

Don Sachtleben, 55, was sentenced to 140 months in prison plus 10 years of supervised release.

Sachtleben took full responsibility for leaking classified information to a national reporter, including sensitive details about a bomb recovered in a thwarted Al-Qaeda plot.

"Information like this gives up techniques and procedures that our enemies use to hurt us," FBI Special Agent Bob Jones said. "So anytime somebody knows that this is what we do to prevent something like that, it gives them the advantage."

Sachtleben also admitted to distributing child pornography. He had more than 600 images of minors under the age of 12 at his Carmel home. Officials said he shared pictures of 19 of the victims with people around the world.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Fri Nov 15, 2013 2:28 am

see link for full story
http://www.huffingtonpost.com/2013/11/1 ... hare_ended
The FBI Doesn't Want You To Know Why It Won't Tell You Its Secrets

11/14/2013

The FBI is going long to keep its secret files on animal rights activists a secret: It is fighting public records requests about why it keeps denying public records requests.

It's a deeply meta strategy that's also like the set-up for an Abbott and Costello routine -- but to Ryan Shapiro, the MIT doctoral candidate profiled in Mother Jones on Wednesday as "the punk rocker who can liberate your FBI file," it's nothing new.

For years, Shapiro and the agency have engaged in a tug-of-war over how many records the FBI will release to enable his academic research on the history of the animal rights movement. Since 2010, Shapiro has barraged the agency with records requests. He says he now has roughly 600 records requests open and is fighting for the release of 350,000 pages of files -- which likely makes him the agency's most prolific requester (or tormentor).

The federal Freedom of Information Act is supposed to force bureaucracies to reveal upon request the records their tax dollars have paid for. But agencies -- particularly the FBI -- often fight releases for months or years.

So transparency advocates are forced to go to court. In one of his five ongoing lawsuits against the FBI, Shapiro wants to force the agency to turn over the "search slips" it produces when it slow-walks his records requests.

"Basically you can file on a [Freedom of Information Act request] -- you can FOIA a FOIA -- and it gives you insight into how an analyst handles your request," said Jason Leopold, a journalist at Al Jazeera America who often collaborates with Shapiro because Shapiro is so adept at navigating the bureaucratic hurdles the agency throws up. The search slips, Leopold said, often provide "the additional information as a reporter I can use to turn the request into a story."

The FBI, for its part, claims that releasing the search slips would reveal sensitive law enforcement techniques. Shapiro is playing connect-the-dots, but the agency considers it quite dangerous: Mother Jones reported that in a court filing responding to a separate lawsuit, the agency claimed releasing his requests could create a "mosaic" of information that could "significantly and irreparably damage national security."

"This is flatly absurd. Sadly though, it’s not surprising," Shapiro said of the FBI's resistance to his FOIA of FOIAs.

The FBI declined to comment on the lawsuit to The Huffington Post.

Shapiro's lawsuit is ongoing, and it is not clear when the judge overseeing the case might issue a ruling. The FBI has been slow to provide an explanation of how releasing the search slips might jeopardize law-enforcement techniques.

So for now, even the FBI's logic behind keeping secrets about its secrets is secret.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Tue Nov 19, 2013 1:08 pm

If the FBI agents keeps you scared they bring home a weekly paycheck,eh?
Booh! Did I scare you? So this is how you allow your tax dime to be spent.

In three steps. As always see link for each step.

Step 1.
http://www.deadlinedetroit.com/articles ... ouXYOInXYQ
Documentary on the Detroit Sleeper Cell that Wasn’t


DETROIT — It’s been about a decade since the “Detroit Sleeper Cell” case imploded and ended up being a big embarrassment to the Justice Department and the FBI.

You might recall, shortly after Sept. 11, 2001, four men were charged in Detroit with operating a sleeper cell that was plotting to pull off terrorist acts. In 2003, two of the four men were convicted of terrorism charges.

But the defense learned that the government withheld information that might have helped their clients, and eventually in 2004 U.S. District Judge Gerald Rosen vacated the terrorism convictions. Essentially, the judge concluded the case was nonsense.
- See more at: http://ticklethewire.com/#sthash.6f66yHe3.dpuf

Step 2
http://www.motherjones.com/politics/201 ... onson-book

Inside the Terror Factory
Award-winning journalist Trevor Aaronson digs deep into the FBI’s massive efforts to create fake terrorist plots.

