HomeLatest ThreadsGreatest ThreadsForums & GroupsMy SubscriptionsMy Posts
DU Home » Latest Threads » leveymg » Journal
Page: « Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Next »


Profile Information

Member since: Wed May 5, 2004, 09:44 AM
Number of posts: 32,443

Journal Archives

He'll probably pick up some Russian language and habits fairly quickly. Here's a useful phrase:

Ваше заявление о предоставлении убежища было одобрено, товарищ Эдвард Сноуден. Добро пожаловать в страну свободы и братского мира. Теперь, вы должны научиться, как водка.

("Your asylum application has been approved, comrade Edward Snowden. Welcome to the land of freedom and fraternal peace. Now, you will have to learn to like Vodka.")

He should start with the word водка.

Same rules should apply in Forums and Groups as on the big board.

I don't know where this concept of "privatized" no-dissent zones came from, but I agree, it's not the DU I know.

"Red Hat" Ed, the Ultimate Ethical Hacker. Now, that finally makes some sense of it.


"It's declassified"

Excellent catch.

What the New NSA Docs Show: How They Lied to Us, and a Lot More

For weeks, uncertainty about how the NSA surveillance system - PRISM - actually operates has fueled fierce debate about whether the Obama Administration has been fully candid in its representation of the Agency’s programs.

Release of a new set of slides appears to have answered many of these uncertainties. We can now say with far greater assurance how the NSA actually works and that the President and senior officials have made inaccurate statements.

These documents reveal a substantial amount of new information about PRISM processes and operations, including: http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/ And related article. http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html

SLIDE 1 – PRISM Tasking Process

• The PRISM database contains both CONTENT and METADATA.
• Content (voice messages) is indicated as PENDING STORED COMMS.
• This partially automated PROFILING process employs both real-time SURVEILLANCE data and PENDING STORED COMMS in the decision to target an individual.
• The determination that a potential target is a US PERSON is made by the FBI after profiling has identified the subject.
• Profiling involves searches of databases of other Agencies, including foreign intel service databases
• A warrant is NOT used for this initial PROFILING step.
• The PROVIDERS (Google, Yahoo, etc.) provide additional data after targeting is completed (all targeting data provided stays in the database and informs subsequent profiling decisions.)
• NUCLEON analyses the Voice Content released from the PRISM database.
• PINWALE does the same for email content.

SLIDE 1 (original)


The next slide gives us further detail about the use of voice CONTENT in PRISM:

• Voice recognition and Internet are part of PRISM - it isn't just metadata!
• PRINTAURA automates the traffic flow. SCISSORS and Protocol Exploitation sort data types for analysis in NUCLEON (voice), PINWALE (video), MAINWAY (call records – phone metadata) and MARINA (Internet records).
• In addition to NUCLEON, there is a second voice data program named CONVEYANCE, which appears to be a splitter.
• This slide also shows voice CONTENT is being acquired as part of the same program.
• The claim that PRISM does not contain voice content, just metadata, is simply untrue.
• Voice Metadata goes to MARINA and Internet records are analyzed and stored in MAINWAY.

SLIDE 2 (original)

SLIDE 3: There are 10 Types of Content within PRISM

• The PRISM case notation format reflects the availability, confirmed by The Post's reporting, of real-time surveillance as well as stored content.
• SLIDE 3 shows there are 10 types of CONTENT stored within the PRISM database:

A. Stored Comms (Search)
B. IM (chat)
C. RTN-EDV (real-time notification of an e-mail event such as a login or sent message)
D. RTN-IM (real-time notification of a chat login or logout event)
E. E-Mail
G. Full (WebForum)
H. OSN Messaging (photos, wallposts, activity, etc.)
I. OSN Basic Subscriber Info
J. Videos . (dot): indicates multiple types

NOTE A, SLIDE 3: Voice data appears to be designated “Content Type: STORED COMMS" (Except VoIP)

STORED COMMS is US person voice (and email) content. There is no other other type of content that US person voice content might fit into, and by a process of deduction, nothing else that STORED COMMS might be. Also, please note in Slides 1 and 2, PENDING STORED COMMS is shown to have its own separate process stream inside the PRISM database, and it is not SURVEILLANCE that may be acquired after the warrant is issued. This seems to answer two questions: whether content informs the targeting decision; and, is it gathered before or after a warrant is issued?

