• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • One Major Paris Mystery: What Happened to the Shooters in the Black Car?

    Van nieuwsblog.burojansen.nl

    Many accounts of the investigation into Friday’s Paris terror attacks have described seven attackers who are known to be dead and one suspect, Salah Abdeslam, who’s known to be alive. Those eight individuals constitute the three suicide bombers who attacked the Stade de France area, three who attacked the Bataclan theater, one who blew himself up in a café near the center of the city, and the still-missing Abdeslam, whose role is unclear. But the individuals responsible for the machine-gun attacks on bars and restaurants in Paris’ city center in which more than 30 people were killed have not been identified, while a breaking report from the AP says authorities are now seeking a “second fugitive” who was directly involved in the attacks. From the wire service:
    Three French officials told The Associated Press on Tuesday that an analysis of the attacks showed that one person directly involved in them was unaccounted for. The officials, who spoke on condition of anonymity because they were not authorized to provide details about the ongoing investigation, said the second fugitive has not been identified.
    Advertisement
    The shooting attacks in the city center were reportedly carried out by gunmen traveling in a black SEAT León car at four restaurants/bars in three different locations: First at the Petit Cambodge restaurant and nearby Carillon bar, then at a pizzeria called Casa Nostra, then at a bar called Belle Équipe. A black SEAT León with three Kalashnikov rifles inside was then found abandoned early Sunday morning in the Paris suburb of Montreuil.

    Who were the gunmen traveling in that car and where are they now? One of the men could have been Ibrahim Abdeslam, Salah’s brother, who blew himself up at a café called Comptoir Voltaire near the other shooting sites after the shootings had already taken place. Salah Abdeslam, meanwhile, was apparently stopped on Saturday near the Belgian border in a car with two other men but wasn’t detained because the officers who stopped him didn’t realize or hadn’t been told that he was a suspect. (Abdeslam’s two companions have since been found and arrested, but he’s still missing.) It seems possible that the pair of brothers and the AP’s “second fugitive” had something to do with the restaurant shootings and that Salah Abdeslam could have ditched the SEAT León before fleeing for Belgium. But four days after dozens were killed at Petit Cambodge, Carillon, Casa Nostra, and Belle Équipe, we still don’t know for sure who was responsible for killing them and whether those attackers are still at large.

    By Ben Mathis-Lilley
    NOV. 17 2015 1:23 PM

    Find this story at 17 November 2015

    © 2015 The Slate Group LLC.

    Opération Sentinelle: la ligne Maginot de la sécurité intérieure

    Van nieuwsblog.burojansen.nl

    Les terroristes ont contourné les militaires, qui souhaitaient faire évoluer leur dispositif pour le rendre moins statique. Mais le gouvernement ne voulait pas alors donner l’impression de baisser la garde dans la protection des écoles, juives notamment.

    A la suite des attentats du début de l’année, l’opération Sentinelle a été déclenchée le 12 janvier. Mobilisant d’abord 10000 hommes, elle devait s’inscrire dans la durée avec 7000 hommes chargés de la protection d’environ 800 sites sensibles, dont près de la moitié en région parisienne. Suite aux attaques de vendredi, l’Elysée a annoncé l’arrivée de 3000 hommes en renfort.
    Comme la Ligne Maginot en 1940, le dispositif militaire de sécurité intérieure a été contourné par l’ennemi. Les terroristes n’ont pas attaqué les sites protégés par l’opération Sentinelle, en particulier ceux de la communauté juive, mais ils ont porté le feu ailleurs. Là où il n’y avait pas de militaires. A cet égard, le Bataclan est un nouveau Sedan.
    Les attaques du vendredi 13 soulignent l’impossibilité d’assurer la protection des Français, désormais tous menacés, grâce au déploiement de l’armée dans les rues. L’Elysée peut bien annoncer l’arrivée de 3000 hommes en renfort, qui s’ajouteront aux 7000 déjà engagés, le problème reste entier : quel rôle l’armée peut-elle jouer dans la sécurité intérieure ?
    Depuis des mois, ce sujet fait l’objet de discussions entre les responsables gouvernementaux et militaires. Les attentats de Paris vont les relancer, voire les amplifier, parce que la question de l’efficacité du dispositif se pose désormais de manière criante.
    Dès les lendemains des attentats contre Charlie et l’Hyper Cacher, les militaires avaient été déployés, dans le cadre de l’opération Sentinelle, pour protéger certains sites sensibles. 7000 militaires (l’équivalent de deux brigades sur les 12 que compte l’armée de terre) l’étaient depuis lors de manière permanente. Au passage, le ministère de la Défense a bénéficié d’une rallonge budgétaire de 4,8 milliards, qui a permis de préserver 18 500 postes. Une mesure très bien accueillie dans la troupe, le chef d’état-major de l’armée de terre, le général Bosser, assurant même les députés de sa « pleine satisfaction ».
    Mission de protection ponctuelle. Mais il y a un hic : les soldats professionnels ne sont pas des vigiles ou des supplétifs des forces de police. Si, dans une situation d’urgence, ils peuvent être engagés dans des missions de protection ponctuelle, ils n’ont pas vocation à l’être de manière permanente et massive. Malgré les primes et la médaille qui vient d’être créée, Sentinelle n’est guère populaire dans les casernes. Monter la garde dans les rues de Paris, ce n’est pas ce que les jeunes venaient chercher en s’engageant.
    Depuis l’été, les états-majors cherchaient donc à faire évoluer leur dispositif, en le rendant plus mobile, plus réactif, moins « scotché », selon le mot d’un officier. Or, scotchés, les militaires le sont pour l’essentiel devant les sites de la communauté juive. D’où la gêne de tous les responsables sur cette question. Personne ne veut fournir des chiffres précis : environ 800 sites sont concernés par l’opération Sentinelle et parmi eux « une grande majorité de lieux de culte et d’écoles », reconnaît-on au ministère de la Défense. En dehors de la communauté juive, un officier assure que « des dizaines d’églises sont concernées et que les mosquées sont plutôt protégées par des patrouilles » que par une garde permanente. La liste des sites sensibles est fixée par le ministère de l’Intérieur, sur la base du travail des préfets, l’armée agissant ensuite dans le cadre d’une « réquisition ».
    Selon les services de renseignement intérieur, la communauté juive, notamment ses écoles, fait toujours l’objet d’une menace très sérieuse. Après l’affaire Ilan Halimi, les attaques de Mohammed Merah contre l’école Ozar Hatorah (4 morts, dont 3 enfants) et d’Amedy Coulibaly contre l’Hyper Cacher (4 morts) ont profondément traumatisé les Français d’origine juive. Ils attendent que la République les protège et les rassure. Mais depuis vendredi, tous les Français sont désormais dans leur cas.
    Jusqu’à présent, personne au sommet de l’Etat n’a voulu prendre le risque de retirer un militaire de la protection d’une école juive. L’armée est bel et bien « scotchée », une situation inconfortable du point de vue tactique. Mais, explique un responsable gouvernemental, « si l’Elysée a décidé de préserver des effectifs et d’augmenter le budget de la Défense, c’est pour faire Sentinelle et pas des missions de sécurité intérieure que l’armée s’inventerait », comme la protection des frontières avec les migrants ou le « contrôle de zones » dans les quartiers sensibles.
    Rapport au Premier ministre. Une réflexion gouvernementale sur l’engagement de l’armée en France, pilotée par le Secrétariat général de la défense et de la sécurité nationale (SGDSN), est en cours. Elle devait aboutir en janvier à la remise d’un rapport au Premier ministre, fixant le nouveau cadre d’emploi de l’armée sur le territoire national. La nouvelle donne terroriste risque de compliquer encore les choses.
    Dix mois après le déclenchement de l’opération Sentinelle, on ne connaît toujours pas les grands principes qui doivent guider l’action militaire sur le sol national, c’est-à-dire face à des Français dans le cadre d’un Etat de droit. « Pour un militaire, un citoyen ne peut pas devenir un adversaire », explique-t-on à l’état-major des armées. « Nous pouvons être engagés pour faire face à la menace terroriste, mais pas dans des missions d’ordre public ». Des généraux ont, un temps, réclamé que les militaires reçoivent certains pouvoirs de police… ce qui revenait à les transformer en gendarmes. L’état d’urgence décrété et la « guerre » dont parle le chef de l’Etat vont-ils faire évoluer les choses dans ce sens ? On se retrouverait alors dans une situation proche de celle des débuts de la guerre d’Algérie, quand les socialistes étaient déjà au pouvoir.
    Pour le général Pierre de Villiers, chef d’état-major des armées, « plutôt que de suppléer les forces de sécurité, les armées doivent apporter des savoir-faire complémentaires ». Reste à savoir lesquels ? Personne n’a encore fourni de réponses définitives et convaincantes. « La capacité de travailler jour et nuit, une grande mobilité, un savoir-faire en matière de renseignement – tant humain que via des drones », expliquait récemment le patron de l’armée de terre. Tout ou presque, sauf des gardes statiques permanentes…
    L’armée de terre n’est pourtant pas prête à renoncer à cette mission Sentinelle. Par conviction, comme l’exprime le général de Villiers : « La mission des armées, en temps de crise comme en temps de paix, est de protéger tous les Français où qu’ils se trouvent. » Mais aussi par intérêt bien compris. Car Sentinelle lui a permis de sauver ce qui fait le cœur de son identité : ses effectifs.

    Jean-Dominique Merchet 15 novembre 2015 à 16h28
    Find this story at 15 November 2015

    © l’Opinion 2015

    Metadata Surveillance Didn’t Stop the Paris Attacks

    Van nieuwsblog.burojansen.nl

    And yet intelligence officials and politicians are now saying it could have. They’re wrong.

    Since terrorists struck Paris last Friday night, the debate over whether encryption prevents intelligence services from stopping attacks has reignited. The New York Times and Yahoo reported on vague claims that the terrorists’ use of encryption stymied investigators who might have thwarted their plans. CIA Director John Brennan made equally vague comments Monday morning, warning that thanks to the privacy protections of the post-Snowden era, it is now “much more challenging” for intelligence agencies to find terrorists. Jeb Bush piled on, saying that the United States needs to restore its program collecting metadata on U.S. phone calls, even though that program won’t be shut down until the end of this month.

    Following a terrorism incident as shocking as the Paris attacks, it is no surprise that politicians and the intelligence establishment would want to widen American spying capabilities. But their arguments are conflating the forest—bulk metadata collection—and the trees: access to individual communications about the attack. To understand why that’s the case, start with this tweet from former NSA and DHS official Stewart Baker: “NSA’s 215 program”—and by association the far larger metadata dragnet of which the domestically focused phone-metadata program is just a small part—“was designed to detect a Mumbai/Paris-style attack.”

    Only it didn’t.

    The metadata surveillance system appears to have failed before it even got to the encryption stage.
    The United States and United Kingdom’s metadata collection that focuses on the Middle East and Europe is far more extensive than the phone dragnet being shut down later this month, and its use has far more permissive rules. This dragnet is mostly limited by technology, not law. And France—which rewrote its surveillance laws after the Charlie Hebdo attack earlier this year—has its own surveillance system. Both are in place, yet neither detected the Nov. 13 plot. This means they failed to alert authorities to the people they should more closely target via both electronic and physical surveillance. In significant part, this system appears to have failed before it even got to the stage at which investigators would need to worry about terrorists’ use of encryption.

    To understand why that’s true, it helps to understand how the metadata dragnet relates to surveillance of content as well as human spying.

    In most public comments going back to the initial leaks from Edward Snowden (and in Baker’s tweet from the weekend), authorities have made a shaky claim: that the surveillance dragnet is “designed to detect” an attack like Paris. Based on that claimed purpose, their dragnets are failing.

    But that claim was always an oversimplification. It oversold the importance of the dragnet, by itself, such that citizens might more willingly tolerate the collection of highly revealing personal details. Because it doesn’t include the actual content of our conversations, call metadata doesn’t seem especially intimate; if it’s the only thing authorities say they need to prevent a big terrorist attack, citizens might easily conclude that they’re fine with the government collecting it. But the claim also served to hide how quickly metadata analysis can lead to the reading of content.

    The intelligence community has given us a more nuanced understanding of the purpose of the metadata dragnet, however, in a National Academy of Sciences paper on “Bulk Collection of Signals Intelligence” released earlier this year. President Obama asked for the paper in early 2014 to assess whether the intelligence apparatus could accomplish what it currently does with metadata dragnets (both those conducted in the U.S. and overseas) via more targeted data collection.

    The NAS report measured the dragnet in terms of three functions:

    Contact chaining, which maps out networks of people based on whom they communicate or even spend time with.

    Identifying and keeping current all known identifiers (phone numbers, email addresses, device identifiers, IP addresses, Internet IDs) a person of interest uses. This is done, in part, by using algorithms to match up the communication patterns of different accounts.