—By Trevor Aaronson
| Fri Jan. 11, 2013

Editor's note: This story is adapted from The Terror Factory, Trevor Aaronson's new book documenting how the Federal Bureau of Investigation has built a vast network of informants to infiltrate Muslim communities and, in some cases, cultivate phony terrorist plots. The book grew from Aaronson's award-winning Mother Jones cover story "The Informants" and his research in the Investigative Reporting Program at the University of California-

Step 3
http://www.deseretnews.com/article/6601 ... tml?pg=all


Nichols says bombing was FBI op

Detailed confession filed in S.L. about Oklahoma City plot


Feb. 22 2007






The only surviving convicted criminal in the April 19, 1995, bombing of the Alfred P. Murrah Federal Building in Oklahoma City is saying his co-conspirator, Timothy McVeigh, told him he was taking orders from a top FBI official in orchestrating the bombing.

A declaration from Terry Lynn Nichols, filed in U.S. District Court in Salt Lake City, has proven to be one of the most detailed confessions by Nichols to date about his involvement in the bombing as well as the involvement of others.

The declaration was filed as part of Salt Lake City attorney Jesse Trentadue's pending wrongful death suit against the government for the death of his brother in a federal corrections facility in Oklahoma City. Trentadue claims his brother was killed during an interrogation by FBI agents when agents mistook his brother for a suspect in the Oklahoma City bombing investigation.

The most shocking allegation in the 19-page signed declaration is Nichols' assertion that the whole bombing plot was an FBI operation and that McVeigh let slip during a bout of anger that he was taking instruction from former FBI official Larry Potts.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Thu Dec 05, 2013 1:48 pm

The FBI Sensitive Informant Program is a taxpayer funded FBI program where FBI agents and FBI informants
are assigned to work for members of Congress and the US Senate; for members of the US Supreme Court; in radio television and print media; to spy on and control these organizations and individuals.


SEE LINK FOR VIDEO AND FULL STORY


http://bobmccarty.com/2013/12/05/everyt ... t-program/

Redacted in 4-Page Document About the FBI’s ‘Sensitive Informant Program’
December 5, 2013

Salt Lake City attorney Jesse Trentadue has received three heavily-redacted batches of recently-declassified documents from the FBI in recent days as partial responses to his ongoing quest for materials related to the Bureau’s “Sensitive Informant Program.” The most recent document, however, could qualify as the most-heavily-redacted document ever offered in response to a Freedom of Information Act request. Everything — four pages in all — is redacted! See pics below.

OKC FBI TRANSP 1 OKC FBI TRANSP 2

OKC FBI TRANSP 3OKC FBI TRANSP 4

In an email message Thursday morning, Trentadue describes this latest set of documents as “certainly in line with the Administration’s position on FOIA and the need for ‘transparency.’”

Trentadue has sought details about the “Sensitive Informant Program” in an effort to learn more about the brutal death of his brother, Kenneth Trentadue, under suspicious circumstances while in custody at the U.S. Bureau of Prisons Federal Transfer Center in Oklahoma City in 1995 and about the connection he believes exists between his brother’s death and the investigation of the Oklahoma City Bombing.

As I reported in a Nov. 21 update to this post, federal Judge Clark Waddoups has set May 5, 2014, as the date on which a new Oklahoma City Bombing trial will begin in the U.S. District Court for the District of Utah, Central Division. The trial will begin at 8:30 a.m. local time, is expected to last three days and could produce some bombshells.

To learn more about Trentatude’s long-running legal battle with the FBI, watch the chilling one-hour video below:
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Fri Dec 06, 2013 2:34 am

see link for full story
http://www.examiner.com/article/retired ... a-two-case


Retired detective contradicts his own trial testimony in Omaha Two case



December 5, 2013

Retired police sergeant Robert Pfeffer contradicted his own court testimony in the prosecution of the Omaha Two, Edward Poindexter and Mondo we Langa (formerly David Rice), for the murder of policeman Larry Minard, Sr. On Dec. 5, Nebraskans for Justice released a previously unpublished confidential interview that was conducted over ten years ago with the former detective.