Clearly, as these and earlier documents show, the PRISM system and analysts have access to vast amounts of data at the profiling stage before the targeting decision is made, and as NSA interprets the law, this profiling step does not require a FISA warrant under the 2008 FISA Amendement Act (FAA). In addition to content taken from the 8 Internet Service Providers, the PRISM program also taps into fiber cables "upstream" (at international points of ingress/egress to the US and abroad), as shown in the "FAA 702 Operations" slide, June 8 Guardian slide below: http://www.guardian.co.uk/world/2013/jun/08/nsa-prism-server-collection-facebook-google

Indeed, it is virtually certain that large amounts of US person data are available without warrants to NSA personnel, at least in the files of other agencies that analysts and contractors may access in the process of profiling suspected terrorists and other NSA targets. Under the law as it was changed by the PATRIOT Act, analysts have 72 hours to examine US person content before they have to seek a warrant. See FISA, 50 U.S.C. § 1801(h)(4): http://www.law.cornell.edu/uscode/text/50/1801

no contents of any communication to which a United States person is a party shall be disclosed, disseminated, or used for any purpose or retained for longer than 72 hours unless a court order under section 1805 of this title is obtained or unless the Attorney General determines that the information indicates a threat of death or serious bodily harm to any person.

Furthermore, NSA and its contractors have a full week to seek a FISA warrant under "exigent circumstances". 50 U.S.C. § 1805(e)(3): http://www.law.cornell.edu/uscode/text/50/1805

(3) In the absence of a judicial order approving such electronic surveillance, the surveillance shall terminate when the information sought is obtained, when the application for the order is denied, or after the expiration of 7 days from the time of authorization by the Attorney General, whichever is earliest.

PRISM is a “database of databases.” Analysts have access to many databases, both domestic and foreign intelligence agencies, and those contain information from all sources – and they generally are not minimized to segregate US person information. According to the sequence of steps shown in SLIDE 2, US person voice content does get separated out and sent to NUCLEON, and the metadata is deposited in MARINA, but only after a US person has gone through the profiling process. This suggests that US person content is utilized in some way at the initial profiling stage of PRISM, which appears to skirt the intent of FISA, if as we see below, loopholes allow it's use in practice.

Under the law, US person telco content is supposed to be "minimized" under Sec. 215 of the PATRIOT Act, and Sec. 216 is supposed to do the same for US person Internet records. Meanwhile Sec. 702 of the 2008 FAA (FISA Amendent Act) legalized the sort of targeted NSA activities that PRISM carries out, but that targeting is supposed to be restricted to foreign persons abroad. Nonetheless, because of loopholes in the law -- such as the allowance under Sec. 1801(h)(4) and 1805(e)(3) for up to seven days of unfettered viewing of US person data that has been worked into PRISM's Tasking process (profiling) -- it does not look like the FISA wall that is supposed to separate these two NSA programs provides any real separation.

NOTE B, SLIDE 3: NSA intercepts email, on-line chats in real-time, CONTENT TYPES C,D

This appears to answer some of the issue of whether analysts can access communications in real-time, or whether they have to wait for a warrant. That question was raised by this report in CNET: http://news.cnet.com/8301-13578_3-57589495-38/nsa-spying-flap-extends-to-contents-of-u.s-phone-calls/

The National Security Agency has acknowledged in a new classified briefing that it does not need court authorization to listen to domestic phone calls, a participant in the briefing said.

Rep. Jerrold Nadler, a New York Democrat, disclosed on Thursday that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed "simply based on an analyst deciding that."