    “Triaging” the identifiers collected to categorize the urgency of the threat to national security from the party associated with each one.
    If the dragnet accomplishes its purpose, it will provide a fairly comprehensive picture of who is communicating or hanging out with whom, connect all the known communications identities of any given person (which is critical to developing a comprehensive picture of someone’s network and the communications tools he uses), and then use those pictures to identify who poses threats that should be followed more closely.

    If the metadata dragnet works, that can happen even with encrypted communication.

    It’s only through that process that authorities get around to actually reading content. Authorities will use the metadata dragnet, for example, to choose what content to keep from bulk content collection. It’s likely they’ll collect, but maybe not immediately read, communications that are one or two degrees of separation from identifiers of interest just in case it becomes interesting later. Importantly, the NSA will even keep encrypted communications that, because of their metadata, are of interest.

    The metadata dragnet also helps the intelligence community decide whom to target in its bulky Section 702 PRISM collection, which last year affected more than 92,000 targets and everyone they communicated with. Here, rather than doing the bulk collection itself, the NSA capitalizes on the fact that much of the world uses American tech companies like Google and Facebook to conduct (and often, store) its online communications. So when the triaging process identifies new foreign identifiers that seem important, NSA can ask the tech companies to preserve and share on an ongoing basis everything that’s associated with that identifier, including more metadata. In most cases, NSA will get the content of communications those identifiers have, which they’ll read and store and pull up again in the future if a related identifier is involved.

    There are a few exceptions where officials cannot get the contents of communications via PRISM because they’re encrypted at the user level, rather than server level. The most important of these exceptions are WhatsApp and iMessage (and the latter only if users have opted not to use Apple’s cloud to store their communications), as well as any communications users have encrypted on their own. The NSA can’t get this content from Facebook, Apple, or other providers, but it can get metadata, so for users of interest, surveilers should at least know who is communicating with whom as well as some other useful details about them, though not what they’re saying.

    For WhatsApp and iMessage users of interest, as well as those using their own encryption, the intelligence agencies will seek ways to bypass the encryption, often by hacking a user’s device or identifying his IP address and then accessing other devices or Internet accounts using that IP.

    Importantly, however, it takes the triaging process or a particular event (like Friday’s attack) to identify users of such importance that the NSA will make the effort to conduct more targeted spying.

    Finally, there’s old-fashioned physical surveillance and human intelligence, asking people to spy on others. As reflected by the CIA’s recent decision to add a digital innovation unit, even old-fashioned spying is increasingly guided and assisted by communications technology, both in identifying targets but also finding ways and information to compromise those targets. Numerous declassified reports make it clear the FBI uses the American phone dragnet to identify people who might make useful informants. (It also sometimes uses communications content to find intelligence they can use to coerce that cooperation.) Presumably, other intelligence services do the same.

    For targets in a known location that are using very good communications security (by using encryption and ensuring their multiple identities cannot be correlated, not even with geolocation), physical surveillance of known targets (as several of the Paris perpetrators were by authorities) is always an option. The problem with that is it is very time- and labor-intensive—and because France and Belgium have so many potentially dangerous extremists, selecting whom would get that level of attention requires a very good combing process.

    It all comes back to this triage, which is in significant part about how well the intelligence community uses that forest of metadata to pick whom it should target.

    “Knowing who someone communicates with is metadata, not content, and most encrypted protocols (e.g. WhatsApp, Telegram, etc.) don’t change this,” Nicholas Weaver, a researcher at the International Computer Science Institute at UC–Berkeley explains. “In attempting to identify actual threat actors, ‘this person is communicating with ISIS’ is probably all you need to justify more intensive targeted actions, such as system compromise, that bypass any effects of encryption.”

    There are a number of reasons why the dragnet might not work as planned. Some important metadata may be missing, perhaps even from the PlayStation 4 consoles some terrorists have used to communicate, which Belgium’s Interior Minister said has posed particular problems in the days before the attack. (Though there’s no evidence PS4s played a role in this attack.) Some metadata, especially that scraped from content, may be increasingly unavailable if the content itself is encrypted. When individuals keep their online identities rigorously separate, that too makes the dragnet less useful, as it makes it hard to identify a terrorist network. Finally, it may be that the triage process doesn’t always measure the importance of communications effectively.

    In any case, news reports on the investigation into Friday’s attacks have suggested that some of the terrorists involved in the attack—even a figure identified as the possible planner—have had some of their communications analyzed already. If so, enough metadata was available to partially map out this network. If investigators know about these communications now, they could have known about them on Thursday, before the attack. And if they did, investigators might have been able to bypass whatever encryption the terrorists did use.

    The terrorists who conducted Friday’s attack may well have been using encryption. But if so, it appears that the metadata dragnet failed well before agencies got to any encrypted communications.

    By Marcy Wheeler
    NOV. 16 2015 10:44 PM

    Find this story at 16 November 2015

    © 2015 The Slate Group LLC

    U.S. Mass Surveillance Has No Record of Thwarting Large Terror Attacks, Regardless of Snowden Leaks

    Van nieuwsblog.burojansen.nl

    Despite the intelligence community’s attempts to blame NSA whistleblower Edward Snowden for the tragic attacks in Paris on Friday, the NSA’s mass surveillance programs do not have a track record — before or after Snowden — of identifying or thwarting actual large-scale terrorist plots.

    CIA Director John Brennan asserted on Monday that “many of these terrorist operations are uncovered and thwarted before they’re able to be carried out,” and lamented the post-Snowden “handwringing” that has made that job more difficult.

    But the reason there haven’t been any large-scale terror attacks by ISIS in the U.S. is not because they were averted by the intelligence community, but because — with the possible exception of one that was foiled by local police — none were actually planned.

    And even before Snowden, the NSA wasn’t able to provide a single substantiated example of its surveillance dragnet preventing any domestic attack at all.

    The recent history of terror arrests linked to ISIS is documented in an internal unclassified Department of Homeland Security document provided to The Intercept via SecureDrop. It shows that terror arrests between January 2014 and September 2015 linked to ISIS were largely of people trying to travel abroad, provide material support, or plan attacks that were essentially imaginary.

    The document, dated before the Paris attacks, includes a list and map of 64 U.S. persons arrested on terror-related charges over the course of nine months who were “assessed to be inspired by the Islamic State of Iraq and the Levant,” or ISIS.

    ?
    Isil Related Arrests in Homeland From jan2014 sept2015 Final Redacted
    6 pages
    The document assigns six categories to types of arrests made in the given time period: a foiled attack, “aspirational” planning, “advanced attack plotting,” failed travel, travel, or material support.

    The only foiled attack involved the arrests of Elton Simpson and Nadir Soofi, who traveled from Arizona to Garland, Texas, bearing assault weapons and body armor, intending to shoot up an art contest involving the drawing of cartoons of the Prophet Muhammad. Both attackers were shot by local police officers.

    There are just five instances of what the report’s authors call “advanced attack plotting” — two of which involve the FBI providing assistance in planning or acquiring supplies for an attack before making an arrest.

    Harlem Suarez, a 23-year-old from Florida, had been posting on Facebook about his support for ISIS when an undercover FBI agent started communicating with him, eventually about a “timer bomb” he wanted to construct and detonate on a public beach in Key West. Suarez asked the undercover agent if he knew how to assemble a bomb, and the agent agreed to get what he needed, subsequently goading him by asking if he was “true to the Islamic State” or “just playing games.” Suarez paid the FBI agent for the materials to assemble the bomb, and the agent taught him how to detonate it. When he tried to carry out the attack, he was arrested. His attorneys described him as “troubled and confused” in a statement.

    An FBI agent also provided a fake explosive device to John T. Booker, a 20-year-old Kansas man who was indicted for attempting to use a weapon of mass destruction.

    Christopher Cornell, a 20-year-old from Ohio, started posting on Twitter under an alias about his support for ISIS when someone in contact with Cornell agreed to be an FBI informant. Cornell talked about attacking the U.S. Capitol. But his father said it was the FBI that was “taking him somewhere, and they were filling his head with a lot of this garbage.”

    Munther Omar Saleh, a New York college student, was arrested after trying to stab federal officers executing a search warrant at his home. The FBI said he and a co-conspirator discussed setting off a pressure-cooker bomb in New York, but no such charge was filed.

    Usaamah Rahim, a 26-year-old Boston man, was killed by police officers when he was stopped for questioning after allegedly threatening them with a knife. He had been posting ISIS-inspired social media messages, and had threatened to kill Pamela Geller, the host of the Garland, Texas, Muhammad cartoon contest. Law enforcement sources called that plot a “fantasy,” but said his second plan, to kill cops, was more believable.

    There were 12 examples of “aspirational” plots, or even less advanced plans to commit attacks.

    There were 30 arrests involving people who were trying to travel to join up with ISIS, most of whom failed, and 15 of people attempting to provide some sort of “material support.”

    That’s hardly a record of averting major ISIS attacks on the homeland.

    In fact, there’s no evidence that the NSA’s extraordinary surveillance dragnet, as revealed by Snowden, has disrupted any major attack within the U.S. ever.

    The U.S. government initially responded to Snowden’s disclosures in 2013 by suggesting that he had irreparably damaged valuable, life-saving capabilities. Two weeks after the media first reported on Snowden’s leaks, President Barack Obama said that the NSA “averted … at least 50 threats … because of this information,” gathered through communications collection in the United States and abroad.

    Members of Congress and the administration alike subsequently repeated that claim, upping the total to 54 attacks thwarted.

    But only 13 of the 54 cases “had some nexus to the U.S.,” Senator Patrick Leahy, D-Vt., said in a Senate Judiciary Committee hearing in October 2013. And they were not all terror “plots”; a majority involved providing “material support,” like money, to foreign terror organizations.

    Then-NSA Director Keith Alexander was forced to dial back the rhetoric, eventually saying only that the intelligence programs “contributed to our understanding” and “helped enable the disruption of terrorist plots.”

    The only incident the NSA has ever disclosed in which its domestic metadata collection program played a key role involved a San Diego man who was convicted of transferring $8,500 to al Shabaab in Somalia — the terror group responsible for a mass shooting at a mall in Kenya. And the metadata program is the only one that has been reigned in since the Snowden disclosures.

    The three other terrorism cases the NSA cited as warrantless surveillance success stories were debunked. Either the government could have gotten a warrant, or it received a tip from British intelligence, or it was a case of fraud, not terrorism.

    A White House panel concluded in December 2013 that the NSA’s bulk collection of Americans’ telephone information was “not essential in preventing attacks.” A member of the panel took it one step further, when he told NBC News that there were no examples of the NSA stopping “any [terror attacks] that might have been really big” using the program.

    Jenna McLaughlin
    Nov. 17 2015, 8:19 p.m.

    Find this story at 17 November 2015

    Copyright https://theintercept.com/

    AMERICAN TERRORIST

    Van nieuwsblog.burojansen.nl

    FRONTLINE investigates American-born terrorist David Coleman Headley, who helped plan the deadly 2008 siege on Mumbai. In collaboration with ProPublica, the film — an updated and expanded version of A Perfect Terrorist — reveals how secret electronic surveillance missed catching the Mumbai plotters, and how Headley planned another Charlie Hebdo-like assault against a Danish newspaper.