Pfeffer has now given four accounts of his role in the purported discovery of dynamite in the basement of Mondo we Langa’s home. Mondo and Poindexter were officers in Omaha’s affiliate chapter of the Black Panthers and were convicted for the 1970 bombing murder of Minard. The 1971 trial, where Pfeffer’s first version of events was aired, was tainted by the withholding of exculpatory evidence from the FBI crime laboratory under orders of J. Edgar Hoover.

Hoover directed an illegal clandestine counterintelligence operation codenamed COINTELPRO against domestic political activists. As leaders of the local Black Panthers, the Omaha Two, as the men are now known, were targets of Paul Young, the Special Agent-in-Charge of the Federal Bureau of Investigation, acting under orders from Hoover to get the pair off the streets.

Officer Minard had been lured to his death by an anonymous call about a woman screaming in a vacant house. Instead, only a suitcase bomb filled with dynamite waited for the eight responding patrolmen. The FBI role in the case under COINTELPRO operations was to withhold a written report on the identity of the anonymous caller recorded by the 911 system and have the FBI crime laboratory guide the Omaha investigation.

At the1971 trial, Robert Pfeffer testified he never went into the basement and first saw dynamite as fellow detective Jack Swanson was carrying it up the stairs. Swanson said he found the explosives in a cubbyhole in an old coal bin.

Swanson was the Omaha police liaison with the FBI and also maintained his own cache of dynamite at a quarry in rural Council Bluffs, Iowa. Swanson took custody of the dynamite after seven boxes of explosives were seized from three men in July 1970.

The dynamite allegedly found in Mondo’s basement was never photographed in place by the crime scene technicians. The first crime scene photos of the dynamite were on a conference table on the fourth floor of the police headquarters.

The second time Pfeffer testified about the case was in U.S. District Court before Judge Warren Urbom, who ruled that Pfeffer and Swanson’s search of Mondo we Langa’s house was illegal. Once again the basement dynamite was discussed although the location shifted from the coal bin to near the furnace. Judge Urbom did not comment on the credibility of Pfeffer but he did make it clear he did not believe the testimony of Pfeffer’s supervisor, Lt. James Perry.

The third version of events under oath by Pfeffer was in 2009, in post-trial proceedings in Omaha. Pfeffer, who was denied his request to use notes, testified contrary to his trial testimony that he was the first one down in the basement and that he found the dynamite, not Swanson. Neither the judge, who ruled against Ed Poindexter’s bid for a new trial, nor the Douglas County Attorney has ever taken any action over Pfeffer’s contradictory sworn testimony.

Robert Pfeffer’s fourth account of his role in the case was in a recorded telephone interview on Sept. 5, 2002, with private detective Thomas Gorgen of Silverhawk Investigations.

Pfeffer claimed, “I found it down the basement against the furnace behind a door that was leaning up against it and you could just look down and you could see it underneath there.”
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Sat Dec 07, 2013 5:13 am

see link for full story
http://articles.philly.com/2013-12-06/n ... her-warren


Key mob witness was paid to work for the FBI

December 06, 2013

During his 30 years with the New York mob, Anthony Aponick grew adept at juggling business both legitimate and illegitimate - or, as he described it, "walking and chewing gum at the same time."

But he spent much of Thursday discussing a more ambiguous form of income as he testified for a second day in the racketeering retrial of reputed Philadelphia mob consigliere George Borgesi: money he earned as a professional informant.

Between 2002 and 2013, the FBI paid the 42-year-old former Bonanno crime family associate $152,000 for coughing up information on Borgesi, with whom he shared a cell in a federal detention center in West Virginia.

Under cross-examination from Borgesi lawyer Christopher Warren, Aponick maintained the money the government paid him never played a role in his decision to switch sides.

"You're making it sound like the two are inextractable," he said, "like George Borgesi got charged, so I got paid."

Instead, Aponick told jurors, the money went toward his housing, clothing, and relocation expenses as a protected informant and to pay for a necessary eye surgery.

"Now, I'm not a cross-eyed junkie fat rat anymore," he joked. "I'm just a rat now."

Prosecutors have called Aponick as a key witness in their case against Borgesi, who they say continued to oversee a profitable loan-sharking and bookmaking operation from behind bars.