If the NSA wants "to listen to the phone," an analyst's decision is sufficient, without any other legal authorization required, Nadler said he learned. "I was rather startled," said Nadler, an attorney and congressman who serves on the House Judiciary committee.

Not only does this disclosure shed more light on how the NSA's formidable eavesdropping apparatus works domestically, it also suggests the Justice Department has secretly interpreted federal surveillance law to permit thousands of low-ranking analysts to eavesdrop on phone calls.

James Owens, a spokesman for Nadler, provided a statement on Sunday morning, a day after this article was published, saying: "I am pleased that the administration has reiterated that, as I have always believed, the NSA cannot listen to the content of Americans' phone calls without a specific warrant." Owens said he couldn't comment on what assurances from the Obama administration Nadler was referring to, and said Nadler was unavailable for an interview. (CNET had contacted Nadler for comment on Friday.)

Because the same legal standards that apply to phone calls also apply to e-mail messages, text messages, and instant messages, being able to listen to phone calls would mean the NSA analysts could also access the contents of Internet communications without going before a court and seeking approval.

Bear in mind two things: the system seems to handle phone, internet, and email messages differently, and under FISA as revised by the PATRIOT ACT, NSA analysts and contractors have 72 hours to do what they want with all data before seeking a warrant. A warrant is only required if the decision is made to target the individual.

PRISM PROFILING estimate: 90 million callers each month.

SLIDE 4 shows that 117,000 persons were profiled as of April 5, 2013. That may not seem like a very large number. But, NSA analysts are also trained to look at all communications, “two hops” out from a targeted person. The implication of that is that the initial PROFILING step outlined in SLIDE 1 profiles very large numbers of persons, and thus has no real 4th Amendment protection for US persons profiled.

How can that be if the system segregates US person data and is court approved? Look at SLIDES 1 and 2, again. Keep in mind the flow chart that shows how PRISM works. Everyone who has been in communication with those 117,000 targets indicated in SLIDE 4 is also investigated, and (at another “hop”) everyone they have been talking to or emailing or texting or chatting on Internet boards. Because these numbers grow exponentially with each hop, that means that if those 117K persons targeted by PRISM called 30 people that month, and they in turn called 30, the PRISM analysts will have initiated investigations of some 90 million persons each month. That could be more than a billion people each year are profiled. Profiling on this vast scale is consistent with known NSA's statistics: http://www.guardian.co.uk/world/2013/jun/27/nsa-online-metadata-collection

"On December 31, 2012, an SSO official wrote that ShellTrumpet had just "processed its One Trillionth metadata record" . . . (five years ago it)"began as a near-real-time metadata analyzer … for a classic collection system", the SSO official noted: "In its five year history, numerous other systems from across the Agency have come to use ShellTrumpet's processing capabilities for performance monitoring" and other tasks, such as "direct email tip alerting."

Almost half of those trillion pieces of internet metadata were processed in 2012, the document detailed: "though it took five years to get to the one trillion mark, almost half of this volume was processed in this calendar year".


The PRISM profiling process contains virtually no safeguards, and here is why:

1) The PRISM Tasking Process flowchart describes an NSA profiling process that does not involve the FBI at any level until the very end, when the FBI ESCU determines the suspect is or is not a US person.
2) The first step in the PRISM process is conducted by software that searches a series of interlinked databases and assembles a predictive profile. The scoring on that profile determines the subject as a potential target. Bill Binney describes that profiling process here: http://civic.mit.edu/blog/schock/the-government-is-profiling-you-william-binney-former-nsa
3) Until the FBI determines that the subject is a US person, the subject is presumed to be a non-US person, and the profiling part of the system affords no 4th Amendment protections in the warrantless search of an array of databases, including those of other US and foreign intelligence services.
4) During this tasking (profiling) stage, the analyst also has access to a near real-time take of the subject's internet activities and chat. No warrant is required for the analyst to carry out this human component of the profiling process. That is described at greater length here: http://www.democraticunderground.com/10023134820
5) The analyst has 72 hours to search across NSA and outside agency databases, as well as real-time monitoring, from the time an anticulable suspicion is raised. During that investigation, supervision is minimal, and the analyst does not have to seek additional permission or a warrant. This initial profiling step is probably the unsupervised analyst's activities that Snowden was describing.