    APRIL 21, 2015 // 01:23:48

    Find this story at 21 April 2015

    Copyright http://www.pbs.org/

    Attentats de Paris : les messages du commanditaire au tueur de l’Hyper Cacher

    Van nieuwsblog.burojansen.nl

    Abonnez vous à partir de 1 € Réagir ClasserPartager (1 681)Tweeter
    image: http://s2.lemde.fr/image/2015/11/07/534×0/4805097_6_dc91_une-video-d-amedy-coulibaly-dans-laquelle-il_1e40cfd5515a5931c0c9dd14ee771631.jpg
    Une vidéo d’Amedy Coulibaly dans laquelle il revendique les attentats de Paris en janvier.
    L’enquête colossale sur les attentats de Paris en janvier s’oriente aujourd’hui, notamment, sur la piste d’un donneur d’ordre. Une personne susceptible d’avoir coordonné à distance les attaques des frères Kouachi contre Charlie Hebdo, le 7 janvier, et d’Amedy Coulibaly à l’Hyper Cacher de la porte de Vincennes, le 9 janvier. C’est la découverte de quelques-uns des échanges de ce commanditaire avec ce dernier qui ont trahi son existence. En l’état, impossible d’identifier son nom ou sa localisation exacte. Les éléments qui attestent de sa présence ne sont que des morceaux de mails et des adresses IP disparates repérés dans l’immensité du Web.
    Lire aussi (abonnés) : Attentats de Paris : la justice sur les traces des commanditaires

    Mais dix mois jour pour jour après les attentats, l’étau se resserre progressivement, d’après les éléments que Le Monde a pu consulter, autour d’un individu se trouvant à l’étranger. Un homme qui, à l’évidence, avait une vision d’ensemble des tueries qui ont coûté la vie à 17 personnes et qui a piloté en partie les opérations.
    Rédigés dans le langage lapidaire des SMS, mais toujours précis dans leurs instructions, les messages de ce mystérieux commanditaire s’apparentent chaque fois à de véritables ordres guerriers. « Ok, fé ske ta a fair aujourdhui ms simple com ça tu rentr dormir ensuit tu plank et verifi adress 1 ts les jrs : indications bientot pr recup amis aider toi. debarasse toi puce, maintenant passe sur adress 1, fini adress 2 », écrit-il ainsi à Amedy Coulibaly le 7 janvier, à 14 heures. Soit seulement deux heures après la tuerie de Charlie Hebdo…
    Le renfort de plusieurs compagnons d’armes
    Un peu plus tôt, à 12 h 48 exactement, le coordinateur inconnu a consulté un message du futur tueur de l’Hyper Cacher contenant plusieurs fichiers intitulés « inventaires ». Un seul d’entre eux n’était pas chiffré et donne une idée du contenu des autres. « J’ai un AK74 avec 275 cartouches. Six tokarev avec 69 cartouche. Trois gillet par balle militaire trois gillet tactique deux bombe a gel et a gaz deux gros couteaux un choqueur ». Un mail à l’orthographe hasardeuse sans doute rédigé par Amedy Coulibaly lui-même.
    Lire aussi : L’explosion de Villejuif et les tirs de Fontenay-aux-Roses attribués à Coulibaly

    En plus d’établir qu’il y avait donc bien une personne, en coulisse, tirant les ficelles du drame, ces échanges laissent entrevoir le fait que, au-delà des frères Kouachi, Amedy Coulibaly devait, semble-t-il, recevoir le renfort de plusieurs compagnons d’armes pour son épopée macabre. Un scénario dont atteste, en filigrane, un dernier mail du commanditaire présumé, dévoilé par BFM TV, le 13 octobre. Le message date cette fois du 8 janvier à 17h21. « 1) pas possible amis, travailler tt seul », écrit notamment l’insaisissable correspondant, avant d’ajouter « 2) si possible trouver et travailler avec zigotos bien. 3) si possible expliker ds video ke toi donner zigoto les outils au nom de d, préciser leskels. » Les « zigotos » désigneraient les frères Kouachi, alors en pleine cavale. « D » signifierait « Daech ».
    Officiellement, seuls les frères Kouachi ont revendiqué l’attaque du journal satirique au nom d’Al-Qaida dans la péninsule Arabique (AQPA). Revendication appuyée, dès le 9 janvier, par un message vidéo sur YouTube du porte-parole d’AQPA au Yémen, Nasser Ben Ali Al-Anassi. Dans une autre vidéo posthume, Amedy Coulibaly, lui, s’est réclamé de l’Etat islamique (EI). Mais en exhumant ces échanges, le travail minutieux des enquêteurs spécialisés en cybercriminalité montre que les frontières peuvent être poreuses entre les deux organisations.
    Les prescriptions testamentaires de Coulibaly
    Quel individu, francophone, a pu avoir l’expérience, le parcours et le réseau, pour se retrouver informé à la fois du projet des frères Kouachi contre Charlie Hebdo au nom d’AQPA et de celui d’Amedy Coulibaly au nom de l’EI ? Quel itinéraire derrière ce soin inattendu à ne pas laisser AQPA « bénéficier » seule des retombées médiatiques de l’attentat du journal satirique ?
    Sans qu’aucun lien soit fait directement avec les attentats, deux noms de djihadistes français apparaissent avec insistance dans l’instruction colossale de la juge Nathalie Poux : ceux de Peter Cherif et de Salim Benghalem. Tous les deux ont la particularité d’avoir été plus ou moins proches des frères Kouachi et d’Amedy Coulibaly, tout en étant passés par le Yémen, où se trouve AQPA.
    Lire aussi : Le djihadiste français Salim Benghalem aurait été le geôlier des ex-otages en Syrie

    A son mystérieux tuteur opérationnel, Amedy Coulibaly avait en tout cas confié jusqu’à ses prescriptions testamentaires. Dans un ultime message non daté intitulé « salam », il demande à ce que l’on prenne soin de son épouse religieuse, Hayat Boumedienne : « Je voudrais que le frère s’occupe de ma femme dans les règles de l’Islam, réclame-t-il notamment. Je voudrais pour elle qu’elle ne se retrouve pas seule qu’elle est une bonne situation financiere qu’elle ne soit pas dellaiser. Surtout qu’elle apprenne l’arabe, le Coran et la science religieuse. Veillez a se quel aye bien religieusement. Le plus important c’est le dine [la religion en arabe] et la foi et pour sa elle a besoin d’etre accompagné. Qu’Allah vous assiste. »

    Le Monde.fr | 07.11.2015 à 10h46 • Mis à jour le 08.11.2015 à 11h05 | Par Elise Vincent
    Find this story at 7 November 2015

    © Le Monde.fr

    Renseignement : partie de ping-pong entre DGSE et DRM

    Van nieuwsblog.burojansen.nl

    Dans l’ombre, les deux services s’affrontent sur leur rôle respectif dans les opérations militaires

    Les services de renseignement sont « une petite oasis d’abondance ». L’un de leurs principaux responsables se réjouit du traitement de faveur dont la « politique publique de renseignement » jouit au sein des activités de l’Etat. La tendance, soulignée depuis plusieurs années, a été nettement confirmée à la suite des attentats de janvier. Une loi, élargissant leurs capacités d’interception, a été votée en juin et leurs moyens financiers et humains sont renforcés, en particulier dans le cadre de l’actualisation à la hausse de la loi de programmation militaire.
    Cette situation n’empêche pas les « services » de se quereller autour des opérations militaires en cours, que ce soit au Sahel ou au Levant (Irak et Syrie). Ce n’est pas la guerre ouverte, mais plutôt une « partie de ping-pong » pour savoir qui fait quoi, comme le note un acteur du dossier. En jeu : le rôle de la DGSE (Direction générale de la sécurité extérieure) et de la DRM (Direction du renseignement militaire) sur les théâtres d’opération. Une querelle de famille, car les deux services dépendent tous les deux du ministère de la Défense, même si la DGSE jouit d’un rôle spécifique au sein de l’Etat, avec notamment un accès direct au président de la République.
    L’un le dit en anglais : « Find. Fix. Finish. » L’autre en français : « Trouver. Traquer. Terminer. » Ce sont deux hauts responsables des services qui évoquent leur rôle au Sahel dans la guerre contre les groupes terroristes. Ils parlent de l’élimination de leurs chefs, les High Value Target (HVT), les cibles de haute valeur, en anglais pour tout le monde. « Finish » ou « Terminer » veut dire tuer, et c’est le rôle des forces spéciales de l’opération Sabre. Là-dessus, tout le monde est à peu près d’accord.
    En revanche, qui trouve et traque les HVT ? Les militaires de la DRM ou les agents de la DGSE ? Dans le meilleur des mondes, le mieux placé pour le faire et ce, en collaboration avec les autres. Sur le terrain, c’est globalement ce qui se passe et cela fonctionne : les groupes terroristes qui ont perdu plusieurs de leurs hauts responsables depuis janvier 2013 ne démentiront pas. Dans les bureaux parisiens, l’affaire est plus compliquée, car chaque service à bien compris que la guerre contre le terrorisme allait redessiner pour longtemps le paysage du renseignement français et qu’il faut, dans ce cadre, s’y garantir une bonne place. Dans l’attente d’arbitrages politiques, chacun tire la couverture à soi.
    « Trouver » les chefs terroristes ? La DGSE explique jouer « un rôle tout à fait essentiel » en « fournissant l’essentiel du renseignement » sur les HVT. C’est, y dit-on, « son métier stratégique ». Mais, ensuite, le boulevard Mortier est prêt à « transférer la traque à la DRM », puisqu’il s’agit d’une « mission tactique » que l’on peut confier aux militaires. Évidemment, ceux-ci ne l’entendent pas de cette oreille et mettent en avant leurs propres moyens de renseignement leur permettant de « trouver » les chefs terroristes.

    Lors d’un récent colloque à la Société de Géographie, la DRM présentait ainsi ses moyens techniques d’analyse spatiale permettant de localiser un centre de commandement de Daech à Mossoul (Irak). L’exemple, assurait la DRM, était purement fictif. Par rapport aux militaires, la DGSE dispose d’un atout majeur : elle est le seul service autorisé à conduire des actions clandestines à l’étranger, qu’il s’agisse de renseignement ou d’action. « Nous seuls pouvons mener des actions de l’Etat non revendicables par l’Etat », indique un acteur de ce dossier. Sur ce plan, la DGSE a d’ailleurs décidé récemment de « relancer la recherche humaine » en son sein, avec une nouvelle organisation qui redonne du poids à l’espionnage traditionnel par rapport au renseignement technique (les écoutes).
    L’un des autres points de crispation entre les services est la notion de « théâtres ouverts » et de « théâtres fermés ». Les premiers sont les pays où la France mène des opérations militaires comme le Mali, le Niger ou l’Irak. Là, la DRM peut être « leader », assure une source proche du dossier, « mais tous les autres services sont mobilisés ». Ainsi, l’ensemble des services de renseignement, y compris ceux relevant des ministères de l’Intérieur et des Finances, sont désormais représentés au sein du Centre de préparation et de conduite des opérations (CPCO), à l’état-major des armées.
    Les « théâtres fermés » posent un problème plus aigu : officiellement, la France n’y mène pas d’actions… si ce n’est clandestines. Elles relèvent dans ce cas uniquement de la DGSE. Mais, explique un acteur, « les forces armées peuvent anticiper l’ouverture d’un théâtre », comme ce fut le cas au Sahel, en Centrafrique ou en Libye. Aujourd’hui, les regards de la communauté du renseignement se tournent vers la Syrie, un « théâtre » en cours d’ouverture depuis la décision du président de la République d’y effectuer des « vols de reconnaissance » ouvrant la voie à des frappes que François Hollande a jugées lundi « nécessaires ». « On ne peut pas désactiver des cellules terroristes en France si on ne va pas un peu plus en profondeur », c’est-à-dire en Syrie, explique un spécialiste de l’antiterrorisme.
    La Syrie le montre : les militaires peuvent recueillir du renseignement grâce aux vols de reconnaissance mais pas sur le terrain où les opérations sont nécessairement clandestines. Qui, au final, réalise la synthèse – la « fusion » disent les hommes du métier ? Qui, par conséquent, informe et conseille les responsables politiques ? Il existe depuis 2008 un coordonnateur national du renseignement (CNR) à l’Elysée – l’actuel est l’ambassadeur Didier Le Bret – mais son rôle n’est pas directement opérationnel. La fusion exige en effet des moyens sophistiqués comme les systèmes de Geoint (geospatial intelligence) de la DRM.
    La DGSE, service « intégré », est organisée en son sein même pour produire des synthèses à partir du renseignement qu’elle recueille par les écoutes (Direction technique) ou l’espionnage traditionnel, ainsi que les capteurs mis en œuvre par les armées (satellites ou avions). En cela, la DGSE se distingue de ses homologues étrangères, comme la CIA qui doit cohabiter avec la NSA, l’agence spécialisée dans les interceptions électroniques. Pour les responsables de la DGSE, cette particularité française est un atout considérable auquel ils sont très attachés.
    Dans les milieux parlementaires, certains imaginent de créer une agence, comme la NSA ou la GCHQ britannique, qui fournirait du renseignement électronique à toute la communauté du renseignement. Pour la DGSE, c’est un chiffon rouge. Comme le maintien en son sein d’une composante purement militaire – le Service Action –, certains considérant à tort qu’il ferait double emploi avec les forces spéciales.

    20 septembre 2015 à 15h03
    Par Jean-Dominique Merchet

    Find this story at 20 September 2015

    © l’Opinion 2015

    Inside Allan Dulles’ Reign as CIA Director, from ’54 Guatemala Coup to Plotting Castro’s Overthrow

    Van nieuwsblog.burojansen.nl

    DAVID TALBOT
    author of the new book The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government. He is the founder and former CEO and editor-in-chief of Salon. He is also author of the best-seller, Brothers: The Hidden History of the Kennedy Years.
    This is viewer supported newsDONATE
    Voters go to the polls in Guatemala on Sunday to elect a new president after a popular uprising led to President Otto Pérez Molina’s resignation and jailing. We speak with journalist and historian David Talbot, author of “The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government,” about the role Allen Dulles and his brother, then-Secretary of State John Foster Dulles, played in the CIA’s 1954 coup in the country, the ramifications of which are still being felt. “The CIA and Allen Dulles told Eisenhower after the Guatemala coup, ‘Oh, it was a clean coup. You know, hardly anyone died,'” Talbot said. “But the fact is, tens of thousands of people died in the killing fields of Guatemala as a result of that coup, and that violence continues today.”

