Sam Adams Associates for Integrity in Intelligence

News

Donald Trump v. the Spooks

Exclusive: President-elect Trump is in a nasty slugfest with U.S. intelligence agencies as they portray him as a Russian tool and he blasts their attempt to delegitimize his election, says ex-British intelligence officer Annie Machon. (originally published January 16, 2017 at Consortiumnews.com)

By Annie Machon

The clash between plutocratic President-elect Trump and the CIA is shaping up to be the heavyweight prize fight of the century, and Trump at least is approaching it with all the entertaining bombast of Mohammed Ali at the top of his game. Rather than following the tradition of doing dirty political deals in dark corners, more commonly known as fixing the match, Trump has come out swinging in the full glare of the media.

In that corner, we have a deal-making, billionaire “man of the people” who, to European sensibilities at least, reputedly espouses some of the madder domestic obsessions and yet has seemed to offer hope to many aggrieved Americans. But it is his professed position on building a rapprochement with Russia and cooperating with Moscow to sort out the Syrian mess that caught my attention and that of many other independent commentators internationally.

In the opposite corner, Trump’s opponents have pushed the CIA into the ring to deliver the knock-out blow, but this has yet to land. Despite jab after jab, Trump keeps evading the blows and comes rattling back against all odds. One has to admire the guy’s footwork.

So who are the opponents ranged behind the CIA, yelling encouragement through the ropes? The obvious culprits include the U.S. military-industrial complex, whose corporate bottom line relies on an era of unending war. As justification for extracting billions – even trillions – of dollars from American taxpayers, there was a need for frightening villains, such as Al Qaeda and even more so, the head choppers of ISIS. However, since the Russian intervention in Syria in 2015, those villains no longer packed as scary a punch, so a more enduring villain, like Emmanuel Goldstein, the principal enemy of the state in George Orwell’s 1984, was required. Russia was the obvious new choice, the old favorite from the Cold War playbook.

The Western intelligence agencies have a vested interest in eternal enemies to ensure both eternal funding and eternal power, hence the CIA’s entry into the fight. As former British MP and long-time peace activist George Galloway so eloquently said in a recent interview, an unholy alliance is now being formed between the “war party” in the U.S., the military-industrial-intelligence complex and those who would have previously publicly spurned such accomplices: American progressives and their traditional host, the Democratic Party.

Yet, if the Democratic National Committee had not done its best to rig the primaries in favor of Hillary Clinton, then perhaps we would not be in this position. Bernie Sanders would be the President-elect.

Two-Party Sham

These establishment forces have also revealed to the wider world a fact long known but largely dismissed as conspiracy theory by the corporate mainstream media, that the two-party system in both the U.S. and the U.K. is a sham. In fact, we are governed by a globalized elite, working in its own interest while ignoring ours. The Democrats, openly disgruntled by Hillary Clinton’s election loss and being seen to jump into bed so quickly with the spooks and the warmongers, have laid this reality bare.

In fact, respected U.S. investigative journalist Robert Parry recently wrote that an intelligence contact told him before the election that the intelligence agencies did not like either of the presidential candidates. This may go some way to explaining the FBI’s intervention in the run-up to the election against Hillary Clinton, as well as the CIA’s attempts to de-legitimize Trump’s victory afterwards.

Whether that was indeed the case, the CIA has certainly held back no punches since Trump’s election. First the evidence-lite assertion that it was the Russians who hacked the DNC emails and leaked them to WikiLeaks: then the fake news about Russia hacking the voting computers; that then morphed into the Russians “hacked the election” itself; then they “hacked” into the U.S. electric grid via a Vermont utility. All this without a shred of fact-based evidence provided, but Obama’s expulsion of 35 Russian diplomats last month solidified this dubious reality in Americans’ minds.

All this culminated in the “dirty dossier” allegations last week about Trump, which he has rightly knocked down – it was desperately poor stuff.