• The metadata focus is the shiny object. The issue is profiling, which does not involve probable cause.

The metadata focus is the shiny object. The issue these new slides raise is profiling – they illustrate how the system profiles suspected callers -- and, many, many more who are called, at least "two hops" out.

Profiling works this way: even though the content of phone and email messages is supposed to be segregated within the databank, the system relies upon algorithms that are built upon all sources of information -- including other US and foreign intel agencies -- to identify possible terrorists when a call is made, in real-time. Those other databases (CIA, FBI, MI6, Saudi MID) inform the NSA PRISM database, but they don't reliably separate (or minimize) US person from foreign person information, so the initial profiling step effectively has no 4th Amendment protections built into it at all. There is no warrant requirement for this step. The NSA reads the law so that it is free to hoover up all calls, email, and Internet traffic, regardless of the parties being within the US. The courts have interpreted that US persons have some expectation of privacy in the content of their voice and email, but considerably less in other Internet communications, so online communications are not protected, and NSA analysts can access them freely in "real-time" whenever you log on. Finally, the courts have little or nothing to say about government profiling of US persons (provided that it doesn't discriminate), so that is where the Agency operates most freely.

In other words, when you place a call, or go on-line to send a message, you're potentially profiled with an NSA "database of databases" that makes no distinctions between US and foreign persons until at a later stage, the software or an analyst determines the caller isn't a likely terrorist or a foreign person.

Obama’s Misleading Statement to Charlie Rose: “There is no content in that database”

Both parts – content and metadata - go through a single NSA database, and these slide show that. Do you want to know what Obama actually said?

Much of the President's credibility on this issue rides on the accuracy of his assertions made to Charlie Rose two weeks ago that NSA's "2015 program" keeps only phone call metadata and does not collect voice content. As he put it, the NSA doesn't listen to Americans phone calls because that data isn't kept. "There is no content. " But, is that true? The Post's revelation about NUCLEON certainly contributes to the doubts about that claim. It now appears that Obama was describing only one isolated part of the PRISM database, MARINA, where US person call metadata is stored. Now that we have the larger picture, that was very misleading of Mr. Obama. Very misleading.

The President's interview with Rose is excerpted at length, below: http://www.democraticunderground.com/10023050432

Program 215, (the President) said gets data from the service providers like a Verizon in bulk, and basically call pairs.

"You have my telephone number connecting with your telephone number. There are no names. There is no content in that database. All it is, is the number pairs, when those calls took place, how long they took place. So that database is sitting there," he said.

"Now, if the NSA through some other sources, maybe through the FBI, maybe through a tip that went to the CIA, maybe through the NYPD. Get a number that where there's a reasonable, articulable suspicion that this might involve foreign terrorist activity related to al-Qaeda and some other international terrorist actors.

Then, what the NSA can do is it can query that database to see did this number pop up? Did they make any other calls? And if they did, those calls will be spit out. A report will be produced. It will be turned over to the FBI. At no point is any content revealed because there's no content," Obama explained.

We now see that the President's statement is, at the least, misleading, if not confused: "There is no content in that database."

What Has and Hasn't Changed Since the 2008 FISA Amendment

The pre-2008 FAA Terrorist Surveillance Program (The Program) swept up everything, content included, and assembled profiles of everybody. That's what Binney and Drake tell us, and they were certainly in a position to know. The EFF suits showed the same thing.

What happens now is that all that data has been harvested and resides in a number of gov't agency databases, and is compared to your metadata whenever you make a call or email. If you score high enough based upon the profile (algorithm), the system red flags you for a warrant. The system takes another look at you in the meantime, before FISC issues the warrant (the law gives NSA 72 hrs. to seek a warrant, and 7 days in "exigent circumstances"), and the content gathered (which Binney says has been encrypted but not destroyed) spills out and gets added to the analyst's "book".