    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.
    AMY GOODMAN: We turn now to Part 2 of my conversation with the author of The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government. The new book is written by journalist and historian David Talbot, the founder of former CEO and editor-in-chief of Salon. The book examines the life and legacy of Alan Dulles, the longest-serving CIA director. He held the position from 1953 to ’61, but his influence is still felt at the agency. Under his watch, the CIA overthrew the governments of Iran and Guatemala in 1953 and 1954, invaded Cuba, and was tied to the killing of Patrice Lumumba, Congo’s first democratically elected leader.

    During Part 1 of our conversation, I asked David Talbot about the 1953 coup in Iran and the ’61 murder of Patrice Lumumba. Part 2 of our interview begins with Guatemala. The ramifications of the CIA’s 1954 coup are still being felt in Guatemala, where voters will go to the polls next Sunday to elect a new president. Last month, President Otto Pérez Molina resigned and was jailed following a popular uprising. I asked David Talbot to talk about the ’54 coup and the role played by Allen Dulles and his brother, John Foster Dulles, who was secretary of state at the time.

    DAVID TALBOT: Well, of course, their original power goes back to Sullivan & Cromwell, this very powerful Wall Street law firm that John Foster Dulles ran and where Allen Dulles worked. And among their clients was United Fruit. United Fruit, of course, was this colossus, this corporate colossus, that ruled much of Latin America, owned, you know, vast acreage in Guatemala and many other countries. They weren’t just a banana company. They were a multinational real estate company. They owned often the utilities. And they owned the local political elites in those countries.

    In the early ’50s, Jacobo Árbenz, this young military officer, a reform officer, starts to emerge as a potential leader. He runs for president and is elected by his people on a reform campaign. And one of the first things he does, of course, in this country that’s basically a medieval country ruled by land barons, is to begin to nationalize some of the land, that’s not being even used by United [Fruit], and give it to the people themselves, the farmers, to work. And this provokes a major backlash from United Fruit, from the local political elites, the oligarchs, and from the CIA. Allen Dulles, working for Eisenhower as CIA director, portrays Jacobo Árbenz as a dangerous communist—he wasn’t—and prepares to overthrow him in a military coup, which does occur.

    What I tell the story of, mostly I focus on, is the tragic aftermath of that coup, because not only for the Árbenz family, which, in some ways, were the Kennedys of Guatemala—glamorous, young couple, Jacobo and María Árbenz, their children, very good-looking, wealthy, but very committed to uplifting the poor in that country. And after the coup, they’re sent into a terrible exile. No country will touch them, because CIA pressure. The CIA and the State Department pressure every country, from Mexico throughout Latin America, not to take the Árbenz family in. They’re finally forced to go behind the Iron Curtain to Czechoslovakia to seek exile. They’re not happy there. They finally end up back in Mexico, but they’re under tight supervision. The family is haunted. It’s stalked wherever it goes. One of his daughters commits suicide. And Jacobo Árbenz himself ends up dead under mysterious circumstances—scalded to death in a bathtub in a Mexico City hotel. His family today believes that he was assassinated. And given the fact that the CIA had a death list of left-wing figures, journalists, political leaders, after the coup that were to be eliminated, that, you know, is a distinct possibility.

    So, these ripples of tragedy, after these coups, go on and on. You know, the CIA and Allen Dulles told Eisenhower after the Guatemala coup, “Oh, it was a clean coup. You know, hardly anyone died.” But the fact is, tens of thousands of people died in the killing fields of Guatemala as a result of that coup, and that violence continues today.

    AMY GOODMAN: And wasn’t it also a precursor to what happened with the Bay of Pigs? Move forward like, what, six years, and explain what happened.

    DAVID TALBOT: Right. Well, emboldened by how easy it was to do a regime change in Guatemala, yes, when Fidel Castro comes to power in Cuba, he again antagonizes the same corporate interests that the Dulles brothers represent—oil companies, like the Rockefeller-owned Standard Oil, and others, agribusiness firms. So they believe that Fidel has to be eliminated, and they begin plotting, under the Eisenhower administration, with Eisenhower’s approval, to kill, to assassinate Fidel Castro. And, in fact, at one point, Fidel Castro, who was beloved in this country after the revolution—he had overthrown a thug, a Mafia-backed thug, Batista, a very corrupt and violent dictatorship. He was seen as the future, and very glamorous, he and Che Guevara and so on. They would come to New York and would be mobbed by people in the streets. When they came to New York for a U.N. meeting in 1960, though, the Eisenhower administration was already pushing back, and no hotel would take them. Finally, a hotel in Midtown did take them, but there was—they asked for so much money as security, they were basically blackmailing Fidel. He was outraged, and he ended up staying in a hotel in Harlem that took him in.

    AMY GOODMAN: Hotel Theresa.

    DAVID TALBOT: Hotel Theresa. And they stood up to this Washington pressure, the manager of that hotel, who was African-American. He had grown up in Jim Crow South. And he said, “You know, I know what it’s like to be denied a roof over your head. This Cuban delegation can stay here.” So it was a very—

    AMY GOODMAN: Did he meet Malcolm X there?

    DAVID TALBOT: He did. It was a very dramatic moment. Malcolm X makes a visit to the Hotel Theresa. He squeezes into his suite, where there’s dozens of people crammed. They have a very interesting encounter, Fidel and Malcolm. And it really changed their lives and had a big impact on both of those men for years afterwards. In fact, Malcolm said he was one of the few white men that he learned to respect and appreciate. And, by the way, there was an FBI guy taking notes the whole time in that hotel room, so we know some of what happened there and the dialogue, because of the FBI report on this.

    AMY GOODMAN: Who was it?

    DAVID TALBOT: Well, his name was not revealed, but there was an agent surveilling him. But meanwhile, while Fidel is there, meeting with Khrushchev from the Soviet Union and Nasser from Egypt and the world leaders and embarrassing the Eisenhower administration, because here he’s gone to Harlem, and, you know, no one else would take him in, in Midtown Manhattan—meanwhile, the Mafia is meeting with CIA agents at the Plaza Hotel, just blocks away, plotting his assassination. So, a lot of intrigue in 1960 going on in New York. And then, to make it even more interesting, a young JFK, who’s campaigning for president, after Fidel has left, shows up at the Hotel Theresa and basically says, “This is revolutionary ground I’m standing on. And we should welcome the winds of change and the revolution, the future. We shouldn’t be afraid of it.” So, very end—and begins to talk about the mortality rate of black infants in Harlem and many of the issues that are still current.

    AMY GOODMAN: And yet, look at what President Kennedy, then President Kennedy, did, when it came to Cuba—

    DAVID TALBOT: Exactly.

    AMY GOODMAN: —what happened under his reign, from the Bay of Pigs to the endless assassination attempts of Fidel Castro.

    DAVID TALBOT: Kennedy did do a flip-flop, to an extent, after that. He came in as president. He was young. He was untested, under a lot of pressure from the national security people in his administration. He inherited the Bay of Pigs operation, the plans for that. He was basically told, “Look, if you pull the plug on this thing, it’s so far along now, there will be a major political backlash against you.” So he was kind of sandbagged by the CIA. He did go through with it, but he had no intention of widening it into an all-out U.S. military assault on the island, on Cuba. But that’s what the CIA had in mind. They knew that this motley crew of Cuban exiles they put together to invade the island wasn’t sufficient to unseat Castro. But what they hoped and what they planned was that a young President Kennedy, as this invasion was bogged down on the beaches of the Bay of Pigs, would be forced then to send in the Marines and the U.S. Air Force to topple Castro.

    AMY GOODMAN: And then, of course, the Cuban missile crisis, the closest we ever came to a nuclear war.

    DAVID TALBOT: Well, but Kennedy stood his ground, and he didn’t do that. And that was the beginning of his break, at the Bay of Pigs, between the CIA and Cuba—and President Kennedy. And then, yes, that became even more severe with the Cuban missile crisis the following year. Again, the military in this country and the CIA thought that we could take, you know, Castro out. During the Cuban missile crisis, they were prepared to go to a nuclear war to do that. President Kennedy thought people like Curtis LeMay, who was head of the Air Force, General Curtis LeMay, was half-mad. He said, “I don’t even see this man in my—you know, in my sight,” because he was pushing for a nuclear confrontation with the Soviet Union. And even years later, Curtis LeMay, after years after Kennedy is dead, in an interview that I quote from in the book, bitterly complains that Kennedy didn’t take this opportunity to go nuclear over Cuba. So, President Kennedy basically, I think, saved my life—I was 12 years old at the time—saved a lot of our lives, because he did stand his ground. He took a hard line against the national security people and said, “No, we’re going to peacefully resolve the Cuban missile crisis.”

    AMY GOODMAN: And then President Kennedy, on November 22nd, 1963, was assassinated.

    DAVID TALBOT: That’s right.

    AMY GOODMAN: David Talbot on his new book, The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government. Back with him in a minute.

    OCTOBER 19, 2015STORY

    Find this story at 19 October 2015

    Where Does This End?”: After Drone Papers Leaks, U.K. Gov’t Has a Kill List of Its Own

    Van nieuwsblog.burojansen.nl

    Last week, The Intercept published the most in-depth look at the U.S. drone assassination program to date. “The Drone Papers” exposed the inner workings of how the drone war is waged, from how targets are identified to who decides to kill. They reveal a number of flaws, including that strikes have resulted in large part from electronic communications data, or “signals intelligence,” that officials acknowledge is unreliable. We are joined by Clive Stafford Smith, founder and director of the international legal charity Reprieve, who says the British government also has a secret kill list in Afghanistan.

    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.
    AMY GOODMAN: Last week, The Intercept published this in-depth look at the U.S. drone assassination program, called “The Drone Papers,” exposing the inner workings of how the drone war is waged, from how targets are identified to who decides to kill. They reveal a number of flaws, including that strikes have resulted in large part from electronic communications data, or “signals intelligence,” that officials acknowledge is unreliable. We spoke to Jeremy Scahill, co-founder of The Intercept, one of the lead reporters on the series.

    JEREMY SCAHILL: One of the most significant findings of this—and my colleague, Cora Currier, really dug deep into this—is we published for the first time the kill chain, what the bureaucracy of assassination looks like. And what you see is that all of these officials, including people like the treasury secretary, are part of signing off on all of this, where they have these secret meetings and they discuss who’s going to live and die around the world. And at the end of that process, it is the president of the United States who signs what amounts to a death warrant for whoever they’ve decided should die.

    AMY GOODMAN: The kill list is what Jeremy Scahill is talking about. Clive Stafford Smith, as we wrap up, your response?

    CLIVE STAFFORD SMITH: Well, it’s something that just horrifies me, that, you know, I voted for President Obama, twice, and yet every Tuesday they have “Terror Tuesday,” where there’s a PowerPoint display in the White House, and they decide, much like Nero did back in the Colosseum in Rome, whether to give the thumbs-up or the thumbs-down for human beings who we’re just going to murder around the world. And, you know, it begins with terrorism, but it will move on. The British, horrifyingly, have already got a list of people on their list in Afghanistan, where they’re saying they’re going to kill pedophiles, for goodness’ sake. I mean, where does this end, that we just murder people worldwide? I mean, we plan to do a lot to publicize that in the upcoming months.

    NERMEEN SHAIKH: When did you learn that Britain has a kill list, to begin with?

    CLIVE STAFFORD SMITH: It was only a couple of weeks ago. Frankly, I’m very pleased, because when both the Brits and the Americans are doing it, we can illustrate the folly of both instead of just picking on the U.S.

    AMY GOODMAN: Clive Stafford Smith, I want to thank you very much for being with us. Clive Stafford Smith has been Shaker Aamer’s attorney for 10 years at Guantánamo. He’s a human rights lawyer, founder and director of the international legal charity called Reprieve.

    This is Democracy Now!, democracynow.org, The War and Peace Report. When we come back, we’re going to talk about Benghazi. Former Secretary of State Hillary Clinton is expected to testify today for up to 10 hours in Congress. We’re going to be talking about the four men who died—the ambassador, Chris Stevens, and three of the other Americans who died. We’ll be speaking with their friends. Stay with us.

    OCTOBER 22, 2015STORY

    Find this story at 22 October 2015

    The Drone Papers” Reveals How Faulty Intel & Secret “Kill Chain” Mark Suspects, Civilians for Death

    Van nieuwsblog.burojansen.nl

    The Intercept series “The Drone Papers” exposes the inner workings of how the drone war is waged, from how targets are identified to who decides to kill. They expose a number of flaws, including that strikes have resulted in large part from electronic communications data, or “signals intelligence,” that officials acknowledge is unreliable. We speak to Intercept reporter Cora Currier, whose article “The Kill Chain,” reveals how the U.S. identifies and selects assassination targets, from the collection of data and human intelligence all the way to President Obama’s desk.

