• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Three senior officials lose their jobs at APA after US torture scandal

    Van nieuwsblog.burojansen.nl

    American Psychological Association framed the departures of its chief executive officer, deputy CEO and communications chief as ‘retirements’ and resignations
    The torture scandal consuming the US’s premiere professional association of psychologists has cost three senior officials their jobs, part of a reckoning that reformers hope will lead to criminal prosecutions.
    US torture doctors could face charges after report alleges post-9/11 ‘collusion’
    As the American Psychological Association copes with the damage reaped by an independent investigation that found it complicit in US torture, the group announced on Tuesday that its chief executive officer, its deputy CEO and its communications chief are no longer with the APA.
    All three were implicated in the 542-page report issued this month by former federal prosecutor David Hoffman, who concluded that APA leaders “colluded” with the US department of defense and aided the CIA in loosening professional ethics and other guidelines to permit psychologist participation in torture.
    Despite rumors of the three oustings circulating for over a week, the APA framed the departures of longtime executive officials Norman Anderson and Michael Honaker as “retirements”. Rhea Farberman, who served as APA’s communications director for 22 years, “resigned”, the APA said in a statement.
    While CEO Anderson’s retirement was scheduled before the Hoffman report was released, the APA stated: “Dr Anderson felt that moving up his retirement date to the end of 2015 would allow the association to take another step in the important process of organizational healing, and to facilitate APA’s continuing focus on its broader mission.”
    Psychologist accused of enabling US torture backed by former FBI chief
    Read more
    Anderson, Honaker and Farberman join Stephen Behnke, the APA’s former ethics chief also implicated in torture, in the first wave of APA departures as the organization seeks to rebuild its credibility. Behnke has issued a combative statement threatening unspecified legal action.
    “This is a major step toward reforming the APA and the profession,” said Stephen Soldz, a longtime APA critic on torture affiliated with Physicians for Human Rights.
    “I hope it is only the beginning of change. The selection of the right CEO will be crucial.”
    Soldz is part of a group pushing for the APA to refer the Hoffman report to the FBI and justice department for potential criminal inquiries. Thus far, the APA has committed to providing the report to the Senate committees overseeing the military and CIA, and a call to end all psychologist participation in US interrogation and detention operations is slated for APA consideration at a major conference next month.
    Thus far, there is no indication from the justice department that it intends to revisit the politically fraught question of legal accountability for torture, which ended in 2012 without prosecutions. The defense department, which still assigns psychologists to Guantanamo Bay, has yet to comment; and the White House has stayed out of the fray.
    Hoffman’s report identifies Behnke, a defense department contractor, as a chief culprit in maneuvering the APA toward loosening its opposition to torture while denying doing any such thing; and the departed APA officials as complicit.
    Behnke undertook “extensive efforts to manipulate” the APA’s council of representatives “in an effort to undermine attempts to keep psychologists from being involved in national security interrogations”, Hoffman found. Other “APA officials involved with Behnke in these efforts included “Anderson, Honaker [and] Farberman”.
    Nevertheless, Farberman insisted to the press that the APA had taken a consistent position against torture.
    After the Guardian reported that the APA had declined to take action against a psychologist who participated in a brutal Guantanamo interpretation, Farberman told the Guardian: “A thorough review of these public materials and our standing policies will clearly demonstrate that APA will not tolerate psychologist participation in torture.”
    It is unclear if the three officials are the APA’s last to leave. Barry Anton, the APA’s current president, is also listed in the “Key Players” section, as Anton is said to have “participated in the selection” of members of a critical task force on psychologist involvement in torture that was stacked with US defense department officials.
    The APA will meet in Toronto beginning on 6 August for its annual convention, which former president Nadine Koslow told the Guardian she expected to be consumed with the issue of what reforms the organization must adopt in the wake of the Hoffman report.
    Tuesday 14 July 2015 17.43 BST Last modified on Tuesday 14 July 2015 18.51 BST
    Find this story at 14 July 2015
    Find the report
    © 2015 Guardian News and Media Limited

    Robert Jay Lifton, Author of “The Nazi Doctors”: Psychologists Who Aided Torture Should Be Charged

    Van nieuwsblog.burojansen.nl

    Robert Jay Lifton, the prominent psychiatrist famous for his study of the doctors who aided Nazi war crimes, speaks out on the role of the American Psychological Association in aiding government-sanctioned torture under President George W. Bush. A new report alleges the APA, the world’s largest group of psychologists, secretly coordinated with government officials to align its ethics policy with the operational needs of the CIA’s torture program. “What the APA did was a scandal within a scandal,” Lifton says. “[This] is something we have to confront as a nation.”
    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.
    NERMEEN SHAIKH: New details have emerged on how the American Psychological Association, the world’s largest group of psychologists, aided government-sanctioned torture under President George W. Bush. A group of dissident psychologists have just published a 60-page report alleging the APA secretly coordinated with officials from the CIA, White House and the Pentagon to change the APA ethics policy to align it with the operational needs of the CIA’s torture program. The report also reveals a behavioral science researcher working for President Bush secretly drafted language that the APA inserted into its ethics policy on interrogations.
    AMY GOODMAN: Much of the report is based on hundreds of newly released internal APA emails from 2003 to 2006 that show top officials were in direct communication with the CIA. In 2004, for example, the APA secretly took part in a meeting with officials from the CIA and other intelligence agencies to discuss ethics and national security.
    Still with us, Dr. Robert Jay Lifton, leading American psychiatrist who has spoken out against the APA’s practices. So, the American Psychological Association has about 150,000 members, the largest association in the world. That’s the APA. The little APA is the American Psychiatric Association, which I assume you’re a part of. Dr. Robert Jay Lifton, your thoughts on what the APA did?
    ROBERT JAY LIFTON: What the APA did—and I read that report—is what I call a scandal within a scandal. That is, I have been much concerned with the behavior of professionals and their ethics, not just in terms of how they conduct their everyday profession—that’s important enough—but their relationship to the world ethically. I became interested in this in working with veterans of the Vietnam War. And in that war, military psychiatrists would be in a position, when examining a soldier who was brought to them with anxiety and a sense of outrage at what was going on—would be in the position of helping that soldier to be strong enough to return to duty, which meant daily atrocities. And I asked myself, how did a psychiatrist find himself in that situation? And it had to do with a military structure of medicine and with the psychiatrist entering into what I called an atrocity-producing situation. In my work with Nazi doctors, it was even, of course, much more extreme, probably the most extreme example of any profession of any country engaging in extremely immoral behavior, engaging directly in killing, because Nazi physicians were in charge of the killing in Auschwitz. And that’s what I studied in that research. But, you know—
    AMY GOODMAN: What’s interesting, both Nermeen and I saw you speak last night on a very different issue, on the Armenian genocide, and you talked about the significance of Dr. Josef Mengele dying without acknowledging what he did.
    ROBERT JAY LIFTON: Yes, when Mengele, who was a notorious fanatical Nazi, quite unusual in that way among doctors, was found to be dead in a lake in Argentina, survivors of Auschwitz were upset that there wasn’t the opportunity to bring him to the dock so that he could confront his crimes. It wasn’t so much a desire for revenge as it was for justice. So I mentioned that survivors of holocaust or genocide, or survivors in general, are what can be called collectors of justice. They need a sense of justice for their own healing.
    But now, here we have American psychologists. There were psychiatrists involved early also in the enhanced interrogation, which spilled over into torture in American use. Fortunately, American Psychiatric Association had slightly more enlightened leadership, and we had the advantage of doctors’ Hippocratic Oath, which is “do no harm,” and there could be developed a resolution prohibiting any physician, any psychiatrist, from being in the interrogation room. The American Psychological Association took an opposite tendency. It’s one thing—and there were a couple of psychologists, who are well known, who helped create the torture and the whole psychological regimen for the torture, crudely and very unscientifically, but with the claim of psychological science. It’s still another level when the professional organization supports torture by meeting with the administration and those people who were looking for some legitimation coming from a professional group for torture. And that’s what the American Psychological Association did.
    And that’s all too reminiscent of what the Nazis called Gleichschaltung. I’m not saying they’re Nazis. We’re not Nazis. We’re still a sufficiently open society to confront this, criticize it and do something about it. But with the Nazis, there was this process of Gleichschaltung, meaning reordering or re-gearing all professional organizations, not destroying them, but breaking them down and reconstructing them to serve the Nazi project. That’s the kind of thing we must and can confront and avoid here.
    NERMEEN SHAIKH: Well, last December, psychologist James Mitchell, who was contracted by the CIA while still a member of the American Psychological Association to design its interrogation program, appeared on Fox News to talk about his role in the waterboarding of Abu Zubaydah. He was interviewed by Megyn Kelly.
    MEGYN KELLY: So you—were you the one actually conducting the techniques on Abu Zubaydah, or were you in more of a sort of background role?
    JAMES MITCHELL: It depends on when you’re talking about. Initially, I was in a background role. Then, after we shut down and the enhanced interrogations were approved, I was in an administration role.
    MEGYN KELLY: OK, so did you personally waterboard him?
    JAMES MITCHELL: Yes.
    MEGYN KELLY: We’re going to get to Khalid Sheikh Mohammed in a minute, but sticking with Abu Zubaydah for now, were all of the methods that were cited in the Senate report employed, like nudity, standing sleep deprivation, the attention grab, the insult slap? Were those all used?
    JAMES MITCHELL: The ones you mentioned were used.
    MEGYN KELLY: The facial grab, the abdominal slap, the kneeling stress position, walling?
    JAMES MITCHELL: Walling was used. The others—if they showed up on the list, they were used. We didn’t typically use a lot of those stress positions. We didn’t use any stress positions with Abu Zubaydah, because he had an injury.
    NERMEEN SHAIKH: That was psychologist James Mitchell speaking on Fox News last December. He was the psychologist who was asked by the CIA to design its interrogation program. Could you talk about that, Dr. Lifton? And in particular, in the context of what you called earlier an atrocity-producing situation, what enabled this to occur?
    ROBERT JAY LIFTON: Professionals are as prone to being socialized to the norm of a group, including being socialized to evil, as are any other groups in American society. What that means is that psychologists, in this case—and there are others from other professions—internalize what is considered to be acceptable and appropriate for them in carrying out their profession. So, torture exists. There is the nod from the administration: Go ahead with torture. And psychologists then adapt to that and, in this case, become not just participants in torture, but the creators of the methods of torture.
    That’s a shocking clip because it shows him kind of slightly reluctantly admitting that they do all those things. Of course, it’s denied that they’re torture, and that’s absurd. They’re out-and-out torture. But the fact that they’ll come on a network program and describe it as something legitimate is another level of scandal. After all, torture has been conducted, you know, from the time of the beginning of history. It’s always been seen, and especially in recent centuries, as something evil. You can judge a society as to whether it engages in torture. You condemn a society that engages in torture.
    In our case, looking at the sequence, one can praise the Obama administration for ending that torture, but one must criticize the Obama administration for blocking any examination or confrontation of our role in torture. You showed an interesting clip about the city of Chicago confronting and at least recognizing that the police had engaged in torture of certain suspects. Well, that doesn’t undo what they did, but it’s a step toward some kind of ethical advance. And for the United States to have engaged in torture on such a widespread dimension, to have legitimated it among professionals like psychologists, for psychologists and others to have created and participated in it, is something that we have to confront, as a nation, to move ahead in something like an ethical way.
    AMY GOODMAN: And when you talk about confronting, what exactly do you mean? You’ve just given a psychological, sociological explanation, understanding. For example, James Mitchell, or Mitchell and Jessen, the company of two psychologists that Pentagon funneled money into, not to mention other psychologists who didn’t even work for them, working at Guantánamo and Abu Ghraib, but should they be brought up on charges?
    ROBERT JAY LIFTON: Of course they should. There are many situations that I can probe psychologically, or psychohistorically, as we say, but have to be approached politically for some kind of resolution, and this is an example of that. A proper confrontation of what we did would mean a real investigation that didn’t stop as we got to the top. Yes, of course, the order for torture being acceptable and advised comes from above, comes from the highest sources in the administration. That has to be uncovered by an investigation, and there has to be a legal context. Whether or not everybody who participated in torture is in some way condemned and put to jail, I don’t know. But at minimum, there must be a confrontation and revelation of what was done, who did it, what the consequences were and how to prevent it in the future.
    AMY GOODMAN: What do you think of this comment by CIA psychologist—former CIA psychologist Kirk Hubbard, who served as the CIA’s chief of operations of the Operational Assessment Division before he joined Mitchell Jessen and Associates? In 2012, Hubbard told the Constitution Project’s Task Force on Detainee Treatment, quote, “Detainees are not patients nor are they being ‘treated’ by the psychologists. Therefore the ethical guidelines for clinicians do not apply, in my opinion. Psychologists can play many different roles and should not be forced into a narrow doctor-patient role.” Dr. Robert Jay Lifton, your response?
    ROBERT JAY LIFTON: What you’ve heard, what you just recited, is a rationalization for torture and for destructive behavior on the part of professionals. All professions require some sort of ethical code, as I said before, not just in everyday practice, but in what they do in society. And to weasel out of any such ethical requirement because one is dealing not with patients, but with prisoners—and, of course, that administration didn’t even give them prisoner rights, according to Geneva Conventions—to do that is simply a rationalization for destructive or even evil behavior.
    AMY GOODMAN: We’re talking to Dr. Robert Jay Lifton, a leading American psychiatrist, author of many books, including Witness to an Extreme Century: A Memoir. We’ll be back with him, talking about a number of issues, including another of his books, Who Owns Death?: Capital Punishment, the American Conscience, and the End of Executions—Prosecutors, Judges, Jurors, Wardens, and the American Public in Conflict. Stay with us.
    THURSDAY, MAY 7, 2015
    Find this story at 7 May 2015
    Creative Commons License The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    Outside Psychologists Shielded U.S. Torture Program, Report Finds