Now, someone needs to explain how, in effect, this sort of warrantless universal profiling is really any different from the warrantless targeted surveillance that was going on before?

MANPADs coming to the Friendly Skies near you. Drop on in.

Who could have foreseen that our fiends and allies in the region would turn on us this way?


It took the posse two weeks to figure out the law of conspiracy as it relates to whistleblowers.

Those who've been most avidly pursuing Snowden aren't the sharpest tacks around here. They still don't grasp the details. The big picture is totally lost on them.

Yet Another NSA Program Raises Questions About Obama's Statements to Charlie Rose

Two days before President Obama's revealing interview with Charley Rose, the Washington Post published an overlooked article about the many programs run by NSA. Deep in the story was this revelation about a slew of surveillance operations: http://articles.washingtonpost.com/2013-06-15/news/39993852_1_comey-national-intelligence-intelligence-collection
"One Of Them Intercepts Telephone Calls And Routes The Spoken Words To A System Called ­NUCLEON."

That would seem to directly contradict the President's comforting assurance Sunday night that NSA doesn't listen to Americans' phones calls because, he claims, it doesn't have the voice content: http://articles.economictimes.indiatimes.com/2013-06-18/news/40049388_1_nsa-president-barack-obama-national-security-agency
"At no point is any content revealed because there's no content," Obama explained.


Much of the President's credibility on this issue rides on the accuracy of his assertions made to Charley Rose that NSA's "2015 program" keeps only phone call metadata and does not collect voice content. As he put it, the NSA doesn't listen to Americans phone calls because that data isn't kept. "There is no content. " But, is that true? The Post's revelation about NUCLEON certainly contributes to the doubts about that claim.

The President's interview with Rose is excerpted at length, below:

Program 2015, (the President) said gets data from the service providers like a Verizon in bulk, and basically call pairs.

"You have my telephone number connecting with your telephone number. There are no names. There is no content in that database. All it is, is the number pairs, when those calls took place, how long they took place. So that database is sitting there," he said.

"Now, if the NSA through some other sources, maybe through the FBI, maybe through a tip that went to the CIA, maybe through the NYPD. Get a number that where there's a reasonable, articulable suspicion that this might involve foreign terrorist activity related to al-Qaeda and some other international terrorist actors.

Then, what the NSA can do is it can query that database to see did this number pop up? Did they make any other calls? And if they did, those calls will be spit out. A report will be produced. It will be turned over to the FBI. At no point is any content revealed because there's no content," Obama explained.

The WaPo report of June 15 goes into some detail about these previously unknown surveillance programs:

Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.

The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.

For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.

Former NSA contractor Edward Snowden, 29, who unmasked himself as the source behind the PRISM and Verizon revelations, said he hoped for a systematic debate about the “danger to our freedom and way of life” posed by a surveillance apparatus “kept in check by nothing more than policy.”

For well over a week, he has had his wish. Startling disclosures have poured out of the nation’s largest and arguably tightest-lipped spy agency at an unprecedented pace. Snowden’s disclosures have opened a national conversation about the limits of secret surveillance in a free society and an outcry overseas against U.S. espionage.


Obama's statement is confusing, and appears to contradict reported facts, as it seems to say that voice content is not collected.

Read it again. He seems perfectly clear on this:

"Then, what the NSA can do is it can query that database to see did this number pop up? Did they make any other calls? And if they did, those calls will be spit out. A report will be produced. It will be turned over to the FBI. At no point is any content revealed because there's no content," Obama explained.

First, "There's no content." What did he mean by that? Does he mean to say that NSA doesn't collect content? Or, second, is he saying that NSA has no access to content, but other agencies that run their own 702 programs do - and, third, how are those two propositions really different?

His statement raises all three questions, as well as unfortunate questions about his full candor.