    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.
    JUAN GONZÁLEZ: Well, today we are looking at “The Drone Papers,” an explosive new exposé by The Intercept based on a cache of secret documents that expose the inner workings of the U.S. military’s assassination program in Afghanistan, Yemen and Somalia. It raises the question: Is there a new Edward Snowden?

    AMY GOODMAN: We’re joined by three reporters who worked on “The Drone Papers.” Cora Currier is staff reporter for The Intercept. Her contributions to the “Drone Papers” series include the pieces “The Kill Chain” and “Firing Blind.” Ryan Devereaux, also a staff reporter at The Intercept, wrote “Manhunting in the Hindu Kush.” Also still with us for the hour, Jeremy Scahill, co-founder of the The Intercept, author of—is also author on this series.

    Cora Currier, I wanted to turn to your piece, “The Kill [Chain].” How do the targets get chosen?

    CORA CURRIER: So this is the first time that we’ve seen documentary evidence of how the Obama White House picks and chooses targets for—to kill them by drone or any other—or other kinds of airstrikes. And this is for operations in Yemen and Somalia. And the slide that we have shows how task force personnel, so people working on the ground in Yemen or Somalia, JSOC task force personnel, working with other intelligence community members, establish—make a package on a target, on a potential target, collecting intelligence, doing reconnaissance. So these people are already under surveillance of various types. And then they put them together, they package them in what they call a “baseball card” on the target, and that passes up the ranks of the military, up the chain of command. It goes through the Joint Chiefs of Staff, secretary of defense, then sends them to the White House.

    And there, they’re examined by counsels of senior administration officials, known as the Principals Committee, which is—of the National Security Council, which is basically sort of all the top Cabinet heads of the Obama administration, all his closest advisers, and their deputies, which is called the Deputies Committee. And that’s reportedly where actually a lot of the work gets done, where they really pour over the targets and they think about sort of the—both the legal cases and also the sort of political ramifications and reasons to kill or not to kill somebody. So this is all happening in—this sort of really interagency process happens at the White House. And then, we know from outside reporting that this is the time when, during the period of this study in 2012, 2013, John Brennan, who then became CIA director, was super influential in these discussions. And it was often him that was bringing the baseball cards to the president to finally sign off on giving JSOC operatives then a 60-day window to go after the target.

    AMY GOODMAN: The baseball cards?

    CORA CURRIER: Mm-hmm, so they would sign off on a “package,” what they called it, a targeting—an operations package, which would have the baseball card, which was all the intelligence on the target, and then a sort of concept of operations about how they might go about getting them. And then they’d have a 60-day window in which they could take a strike against the target. And that is counter to some previous reporting about whether or not the president sort of—you hear this rhetoric that the president personally signs off on each drone strike. It’s not clear that that’s exactly what was meant by that. It seems more likely that he signs off on these packages, and then the actual decision to take a strike goes through the military chain of command.

    JUAN GONZÁLEZ: And a key part of these baseball cards are the SIM cards and the cellphone numbers and—in other words, the signals intelligence attached to each of these individuals?

    CORA CURRIER: Right. It’s going to have, you know, everything that they know about them, so from a variety of sources. And one thing that we learned in the documents is that they are heavily reliant on signals intelligence, heavily reliant on communications intelligence, to build a picture of who they think this person is and why they think he’s important.

    AMY GOODMAN: Now, in your piece, “The Kill Chain: The Lethal Bureaucracy Behind Obama’s Drone War,” you talk about the different officials who sign off. Jeremy mentioned earlier, for example, the treasury secretary. Why would the treasury secretary be involved with naming who should be killed?

    CORA CURRIER: Well, I think, in practice—I mean, by the letter, the Principals Committee of the National Security Council includes all of these—all of these top officials, like the treasury secretary, like the secretary of energy. Is the secretary of energy actually really, you know, a deciding factor in who gets killed in Yemen? No. It’s going to be the—you know, Hillary Clinton at the time of this study was secretary of state, and she would sort of represent the State Department’s opinions about this. Again, would she actually probably have all the background on these individuals? No, it would have been prepared for her by, you know, her second-in-commands or whoever was below her, and they would sort of be representing the views of their agency. So, while all those Cabinet members are, on paper, in the—on the Principals Committee, in practice, it was a smaller circle of advisers.

    AMY GOODMAN: Now, Jeremy, so, the president is making these decisions on the others below him based on—I mean, it’s very much shaped on the information he’s getting on his desk.

    JEREMY SCAHILL: Right. And, I mean, you know, one of the things that we also see in the documents is that a great deal of the intelligence that they’re basing these packages on come from foreign intelligence sources. So it could be from the Saudis, it could be from Yemenis, it could be from another entity, from Qatar—

    AMY GOODMAN: From the Saudis, for example, who want a protester, a pro-democracy protester, dead.

    JEREMY SCAHILL: Right. Right. And, I mean—well, yes, that’s part of it, but more specifically to this, there are cases where it seems as though the U.S. was intentionally fed bad intelligence to—in the effort to try to eliminate a domestic political opponent of the former dictator of Yemen, for instance, where someone that was actually trying to negotiate with al-Qaeda, but was a political opponent of the Yemeni dictator at the time, Ali Abdullah Saleh, was killed in a U.S. drone strike, and it seems quite likely that it was—you know, Yemen had fed that intelligence to try to eliminate one of their opponents. I mean, the WikiLeaks cables were rife with examples of the Yemeni president trying to get the United States to take up his own political cause against the Houthis at the time, who are now controlling parts of Yemen. But the Saudis have a huge influence over who the U.S. targets in that region. And foreign intelligence—they have their own agenda. And if we’re basing a lot of our decision on who should sort of live or die in these cases on foreign intelligence and unreliable signals intelligence, it raises serious questions about who we’re actually killing.

    JUAN GONZÁLEZ: Well, and it seems to me the other aspect of this, as your report shows, is that the government’s own reviews shows—states the unreliability of this information. So they’re not only making decisions without any kind of judicial process to kill people, the evidence that they’re using, they themselves acknowledge, is unreliable.

    JEREMY SCAHILL: Well, remember, this task force, the ISR Task Force, that did these studies that are in the document—

    AMY GOODMAN: And ISR stands for?

    JEREMY SCAHILL: Intelligence, Surveillance, Reconnaissance. And so, this task force is basically an advocacy wing for more drones, more surveillance platforms, and so you have to view it in the context of this is the Pentagon trying to get all the toys and to make themselves, you know, the boss of everything—and they largely are the boss of everything, because they have the biggest budget and they have the most personnel. But what there—you know, what the point there is, is that there’s this not-so-subtle agitation to start being able to do a lot more capturing. I think it’s true what they’re saying about the unreliability of it. But there’s also—you know, there’s a turf war at play here with the CIA, so I think you have to take it with a grain of salt and read it in the context of that.

    AMY GOODMAN: Now, the issue of innocent civilians—I mean, there’s also an issue of the people who they believe are absolutely guilty, whether or not, Cora, the president should be the judge and the jury and the executioner. But this percentage that Juan raised earlier of 90 percent innocents killed in a drone strike, explain further what you learned on who lives and who dies.

    CORA CURRIER: So what was actually striking about the Pentagon study, which was one of the documents that we had—Ryan looked in detail at these campaigns in Afghanistan, where that 90 percent figure comes from. In Yemen and Somalia, in this Pentagon study, they actually—it was pretty striking for how little they talk about civilian casualties, how little it seems to be an issue. The whole gist of the study was, “Give us”—as Jeremy was saying, “Give us more drones, give us better equipment, so that we can get these high-value targets.” And there was sort of little discussion of what the consequences are if you hit the—of hitting the wrong person. It was more about, like, “We’ve got to be more efficient at getting the people that we want,” and there was very little mention of civilian casualties.

    There were a few times that it mentioned that low CDE, or collateral damage estimate, which is military speak for how many civilians might be harmed, was mentioned a few times as kind of a restraining factor on strikes and something that was explaining why they were moving more slowly, because they had these low CDE requirements. And that’s actually really—that word, that standard, low CDE, is interesting, because at the same time as this study was circulated in May 2013 was when the president gave his big speech about how, before the U.S. would take a strike, there had to be near certainty that no civilians would be harmed or injured. And near certainty is not the same as low CDE. And the White House told us that, you know, the standards of the May 2013 speech are still in place, but they wouldn’t explain that discrepancy as to why these internal documents at the same time had this different standard for civilian deaths.

    AMY GOODMAN: And, Jeremy Scahill, what was the White House’s reaction to this explosive series?

    JEREMY SCAHILL: Well, the White House was—you know, basically said, “We’re not going to comment on purported internal documents.” And, you know, I mean, Ryan had sort of a funny interaction with the Special Operations Command that he can explain. But at the end of the day, the Pentagon ended up being the one that kind of spoke for all of them and said, you know, “These are internal classified documents, and we’re not going to speak about it.” I mean, they’ll speak about classified material all the time when it benefits their position, like John Brennan leaking things after bin Laden, but, you know, they’re not going to address these things. Or even—I mean, Cora had very concrete questions: Is this still the case? Is this true? You know, they wouldn’t answer a single question.

    AMY GOODMAN: We’re going to go to break and then come back, and when we come back, we’re going to talk about Afghanistan. And that’s where Ryan Devereaux comes in. With President Obama now reversing course, the longest war in U.S. history is about to get longer. How do “The Drone Papers” weigh in here? What do they tell us about Afghanistan? And much more. We’re speaking with three of the authors of this series, this stunning series at The Intercept: Jeremy Scahill, Ryan Devereaux and Cora Currier. Stay with us.

    OCTOBER 16, 2015STORY

    Find this story at 13 October 2015

    Sources Detail Skewed Reports On How The U.S. Is Doing Against ISIS

    Van nieuwsblog.burojansen.nl

    Sens. John McCain, R-Ariz., (left) and Jack Reed, D-R.I., hear testimony on operations against ISIS from Gen. Lloyd Austin.i
    Sens. John McCain, R-Ariz., (left) and Jack Reed, D-R.I., hear testimony on operations against ISIS from Gen. Lloyd Austin.
    Pablo Martinez Monsivais/AP

    NPR has new details on what investigators are discovering about Pentagon analysis of the battle against ISIS in Iraq.

    The Pentagon is looking at whether senior military officials at U.S. Central Command, or CENTCOM, pressured intelligence analysts into painting a rosy picture of the fight against ISIS. The Defense Department’s inspector general is talking to a group of intelligence analysts who are providing evidence and details on how bias crept into their assessments.

    One military source who witnessed the skewing of reports and told NPR he was “a victim of them” said that analysts at CENTCOM got the message as they began writing their assessments of events on the ground. If analysts wanted to include a piece of good news regarding the campaign against ISIS or the progress of Iraqi forces, they needed almost no sourcing. But if they wanted to include bad news — such as Iraqi forces retreating — analysts were required to cite three or four sources.

    Two military sources familiar with the investigation say that, while they haven’t discovered a direct order to cherry-pick intelligence, it was something that evolved because of the way data were handled and produced.

    “The bad news didn’t just need to be footnoted,” one military source, who did not want to be further identified because he is involved with the inquiry, told NPR. “The intelligence data itself had to be attached to the report. It became pretty clear if they wrote something bad, it was likely to be changed. Knowing that bad news on ISIS wasn’t welcome meant that, over time, the picture of the fight began being rosier.”

    A military source described the evolution of one report that came out of CENTCOM’s intelligence shop. It was a dispatch on an ISIS attack in Iraq near the Syrian border. The initial CENTCOM report read, “Iraqi forces retreated.” It was sent back for reworking, the source said. Eventually that report came to read that the Iraqi forces had not retreated, but instead had reinforced another Iraqi position. The final draft suggested a strategic decision had been made. But that was not what happened, the source said — the Iraqi forces ran. A second source confirmed the account of the change in wording to put the Iraqi forces in a more positive light.

    The head of U.S. Central Command, Gen. Lloyd Austin, was on Capitol Hill on Wednesday to testify before the Senate Armed Services Committee. He had been called to provide a progress report on the fight against ISIS. But he was obliged to address, although obliquely, the Pentagon investigation into CENTCOM first. “There is an ongoing DOD IG investigation looking into allegations concerning the processing of intelligence information by CENTCOM’s intelligence directorate,” Austin said in his opening remarks. “Because the allegations are currently under investigation … it would be premature and inappropriate for me to discuss this matter.”

    All he would say was that the CENTCOM reports, contrary to what had been said in the media, did not go directly to the president, and CENTCOM drew its intelligence analysis from a variety of sources — 1,200 analysts, combat commanders on the ground, and other agencies. Even so, in his testimony, the general seemed to be painting an upbeat picture. “In recent months, Iraq’s security forces have experienced some setbacks, and this is to be expected in a fight as complex as this one,” said Austin. “But overall the Iraqis continue to make progress.”