    Van nieuwsblog.burojansen.nl

    WASHINGTON — The Central Intelligence Agency’s health professionals repeatedly criticized the agency’s post-Sept. 11 interrogation program, but their protests were rebuffed by prominent outside psychologists who lent credibility to the program, according to a new report.
    The 542-page report, which examines the involvement of the nation’s psychologists and their largest professional organization, the American Psychological Association, with the harsh interrogation programs of the Bush era, raises repeated questions about the collaboration between psychologists and officials at both the C.I.A. and the Pentagon.
    The report, completed this month, concludes that some of the association’s top officials, including its ethics director, sought to curry favor with Pentagon officials by seeking to keep the association’s ethics policies in line with the Defense Department’s interrogation policies, while several prominent outside psychologists took actions that aided the C.I.A.’s interrogation program and helped protect it from growing dissent inside the agency.
    Continue reading the main story
    DOCUMENT
    Psychologists and ‘Enhanced’ Interrogation
    A 542-page report concludes that prominent psychologists worked closely with the C.I.A. to blunt dissent inside the agency over an interrogation program that is now known to have included torture. It also finds that officials at the American Psychological Association colluded with the Pentagon to make sure the association’s ethics policies did not hinder the ability of psychologists to be involved in the interrogation program.
    OPEN DOCUMENT
    The association’s ethics office “prioritized the protection of psychologists — even those who might have engaged in unethical behavior — above the protection of the public,” the report said.
    Two former presidents of the psychological association were on a C.I.A. advisory committee, the report found. One of them gave the agency an opinion that sleep deprivation did not constitute torture, and later held a small ownership stake in a consulting company founded by two men who oversaw the agency’s interrogation program, it said.
    The association’s ethics director, Stephen Behnke, coordinated the group’s public policy statements on interrogations with a top military psychologist, the report said, and then received a Pentagon contract to help train interrogators while he was working at the association, without the knowledge of the association’s board. Mr. Behnke did not respond to a request for comment.
    The report, which was obtained by The New York Times and has not previously been made public, is the result of a seven-month investigation by a team led by David Hoffman, a Chicago lawyer with the firm Sidley Austin at the request of the psychology association’s board.
    After the Hoffman report was made public on Friday, the American Psychological Association issued an apology.
    “The actions, policies and lack of independence from government influence described in the Hoffman report represented a failure to live up to our core values,” Nadine Kaslow, a former president of the organization, said in a statement. “We profoundly regret and apologize for the behavior and the consequences that ensued.”
    The association said it was considering proposals to prohibit psychologists from participating in interrogations and to modify its ethics policies, among other changes.
    The involvement of psychologists in the interrogation programs has been a source of contention within the profession for years. Another report, issued in April by several critics of the association, came to similar conclusions. But Mr. Hoffman’s report is by far the most detailed look yet into the crucial roles played by behavioral scientists, especially top officials at the American Psychological Association and some of the most prominent figures in the profession, in the interrogation programs. It also shows that the collaboration was much more extensive than was previously known.
    A report last December by the Senate Intelligence Committee detailed the brutality of some of the C.I.A.’s interrogation methods, but by focusing on the role of psychologists, Mr. Hoffman’s report provides new details, and can be seen as a companion to the Senate report.
    The C.I.A. and the Pentagon both conducted harsh interrogations during the administration of President George W. Bush, although the C.I.A.’s program included more brutal tactics. Some of them, like the simulated drowning technique called waterboarding, are now widely regarded as torture. The agency’s interrogations were done at so-called black site prisons around the world where prisoners were held secretly for years.
    The report found that while some prominent psychologists collaborated with C.I.A. officials in ways that aided the agency’s interrogation program, the American Psychological Association and its staff members focused more on working with the Pentagon, with which the association has long had strong ties.
    Indeed, the report said that senior officials of the association had “colluded” with senior Defense Department officials to make certain that the association’s ethics rules did not hinder the ability of psychologists to remain involved with the interrogation program.
    The report’s most immediate impact will be felt at the association, where it has been presented to the board and its members’ council. The board met last week to discuss the report and is expected to act on its findings soon. The association has since renounced 2005 ethics guidelines that allowed psychologists to stay involved in the harsh interrogations, but several staff members who were named in the report have remained at the organization.
    A C.I.A. spokesman said that agency officials had not seen it and so could not comment.
    Dissent began building within the C.I.A. against the use of so-called enhanced interrogation techniques not long after its interrogation program began.
    In about late 2002, the head of the C.I.A.’s Office of Medical Services, Terrence DeMay, started to complain about the involvement in the program of James Mitchell, a psychologist and instructor at the Air Force’s SERE (survival, evasion, rescue and escape) program, in which United States military personnel are subjected to simulated torture to gird them for possible capture. Mr. Mitchell had also served as a consultant to the C.I.A. advisory committee that included two former presidents of the psychological association.
    One unidentified witness was quoted in the Hoffman report as saying that doctors and psychologists in the C.I.A.’s Office of Medical Services “were not on board with what was going on regarding interrogations, and felt that they were being cut out of the discussion.” One leading C.I.A. psychologist told investigators that Mr. DeMay “was berating Jim Mitchell about being involved in the interrogation program,” and that Mr. DeMay’s objections “related to the involvement of psychologists as professionals adept at human behavior and manipulation.”
    Mr. DeMay’s complaints “led to a substantial dispute within the C.I.A.,” according to the report, and prompted the head of the agency’s counterterrorism center to seek an opinion from a prominent outside psychologist on whether it was ethical for psychologists to continue to participate in the C.I.A.’s interrogations.
    The C.I.A. chose Mel Gravitz, a prominent psychologist who was also a member of the agency’s advisory committee. In early 2003, Mr. Gravitz wrote an opinion that persuaded the chief of the agency’s counterterrorism center that Mr. Mitchell could continue to participate in and support interrogations, according to the Hoffman report.
    Mr. Gravitz’s opinion, which the Hoffman report quotes, noted that “the psychologist has an obligation to (a) group of individuals, such as the nation,” and that the ethics code “must be flexible [sic] applied to the circumstances at hand.”
    But ethical concerns persisted at the C.I.A. In March 2004, other agency insiders emailed the psychological association to say they were worried that psychologists were assisting with interrogations in ways that contradicted the association’s ethics code.
    One of those who contacted the association was Charles Morgan, a C.I.A. contractor and psychiatrist who had studied military personnel who went through the SERE program’s simulated torture training, research that showed that the techniques used on them could not be used to collect accurate information.
    Another, oddly, was Kirk Hubbard, a C.I.A. psychologist who was chairman of the agency advisory committee that included two former association presidents and on which Mr. Mitchell was a consultant. Mr. Hubbard told the Hoffman investigators that he did not have concerns about the participation of psychologists in the interrogation program, but emailed the association because he had been asked to pass on the concerns of other behavioral scientists inside the agency.
    The ethical concerns raised by Mr. Morgan and others inside the C.I.A. led to a confidential meeting in July 2004 at the psychological association of about 15 behavioral scientists who worked for national security agencies. This was followed by the creation of an association task force to study the ethics of psychologists’ involvement in interrogations.
    But association and government officials filled the task force with national security insiders, and it concluded in 2005 that it was fine for psychologists to remain involved, the report found.
    The report provides new details about how Mr. Mitchell and Bruce Jessen, another SERE trainer who would later go into business with Mr. Mitchell, gained entree to the C.I.A.’s counterterrorism center, which hired them to create and run the interrogation program. After Mr. Mitchell worked as a consultant to the C.I.A. advisory committee, Mr. Hubbard introduced Mr. Mitchell and Mr. Jessen to Jim Cotsana, the chief of special missions in the C.I.A.’s counterterrorism center.
    Mr. Mitchell and Mr. Jessen were later hired as contractors for the counterterrorism center, where they helped create the interrogation program by adapting the simulated torture techniques from the SERE program, using them against detainees.
    Separately, Joseph Matarazzo, a former president of the psychological association who was a member of the C.I.A. advisory committee, was asked by Mr. Hubbard to provide an opinion about whether sleep deprivation constituted torture. Mr. Matarazzo concluded that it was not torture, according to the report.
    Later, Mr. Matarazzo became a 1 percent owner of a unit of Mitchell Jessen and Associates, the contracting company Mr. Mitchell and Mr. Jessen created to handle their work with the C.I.A.’s interrogation program. Mr. Matarazzo was also listed as a partner of the company in a 2008 annual report, according to the Hoffman report.
    Mr. Matarazzo said he had not read the report and could not comment.
    Mr. Hubbard, after he retired from the C.I.A., also did some work for Mitchell Jessen and Associates.
    The report reaches unsparing conclusions about the close relationship between some association officials and officials at the Pentagon.
    “The evidence supports the conclusion that A.P.A. officials colluded with D.O.D. officials to, at the least, adopt and maintain A.P.A. ethics policies that were not more restrictive than the guidelines that key D.O.D. officials wanted,” the report says, adding, “A.P.A. chose its ethics policy based on its goals of helping D.O.D., managing its P.R., and maximizing the growth of the profession.”
    By JAMES RISENJULY 10, 2015
    Find this story at 10 July 2015
    © 2015 The New York Times Company

    Emails Show American Psychological Association Secretly Worked with Bush Admin to Enable Torture