Now available in orange, with extra added content at: http://www.dailykos.com/story/2013/06/20/1217474/-Yet-Another-NSA-Program-Raises-Questions-About-Obama-s-Statements-to-Charley-Rose?showAll=yes
ON EDIT - The Guardian has released a new round of documents today that include the NSA's targeting rules and minimiization guidelines. See, http://www.guardian.co.uk/world/interactive/2013/jun/20/exhibit-b-nsa-procedures-document and linked Part A. Have only briefly scanned them, but will note any significant new information in an updated version of this posting.

Director Mueller: Flt. 77 Hijackers were, in Fact, Under NSA Surveillance

NSA Surveillance of 9/11 Plot Was Known to FBI

Outgoing FBI Director Robert Mueller made a startling claim yesterday to a Congressional Committee overseeing the NSA inquiry. The Director described how Khalid al-Midhar, one of the 9-11 hijackers, had called a Yemeni safe house from a phone in San Diego shortly before the attack. Mueller claims had today's surveillance system been in place, NSA surveillance of that call would have led to sharing of intelligence with the FBI and "derailed" the 9/11 attack. http://www.guardian.co.uk/world/2013/jun/13/fbi-mueller-spy-tactics-9-11-boston

That isn't the complete truth, however. Court records from the trial of convicted co-conspiractor Zakaria Moussaoui shows the FBI was aware of NSA intercepts of Midhar and and his partner Nawaf al-Hazmi in the months leading up to 9/11, who went on to hijack Flt. 77 that slammed into the Pentagon. The pair had also met with the other principal 9/11 hijackers at various locations inside the US. Based in part on NSA wiretaps that were later withheld and suppressed, FBI agents had, in fact, located the pair inside the US in mid-2001, but the investigating agents were ordered to close their files after CIA refused to cooperate and pressured the Bureau to shut down several lines of field investigation that were focusing on the plotters.

Mueller's claims omit those key facts. The Director instead stated that Khalid al-Midhar was being monitored by intelligence agencies, but “they lost track of him,” Mueller said. http://www.csmonitor.com/USA/Politics/2013/0613/Secret-NSA-program-could-have-derailed-9-11-attacks-FBI-director-says-video

FBI Director Mueller doesn't explain why. He instead told Congress that intelligence officials did not know that it was Midhar who called a Yemen safehouse to discuss progress of the plot. The NSA monitoring program could have changed that, Mueller argued, potentially leading to the "derailing" of the plot. In fact, the FBI field investigators had already tried to get CIA to reveal the NSA surveillance records they knew already existed, but that line of investigation was shut down by headquarters. Mueller's statement is completely misleading in view of the actual events and decisions taken by ranking intelligence officials to sidetrack ongoing FBI investigations into the al-Qaeda operation during 2001:

“If we had the telephone number from Yemen, we would have matched it up to that telephone number in San Diego, got further legal process, identified al-Mihdhar,” he said. “The 9/11 Commission itself indicated that investigations or interrogations of al-Mihdhar once he was identified could have yielded evidence of connections to other participants in the 9/11 plot.”

Moussaoui Court Records Show CIA Suppression of Ongoing FBI Investigation


We've learned a great deal about 9/11 that confirmed earlier information that points to sabotage of FBI field investigations of the 9/11 hijackers known by both CIA and FBI to be inside the U.S. We also see a chain of malfeasance and dereliction of duty that reaches up into the White House in the handling of the known threat presented by the presence of the soon to be Flt.-77 hijackers, Nawaf Al-Hazmi and Khalid al-Midhar.

The following summary also sheds light on the role that previously unpublicized NSA surveillance had, and how willful misinterpretation of FISA requirements led to FBI surveillance of the Flt. 77 plot being shut down. The "DE" references, below, refer to specific Defense Exhibits in the Moussaoui trial.