    Sen. John McCain, chairman of the Armed Services Committee, made clear he wasn’t swallowing Austin’s assessment. “I must say I have been on this committee for 30 years and I have never heard testimony like this,” McCain said. “Never.”

    Just the week before his appearance, McCain told the general, the chairman of the Joint Chiefs, Gen. Martin Dempsey, had testified that the fight against ISIS was tactically stalemated. “So obviously you and the outgoing chairman of the Joint Chiefs of Staff have a very different view of what the situation is,” McCain said.

    SEPTEMBER 16, 2015 8:09 PM ET
    Dina Temple- Raston

    Find this story at 16 September 2015

    © 2015 npr

    Tomgram: Engelhardt, Creating an Un-Intelligence Machine The Fog of Intelligence Or How to Be Eternally “Caught Off Guard” in the Greater Middle East

    Van nieuwsblog.burojansen.nl

    1,500.

    That figure stunned me. I found it in the 12th paragraph of a front-page New York Times story about “senior commanders” at U.S. Central Command (CENTCOM) playing fast and loose with intelligence reports to give their air war against ISIS an unjustified sheen of success: “CENTCOM’s mammoth intelligence operation, with some 1,500 civilian, military, and contract analysts, is housed at MacDill Air Force Base in Tampa, in a bay front building that has the look of a sterile government facility posing as a Spanish hacienda.”

    Think about that. CENTCOM, one of six U.S. military commands that divide the planet up like a pie, has at least 1,500 intelligence analysts (military, civilian, and private contractors) all to itself. Let me repeat that: 1,500 of them. CENTCOM is essentially the country’s war command, responsible for most of the Greater Middle East, that expanse of now-chaotic territory filled with strife-torn and failing states that runs from Pakistan’s border to Egypt. That’s no small task and about it there is much to be known. Still, that figure should act like a flash of lightning, illuminating for a second an otherwise dark and stormy landscape.

    And mind you, that’s just the analysts, not the full CENTCOM intelligence roster for which we have no figure at all. In other words, even if that 1,500 represents a full count of the command’s intelligence analysts, not just the ones at its Tampa headquarters but in the field at places like its enormous operation at al-Udeid Air Base in Qatar, CENTCOM still has almost half as many of them as military personnel on the ground in Iraq (3,500 at latest count). Now, try to imagine what those 1,500 analysts are doing, even for a command deep in a “quagmire” in Syria and Iraq, as President Obama recently dubbed it (though he was admittedly speaking about the Russians), as well as what looks like a failing war, 14 years later, in Afghanistan, and another in Yemen led by the Saudis but backed by Washington. Even given all of that, what in the world could they possibly be “analyzing”? Who at CENTCOM, in the Defense Intelligence Agency, or elsewhere has the time to attend to the reports and data flows that must be generated by 1,500 analysts?

    Of course, in the gargantuan beast that is the American military and intelligence universe, streams of raw intelligence beyond compare are undoubtedly flooding into CENTCOM’s headquarters, possibly overwhelming even 1,500 analysts. There’s “human intelligence,” or HUMINT, from sources and agents on the ground; there’s imagery and satellite intelligence, or GEOINT, by the bushelful. Given the size and scope of American global surveillance activities, there must be untold tons of signals intelligence, or SIGINT; and with all those drones flying over battlefields and prospective battlefields across the Greater Middle East, there’s undoubtedly a river of full motion video, or FMV, flowing into CENTCOM headquarters and various command posts; and don’t forget the information being shared with the command by allied intelligence services, including those of the “five eyes“ nations, and various Middle Eastern countries; and of course, some of the command’s analysts must be handling humdrum, everyday open-source material, or OSINT, as well — local radio and TV broadcasts, the press, the Internet, scholarly journals, and god knows what else.

    And while you’re thinking about all this, keep in mind that those 1,500 analysts feed into, and assumedly draw on, an intelligence system of a size surely unmatched even by the totalitarian regimes of the twentieth century. Think of it: the U.S. Intelligence Community has — count ‘em — 17 agencies and outfits, eating close to $70 billion annually, more than $500 billion between 2001 and 2013. And if that doesn’t stagger you, think about the 500,000 private contractors hooked into the system in one way or another, the 1.4 million people (34% of them private contractors) with access to “top secret” information, and the 5.1 million — larger than Norway’s population — with access to “confidential and secret” information.

    Remember as well that, in these years, a global surveillance state of Orwellian proportions has been ramped up. It gathers billions of emails and cell phone calls from the backlands of the planet; has kept tabs on at least 35 leaders of other countries and the secretary general of the U.N. by hacking email accounts, tapping cell phones, and so on; keeps a careful eye and ear on its own citizens, including video gamers; and even, it seems, spies on Congress. (After all, whom can you trust?)

    In other words, if that 1,500 figure bowls you over, keep in mind that it just stands in for a far larger system that puts to shame, in size and yottabytes of information collected, the wildest dreams of past science fiction writers. In these years, a mammoth, even labyrinthine, bureaucratic “intelligence” structure has been constructed that is drowning in “information” — and on its own, it seems, the military has been ramping up a smaller but similarly scaled set of intelligence structures.

    Surprised, Caught Off Guard, and Left Scrambling

    The question remains: If data almost beyond imagining flows into CENTCOM, what are those 1,500 analysts actually doing? How are they passing their time? What exactly do they produce and does it really qualify as “intelligence,” no less prove useful? Of course, we out here have limited access to the intelligence produced by CENTCOM, unless stories like the one about top commanders fudging assessments on the air war against the Islamic State break into the media. So you might assume that there’s no way of measuring the effectiveness of the command’s intelligence operations. But you would be wrong. It is, in fact, possible to produce a rough gauge of its effectiveness. Let’s call it the TomDispatch Surprise Measurement System, or TSMS. Think of it as a practical, news-based guide to the questions: What did they know and when did they know it?

    Let me offer a few examples chosen almost at random from recent events in CENTCOM’s domain. Take the seizure at the end of September by a few hundred Taliban fighters of the northern provincial Afghan capital of Kunduz, the first city the Taliban has controlled, however briefly, since it was ejected from that same town in 2002. In the process, the Taliban fighters reportedly scattered up to 7,000 members of the Afghan security forces that the U.S. has been training, funding, and arming for years.

    For anyone following news reports closely, the Taliban had for months been tightening its control over rural areas around Kunduz and testing the city’s defenses. Nonetheless, this May, based assumedly on the best intelligence analyses available from CENTCOM, the top U.S. commander in the country, Army General John Campbell, offered this predictive comment: “If you take a look very closely at some of the things in Kunduz and up in [neighboring] Badakhshan [Province], [the Taliban] will attack some very small checkpoints… They will go out and hit a little bit and then they kind of go to ground… so they’re not gaining territory for the most part.’”

    As late as August 13th, at a press briefing, an ABC News reporter asked Brigadier General Wilson Shoffner, the U.S. deputy chief of staff for communications in Afghanistan: “There has been a significant increase in Taliban activity in northern Afghanistan, particularly around Kunduz. What is behind that? Are the Afghan troops in that part of Afghanistan at risk of falling to the Taliban?”

    Shoffner responded, in part, this way: “So, again, I think there’s been a lot of generalization when it comes to reports on the north. Kunduz is — is not now, and has not been in danger of being overrun by the Taliban, and so — with that, it’s kind of a general perspective in the north, that’s sort of how we see it.”

    That General Cambell at least remained of a similar mindset even as Kunduz fell is obvious enough since, as New York Times reporter Matthew Rosenberg reported, he was out of the country at the time. As Goldstein put it:

    “Mostly, though, American and Afghan officials appeared to be genuinely surprised at the speedy fall of Kunduz, which took place when Gen. John F. Campbell, the commander of coalition forces, was in Germany for a defense conference… Though the Taliban have been making gains in the hinterlands around Kunduz for months, American military planners have for years insisted that Afghan forces were capable of holding onto the country’s major cities.

    “‘This wasn’t supposed to happen,’ said a senior American military officer who served in Afghanistan, speaking on the condition of anonymity. ‘The Afghans are fighting, so it’s not like we’re looking at them giving up or collapsing right now. They’re just not fighting very well.’”

    It’s generally agreed that the American high command was “caught off guard” by the capture of Kunduz and particularly shocked by the Afghan military’s inability to fight effectively. And who would have predicted such a thing of an American-trained army in the region, given that the American-backed, -trained, and -equipped Iraqi Army on the other side of the Greater Middle East had a similar experience in June 2014 in Mosul and other cities of northern Iraq when relatively small numbers of Islamic State militants routed its troops?

    At that time, U.S. military leaders and top administration officials right up to President Obama were, as the Wall Street Journal reported, “caught off guard by the swift collapse of Iraqi security forces” and the successes of the Islamic State in northern Iraq. Peter Baker and Eric Schmitt of the Times wrote in retrospect, “Intelligence agencies were caught off guard by the speed of the extremists’… advance across northern Iraq.” And don’t forget that, despite that CENTCOM intelligence machine, something similar happened in May 2015 when, as Washington Post columnist David Ignatius put it, U.S. officials and American intelligence were “blindsided again” by a very similar collapse of Iraqi forces in the city of Ramadi in al-Anbar Province.

    Or let’s take another example where those 1,500 analysts must have been hard at work: the failed $500 million Pentagon program to train “moderate” Syrians into a force that could fight the Islamic State. In the Pentagon version of the elephant that gave birth to a mouse, that vast effort of vetting, training, and arming finally produced Division 30, a single 54-man unit of armed moderates, who were inserted into Syria near the forces of the al-Qaeda-aligned al-Nusra Front. That group promptly kidnapped two of its leaders and then attacked the unit. The result was a disaster as the U.S.-trained fighters fled or were killed. Soon thereafter, the American general overseeing the war against the Islamic State testified before Congress that only “four or five” armed combatants from the U.S. force remained in the field.

    Here again is how the New York Times reported the response to this incident:

    “In Washington, several current and former senior administration officials acknowledged that the attack and the abductions by the Nusra Front took American officials by surprise and amounted to a significant intelligence failure. While American military trainers had gone to great lengths to protect the initial group of trainees from attacks by Islamic State or Syrian Army forces, they did not anticipate an assault from the Nusra Front. In fact, officials said on Friday, they expected the Nusra Front to welcome Division 30 as an ally in its fight against the Islamic State.

    “‘This wasn’t supposed to happen like this,’ said one former senior American official, who was working closely on Syria issues until recently, and who spoke on the condition of anonymity to discuss confidential intelligence assessments.”

    Now, if accurate, this is wild stuff. After all, how anyone, commander or intelligence analyst, could imagine that the al-Nusra Front, classified as an enemy force in Washington and some of whose militants had been targeted by U.S. air power, would have welcomed U.S.-backed troops with open arms is the mystery of all mysteries. One small footnote to this: McClatchy News later reported that the al-Nusra Front had been poised to attack the unit because it had been tipped off in advance by Turkish intelligence, something CENTCOM’s intelligence operatives evidently knew nothing about.

    In the wake of that little disaster and again, assumedly, with CENTCOM’s full stock of intelligence and analysis on hand, the military inserted the next unit of 74 trained moderates into Syria and was shocked (shocked!) when its members, chastened perhaps by the fate of Division 30, promptly handed over at least a quarter of their U.S.-supplied equipment, including trucks, ammunition, and rifles, to the al-Nusra Front in return for “safe passage.” Al-Nusra militants soon were posting photos of the weapons online and tweeting proudly about them. CENTCOM officials initially denied that any of this had happened (and were clearly in the dark about it) before reversing course and reluctantly admitting that it was so. (“‘If accurate, the report of NSF [New Syrian Forces] members providing equipment to al-Nusra Front is very concerning and a violation of Syria train-and-equip program guidelines,’ U.S. Central Command spokesman Colonel Patrick Ryder said.”)

    To turn to even more recent events in CENTCOM’s bailiwick, American officials were reportedly similarly stunned as September ended when Russia reached a surprise agreement with U.S. ally Iraq on an anti-ISIS intelligence-sharing arrangement that would also include Syria and Iran. Washington was once again “caught off guard” and, in the words of Michael Gordon of the Times, “left… scrambling,” even though its officials had known “that a group of Russian military officers were in Baghdad.”

    Similarly, the Russian build-up of weaponry, planes, and personnel in Syria initially “surprised” and — yes — caught the Obama administration “off guard.” Again, despite those 1,500 CENTCOM analysts and the rest of the vast U.S. intelligence community, American officials, according to every news report available, were “caught flat-footed” and, of course, “by surprise” (again, right up to the president) when the Russians began their full-scale bombing campaign in Syria against various al-Qaeda-allied outfits and CIA-backed opponents of Syrian President Bashar al-Assad. They were even caught off guard and taken aback by the way the Russians delivered the news that their bombing campaign was about to start: a three-star Russian general arrived at the U.S. Embassy in Baghdad to offer an hour’s notice. (Congressional lawmakers are now considering “the extent to which the spy community overlooked or misjudged critical warning signs” about the Russian intervention in Syria.)