    Van nieuwsblog.burojansen.nl

    New details have emerged on how the American Psychological Association, the world’s largest group of psychologists, aided government-sanctioned torture under President George W. Bush. A group of dissident psychologists have just published a 60-page report alleging the APA secretly coordinated with officials from the CIA, White House and the Pentagon to change the APA ethics policy to align it with the operational needs of the CIA’s torture program. Much of the report, “All the President’s Psychologists: The American Psychological Association’s Secret Complicity with the White House and US Intelligence Community in Support of the CIA’s ‘Enhanced’ Interrogation Program,” is based on hundreds of newly released internal APA emails from 2003 to 2006 that show top officials were in direct communication with the CIA. The report also reveals Susan Brandon, a behavioral science researcher working for President Bush, secretly drafted language that the APA inserted into its ethics policy on interrogations. We are joined by two of the report’s co-authors: Dr. Steven Reisner, a founding member of the Coalition for an Ethical Psychology and member of the APA Council of Representatives, and Nathaniel Raymond, director of the Signal Program on Human Security and Technology at the Harvard Humanitarian Initiative.
    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.
    AMY GOODMAN: New details have emerged on how the American Psychological Association, the world’s largest group of psychologists, aided government-sanctioned torture under President George W. Bush. A group of dissident psychologists have just published a 60-page report alleging the APA secretly coordinated with officials from the CIA, White House and the Pentagon to change the APA ethics policy to align it with the operational needs of the CIA’s torture program. The report also reveals a behavioral science researcher working for President Bush secretly drafted language that the APA inserted into its ethics policy on interrogations.
    Much of the report is based on hundreds of newly released internal APA emails from 2003 to 2006 that show top officials were in direct communication with the CIA. In 2004, for example, the APA secretly took part in a meeting with officials from the CIA and other intelligence agencies to discuss ethics and national security. In one email, the APA stated that the aim of the meeting was, quote, “to take a forward looking, positive approach, in which we convey a sensitivity to and appreciation of the important work mental health professionals are doing in the national security arena, and in a supportive way offer our assistance in helping them navigate through thorny ethical dilemmas,” unquote.
    One attendee was Kirk Hubbard, then the chief of operations for the CIA Operational Assessment Division. He would later leave the CIA to work for the private firm set up by James Mitchell and Bruce Jessen, the psychologists who were hired as private contractors to set up the CIA interrogation program including the waterboarding of prisoners. In one 2003 email, Hubbard wrote to a top APA official, quote, “You won’t get any feedback from [Dr. James] Mitchell or Jessen. They are doing special things to special people in special places, and generally are not available,” unquote. While the APA has attempted to distance itself from Mitchell and Jessen, the newly disclosed emails show the men attended a 2003 invite-only conference called “The Science of Deception,” sponsored by the APA, the CIA and RAND Corporation, to discuss so-called enhanced interrogations.
    We’re joined now by two of the co-authors of the new report, “All the President’s Psychologists: The American Psychological Association’s Secret Complicity with the White House and US Intelligence Community in Support of the CIA’s ‘Enhanced’ Interrogation Program.” Steven Reisner is a clinical psychologist and psychoanalyst. He’s a founding member of the Coalition for an Ethical Psychology and adviser on psychology and ethics for Physicians for Human Rights. He’s currently a member of the APA Council of Representatives. Nathaniel Raymond is director of the Signal Program on Human Security and Technology at the Harvard Humanitarian Initiative.
    We did invite a representative from the APA to join us, as well, but they declined. Last year, the APA commissioned an outside attorney named David Hoffman to conduct a third-party, independent review of the allegations about the APA and the Bush administration torture program. Rhea Farberman, the APA’s executive director for Public and Member Communications, told Democracy Now! the APA won’t respond to the allegations in the “All the President’s Psychologists” report until Hoffman’s review is completed.
    Steven Reisner and Nathaniel Raymond, welcome back to Democracy Now! OK, Nathaniel Raymond, why don’t you lay out the core findings in your 60-page report?
    NATHANIEL RAYMOND: There are four core findings. The first is that the American Psychological Association allowed, as you mentioned, Dr. Susan Brandon, it appears, who, three weeks before the APA engaged in its ethics process in 2005 on psychological ethics and national security, had been president Bush’s behavioral science adviser—she wrote what appears to be research language in the PENS report, the Psychological Ethics and National Security policy of the APA. That language, we now know because of the Senate Select Committee on Intelligence report, directly aligns with the legal memos authorizing the enhanced interrogation program, and provided an ethical get-out-of-jail-free card that aligned with the then-classified legal get-of-jail-free card.
    Secondly, we see clear deception by the APA, including some outright lies, including the assertion for many years that James Mitchell, the CIA torture psychologist you mentioned, had not been an APA member. We now know he was an APA member from 2001 to 2006. And the APA has also contended, according to Dr. Stephen Behnke, the ethics director, that they had had no contact on interrogations and interrogation techniques with Mitchell and Jessen. We now know that they discussed sensory overload and the use of psychopharmacological agents with Mitchell and Jessen in 2003.
    The last two critical findings, Amy, are that the APA, as we see throughout the emails, expressed no concern about clear evidence of abuse that at that point, between 2004 in 2005, was public knowledge. And lastly, what we see in this report is a clear coordination that directly mirrors the timeline inside the Bush administration when Office of Medical Services personnel inside the CIA were raising concerns about human subjects research as part of the program. The APA, whether they knew it or not, allowed the administration to write a policy that basically helped put down that rebellion inside CIA.
    AMY GOODMAN: How?
    NATHANIEL RAYMOND: By allowing psychologists to play a critical monitoring and research role, that was at the heart of the newly—then newly authorized Bradbury Office of Legal Counsel memo. If psychologists couldn’t ethically play this role, if the APA had not engaged in this policy, it is highly likely that the interrogation program itself would have disintegrated.
    AMY GOODMAN: You ran, Steven Reisner, for president of the American Psychological Association. Your main platform was speaking out against torture and APA’s involvement with the Bush administration. You didn’t win. Talk about what this means for the American Psychological Association.
    STEVEN REISNER: Well, I think the issue is what this means for the entire profession of psychologists and the fact that we are represented by the American Psychological Association, because I think that what we’re finding is that psychologists are feeling betrayed by our association. What has happened is that the ethics code that we are all trained in, that we align ourselves with and that gives us our identity as health professionals dedicated to the public good, that ethics code and ethics policy was twisted to align—not only to align with what the government needed it to do, but in the service of torture. It is a betrayal of what I think we all are expecting from and try to identify with from our association. So, what has to happen right now is that we’ve got to—the membership, the council, any concerned American has to insist that we reclaim our association, put it back on an ethical track, and find a way to expose this, be accountable for it, be transparent about it and make significant change so that we can restore trust.
    AMY GOODMAN: We’re going to go into detail on what the APA knew and when they knew it with Dr. Steven Reisner and Nathaniel Raymond, co-authors of the new report, “All the President’s Psychologists,” in a minute.
    [break]
    AMY GOODMAN: We’re talking about a new report that has just come out on the American Psychological Association’s involvement with the Bush administration’s so-called enhanced interrogation program. In 2005, Stephen Behnke, the director of ethics at the American Psychological Association, then and now, appeared on Democracy Now!
    STEPHEN BEHNKE: I don’t have firsthand knowledge of what went on at Guantánamo. I know that the APA very much wants the facts, and that when APA has the facts, we will act on those facts.
    AMY GOODMAN: Stephen Behnke appeared on the show in a debate with Michael Wilks, chair of the medical ethics committee at the British Medical Association. Dr. Behnke went on to defend the APA’s actions.
    STEPHEN BEHNKE: In all fairness, the American Psychological Association is very clear that under no circumstances is it in any manner permissible for a psychologist to engage in, to support, to facilitate, to direct or to advise torture or other cruel, inhuman or degrading treatment. The American Psychological Association and the American Psychiatric Association issued a joint statement against torture and cruel, inhuman or degrading treatment in 1985. In 1986, the American Psychological Association issued another resolution against torture. So, to even suggest that that would in any manner be permissible is completely out of bounds.
    MICHAEL WILKS: Might I ask a direct question, because I’m really interested to know? Could I ask why the APA’s presidential report then specifically recommends that psychologists should be involved in research into interrogation techniques?
    STEPHEN BEHNKE: Well, as I have—as I have said, psychologists have been working together with law enforcement for many years domestically in information gathering and interrogation processes. We believe that as experts in human behavior, psychologists have valuable contributions to make to those activities.