He told jurors Wednesday that Borgesi often discussed his ongoing crimes and tried to recruit him to the Philadelphia mob.

He and Borgesi grew close during their time together, Aponick said - often joking, roughhousing, and trading war stories in their cell.

Early on in his cross-examination Thursday, Warren pressed Aponick to clarify that relationship, especially the prison cell wrestling bouts mentioned in previous testimony.

"What? Are you implying we're [gay] or something?" Aponick shot back. "I can say a lot of things about this guy - but he ain't [gay]."

But it was what happened after Aponick's release that consumed much of Warren's questioning Thursday. Two months after federal prosecutors lobbied to have him released early, Aponick returned to Brooklyn and launched into a bank robbery spree.

He told jurors he needed the money to pay off gambling debts owed to a rival mob family.

"I didn't want to break the deal," he said of his plea agreement Thursday. "But all [the FBI] could do was put me in jail. These other guys could hurt or kill me."

Infuriated, agents stopped taking his calls. But Aponick continued trying to work his way back into the government fold.

Only after an anonymous website posting identified him as an informant in 2005 did agents again make contact.

Though Aponick was placed in witness protection, prosecutors deemed him too problematic to call during their first trial last year against Borgesi and his uncle, reputed mob boss Joe Ligambi.

That jury deadlocked, prompting a reevaluation of Aponick's usefulness. But three months before he was scheduled to take the stand in the retrial, Aponick was arrested again - this time for allegedly shoving his wife out of a moving vehicle, a charge that was later dismissed.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Sun Dec 08, 2013 10:41 pm

Some people have asked how I got started in my work around the FBI.
My response is "it started in 1988 when FBI supervisor John Kenoyer was
given a get out jail free card by the Maine courts and politicians after raping a 11 year old girl.


Maine's Shameful State Secret: Child Sex Abuse
see link for full story
http://www.lukesarmy.com/content/maines ... -sex-abuse

Mon, 02/18/2013
Maine has just been rated third worst in the country for sex trafficking. The Bangor Daily News says Maine is a top source for the entire East Coast to procure children for sex abuse. Those who know Maine's history are not surprised.

Only a few years ago when students at the Baxter School for the Deaf tried to refuse sexual abuse by their director, Dr. Robert Kelly, he tied the children naked to a tree and left them alone, all night, in the Maine woods. The State of Maine protected Dr. Kelly and not the children. Maine's Attorney General (AG) refused to prosecute. Apparently the State continues to pay Dr. Kelly his pension. When children are tied naked to pine trees as a "grooming" exercise for rape and no one is prosecuted, the devil is walking the halls of Maine's Attorney General's office.

Lawyers in the AG's office used a "statute of limitations" excuse to justify their protection of abusers and not children. This is wide recognition that there can be no statute of limitations for crimes of child abuse and Maine legislatures, in 1991, ended the statute of limitations for child sexual abuse. Then the federal District Court for the District of Maine, in an unbelievable judgment ruled that "the Legislature clearly did not intend for this expanded statute of limitations to revive claims that were already 'barred by the previous statute of limitations in force' prior to the amendments."

Judges in Maine, both state and federal, appear eager to protect abusers and not children. From Baxter School for the Deaf to Kennebunk's Zumba prostitution scandal, Maine courts have systematically protected child abusers and not children. Child abusers like Dr. Kelly, former FBI Bureau Chief John Kenoyer, who raped a ten year old girl for over a year, and former Assistant Attorney General James Cameron, recently arrested for child porn, are considered "important people" and " productive members of the community. " Judges in Maine protect them. One has to wonder why.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Mon Dec 09, 2013 1:13 pm

If FBI agents change link google the title

My friend Ed Tatro sent this to me today

50 Reasons For 50 Years - Episode 50
The Bigger Picture
Filmmaker Oliver Stone discusses conflict behind the scenes during John Kenn…

To view other chapters see

https://www.youtube.com/channel/UCOpje8 ... 00&sort=dd


https://www.youtube.com/watch?v=EDjk3Sh2gIU
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Mon Dec 09, 2013 9:34 pm

see link for full story
http://triblive.com/news/adminpage/5223 ... bb-charges

Duquesne man acquitted of drug charges sues FBI agent for malicious prosecution

December 7, 201

A Duquesne man acquitted in December 2011 on drug charges claims that an FBI agent had him arrested and prosecuted for no other reason than he was friends with and related to convicted drug dealers.