    The Fog Machine of American Intelligence

    You get the point. Whatever the efforts of that expansive corps of intelligence analysts (and the vast intelligence edifice behind it), when anything happens in the Greater Middle East, you can essentially assume that the official American reaction, military and political, will be “surprise” and that policymakers will be left “scrambling” in a quagmire of ignorance to rescue American policy from the unexpected. In other words, somehow, with what passes for the best, or at least most extensive and expensive intelligence operation on the planet, with all those satellites and drones and surveillance sweeps and sources, with crowds of analysts, hordes of private contractors, and tens of billions of dollars, with, in short, “intelligence” galore, American officials in the area of their wars are evidently going to continue to find themselves eternally caught “off guard.”

    The phrase “the fog of war” stands in for the inability of commanders to truly grasp what’s happening in the chaos that is any battlefield. Perhaps it’s time to introduce a companion phrase: the fog of intelligence. It hardly matters whether those 1,500 CENTCOM analysts (and all those at other commands or at the 17 major intelligence outfits) produce superlative “intelligence” that then descends into the fog of leadership, or whether any bureaucratic conglomeration of “analysts,” drowning in secret information and the protocols that go with it, is going to add up to a giant fog machine.

    It’s difficult enough, of course, to peer into the future, to imagine what’s coming, especially in distant, alien lands. Cobble that basic problem together with an overwhelming data stream and groupthink, then fit it all inside the constrained mindsets of Washington and the Pentagon, and you have a formula for producing the fog of intelligence and so for seldom being “on guard” when it comes to much of anything.

    My own suspicion: you could get rid of most of the 17 agencies and outfits in the U.S. Intelligence Community and dump just about all the secret and classified information that is the heart and soul of the national security state. Then you could let a small group of independently minded analysts and critics loose on open-source material, and you would be far more likely to get intelligent, actionable, inventive analyses of our global situation, our wars, and our beleaguered path into the future.

    The evidence, after all, is largely in. In these years, for what now must be approaching three-quarters of a trillion dollars, the national security state and the military seem to have created an un-intelligence system. Welcome to the fog of everything.

    Tom Engelhardt is a co-founder of the American Empire Project and the author of The United States of Fear as well as a history of the Cold War, The End of Victory Culture. He is a fellow of the Nation Institute and runs TomDispatch.com. His latest book is Shadow Government: Surveillance, Secret Wars, and a Global Security State in a Single-Superpower World.

    [Note: Nick Turse was my co-conspirator on this piece and I thank him for all his help.]

    Follow TomDispatch on Twitter and join us on Facebook. Check out the newest Dispatch Book, Nick Turse’s Tomorrow’s Battlefield: U.S. Proxy Wars and Secret Ops in Africa, and Tom Engelhardt’s latest book, Shadow Government: Surveillance, Secret Wars, and a Global Security State in a Single-Superpower World.

    Posted by Tom Engelhardt at 7:29am, October 15, 2015.
    Follow TomDispatch on Twitter @TomDispatch.
    Email Print
    [Note to TomDispatch Readers: Here’s a small reminder. TomDispatch keeps itself going to a significant extent thanks to the donations of faithful readers. In return for contributions of $100 or more, we like to offer — as a small but (we hope) meaningful thank you — signed, personalized copies of superlative books that help, like this website, make some sense of our embattled world. Among those on offer at present are Nick Turse’s Tomorrow’s Battlefield and his bestselling Kill Anything That Moves, my own Shadow Government and The End of Victory Culture, David Vine’s Base Nation, and Greg Grandin’s Kissinger’s Shadow. Check out our donation page for the full list. Tom]

    By Tom Engelhardt

    Find this story at 15 October 2015

    Copyright 2015 Tom Engelhardt

    A Former CIA Official Apologizes to ‘Every American’ For Iraq Intelligence Failures

    Van nieuwsblog.burojansen.nl

    An intelligence assessment drafted by the CIA months prior to the March 2003 US invasion of Iraq asserting that Saddam Hussein harbored an active weapons of mass destruction (WMDs) cache has been thoroughly debunked time and again.

    But even after the deaths of more than 4,000 US soldiers and hundreds of thousands of Iraqi civilians, CIA officials have never publicly taken responsibility for getting the pre-war intelligence so wrong.

    Former CIA deputy director Michael Morell, however, now owns up to the disastrous “mistakes” the agency made on the Iraqi WMD failures.

    The veteran intelligence official has written The Great War of Our Time: The CIA’s Fight against Terrorism from al Qa’ida to ISIS, which offers a behind-the-scenes look at numerous national security crises since 9/11. Morell writes in the book about the CIA’s Iraq intelligence failures, and he apologizes to former Secretary of State Colin Powell, who told the United Nations Security Council on February 5, 2003 that Iraq had “biological weapons and the capability to rapidly produce more, many more.” When WMDs weren’t located in Iraq after the US invasion, Powell’s credibility was destroyed.

    Related: CIA Report Says No Evidence Saudi Arabia ‘Willingly Supported’ al Qaeda Leading up to 9/11

    “Let me tell you why I [apologized to] Colin Powell,” Morell told VICE News before a recent appearance at the Richard Nixon Library to promote his book. “Here’s a guy who had a stellar reputation… and quite frankly that reputation was tarnished when he went before the UN and laid out the case. That case turns out to be wrong. Almost every part of it turns out to be wrong. I knew he had said to folks over the years, ‘You know, nobody from the agency has ever apologized to me.’ And so that’s why I wanted to apologize to him…. The apology applies to every single American.”

    Morell was somewhat defensive when asked to discuss why CIA analysts were unable to determine that Iraq had abandoned its weapons program in the 1990s. He compared the analysts to “weather forecasters.”

    “This is a very difficult business,” he said. “I don’t know a harder job in the world than trying to get an understanding of what’s the status of the Iran nuclear program. Or, what’s the status of North Korea’s long-range missile system. Or, where does Chinese military modernization stand. Or, what are the plans, intentions, and capabilities of al Qaeda in Yemen.”

    Watch the VICE News interview with Michael Morell

    Ultimately, Morell said the main reason “we were not able to come up with the right answer is that we didn’t do our fundamental job of penetrating [Saddam Hussein’s] inner circle with a human asset. So there was no information to give to the analyst to say, ‘Here’s what this guy is up to.’ This was our failure, and quite frankly a national security failure, to get inside of Saddam’s inner circle to tell us exactly what he was up to with regards to weapons of mass destruction.”

    While Morell leaves no doubt that the CIA failed on Iraq, he mounts a full-throated defense when discussing the agency’s so-called enhanced interrogation program, which he “doesn’t like calling torture, because to call it torture says my guys were torturers, and they were told that they weren’t.”

    “I have no doubt after spending months looking at this that [the program] was effective,” Morell said. “I’ve seen the intelligence that these guys provided before enhanced interrogation techniques. It was not full answers to questions, it was not specific information, it was not actionable. After enhanced interrogation techniques, full answers to questions, specific information, actionable information. There’s no doubt in my mind it was effective.”

    His analysis is at odds with the damning findings of the Senate Intelligence Committee, which last December released a declassified executive summary of its mammoth report on the CIA’s torture program, an investigation that took five years to complete, cost $40 million, and led to chilled relations between the CIA and the committee.

    In fact, the harshest critique in Morell’s book is aimed directly at Democrats on the Senate Intelligence Committee, including the panel’s former chairwoman, Dianne Feinstein, who led the oversight effort into the detention and interrogation program and said what committee staffers discovered in millions of pages of CIA documents clearly rose to the level of torture. He declined to respond to some of the more brutal findings in the Senate report, such as subjecting a handful of detainees to “rectal feeding” and whether that amounted to torture.

    So how did the Senate get it wrong if it perused the CIA’s own highly classified documents to reach its conclusions?

    “One of the things I learned as an intelligence analyst very early on is it’s very dangerous to speculate,” Morell said. “When you speculate, you get things wrong a lot more then you get right. But I’ll speculate for you with that caveat. Senator Feinstein made it very clear to everyone who would talk to her about this, that she wanted the report to be the nail in the coffin of the country ever doing anything like this again. Well, when you’re on her staff and you hear that day after day after day, and your job is to put this report together, it takes you in a certain direction.”

    “Republican leaders in the House and the Senate [approved] this program back in 2002, 2003, 2004. And not only approved the program but encouraged us to go further — they thought we were risk-averse when we stopped the program for a period of time…. So what’s the only way that the [Senate] can get themselves out of this discussion? To say that the CIA lied to them at the time about what we were doing and about the effectiveness of the program. That’s the only way to get themselves off the hook. I can’t prove any of that. I’m speculating.”

    VICE News tried numerous times to obtain a comment from Feinstein, but her office failed to respond to our queries.

    However, a day before Morell’s book went on sale, Feinstein took the unprecedented step of issuing a press release attacking Morell’s contradictory claims about the torture program and said he did not even bother to read the full 6,700-page report. Feinstein’s office then issued a 54-page point-by-point rebuttal to all of the assertions Morell made in his book about the efficacy of the program.

    Morell, who now works for a private security firm founded by former aides to Hillary Clinton, told VICE News that the US is engaged in an “intelligence war.”

    “In this new era of terrorism, the enemy is very hard to find, but very easy to kill,” he said. “The finding, which is the hard part, is all about intelligence. So this is an intelligence war…. You cannot capture and kill your way out of this. The other problem that you have to deal with is how do you stop the creation of new terrorists? How do you deal with the radicalization problem of young men and young women around the globe? That’s something that we have not done well as a country or as a coalition of countries… and it’s not going to go away until we get our arms around that.”

    An earlier version of this report incorrectly said the CIA’s pre-war Iraq intelligence concluded that Saddam Hussein colluded with Al Qaeda. The story has been updated.

    By Jason Leopold
    June 25, 2015 | 7:35 pm

    Find this story at 25 June 2015

    Copyright https://news.vice.com/

    Military Analyst Again Raises Red Flags on Progress in Iraq

    Van nieuwsblog.burojansen.nl

    WASHINGTON — As the war in Iraq deteriorated, a senior American intelligence analyst went public in 2005 and criticized President George W. Bush’s administration for pushing “amateurish and unrealistic” plans for the invasion two years before.

    Now that same man, Gregory Hooker, is at the center of an insurrection of United States Central Command intelligence analysts over America’s latest war in Iraq, and whether Congress, policy makers and the public are being given too rosy a picture of the situation.

    As the senior Iraq analyst at Central Command, the military headquarters in Tampa that oversees American military operations across the Middle East and Central Asia, Mr. Hooker is the leader of a group of analysts that is accusing senior commanders of changing intelligence reports to paint an overly optimistic portrait of the American bombing campaign against the Islamic State. The Pentagon’s inspector general is investigating.

    Although the investigation became public weeks ago, the source of the allegations and Mr. Hooker’s role have not been previously known. Interviews with more than a dozen current and former intelligence officials place the dispute directly at the heart of Central Command, with Mr. Hooker and his team in a fight over what Americans should believe about the war.

    Photo

    Gregory Hooker is critical of reports on the ISIS fight.
    Mr. Hooker, who declined to comment, has been an Iraq analyst for more than two decades. Some on his team were at Central Command, or Centcom, when American troops poured into Iraq in 2003. The analysts remained focused on the country long after President Obama officially ended the war in 2011.

    “This core group of Iraq analysts have been doing this for a long time,” said Stephen Robb, a retired Marine colonel and a former head of the Centcom Joint Intelligence Center. “If they say there’s smoke, start looking for a firehouse.”

    The investigation has repercussions beyond the question of whether the American-led bombing campaign in Iraq and Syria is succeeding. The allegations call into question how much the president — this one or the next — can rely on Centcom for honest assessments of military operations in Iraq, Afghanistan, Yemen and other crisis spots.

    In some ways, the Iraq team’s criticism mirrors the disputes of a decade ago, when Mr. Hooker wrote a research paper saying the Bush administration, over many analysts’ objections, advocated a small force in Iraq and spent little time thinking about what would follow the invasion.

    That dispute was separate from the battle over flawed intelligence assessments by the C.I.A. and other spy agencies that Saddam Hussein had weapons of mass destruction. Central Command did not contribute significantly to those assessments.

    Several current and former officials said that it was the two most senior intelligence officers at Centcom — Maj. Gen. Steven Grove and his civilian deputy, Gregory Ryckman — who drew analysts’ ire with changes in draft intelligence assessments. But why the assessments were changed remains an open question. Some analysts suggested that leaders in Tampa feared that reporting bad news might anger the White House. Others described an institutional bias that makes it hard for the military to criticize its own operations.