    AMY GOODMAN: That’s Dr. Stephen Behnke on Democracy Now! in 2005. Our guests now are Dr. Steven Reisner, a member of the American Psychological Association, and Nathaniel Raymond. They both co-authored the new report, “All the President’s Psychologists.” Nathaniel Raymond, can you respond to what Dr. Behnke said?
    NATHANIEL RAYMOND: Well, what we now know, by reading the American Psychological Association’s emails, is that Dr. Behnke’s assertion in 2005 of “bring us the facts, and we will respond” directly contradicts his own words to the Operational Assessment Division of the Central Intelligence Agency in 2004, where he basically says, “We are not going to investigate,” in the context of the secret meeting they had, almost to the—basically, to the day that the White House was reauthorizing the enhanced interrogation program—”We’re not going to investigate any claims of abuse or any charges made at that meeting.” That directly contradicts what he said on Democracy Now!
    Second is his continued assertion that somehow the American Psychiatric Association, which endorsed in 2006 a clear ban on participation in all interrogations, direct participation by psychiatrists, is analogous to the APA position, is entirely specious. The fact of the matter is, is the American Psychological Association position in that PENS report, that we now know was the direct result of coordination with the intelligence community and, in some cases, elements of that community writing language in the report, critical research language, is—it is entirely different to look at the APA position and the American Psychological Association position for one reason. The American Psychological Association based its policy on U.S. definitions of torture at that time, which we now know from the declassified Office of Legal Counsel memos had an entirely different view of what constituted, quote, “torture” and what constituted cruel, inhuman and degrading treatment. So, saying that those positions are the same is just not the facts.
    AMY GOODMAN: Explain what changed.
    NATHANIEL RAYMOND: What changed is—there was two periods of change. The first is immediately after 9/11. We have evidence in the public record that the American Psychological Association changed a large portion of its ethics code related to research, and basically it wrote out international and domestic protections on consent for human subjects research. We know, by different names, some of those protections, such as the Nuremberg Code and the Common Rule. They allowed for the revocation of consent when consistent with a lawful order or regulation.
    That then combined with the second set of changes, which is the 2005 PENS report. The Psychological Ethics and National Security Task Force report then not only allows, but exhorts psychologists to have a research role in not only interrogations, but—this is the key sentence, Amy—in determining what constitutes cruel, inhuman, degrading treatment. Now, last time I checked, psychologists were not lawyers. This is outside the professional competency of psychologists to make a legal determination based on research. The question is, why were they being asked to do that, in language that we now know from the emails appears to have been written by a White House—former White House official? The fact of the matter is, that’s exactly what the Bradbury memos, that were then protecting the Bush administration from potential torture charges, required. And that’s exactly the concern that was being raised by the Office of the Inspector General internally at CIA, we now know from the Senate Select Committee on Intelligence. So that one sentence about research into what constitutes cruel, inhuman and degrading treatment positioned psychologists to be the legal heat shield for the president of the United States.
    AMY GOODMAN: Dr. Reisner?
    STEVEN REISNER: Well, we listened to Dr. Behnke say that the APA is opposed to torture, cruel, inhuman and degrading treatment at the very moment when they are writing into our ethics code a policy that permits psychologists’ very presence at those sites, researching, overseeing and monitoring, that the psychologists being there is what makes it fall outside the definition of torture, cruel, inhuman and degrading treatment concocted by the Justice Department in order to legally allow the torture. So what we have is a working together between the psychologists, the American Psychological Association, the CIA and the White House to create a cover story that says that torture is not torture, that it’s not legally torture under these rules. And while Dr. Behnke is claiming that psychologists don’t torture, psychologists are in fact torturing, and the APA seems to know it, according to these emails and according to what was in the press. But so what he’s doing is he’s parsing the facts and funneling it through a bent and distorted APA ethics code that has been changed simply to allow that program to continue.
    AMY GOODMAN: I want to read another one of the newly disclosed emails. This is from Dr. Geoff Mumford, director of science policy at the APA, to CIA psychologist Dr. Kirk Hubbard, who was then chief of operations for the CIA Operational Assessment Division. Dr. Mumford writes, quote, “I thought you and many of those copied here would be interested to know that APA grabbed the bull by the horns and released this [Psychological Ethics and National Security] Task Force Report today.” The PENS Task Force. “I also wanted to semi-publicly acknowledge your personal contribution … in getting this effort off the ground over a year ago. Your views were well represented by very carefully selected Task Force members,” unquote.
    In another email from 2005, the APA’s Dr. Geoff Mumford admitted former White House adviser Susan Brandon, who was then at the National Institute of Mental Health, helped craft language for the PENS report. Mumford wrote, quote, “Susan serving as an Observer (note she has returned to NIMH, at least temporarily) helped craft some language related to research and I hope we can take advantage of the reorganization of the National Intelligence Program, with its new emphasis on human intelligence, to find a welcoming home for more psychological science.”
    OK, Nathaniel Raymond, talk about who Mumford is. Talk about also the significance of the Susan they are referring to, Susan Brandon, and her position today.
    NATHANIEL RAYMOND: Well, Geoff Mumford, then and now, was executive director and is executive director of science policy at the American Psychological Association. And while he is one of the most prominent officials in these emails, I want to make clear he’s not the only one. We also see Rhea Farberman, the spokeswoman who denied any coordination between the APA and the Bush administration in James Risen’s New York Times story. We see Steve Behnke. And we also see—and this is new to our report—that the deputy CEO, Michael Honaker, deputy CEO of APA, was also CCed on one of the emails about the secret 2004 meeting.
    Dr. Brandon, then, was, as you described, at NIMH. She served in a variety of roles.
    AMY GOODMAN: National Institute of Mental Health.
    NATHANIEL RAYMOND: Yeah, National Institutes of Mental Health. And she served in a variety of roles in the Department of Defense and elsewhere. But she also had been, during the time of the planning of the 2003 conference that Mitchell and Jessen attended, an APA employee, previously. Now she is the chief scientist of the High-Value Interrogation Group of the FBI. And in that role, she is basically the senior interrogation research scientist in the U.S. government. And thus, the High-Value Interrogation Group, which advises the National Security Council at the White House, is the leading interrogation group in the intelligence community. What we’ve seen in the—
    AMY GOODMAN: She’s head of it now. She’s heading it now.
    NATHANIEL RAYMOND: She’s head of it right now. And I think that’s something that’s been missed in the coverage so far, is that this is not just about what happened five years ago. It is about a currently serving Obama administration official. And I want to say that Mark Fallon, the former assistant deputy director of the Naval Criminal Investigative Service, came out—
    AMY GOODMAN: NCIS.
    NATHANIEL RAYMOND: NCIS—came out a few days ago calling for an independent prosecutor in these matters, including the issues raised in our report. He is serving as chair of an advisory group to the High-Value Interrogation Group. So I want to make a point here that we have master interrogators, people who are affiliated with the current interrogation group, who are raising real concerns about the allegations in our report and are saying this isn’t old news. This has direct implications for accountability on these matters, involving, in this case, a current administration official.
    AMY GOODMAN: In 2007, psychologist Jean Maria Arrigo stood on the dais before a standing-room-only crowd at the annual American Psychological Association meeting in California. This came two years after she participated in an APA panel known as the PENS Task Force, that we’ve referred to today, that concluded psychologists working in interrogations play a, quote, “valuable and ethical role.” Dr. Arrigo criticized the findings and makeup of the panel she was on.
    JEAN MARIA ARRIGO: Six of the 10 members were highly placed in the Department of Defense, as contractors and military officers. For example, one was the commander of all military psychologists. Their positions on two key items of controversy in the PENS report were predetermined by their DOD employment, in spite of the apparent ambivalence of some. These key items were: (a) the permissive definition of torture in U.S. law versus the strict definition in international law, and, second, participation of military psychologists in interrogation settings versus nonparticipation. Those are the two principal issues. And because of their employment, they have to decide the way they do.
    AMY GOODMAN: That was Dr. Jean Arrigo. Talk about the significance of what she was saying. Democracy Now! was there covering these meetings as the APA even tried to cut down public access to the public parts of the meeting. But, Dr. Steve Reisner, she served on the PENS committee.
    STEVEN REISNER: That’s right. She served, believing that it was a committee that—of interested and knowledgeable psychologists to actually review ethics policy and national security. What she found was that the task force seemed to have a predetermined agenda, that the members of the task force were involved in the very commands that were implicated in the abuse, and that the majority of the conclusions seemed to have already been drawn before they began. It was a guided operation.