Frank M. Cobb, 32, says in the civil rights lawsuit that Special Agent Minh-Tri V. Truong had no evidence linking him to drug trafficking and that he or someone else on the task force destroyed evidence that would have helped prove his innocence.

One of Cobb's childhood friends and two cousins were arrested in the same drug sweep and pleaded guilty to drug charges.

A federal jury on Dec. 9, 2011, acquitted Cobb on charges of drug conspiracy, operating a drug house and possessing a firearm in connection with drug trafficking. He spent a year in jail awaiting trial.

Cobb had security cameras on his home and tried to get Truong and other members of the task force to review the footage to see that no drug trafficking was taking place, the lawsuit says.

“At some point, after the illegal search and seizure of the plaintiff's home, after the plaintiff insisted defendants review the security footage and after the defendants, without good cause or excuse, refused to review that footage, the memory on plaintiff's security system was mysteriously wiped clean,” the lawsuit says.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: FBI WATCH MAKING CRUELTY VISIBLE

Postby fruhmenschen » Tue Dec 10, 2013 4:14 am

FBI informant linked to the creation of 911
see link for full story
http://www.ibtimes.com/911-link-saudi-a ... se-1501202

9/11 Link To Saudi Arabia Is Topic Of 28 Redacted Pages In Government Report; Congressmen Push For Release
By Jamie Reno
on December 09 2013 2:09 PM


Since terrorists attacked the United States on Sept. 11, 2001, victims’ loved ones, injured survivors, and members of the media have all tried without much success to discover the true nature of the relationship between the 19 hijackers – 15 of them Saudi nationals – and the Saudi Arabian government. Many news organizations reported that some of the terrorists were linked to the Saudi royals and that they even may have received financial support from them as well as from several mysterious, moneyed Saudi men living in San Diego.


Saudi Arabia has repeatedly denied any connection, and neither President George W. Bush nor President Obama has been forthcoming on this issue.

But earlier this year, Reps. Walter B. Jones, R-N.C., and Stephen Lynch, D-Mass., were given access to the 28 redacted pages of the Joint Intelligence Committee Inquiry (JICI) of 9/11 issued in late 2002, which have been thought to hold some answers about the Saudi connection to the attack.

"I was absolutely shocked by what I read," Jones told International Business Times. "What was so surprising was that those whom we thought we could trust really disappointed me. I cannot go into it any more than that. I had to sign an oath that what I read had to remain confidential. But the information I read disappointed me greatly."
Related

Readers' Stories From The Morning of 9/11
The U.S.'s New Day of Infamy

The public may soon also get to see these secret documents. Last week, Jones and Lynch introduced a resolution that urges President Obama to declassify the 28 pages, which were originally classified by President George W. Bush. It has never been fully explained why the pages were blacked out, but President Bush stated in 2003 that releasing the pages would violate national security.

While neither Jones nor Lynch would say just what is in the document, some of the information has leaked out over the years. A multitude of sources tell IBTimes, and numerous press reports over the years in Newsweek, the New York Times, CBS News and other media confirm, that the 28 pages in fact clearly portray that the Saudi government had at the very least an indirect role in supporting the terrorists responsible for the 9/11 attack. In addition, these classified pages clarify somewhat the links between the hijackers and at least one Saudi government worker living in San Diego.

Former Sen. Bob Graham, D-Fla., who chaired the Joint Inquiry in 2002 and has been beating the drum for more disclosure about 9/11 since then, has never understood why the 28 pages were redacted. Graham told IBTimes that based on his involvement in the investigation and on the now-classified information in the document that his committee produced, he is convinced that “the Saudi government without question was supporting the hijackers who lived in San Diego…. You can't have 19 people living in the United States for, in some cases, almost two years, taking flight lessons and other preparations, without someone paying for it. But I think it goes much broader than that. The agencies from CIA and FBI have suppressed that information so American people don't have the facts."

Jones insists that releasing the 28 secret pages would not violate national security.