    Continue reading the main story

    Graphic: Where ISIS Has Directed and Inspired Attacks Around the World
    Centcom’s leader, Gen. Lloyd J. Austin III, was chosen for the job in part because the White House regarded him as a steady, cautious loyalist who would execute military operations in the Middle East with little drama — an especially important consideration after the contentious relationship between the White House and Gen. James Mattis, the previous Centcom commander. General Austin gave testimony last week to the Senate Armed Services Committee that was roundly criticized by some lawmakers as being an overly positive assessment of the war’s progress.

    Centcom’s mammoth intelligence operation, with some 1,500 civilian, military and contract analysts, is housed at MacDill Air Force Base in Tampa, in a bay front building that has the look of a sterile government facility posing as a Spanish hacienda. In banks of plain cubicles, the analysts try each day to measure the progress of war.

    That effort has long been difficult, particularly in campaigns without traditional armies and clear battle lines. During the war in Vietnam, generals were criticized for measuring success in body counts. In the fight against the Islamic State, also known as ISIS or ISIL, the military issues daily reports that suggest tactical victories but offer little hint about how the war is going.

    “One airstrike struck an ISIL tactical unit and destroyed an ISIL cache, three ISIL fighting positions and one ISIL motorcycle,” a report this month said. “Near Ramadi, one airstrike destroyed an ISIL vehicle.”

    Brian Hale, a spokesman for the director of national intelligence, played down the significance of Centcom’s conclusions in shaping the thinking of senior policy makers, including Mr. Obama, about the war. In a statement on Wednesday he said that Centcom and other military commanders do not provide “broad or strategic assessments.”

    The success of daily airstrikes, experts say, can give the illusion of progress, particularly for Centcom commanders who are judged in Washington on their ability to carry out a successful mission. Iraq analysts, officials said, are less optimistic.

    Continue reading the main story
    Obama’s Evolution on ISIS
    Some of President Obama’s statements about the American strategy to confront ISIS and its effectiveness.

    “You can get pulled into watching the laser dot on a target and watching it blow up,” said Kevin Benson, a retired Army colonel who teaches intelligence analysis to officers at Fort Leavenworth, Kan. “After that, it can be hard to hear that you’re not making progress, because you saw it.”

    Analysts like Mr. Hooker and his team are supposed to be immune from such pressure because they are employed by the Defense Intelligence Agency. In practice, though, the analysts are reviewed by officials at Centcom.

    Although critics have suggested that the bombing campaign’s stalemate proves the need for more troops in Iraq, colleagues say Mr. Hooker’s team is not advocating that approach. “I don’t know anyone outside of a political commercial who thinks we need to send large numbers of troops into Iraq,” said one intelligence official who has worked closely with the Centcom analysts.

    Instead, analysts say the dispute centers on whether the military is being honest about the political and religious situation in Iraq and whether a bombing campaign can change it.

    “What are the strategic objectives here? There are none. This is just perpetual war,” said David Faulkner, the former targeting director at Centcom who worked alongside the Iraq analysts. “People say: ‘Oh, you’re military. You like that.’ No, we don’t.”

    Current and ex-officials said tension about how to portray the war’s progress began almost at the start of the campaign last summer, when Mr. Obama authorized strikes against Islamic State fighters in Iraq and later expanded the bombings to Syria.

    Continue reading the main story

    Graphic: How ISIS Expands
    Early this year, one former official said, Mr. Hooker’s team concluded that, despite public statements to the contrary, airstrikes against Islamic State-held refineries had not significantly weakened its finances because it had built makeshift refineries to sell oil on the black market. But the finding was not distributed outside Centcom, the ex-official said.

    Over this past year, analysts felt pressure to keep their assessments positive. In order to report bad news, current and former officials said, the analysts were required to cite multiple sources. Reporting positive news required fewer hurdles. Senior officials sent emails cautioning against using pessimistic phrases that they said were more likely to get attention, according to one former official. In some instances, officials said, conclusions were completely changed.

    Anger among analysts grew so intense that in the spring, Mr. Hooker’s civilian boss, William Rizzio, confronted his superiors about the problems. Mr. Rizzio, a retired Marine colonel who had gradually come to take the side of the analysts in the dispute, had meetings with General Grove and Mr. Ryckman. It is unclear what transpired in the meetings, but three people with knowledge of the situation, who, like some others interviewed, spoke on the condition of anonymity because the matter is part of the inspector general’s investigation, said the result was that Mr. Rizzio was punished for siding with the analysts. He was temporarily reassigned, and analysts were left wondering what happened to him after his name was scraped off the front of his office at Centcom’s Joint Intelligence Center.

    Mr. Rizzio, who has since returned to his position, declined to be interviewed.

    His concerns gained a more sympathetic hearing several months later, when officials began speaking to the Pentagon’s inspector general, who opened his investigation in July. Officials would not say if Mr. Hooker was the first analyst to do so.

    The inspector general’s investigation turned a quiet matter into one of the most high-profile intelligence disputes since officials issued new rules that encourage dissenting views. Those rules were intended to prevent a repeat of the debacle over weapons of mass destruction in Iraq.

    The investigation has put this team of analysts, who for years worked in relative obscurity, at the center of a dispute that has the attention of intelligence officials across the government.

    “Signing onto a whistle-blowing complaint can easily be a career-ender,” David Shedd, a former acting head of the Defense Intelligence Agency, wrote in a column this week on Defense One, a national security news website. “The nation’s analytic professionals are watching closely to see how it is handled.”

    Correction: September 24, 2015
    An earlier version of this article misstated the year that President Obama officially ended the Iraq war. It was 2011, not 2009.
    Kitty Bennett contributed research.

    By MARK MAZZETTI and MATT APUZZOSEPT. 23, 2015

    A version of this article appears in print on September 24, 2015, on page A1 of the New York edition with the headline: Military Analyst Again Raises Red Flags on Progress in Iraq. Order Reprints| Today’s Paper|Subscribe

    Find this story at 23 September 2015

    © 2015 The New York Times Company

    Inquiry Weighs Whether ISIS Analysis Was Distorted

    Van nieuwsblog.burojansen.nl

    WASHINGTON — The Pentagon’s inspector general is investigating allegations that military officials have skewed intelligence assessments about the United States-led campaign in Iraq against the Islamic State to provide a more optimistic account of progress, according to several officials familiar with the inquiry.

    The investigation began after at least one civilian Defense Intelligence Agency analyst told the authorities that he had evidence that officials at United States Central Command — the military headquarters overseeing the American bombing campaign and other efforts against the Islamic State — were improperly reworking the conclusions of intelligence assessments prepared for policy makers, including President Obama, the government officials said.

    Fuller details of the claims were not available, including when the assessments were said to have been altered and who at Central Command, or Centcom, the analyst said was responsible. The officials, speaking only on the condition of anonymity about classified matters, said that the recently opened investigation focused on whether military officials had changed the conclusions of draft intelligence assessments during a review process and then passed them on.

    Photo

    Iraqi Army recruits in Taji in April with U.S. Army trainers. About 3,400 American troops are advising Iraqi forces. Credit John Moore/Getty Images
    The prospect of skewed intelligence raises new questions about the direction of the government’s war with the Islamic State, and could help explain why pronouncements about the progress of the campaign have varied widely.

    Legitimate differences of opinion are common and encouraged among national security officials, so the inspector general’s investigation is an unusual move and suggests that the allegations go beyond typical intelligence disputes. Government rules state that intelligence assessments “must not be distorted” by agency agendas or policy views. Analysts are required to cite the sources that back up their conclusions and to acknowledge differing viewpoints.

    Under federal law, intelligence officials can bring claims of wrongdoing to the intelligence community’s inspector general, a position created in 2011. If officials find the claims credible, they are required to advise the House and Senate Intelligence Committees. That occurred in the past several weeks, the officials said, and the Pentagon’s inspector general decided to open an investigation into the matter.

    Spokeswomen for both inspectors general declined to comment for this article. The Defense Intelligence Agency and the White House also declined to comment.

    Col. Patrick Ryder, a Centcom spokesman, said he could not comment on a continuing inspector general investigation but said “the I.G. has a responsibility to investigate all allegations made, and we welcome and support their independent oversight.”

    Numerous agencies produce intelligence assessments related to the Iraq war, including the Defense Intelligence Agency, the Central Intelligence Agency and others. Colonel Ryder said it was customary for them to make suggestions on one another’s drafts. But he said each agency had the final say on whether to incorporate those suggestions. “Further, the multisource nature of our assessment process purposely guards against any single report or opinion unduly influencing leaders and decision makers,” he said.

    It is not clear how that review process changes when Defense Intelligence Agency analysts are assigned to work at Centcom — which has headquarters both in Tampa, Fla., and Qatar — as was the case of at least one of the analysts who have spoken to the inspector general. In the years since the Sept. 11, 2001, attacks, the Pentagon has relocated more Defense Intelligence Agency analysts from the agency’s Washington headquarters to military commands around the globe, so they can work more closely with the generals and admirals in charge of the military campaigns.

    Mr. Obama last summer authorized a bombing campaign against the Islamic State, and approximately 3,400 American troops are currently in Iraq advising and training Iraqi forces. The White House has been reluctant, though, to recommit large numbers of ground troops to Iraq after announcing an “end” to the Iraq war in 2009.

    The bombing campaign over the past year has had some success in allowing Iraqi forces to reclaim parts of the country formerly under the group’s control, but important cities like Mosul and Ramadi remain under Islamic State’s control. There has been very little progress in wresting the group’s hold over large parts of Syria, where the United States has done limited bombing.

    Some senior American officials in recent weeks have provided largely positive public assessments about the progress of the military campaign against the Islamic State, a Sunni terrorist organization that began as an offshoot of Al Qaeda but has since severed ties and claimed governance of a huge stretch of land across Iraq and Syria. The group is also called ISIS or ISIL.

    Continue reading the main story
    Obama’s Evolution on ISIS
    Some of President Obama’s statements about the American strategy to confront ISIS and its effectiveness.

    In late July, retired Gen. John Allen — who is Mr. Obama’s top envoy working with other nations to fight the Islamic State — told the Aspen Security Forum that the terror group’s momentum had been “checked strategically, operationally, and by and large, tactically.”

    “ISIS is losing,” he said, even as he acknowledged that the campaign faced numerous challenges — from blunting the Islamic State’s message to improving the quality of Iraqi forces.

    During a news briefing last week, Defense Secretary Ashton B. Carter was more measured. He called the war “difficult” and said “it’s going to take some time.” But, he added, “I’m confident that we will succeed in defeating ISIL and that we have the right strategy.”

    But recent intelligence assessments, including some by Defense Intelligence Agency, paint a sober picture about how little the Islamic State has been weakened over the past year, according to officials with access to the classified assessments. They said the documents conclude that the yearlong campaign has done little to diminish the ranks of the Islamic State’s committed fighters, and that the group over the last year has expanded its reach into North Africa and Central Asia.

    Critics of the Obama administration’s strategy have argued that a bombing campaign alone — without a significant infusion of American ground troops — is unlikely to ever significantly weaken the terror group. But it is not clear whether Defense Intelligence Agency analysts concluded that more American troops would make an appreciable difference.

    In testimony on Capitol Hill this year, Lt. Gen. Vincent R. Stewart, the agency’s director, said sending ground troops back into Iraq risked transforming the conflict into one between the West and ISIS, which would be “the best propaganda victory that we could give.”

    “It’s both expected and helpful if there are dissenting viewpoints about conflicts in foreign countries,” said Micah Zenko, a fellow at the Council on Foreign Relations and author of a forthcoming book, “Red Team,” that includes an examination of alternative analysis within American intelligence agencies. What is problematic, he said, “is when a dissenting opinion is not given to policy makers.”

    The Defense Intelligence Agency was created in 1961, in part to avoid what Robert McNamara, the Secretary of Defense at the time, called “service bias.” During the 1950s, the United States grossly overestimated the size of the Soviet missile arsenal, a miscalculation that was fueled in part by the Air Force, which wanted more money for its own missile systems.

    During the Vietnam War, the Defense Intelligence Agency repeatedly warned that even a sustained military campaign was unlikely to defeat the North Vietnamese forces. But according to an internal history of the agency, its conclusions were repeatedly overruled by commanders who were certain that the United States was winning, and that victory was just a matter of applying more force.

    “There’s a built-in tension for the people who work at D.I.A., between dispassionate analysis and what command wants,” said Paul R. Pillar, a retired senior Central Intelligence Agency analyst who years ago accused the Bush administration of distorting intelligence assessments about Iraq’s weapons programs before the beginning of the Iraq war in 2003.

    “You’re part of a large structure that does have a vested interest in portraying the overall mission as going well,” he said.

    By MARK MAZZETTI and MATT APUZZOAUG. 25, 2015
    A version of this article appears in print on August 26, 2015, on page A1 of the New York edition with the headline: Inquiry Weighs If ISIS Analysis Was Distorted . Order Reprints| Today’s Paper|Subscribe

    Find this story at 25 August 2015

    © 2015 The New York Times Company

    << oudere artikelen  nieuwere artikelen >>