    AMY GOODMAN: She attempted to take notes during the meeting, is that right?
    STEVEN REISNER: That’s right, and she was asked not to, which is totally bizarre for a meeting that is trying to generate a new policy. She was taking notes. She was participating as if it was a regular meeting. It turned out that the meeting was a meeting of, as the emails reveal, carefully selected members. And that email was to Kirk Hubbard. The members were carefully selected in order, it seems, to guarantee what the CIA and the White House needed from that meeting. And that’s what Jean Maria realized and what she’s talking about in that—on that panel.
    AMY GOODMAN: She talked about having a meeting for a few hours and then being handed the resolution of the committee—
    STEVEN REISNER: That’s right.
    AMY GOODMAN: —before she had even weighed in.
    STEVEN REISNER: That’s right. The drafts came fast and furious. This meeting lasted two-and-a-half days. And then the very final draft, where they added the piece on research, that came between the end of the meeting and, I would—and just, you know, 12, 24 hours later. The final rewritten version was sent to the members for them to just give their OK. It was whirlwind. They were told that this had to go to the Pentagon, it had to go to the White House. It was hurried, and there was very little room for critique.
    AMY GOODMAN: And, Nathaniel Raymond, who do we now know wrote these drafts?
    NATHANIEL RAYMOND: Well, we know from the PENS listserv and from Jean Maria Arrigo herself and others that Dr. Stephen Behnke was responsible for being the keeper of the draft and, during lunch breaks and in the evenings, wrote the language in the report.
    But that’s not the whole story. From what we see in the emails, as you mentioned, Dr. Brandon’s avowed role by Dr. Mumford in the research piece raises the broader question of: Who were the observers in the room, and how did they get there? What we see from the PENS listserv, the listserv of this task force that Jean Maria Arrigo has helped the world to see, that listserv shows that Dr. Gerald Koocher and Dr. Barry Anton, who is the current president right now of the APA, was responsible for approving the observers in the room. We now know that one of those observers was a senior administration official who had never— and still now never—been publicly acknowledged by the APA as having been in the room. So it’s not just who was writing the report, who was Dr. Behnke; it was who put those other people secretly in the room. And we now know it was Drs. Anton and Koocher, according to the listserv.
    AMY GOODMAN: Why were psychologists so important to this whole process? I mean, what was happening with the psychiatrists of the United States? What was happening with other physicians?
    NATHANIEL RAYMOND: This is where it can get complicated sometimes, and I want to try to express this as clearly as possible. In the enhanced interrogation program, you had two roles for health professionals, and these roles were conjoined. Role one was actually designing and implementing the tactics. And that’s what James Mitchell and Bruce Jessen did. The second role is this monitoring and indemnification role, to say that we have not crossed this threshold of severe and long-lasting harm. Now, that role changes throughout the program. It begins with Yoo-Bybee making sure that a line hasn’t been crossed. But by the time we get to—
    AMY GOODMAN: Bybee now being a federal judge. Explain his role.
    NATHANIEL RAYMOND: Yeah, he was assistant attorney general for the Office of Legal Counsel. And John Yoo worked for him in that office, and he was responsible for primarily crafting the first torture memo.
    AMY GOODMAN: Now at the University of California, Berkeley, law school.
    NATHANIEL RAYMOND: Yes, at Boalt Hall. And now we move forward in time. And so, what we can see in these emails is that at the time the APA was really working hard—its engine was going overdrive on these issues between 2004 and 2005—in direct contact with the CIA, you have another process going on, which is the creation of that new legal authorization that we now know George Tenet asked for upon his resignation. And that’s what we call the Bradbury memo. In that memo, there is a significantly changed role for this second group of health professionals, putting Mitchell and Jessen aside: the monitors, the researchers. And it moves from them determining whether you crossed the line to determining the line. And to determine the line, that required research. And so, we see in the Bradbury memos very clearly, as we documented in the Physicians for Human Rights report, “Experiments in Torture,” in 2010, is that they were having to look at the effect of the tactics to the whole detainee population over years and determine what the line was, because there was no clinical literature on torture.
    AMY GOODMAN: Last December, psychologist James Mitchell, who was contracted by the CIA to design its interrogation program, appeared on Fox News to talk about his role in the waterboarding of Abu Zubaydah. He was interviewed by Megyn Kelly.
    JAMES MITCHELL: Zubaydah shut down. And they asked me to come back to the campus. And it was clear to me, when I was at the campus listening to what people were saying, that there was so much pressure about trying to head off this second wave that was coming, that they were going to use some kind of physical coercion. And so, I have been—spent a lot of time in the Air Force SERE school, and I see what happens when people sort of make stuff up on the fly. And in the course of the conversations, I said, “If you’re going to use physical coercion—not that you should use physical coercion, but if you’re going to use physical coercion—then you should use physical coercion that has been demonstrated over 50 years not to produce the kinds of injuries we would like to avoid.
    MEGYN KELLY: OK. So you—were you the one actually conducting the techniques on Abu Zubaydah, or were you in more of a sort of background role?
    JAMES MITCHELL: It depends on when you’re talking about. Initially, I was in a background role. Then, after we shut down and the enhanced interrogations were approved, I was in an administration role.
    MEGYN KELLY: OK, so did you personally waterboard him?
    JAMES MITCHELL: Yes.
    MEGYN KELLY: We’re going to get to Khalid Sheikh Mohammed in a minute, but sticking with Abu Zubaydah for now, were all of the methods that were cited in the Senate report employed, like nudity, standing sleep deprivation, the attention grab, the insult slap? Were those all used?
    JAMES MITCHELL: The ones you mentioned were used.
    MEGYN KELLY: The facial grab, the abdominal slap, the kneeling stress position, walling?
    JAMES MITCHELL: Walling was used. The others—if they showed up on the list, they were used. We didn’t typically use a lot of those stress positions. We didn’t use any stress positions with Abu Zubaydah, because he had an injury.
    AMY GOODMAN: That’s psychologist James Mitchell, who was in the APA from 2001 to 2006, admitting on Fox News that he waterboarded Abu Zubaydah, the prisoner. Dr. Steve Reisner, we are wrapping up right now. Your response to Mitchell?
    STEVEN REISNER: Well, this was—this is chilling to listen to the description of a psychologist dedicated to the public good and individual well-being talking about destroying a prisoner’s mind and body. And it was chilling to the medical professionals in the CIA, who were pushing back. It was chilling to the inspector general, who was pushing back. The program was shut down. And just at that moment when the program was shut down, the Office of Legal Counsel, the White House, some members of the CIA and the American Psychological Association appear to have all worked together to revive that program and to find the rationale for psychologists to be able to help that program continue.
    AMY GOODMAN: So what are you looking for now? What is the next step that’s taking place right now with the American Psychological Association, Nathaniel?
    NATHANIEL RAYMOND: Well, as we heard from Senator Feinstein when James Risen’s article came out last week, there’s clear congressional interest in what happens next. And she said in her statement that she is looking forward to the results of the Hoffman investigation, the independent review of alleged collusion between—
    AMY GOODMAN: Now, is this independent? He has been hired by the American Psychological Association?
    NATHANIEL RAYMOND: Yes, it is called by the APA the independent review. Dr. Reisner and I and our co-authors have met extensively with David Hoffman, and obviously the proof will be in the pudding when the report is released. But right now, the next step—
    AMY GOODMAN: Did the APA say they will release the report?
    NATHANIEL RAYMOND: Well, this is a big issue, Amy, is the APA has said that the board will review it and, after it reviews it, will release it. And as we’ve been calling for, they need to release it to the public right now. When you have Senator Feinstein saying she wants to see this report, there cannot be a half-step before it goes to the public. The key issue now is to put pressure on the American Psychological Association to release the report to the public as soon as it is completed.
    AMY GOODMAN: Your response to what Kirk Hubbard said, the former CIA psychologist, who in a 2012 interview with the Constitution Project’s Task Force on Detainee Treatment said that “Detainees are not patients, nor are they being ‘treated’ by the psychologists. Therefore the ethical guidelines for clinicians do not apply, in my opinion. Psychologists can play many different roles and should not be forced into a narrow doctor-patient role.”
    NATHANIEL RAYMOND: The Declaration of Helsinki and the Declaration of Tokyo, the Nuremberg Code, U.S. law, the Geneva Conventions are not based on whether someone’s a patient. It’s based on whether someone’s a human being. And the fact of the matter is that those codes were mangled and, in some cases, written out of what the APA did. So the issue is not about doctor-patient relationship here. It is about war crimes and about crimes against humanity, which are not contingent on someone being your patient.
    AMY GOODMAN: I want to thank you both for being with us. Nathaniel Raymond and Dr. Steven Reisner are co-authors of the new report, “All the President’s Psychologists.” We will link to it at democracynow.org. This is Democracy Now! We’ll be back in a minute.
    TUESDAY, MAY 5, 2015
    Find this story at 5 May 2015
    Creative Commons License The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    Psychologists met in secret with Bush officials to help justify torture – report