(Note: Much of what we now know about the 9/11 plot the material introduced by the defense. http://www.salon.com/2012/06/19/new_nsa_docs_reveal_911_truths/singleton/)

DE #939 entered into the Moussaoui trial on March 11, 2006: email from former CIA Deputy Chief of the CIA Bin Laden unit , Tom Wilshire, back to his CIA CTC managers, Richard Blee, Head of the CIA Bin Laden unit, Cofer Black head of the CIA CTC unit and likely George Tenet, on July 23, 2001. This email said that Khalid al-Mihdhar would be found at the point of the next big al Qaeda attack. Wilshire in the DOJ IG report had also already stated in his July 5, 2001 email back to his CIA CTC managers that he thought the people at the Kuala Lumpur meeting were connected to the warnings the CIA and FBI had been receiving since April 2001 of a huge al Qaeda attack aimed at the United States. These people would have been Mihdhar and Hazmi. Wilshire, as did the CIA already knew Hazmi had a US visa and was inside of the US, and knew Mihdhar had a US multi-entry visa.

According DE 939, Wilshire was not given permission to his two requests on July 13, 2001, and July 23, 2001 to turn the information on Kuala Lumpur meeting over to the FBI Cole bombing investigators (O'Neill's unit), even though his CIA managers, Richard Blee and Cofer Black along with George Tenet were holding an urgent meeting on July 10, 2001 with Rice and Clark in the White house warning Rice and Clark that the al Qaeda terrorists were planning an attack inside of the US that would kill thousands of Americans. see State of Denial by Bob Woodward. On July 17, Blee, Black and Tenet gave the same warning to Ashcroft, and Rumsfeld. Whatever the warning, Ashcroft quite flying commercial aircraft on AJ business on July 26, 2001 due to some still unexplained threat from the FBI?

Less than one month after his July 23, 2001 email back to Blee and Black indicating that Mihdhar would be found at the location of the next big al Qaeda attack, on August 22, 2001 FBI Agent Margret Gillespie, aka Mary, working at the CIA Bin Laden unit tells FBI HQ Agent Dina Corsi and CIA officer Tom Wilshire, working at that time as the FBI ITOS Deputy Chief, that the INS had discovered both Mihdhar and Hazmi inside of the US. It is clear that Wilshire and most likely Corsi know that that point that both Mihdhar and Hazmi are inside of the US to take part in the al Qaeda attack they are aware of that will kill thousands of Americans. It is clear that . . . they work together to shut down the only investigation of Mihdhar and Hazmi that could have prevented this attack. See description of DE 061/062 below.

On August 23, 2001 Gillespie had the CIA Bin Laden unit send out an alert for Mihdhar and Hazmi, and indicated that these al Qaeda terrorists are inside of the US. At that point anyone at the CIA who had received Wilshire’s July 23, 2001 and July 5, 2001 email, or who were aware of the massive warnings of an al Qaeda attack inside of the US would also know that al Qaeda terrorists Mihdhar and Hazmi were inside of the US to carry out the al Qaeda attacks the CIA and FBI HQ had been warned about since April 2001.

See the following webs sites; http://www.vaed.uscourts.gov/notable...aoui/exhibits/ and www.eventson911.com.

In addition to DE 939, the most chilling of these is DE-0681 and DE 0682. In DE 681/682, FBI HQ IOS Agent Dina Corsi tells Bongardt on August 28, 2001, that he and his team must shut down any investigation of Mihdhar and Hazmi because the information came from intelligence through the NSA. But on August 27, 2001 the day before, the NSA had already given Corsi written permission to give all of this NSA information to the criminal investigators on the Cole bombing investigation, see DE-0448 for this actual release from the NSA. (ON EDIT: See, link: "NSA approves sharing info" at http://prior-knowledge-of-9-11.blogspot.com/2008/09/nsa-release-from-nsa-caveats.html)

Corsi also tells Bongardt on August 29, 2001 that a FBI National Security Legal Unit (NSLU) attorney had ruled that Bongardt and his team could have no part in the investigation of Mihdhar and Hazmi but per Sherry Sabol’s testimony to DOJ IG investigators, on November 7, 2002, in the DOJ IG report, it is clear that Sabol, the NSLU attorney Corsi had contacted, had ruled in fact just the opposite and had ruled that Bongardt and his team could be part of any investigation and search for of Mihdhar since the NSA information had no connection to any FISA warrant.