This last item, from a British perspective, is particularly concerning. It appears that a Washington dirt-digging company was hired by a Republican rival to Trump to unearth any potential Russian scandals during the primaries; once Trump had won the nomination this dirt-digging operation was taken over by a Democrat supporter of Hillary Clinton. The anti-Trump investigation was then sub-contracted to an alleged ex-British spy, an ex-MI6 man named Christopher Steele.

The Role of MI6

Much has already been written about Steele and the company, much of it contradictory as no doubt befits the life of a former spy. But it is a standard career trajectory for insiders to move on to corporate, mercenary spy companies, and this is what Steele appears to have done successfully in 2009. Of course, much is predicated on maintaining good working relations with your former employers.

That is the aspect that interests me most – how close a linkage did he indeed retain with his former employers after he left MI6 in 2009 to set up his own private spy company? The answer is important because companies such has his can also be used as cut-outs for “plausible deniability” by official state spies.

I’m not suggesting that happened in this case, but Steele reportedly remained on good terms with MI6 and was well thought of. For a man who had not been stationed in Russia for over 20 years, it would perhaps have been natural for him to turn to old chums for useful connections.

But this question is of extreme importance at a critical juncture for the U.K.; if indeed MI6 was complicit or even aware of this dirt digging, as it seems to have been, then that is a huge diplomatic problem for the government’s attempts to develop a strong working relationship with the US, post-Brexit. If MI6’s sticky fingers were on this case, then the organization has done the precise opposite of its official task – “to protect national security and the economic well-being of the UK.”

MI6 and its U.S. intelligence chums need to remember their designated and legislated roles within a democracy – to serve the government and protect national security by gathering intelligence, assessing it impartially and making recommendations on which the government of the day will choose to act or not as the case may be.

The spies are not there to fake intelligence to suit the agenda of a particular regime, as happened in the run-up to the illegal Iraq War, nor are they there to endemically spy on their own populations (and the rest of the world, as we know post-Snowden) in a pointless hunt for subversive activity, which often translates into legitimate political activism and acts of individual expression).

And most especially the intelligence agencies should not be trying to subvert democratically elected governments. And yet this is what the CIA and a former senior MI6 officer, along with their powerful political allies, appear to be now attempting against Trump.

Chances for Peace

If I were an American, I would be wary of many of Trump’s domestic policies. As a European concerned with greater peace rather than increasing war, I can only applaud his constructive approach towards Russia and his offer to cooperate with Moscow to stanch the bloodshed in the Middle East.

That, of course, may be the nub of his fight with the CIA and other vested interests who want Russia as the new bogeyman. But I would bet that Trump takes the CIA’s slurs personally. After all, given the ugliness of the accusations and the lack of proof, who would not?

So, this is a world championship heavy-weight fight over who gets to hold office and wield power, an area where the U.S. and U.K. intelligence agencies have considerable experience in rigging matches and knocking out opponents. Think, for instance, Iranian Prime Minister Mohammad Mossadeq in 1953; Chilean President Salvador Allende in 1973; Iraqi leader Saddam Hussein in 2003; and Libyan leader Muammar Gaddafi in 2011. Syrian President Bashar al-Assad is wobbly but still standing, thanks to some good corner support from Russia.

However, it would appear that Trump is a stranger to the spies’ self-defined Queensbury Rules in which targets are deemed paranoid if they try to alert the public to the planned “regime change” or they become easy targets by staying silent. By contrast, Trump appears shameless and pugnacious. Street-smart and self-promoting, he seems comfortable with bare-knuckle fighting.

This match has already gone into the middle rounds with Trump still bouncing around on his toes and still relishing the fight. It would be ironic if out of this nasty prize fight came greater world peace and safely for us all.

Annie Machon is a former intelligence officer in the UK’s MI5 Security Service (the U.S. counterpart is the FBI).

US Intel Vets Dispute Russia Hacking Claims

As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans. (Originally posted December 12, 2016 on Consortiumnews.com)

Veteran Intelligence Professionals for Sanity

MEMORANDUM

Allegations of Hacking Election Are Baseless

A New York Times report on Monday alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else.