    Van nieuwsblog.burojansen.nl

    Newly disclosed emails reveal American Psychological Association coordinated with officials in CIA and White House to help ethically justify detainee program
    The leading American professional group for psychologists secretly worked with the Bush administration to help justify the post-9/11 US detainee torture program, according to a watchdog analysis released on Thursday.
    The report, written by six leading health professionals and human rights activists, is the first to examine the alleged complicity of the American Psychological Association (APA) in the “enhanced interrogation” program.
    Based on an analysis of more than 600 newly disclosed emails, the report found that the APA coordinated with Bush-era government officials – namely in the CIA, White House and Department of Defense – to help ethically justify the interrogation policy in 2004 and 2005, when the program came under increased scrutiny for prisoner abuse by US military personnel at the Abu Ghraib prison in Iraq.
    A series of clandestine meetings with US officials led to the creation of “an APA ethics policy in national security interrogations which comported with then-classified legal guidance authorizing the CIA torture program,” the report’s authors found.
    The APA is the largest organization representing psychologists in the US, with more than 122,500 members. That mental health professionals – let alone members of the APA itself – played any role in the justification or enhancement of the interrogation program undoubtedly lent the program an air of legitimacy, if even behind closed doors.
    In secret opinions, the US Department of Justice argued that the torture program did not constitute torture and was therefore legal, since they were being monitored by medical professionals.
    A spokeswoman for the APA denied that the group had coordinated its actions with the government, in a statement to the New York Times. There “has never been any coordination between the APA and the Bush administration on how APA responded to the controversies about the role of psychologists in the interrogations program”, Rhea Farberman said.
    The US paid torture doctors millions. Why is it last in the world in punishing them?
    Dr Steven Miles
    Read more
    However, the report details a meeting in July 2004 – as images from Abu Ghraib stirred international outrage – at which the APA invited psychologists “directly involved in the CIA’s ‘enhanced’ interrogation program” to meet with the APA’s ethics office regarding the organization’s ethics policies. The meeting came on the heels of a secret order – signed one month prior by then-CIA director George Tenet – suspending the agency’s use of torture techniques, which also requested a detailed policy review.
    A second meeting took place in 2005, when the APA Presidential Task Force on Psychological Ethics and National Security (Pens), according to the emails, ensured that the “legal safeguards built into the ‘torture memos’ issued by the DOJ’s office of legal counsel were codified in APA ethics policy”.
    Following the Pens meeting, the report says the APA passed “extraordinary policy recommendations”, in which the association reaffirmed that its members could be involved in the interrogation program, without violating APA ethical codes.
    Additionally, the APA permitted research on “individuals involved in interrogation processes” without their consent; according to the report’s authors, such a policy turned against decades of medical ethics prohibitions.
    “The analysis presented in this report raises serious concerns about the APA Board’s knowledge of, involvement in and responsibility for allowing the US government to unduly influence and change APA policy on interrogations,” the report concludes. “The resulting policy facilitated the continuation of the Bush administration torture program.”
    Although the Bush-era torture program has since been shuttered, a partially declassified report released by the Senate intelligence committee in December concluded that torture does not work. Detainees subjected to so-called enhanced techniques, it found, produced no intelligence or “fabricated information, resulting in faulty intelligence”.
    Donna McKay, the executive director of Physicians for Human Rights (PHR), an organization with which all of the report’s authors have been affiliated at some point, said in a statement issued on Thursday: “This calculated undermining of professional ethics is unprecedented in the history of US medical practice and shows how the CIA torture program corrupted other institutions in our society.”
    James Mitchell: ‘I’m just a guy who got asked to do something for his country’
    Read more
    PHR has previously called on the APA to clarify its ties to the CIA torture program and its architects, namely the two CIA contract psychologists Dr James Mitchell and Dr Bruce Jessen. “In the meantime,” the statement said, “there is sufficient evidence of wrongdoing to warrant a Department of Justice investigation.”
    In their own report, issued last December, PHR called for a federal commission to investigate the full extent of health professionals’ alleged participation in CIA torture, accusing them of “[betraying] the most fundamental duty of the healing professions” and suggesting that some psychologists may have committed war crimes.
    The new report found that the APA concealed its numerous contacts with Mitchell and Jessen, and had failed to disclose Mitchell’s past APA membership when it released its 2007 statement in response to public revelation of Mitchell’s role in enhanced interrogations.
    Perhaps most damning, the watchdogs reported that in examining the trove of 638 new emails, they found no evidence that any APA staff member “expressed concern over mounting reports of psychologist involvement in detainee abuse during four years of direct email communications with senior members of the US intelligence community.”
    Last November, the APA announced an independent investigation into its alleged collusion with the CIA. The findings are expected this summer.
    Raya Jalabi in New York
    Thursday 30 April 2015 18.23 BST Last modified on Thursday 30 April 2015 18.38 BST
    Find this story at 30 April 2015
    Find the report
     
    © 2015 Guardian News and Media Limited

    “24’s” phony history exposed: The dark history of a CIA “black site”