“It does not deal with national security per se; it is more about relationships,” he said. “The information is critical to our foreign policy moving forward and should thus be available to the American people. If the 9/11 hijackers had outside help – particularly from one or more foreign governments – the press and the public have a right to know what our government has or has not done to bring justice to the perpetrators."

It took Jones six weeks and several letters to the House Intelligence Committee before the classified pages from the 9/11 report were made available to him. Jones was so stunned by what he saw that he approached Rep. Lynch, asking him to look at the 28 pages as well. He knew that Lynch would be astonished by the contents of the documents and perhaps would join in a bipartisan effort to declassify the papers.

"He came back to me about a week ago and told me that he, too, was very shocked by what he read,” Jones said. “I told him we need to join together and put in a resolution and get more members on both sides of the aisle involved and demand that the White House release this information to the public. The American people have a right to know this information."

A decade ago, 46 senators, led by Sen. Charles Schumer, D-N.Y., demanded in a letter to President Bush that he declassify the 28 pages.

The letter read, in part, "It has been widely reported in the press that the foreign sources referred to in this portion of the Joint Inquiry analysis reside primarily in Saudi Arabia. As a result, the decision to classify this information sends the wrong message to the American people about our nation's antiterror effort and makes it seem as if there will be no penalty for foreign abettors of the hijackers. Protecting the Saudi regime by eliminating any public penalty for the support given to terrorists from within its borders would be a mistake.... We respectfully urge you to declassify the 28-page section that deals with foreign sources of support for the 9/11 hijackers."

All of the senators who signed that letter but one, Sen. Sam Brownback (R-Kansas), were Democrats.

Lynch, who won the Democratic primary for his congressional seat on that fateful day of Sept. 11, 2001, told IBTimes that he and Jones are in the process of writing a “Dear Colleague” letter calling on all House members to read the 28 pages and join their effort.

"Once a member reads the 28 pages, I think whether they are Democrat or Republican they will reach the same conclusion that Walter and I reached, which is that Americans have the right to know this information," Lynch said. “These documents speak for themselves. We have a situation where an extensive investigation was conducted, but then the Bush [administration] decided for whatever purposes to excise 28 pages from the report. I'm not passing judgment. That was a different time. Maybe there were legitimate reasons to keep this classified. But that time has long passed.”

Most of the allegations of links between the Saudi government and the 9/11 hijackers revolve around two enigmatic Saudi men who lived in San Diego: Omar al-Bayoumi and Osama Basnan, both of whom have long since left the United States.

In early 2000, al-Bayoumi, who had previously worked for the Saudi government in civil aviation (a part of the Saudi defense department), invited two of the hijackers, Khalid Almihdhar and Nawaf Alhazmi, to San Diego from Los Angeles. He told authorities he met the two men by chance when he sat next to them at a restaurant.

Newsweek reported in 2002 that al-Bayoumi’s invitation was extended on the same day that he visited the Saudi Consulate in Los Angeles for a private meeting.

Al-Bayoumi arranged for the two future hijackers to live in an apartment and paid $1,500 to cover their first two months of rent. Al-Bayoumi was briefly interviewed in Britain but was never brought back to the United States for questioning.

As for Basnan, Newsweek reported that he received monthly checks for several years totaling as much as $73,000 from the Saudi ambassador to the United States, Prince Bandar, and his wife, Princess Haifa Faisal. Although the checks were sent to pay for thyroid surgery for Basnan’s wife, Majeda Dweikat, Dweikat signed many of the checks over to al-Bayoumi’s wife, Manal Bajadr. This money allegedly made its way into the hands of hijackers, according to the 9/11 report.

Despite all this, Basnan was ultimately allowed to return to Saudi Arabia, and Dweikat was deported to Jordan.

Sources and numerous press reports also suggest that the 28 pages include more information about Abdussattar Shaikh, an FBI asset in San Diego who Newsweek reported was friends with al-Bayoumi and invited two of the San Diego-based hijackers to live in his house.

Shaikh was not allowed by the FBI or the Bush administration to testify before the 9/11 Commission or the JICI.

Graham notes that there was a significant 9/11 investigation in Sarasota, Fla., which also suggests a connection between the hijackers and the Saudi government that most Americans don’t know about.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

PreviousNext

Return to Data & Research Compilations

Who is online

Users browsing this forum: No registered users and 5 guests