Monday’s Washington Post reports that Sen. James Lankford, R-Oklahoma, a member of the Senate Intelligence Committee, has joined other senators in calling for a bipartisan investigation of suspected cyber-intrusion by Russia. Reading our short memo could save the Senate from endemic partisanship, expense and unnecessary delay.

In what follows, we draw on decades of senior-level experience – with emphasis on cyber-intelligence and security – to cut through uninformed, largely partisan fog. Far from hiding behind anonymity, we are proud to speak out with the hope of gaining an audience appropriate to what we merit – given our long labors in government and other areas of technology. And corny though it may sound these days, our ethos as intelligence professionals remains, simply, to tell it like it is – without fear or favor.

We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking:

Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did.

Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data.

All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient.

In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.

Awesome Technical Capabilities

Again, NSA is able to identify both the sender and recipient when hacking is involved. Thanks largely to the material released by Edward Snowden, we can provide a full picture of NSA’s extensive domestic data-collection network including Upstream programs like Fairview, Stormbrew and Blarney. These include at least 30 companies in the U.S. operating the fiber networks that carry the Public Switched Telephone Network as well as the World Wide Web. This gives NSA unparalleled access to data flowing within the U.S. and data going out to the rest of the world, as well as data transiting the U.S.

In other words, any data that is passed from the servers of the Democratic National Committee (DNC) or of Hillary Rodham Clinton (HRC) – or any other server in the U.S. – is collected by the NSA. These data transfers carry destination addresses in what are called packets, which enable the transfer to be traced and followed through the network.

Packets: Emails being passed across the World Wide Web are broken down into smaller segments called packets. These packets are passed into the network to be delivered to a recipient. This means the packets need to be reassembled at the receiving end.

To accomplish this, all the packets that form a message are assigned an identifying number that enables the receiving end to collect them for reassembly. Moreover, each packet carries the originator and ultimate receiver Internet protocol number (either IPV4 or IPV6) that enables the network to route data.

When email packets leave the U.S., the other “Five Eyes” countries (the U.K., Canada, Australia, and New Zealand) and the seven or eight additional countries participating with the U.S. in bulk-collection of everything on the planet would also have a record of where those email packets went after leaving the U.S.

These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources.

The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.

The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked.

The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.

As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking.

For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)

William Binney, former Technical Director, World Geopolitical & Military Analysis, NSA; co-founder, SIGINT Automation Research Center (ret.)

Mike Gravel, former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator

Larry Johnson, former CIA Intelligence Officer & former State Department Counter-Terrorism Official

Ray McGovern, former US Army infantry/intelligence officer & CIA analyst (ret.)

Elizabeth Murray, Deputy National Intelligence Officer for Middle East, CIA (ret.)

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA (ret.)

CIA Analyst to Iraq Tribunal: Wolfowitz Pushed Multiple Investigations of “Pure Fiction”

The allegations that Saddam possessed weapons of mass destruction are lies.
By Elizabeth Murray / AlterNet December 1, 2016

I retired in 2010 after a 27-year career with the CIA and for the first 20 years of my career, I was a senior political and media analyst with the CIA’s open source arm. That department monitors and translates speeches by foreign leaders, newspaper editorials and other foreign news of interest to US policymakers.

Our job was to analyze the speeches of foreign leaders and the political spin of foreign media content and help the policymakers we worked with understand the implications for US policy and interests. It was exciting, challenging and very interesting work.

In early 2003, just prior to the launching of the US attack on Iraq, I was the senior analyst in charge of Iraqi media at the Open Source Center. The political atmosphere around the Beltway had become very charged amid allegations that Saddam Husayn possessed WMD and there were active efforts afoot to link him to al-Qa’ida and the events of 9-11. The drumbeat for war was in full swing.

One morning I received a telephone call from the office of then-Deputy Defense Secretary Paul Wolfowitz asking us to find media reportage of meetings between al-Qaida representatives and Iraqi officials. There was a strong implication in the way the tasking was conveyed to me that a meeting between the two sides had, in fact, taken place – possibly in Prague – and that we needed to find the evidence.