    Van nieuwsblog.burojansen.nl

    Diego Garcia has been mythologized by American pop culture. Its true story is stranger (and bleaker) than fiction
    “24’s” phony history exposed: The dark history of a CIA “black site”
    This piece originally appeared on TomDispatch.
    First, they tried to shoot the dogs. Next, they tried to poison them with strychnine. When both failed as efficient killing methods, British government agents and U.S. Navy personnel used raw meat to lure the pets into a sealed shed. Locking them inside, they gassed the howling animals with exhaust piped in from U.S. military vehicles. Then, setting coconut husks ablaze, they burned the dogs’ carcasses as their owners were left to watch and ponder their own fate.
    The truth about the U.S. military base on the British-controlled Indian Ocean island of Diego Garcia is often hard to believe. It would be easy enough to confuse the real story with fictional accounts of the island found in the Transformers movies, on the television series 24, and in Internet conspiracy theories about the disappearance of Malaysia Airlines flight MH370.
    While the grim saga of Diego Garcia frequently reads like fiction, it has proven all too real for the people involved. It’s the story of a U.S. military base built on a series of real-life fictions told by U.S. and British officials over more than half a century. The central fiction is that the U.S. built its base on an “uninhabited” island. That was “true” only because the indigenous people were secretly exiled from the Chagos Archipelago when the base was built. Although their ancestors had lived there since the time of the American Revolution, Anglo-American officials decided, as one wrote, to “maintain the fiction that the inhabitants of Chagos [were] not a permanent or semi-permanent population,” but just “transient contract workers.” The same official summed up the situation bluntly: “We are able to make up the rules as we go along.”
    And so they did: between 1968 and 1973, American officials conspired with their British colleagues to remove the Chagossians, carefully hiding their expulsion from Congress, Parliament, the U.N., and the media. During the deportations, British agents and members of a U.S. Navy construction battalion rounded up and killed all those pet dogs. Their owners were then deported to the western Indian Ocean islands of Mauritius and the Seychelles, 1,200 miles from their homeland, where they received no resettlement assistance. More than 40 years after their expulsion, Chagossians generally remain the poorest of the poor in their adopted lands, struggling to survive in places that outsiders know as exotic tourist destinations.
    During the same period, Diego Garcia became a multi-billion-dollar Navy and Air Force base and a central node in U.S. military efforts to control the Greater Middle East and its oil and natural gas supplies. The base, which few Americans are aware of, is more important strategically and more secretive than the U.S. naval base-cum-prison at Guantánamo Bay, Cuba. Unlike Guantánamo, no journalist has gotten more than a glimpse of Diego Garcia in more than 30 years. And yet, it has played a key role in waging the Gulf War, the 2003 invasion of Iraq, the U.S.-led war in Afghanistan, and the current bombing campaign against the Islamic State in Syria and Iraq.
    Following years of reports that the base was a secret CIA “black site” for holding terrorist suspects and years of denials by U.S. and British officials, leaders on both sides of the Atlantic finally fessed up in 2008. “Contrary to earlier explicit assurances,” said Secretary of State for Foreign and Commonwealth Affairs David Miliband, Diego Garcia had indeed played at least some role in the CIA’s secret “rendition” program.
    Last year, British officials claimed that flight log records, which might have shed light on those rendition operations, were “incomplete due to water damage” thanks to “extremely heavy weather in June 2014.” A week later, they suddenly reversed themselves, saying that the “previously wet paper records have been dried out.” Two months later, they insisted the logs had not dried out at all and were “damaged to the point of no longer being useful.” Except that the British government’s own weather data indicates that June 2014 was an unusually dry month on Diego Garcia. A legal rights advocate said British officials “could hardly be less credible if they simply said ‘the dog ate my homework.’”
    And these are just a few of the fictions underlying the base that occupies the Chagossians’ former home and that the U.S. military has nicknamed the “Footprint of Freedom.” After more than four decades of exile, however, with a Chagossian movement to return to their homeland growing, the fictions of Diego Garcia may finally be crumbling.
    No “Tarzans”
    The story of Diego Garcia begins in the late eighteenth century. At that time, enslaved peoples from Africa, brought to work on Franco-Mauritian coconut plantations, became the first settlers in the Chagos Archipelago. Following emancipation and the arrival of indentured laborers from India, a diverse mixture of peoples created a new society with its own language, Chagos Kreol. They called themselves the Ilois — the Islanders.
    While still a plantation society, the archipelago, by then under British colonial control, provided a secure life featuring universal employment and numerous social benefits on islands described by many as idyllic. “That beautiful atoll of Diego Garcia, right in the middle of the ocean,” is how Stuart Barber described it in the late 1950s. A civilian working for the U.S. Navy, Barber would become the architect of one of the most powerful U.S. military bases overseas.
    Amid Cold War competition with the Soviet Union, Barber and other officials were concerned that there was almost no U.S. military presence in and around the Indian Ocean. Barber noted that Diego Garcia’s isolation — halfway between Africa and Indonesia and 1,000 miles south of India — ensured that it would be safe from attack, yet was still within striking distance of territory from southern Africa and the Middle East to South and Southeast Asia.
    Guided by Barber’s idea, the administrations of John F. Kennedy and Lyndon Johnson convinced the British government to detach the Chagos Archipelago from colonial Mauritius and create a new colony, which they called the British Indian Ocean Territory. Its sole purpose would be to house U.S. military facilities.
    During secret negotiations with their British counterparts, Pentagon and State Department officials insisted that Chagos come under their “exclusive control (without local inhabitants),” embedding an expulsion order in a polite-looking parenthetical phrase. U.S. officials wanted the islands “swept” and “sanitized.” British officials appeared happy to oblige, removing a people one official called “Tarzans” and, in a racist reference toRobinson Crusoe, “Man Fridays.”
    “Absolutely Must Go”
    This plan was confirmed with an “exchange of notes” signed on December 30, 1966, by U.S. and British officials, as one of the State Department negotiators told me, “under the cover of darkness.” The notes effectively constituted a treaty but required no Congressional or Parliamentary approval, meaning that both governments could keep their plans hidden.
    According to the agreement, the United States would gain use of the new colony “without charge.” This was another fiction. In confidential minutes, the United States agreed to secretly wipe out a $14 million British military debt, circumventing the need to ask Congress for funding. In exchange, the British agreed to take the “administrative measures” necessary for “resettling the inhabitants.”
    Those measures meant that, after 1967, any Chagossians who left home for medical treatment or a routine vacation in Mauritius were barred from returning. Soon, British officials began restricting the flow of food and medical supplies to Chagos. As conditions deteriorated, more islanders began leaving. By 1970, the U.S. Navy had secured funding for what officials told Congress would be an “austere communications station.” They were, however, already planning to ask for additional funds to expand the facility into a much larger base. As the Navy’s Office of Communications and Cryptology explained, “The communications requirements cited as justification are fiction.” By the 1980s, Diego Garcia would become a billion-dollar garrison.
    In briefing papers delivered to Congress, the Navy described Chagos’s population as “negligible,” with the islands “for all practical purposes… uninhabited.” In fact, there were around 1,000 people on Diego Garcia in the 1960s and 500 to 1,000 more on other islands in the archipelago. With Congressional funds secured, the Navy’s highest-ranking admiral, Elmo Zumwalt, summed up the Chagossians’ fate in a 1971 memo of exactly three words: “Absolutely must go.”
    The authorities soon ordered the remaining Chagossians — generally allowed no more than a single box of belongings and a sleeping mat — onto overcrowded cargo ships destined for Mauritius and the Seychelles. By 1973, the last Chagossians were gone.
    “Abject Poverty”
    At their destinations, most of the Chagossians were literally left on the docks, homeless, jobless, and with little money. In 1975, two years after the last removals, a Washington Post reporter found them living in “abject poverty.”
    Aurélie Lisette Talate was one of the last to go. “I came to Mauritius with six children and my mother,” she told me. “We got our house… but the house didn’t have a door, didn’t have running water, didn’t have electricity. And then my children and I began to suffer. All my children started getting sick.”
    Within two months, two of her children were dead. The second was buried in an unmarked grave because she lacked money for a proper burial. Aurélie experienced fainting spells herself and couldn’t eat. “We were living like animals. Land? We had none… Work? We had none. Our children weren’t going to school.”
    Today, most Chagossians, who now number more than 5,000, remain impoverished. In their language, their lives are ones of lamizer (impoverished misery) and sagren (profound sorrow and heartbreak over being exiled from their native lands). Many of the islanders attribute sickness and even death tosagren. “I had something that had been affecting me for a long time, since we were uprooted,” was the way Aurélie explained it to me. “This sagren, this shock, it was this same problem that killed my child. We weren’t living free like we did in our natal land.”
    Struggling for Justice
    From the moment they were deported, the Chagossians demanded to be returned or at least properly resettled. After years of protest, including five hunger strikes led by women like Aurélie Talate, some in Mauritius received the most modest of compensation from the British government: small concrete houses, tiny plots of land, and about $6,000 per adult. Many used the money to pay off large debts they had accrued. For most, conditions improved only marginally. Those living in the Seychelles received nothing.
    The Chagossian struggle was reinvigorated in 1997 with the launching of alawsuit against the British government. In November 2000, the British High Court ruled the removal illegal. In 2001 and 2002, most Chagossians joined new lawsuits in both American and British courts demanding the right to return and proper compensation for their removal and for resettling their islands. The U.S. suit was ultimately dismissed on the grounds that the judiciary can’t, in most circumstances, overrule the executive branch on matters of military and foreign policy. In Britain, the Chagossians were more successful. In 2002, they secured the right to full U.K. citizenship. Over 1,000 Chagossians have since moved to Britain in search of better lives. Twice more, British courts ruled in the people’s favor, with judges calling the government’s behavior “repugnant” and an “abuse of power.”
    On the government’s final appeal, however, Britain’s then highest court, the Law Lords in the House of Lords, upheld the exile in a 3-2 decision. The Chagossians appealed to the European Court of Human Rights to overturn the ruling.
    A Green Fiction
    Before the European Court could rule, the British government announced the creation of the world’s largest Marine Protected Area (MPA) in the Chagos Archipelago. The date of the announcement, April Fool’s Day 2010, should have been a clue that there was more than environmentalism behind the move. The MPA banned commercial fishing and limited other human activity in the archipelago, endangering the viability of any resettlement efforts.
    And then came WikiLeaks. In December 2010, it released a State Departmentcable from the U.S. Embassy in London quoting a senior Foreign and Commonwealth Office official saying that the “former inhabitants would find it difficult, if not impossible, to pursue their claim for resettlement on the islands if the entire Chagos Archipelago were a marine reserve.” U.S. officials agreed. According to the Embassy, Political Counselor Richard Mills wrote, “Establishing a marine reserve might, indeed… be the most effective long-term way to prevent any of the Chagos Islands’ former inhabitants or their descendants from resettling.”
    Not surprisingly, the main State Department concern was whether the MPA would affect base operations. “We are concerned,” the London Embassy noted, that some “would come to see the existence of a marine reserve as inherently inconsistent with the military use of Diego Garcia.” British officials assured the Americans there would be “no constraints on military operations.”
    Although the European Court of Human Rights ultimately ruled against the Chagossians in 2013, this March, a U.N. tribunal found that the British government had violated international law in creating the Marine Protected Area. Next week, Chagossians will challenge the MPA and their expulsion before the British Supreme Court (now Britain’s highest) armed with the U.N. ruling and revelations that the government won its House of Lords decision with the help of a fiction-filled resettlement study.
    Meanwhile, the European Parliament has passed a resolution calling for the Chagossians’ return, the African Union has condemned their deportation as unlawful, three Nobel laureates have spoken out on their behalf, and dozens of members of the British Parliament have joined a group supporting their struggle. In January, a British government “feasibility study” found no significant legal barriers to resettling the islands and outlined several possible resettlement plans, beginning with Diego Garcia. (Notably, Chagossians are not calling for the removal of the U.S. military base. Their opinions about it are diverse and complicated. At least some would prefer jobs on the base to lives of poverty and unemployment in exile.)
    Of course, no study was needed to know that resettlement on Diego Garcia and in the rest of the archipelago is feasible. The base, which has hosted thousands of military and civilian personnel for more than 40 years, has demonstrated that well enough. In fact, Stuart Barber, its architect, came to the same conclusion in the years before his death. After he learned of the Chagossians’ fate, he wrote a series of impassioned letters to Human Rights Watch and the British Embassy in Washington, among others, imploring them to help the Chagossians return home. In a letter to Alaska Senator Ted Stevens, he said bluntly that the expulsion “wasn’t necessary militarily.”
    In a 1991 letter to the Washington Post, Barber suggested that it was time “to redress the inexcusably inhuman wrongs inflicted by the British at our insistence.” He added, “Substantial additional compensation for 18-25 past years of misery for all evictees is certainly in order. Even if that were to cost $100,000 per family, we would be talking of a maximum of $40-50 million, modest compared with our base investment there.”
    Almost a quarter-century later, nothing has yet been done. In 2016, the initial 50-year agreement for Diego Garcia will expire. While it is subject to an automatic 20-year renewal, it provides for a two-year renegotiation period, which commenced in late 2014. With momentum building in support of the Chagossians, they are optimistic that the two governments will finally correct this historic injustice. That U.S. officials allowed the British feasibility study to consider resettlement plans for Diego Garcia is a hopeful sign that Anglo-American policy may finally be shifting to right a great wrong in the Indian Ocean.
    Unfortunately, Aurélie Talate will never see the day when her people go home. Like others among the rapidly dwindling number of Chagossians born in the archipelago, Aurélie died in 2012 at age 70, succumbing to the heartbreak that is sagren.
    DAVID VINE, TOMDISPATCH.COM
    TUESDAY, JUN 16, 2015 10:45 AM +0200
    Find this story at 16 June 2015
    Copyright © 2015 Salon Media Group, Inc.