This was the exact argument that FBI Agent Steve Bongardt had raised when he asked Corsi on August 28, 2001 to get a legal ruling from the NSLU, the FBI legal unit, to see if he could investigate and search for Mihdhar and Hazmi. Bongardt even tells Corsi on August 29, 2001 as she is shutting down his investigation, that these terrorists are inside of the US to carry out yet another horrific al Qaeda terrorist attack, and people will die because of this ruling. See testimony of Sherry Sabol, aka Sherry S. 9/11 Commission report page 538, footnote 81.

Corsi also never tells Bongardt as she is shutting down his investigation of Mihdhar and Hazmi that she is aware that the CIA had been deliberately hiding the photograph of Walid Bin Attash, mastermind of the Cole bombing, taken at Kuala Lumpur, from him and his Cole bombing investigating team, a photograph that directly connects both Mihdhar and Hazmi, who were at the same meeting, to the planning of the Cole bombing, see page 302 DOJ IG report. http://forums.randi.org/showthread.php?t=181411&page=3

CIA Ordered FBI Warning Cable Withheld - 9/11 Attacks Could Have Been Thwarted in Jan. 2000

On January 15, 2000, Flt. 77 hijackers, al-Hazmi and al-Nidhar landed at LA Int'l Airport after attending an al-Qaeda planning summit in Kuala Lumpur, Malaysia. According to testimony given by CIA Director Tenet to the 2002 Joint Congressional Inquiry, the CIA and a dozen allied agencies had that meeting under intensive surveillance. Shortly thereafter, an FBI liaison officer in the CIA Counter-Terrorism Center drafted a warning cable about the arrival in the US of the pair, but never sent it.

Why? She was ordered to withhold it by the CIA-CTC Assistant Director.

If that cable had been sent, the presence of the Flt. 77 hijackers and the other 9/11 attack groups would have been known to a much wider group of FBI agents and offices, including John P. O'Neill's I-95 anti-terrorism unit in New York, who would have immediately understood the significance, and ordered both human surveillance and FISA warrant coverage, which would have certainly been granted under the law then in place. Contrary to the testimony yesterday given by Director Mueller, FISA law as it existed before the Patriot Act would have allowed the FBI access to any electronic surveillance of al-Hazmi and al-Midhar, who were foreign nationals and known terrorists. Units of the FBI did obtain access to some of the NSA "take", but under pressure from CIA, these investigators were denied use of this intelligence and access to further electronic coverage.

Here's what the Wiki page for O'Neill says about that:

In 1999, O'Neill sent a close associate named Mark Rossini to work in CIA's Bin Laden Issue Station in Virginia. He had a conflict with station chief Richard Blee; O'Neill wanted Rossini to stay at station and feed him information about what the CIA was doing, while Blee wanted him out working in the field. Later on, the CIA Bin Ladin station learned that Bin-Ladin associates Nawaf al-Hazmi and Khalid al-Mihdhar were headed to the US with Visas. Rossini and his associate Doug Miller attempted to alert O'Neill but the message was blocked by Blee. Mihdhar and Hazmi became two of the hijackers of American Airlines Flight 77 on 9/11.

Not a big believer in an informed public are you? DiFi couldn't cite a single valid example

(and nor has any other defender of the Universal Surveillance State run by Ma Bell) of how this $80 billion Panopticon has protected us from any foreign terrorists. Not one example in a decade of operation.

Give us an example, Steven. We're not going to take merely your word on that. Even if there had been a dozen, that might still be a poor Return on Investment unless we know the specifics. If we're being asked to sacrifice the Fourth Amendment, we need proof that allowing the Telephone Company to record our every word is both necessary and effective.

The President needs a new analyst if he thinks he can continue to operate this way without a consensus of support for the Program.

Is there any good propaganda?

Go to Page: « Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Next »