I gave the tasking my highest priority. I immediately contacted our overseas bureau in the Middle East in charge of monitoring and translating Iraqi media. We had the monitors/translators undertake an exhaustive search of all relevant Iraqi media reports in our archives that might contain such information. We also leveraged other resources available to us in Baghdad so that they could check on lesser known Iraq media sources – we pulled out all the stops.

About 2 weeks later, we received a definitive response – there was no evidence in Iraqi media of any such relationship between al-Qaida and Saddam Husayn’s regime. I promptly reported this information to Wolfowitz’s office. I assumed that was the end of the matter.

However, about a week later Wolfowitz’s office phoned us again, asking for the same thing – media evidence of an Iraqi government link with al-Qaida. So I again marshaled all the resources we had and dedicated some of our overseas staff to a full-time search. Again the finding was negative.

Again I reported this back. Unbelievably, a few weeks the request came to us a third time. It was slowly dawning on me that we were not providing his office with the answer they wanted. We were being subjected to political pressure. We had already expended many hours and many US tax dollars on this search – and I trusted our seasoned media professionals when they said there was no evidence of these allegations.

So I asked Wolfowitz’s office where they had heard that a meeting between al-Qa’ida and Iraqi officials had taken place – in the hopes that this might aid our search. However, I never received a response to my request.

Of course, we now know that these allegations were pure fiction, as were the allegations that Saddam possessed weapons of mass destruction.

By 2006 – three years into the war on Iraq — the Bush administration officially admitted it had no evidence of any Iraqi role in the 9-11 attacks. Nevertheless, the US continues to devastate that country, to this very day.

It is time to face the truth and hold our leaders to account for the terrible war crimes committed against the Iraqi people. And it is time for the United States to withdraw from Iraq and allow the Iraqi people to rebuild their country free of foreign interference.

That is why I have shared my experience with The People’s Tribunal on the Iraq War – as my testimony to the lies that led to the mass murder of so many innocent people. It is my hope that the truth uncovered by the Tribunal will enable a national reckoning and help us hold our leaders accountable for the past and present war crimes committed against the nation of Iraq – crimes which could not have been committed in the absence of the lies that were told to the American people.

Elizabeth Murray served as Deputy National Intelligence Officer for the Near East in the National Intelligence Council before retiring after a 27-year career in the U.S. government, where she specialized in Middle Eastern political and media analysis.

(Full article at: http://www.alternet.org/world/cia-analyst-iraq-tribunal-wolfowitz-pushed-multiple-investigations-pure-fiction)

About the Sam Adams Associates

Sam Adams AssociatesSam Adams Associates for Integrity in Intelligence is a movement of former CIA colleagues of former intelligence analyst Sam Adams, together with others who hold up his example as a model for those in intelligence who would aspire to the courage to speak truth to power. SAAII confers an award each year to a member of the intelligence community or related professions who exemplifies Sam Adam’s courage, persistence, and devotion to truth – no matter the consequences. Read more about the history here.

The annual Sam Adams Award has been given in previous years to truth tellers Coleen Rowley of the FBI; Katharine Gun of British Intelligence; Sibel Edmonds of the FBI; Craig Murray, former UK ambassador to Uzbekistan; Sam Provance, former US Army Sgt; Maj. Frank Grevil of Danish Army Intelligence; Larry Wilkerson, Col., US Army (ret.), former chief of staff to Colin Powell at State; Julian Assange, of WikiLeaks: Thomas Drake, of NSA; Jesselyn Radack, formerly of Dept. of Justice and now National Security Director of Government Accountability Project; Thomas Fingar, former Deputy Director of National Intelligence and Director, National Intelligence Council, and Edward Snowden, former contractor for the National Security Agency; Chelsea Manning, US Army Private who exposed (via WikiLeaks) key information on Afghanistan and Iraq, as well as State Department activities; and to retired National Security Agency official William Binney, who challenged decisions to ignore the Fourth Amendment in the government’s massive — and wasteful — collection of electronic data.