    Diego Garcia: UK Delays Publication of Flight Records Which May Hold Truth About CIA Activities

    Van nieuwsblog.burojansen.nl

    The UK Foreign Office (FCO) has further delayed publication of flight records for Diego Garcia, following disclosures by a senior Bush administration official that interrogations took place at a CIA black site on the British island.
    FCO officials are “still assessing the suitability of the full flight records for publication”, nine months after they were first requested from the government by human rights NGO Reprieve.
    Campaigners believe that the logs — written records of all flights landing on and leaving the atoll — could provide crucial, previously undisclosed details of flights involved in the intelligence agency’s post-9/11 rendition and torture program.
    ‘It is now over seven years since the UK government was forced to admit that CIA torture flights were allowed to use the British territory of Diego Garcia, yet we still seem no closer to the publication of flight records which could provide crucial evidence of what went on.’
    However, the UK government has so far declined to publish the logs, and has dismissed the new claims made by a former senior Bush administration official — published by VICE News — that the CIA did in fact detain prisoners on Diego Garcia, despite years of assurances from British ministers to the contrary.
    “We have responded publicly in recent years to previous claims,” wrote Hugo Swire, the FCO minister of state, in a letter to Reprieve. “However, Colonel Wilkerson has not presented any new evidence to support his allegation that detainees were held on Diego Garcia.”
    Lawrence Wilkerson, former chief of staff to Secretary of State Colin Powell, told VICE News in January that the island was home to “a transit site where people were temporarily housed, let us say, and interrogated from time to time.” His information came from four well-placed CIA and intelligence sources, he said.
    Related: Exclusive: CIA interrogations took place on British territory of Diego Garcia, Senior Bush administration official says. Read more here
    Swire said that the British government “seeks regular reassurance from the US government” on renditions, in the letter dated March 3.
    “All previous assurances on transfer of detainees provided by the US government since 2008 remain valid and correct,” Swire wrote.
    “Whilst I am not able to make public the details of diplomatic correspondence, I can confirm that the most recent assurances were received this month.”
    Swire did not explain whether the FCO contacted the US in direct response to Wilkerson’s disclosures, but did say that the most recent assurances were made “after Colonel Wilkerson’s claims were made.”
    Donald Campbell of Reprieve said the publication of the flight logs was necessary to reassure the public that Britain is not involved in a cover-up of torture evidence.
    “It is now over seven years since the UK government was forced to admit that CIA torture flights were allowed to use the British territory of Diego Garcia,” he said, “yet we still seem no closer to the publication of flight records which could provide crucial evidence of what went on.
    “Last summer, after the records reportedly suffered ‘accidental’ water damage, ministers promised that they were ‘assessing their suitability for publication.’ Eight months later, they say they are still ‘assessing.’ It is hard to see how such a long delay could be justified.”
    It is far from the first time that Diego Garcia’s role in the CIA’s post-9/11 rendition and torture program has been disputed.
    The tiny atoll in the Indian Ocean, which has been leased to the US for use as a military base since 1966, has been the subject of CIA torture program claims and counter-claims stretching back more than a decade. The release of the Senate Intelligence Committee torture report in December confirmed that the CIA did operate a post-9/11 global rendition and torture program, with secret prisons all over the world — but the heavily redacted document did not reveal whether Diego Garcia was a part of the CIA’s international network of black sites.
    The UK’s changing position on Diego Garcia’s unpublished flight records
    The British government says it has received repeated assurances from the US that no CIA rendition flights landed on Diego Garcia — bar two rendition planes which stopped briefly to refuel in 2002.
    The government has been slow to release flight logs for the atoll, however, and the position of the Foreign Office in relation to the records has shifted as pressure for them to be released has grown.
    February 21 2008: The UK admits that two rendition flights stopped over on Diego Garcia to refuel.
    David Miliband, then the foreign secretary, tells parliament he is “very sorry indeed” to report that contrary to earlier assurances, two rendition flights carrying a single detainee each did, in fact, land on Diego Garcia.
    July 2008: … but the UK claims that records on these two flights — and for the whole of 2002 — are no longer held.
    Miliband tells the Intelligence and Security Committee (ISC) that records “are unfortunately no longer held for the period when the two cases of rendition occurred [2002],” because they are generally only held for up to five years.
    June 26 2014: NGO Reprieve asks the foreign secretary whether flight records from 2002 onwards are held…
    Reprieve writes to William Hague, who has by then taken over as foreign secretary, asking: “Can you confirm whether the government holds monthly statistics of flights through D[iego] G[arcia] from January 2002 onwards; daily logs from October 2002 onwards; and general aviation reports from January 2004 onwards? And can you confirm that all planes and flights recorded in all these logs and statistics have been investigated, and discounted as being possible rendition flights?”
    July 8 2014: …and the Foreign Office says they are held, but 2002 flight records are incomplete due to ‘water damage.’
    Mark Simmonds, a Foreign Office minister, tells members of parliament (MPs) that “though there are some limited records from 2002, I understand they are incomplete due to water damage.”
    July 14 2014: … but then the foreign secretary says he believes that there’s actually a complete set of flight logs for 2002.
    Hague replies to Reprieve’s letter saying that actually only a small number of flight records have been irretrievably damaged: “I am satisfied that for the period you are asking about, we have a complete set of information about types of aircraft, passenger and crew numbers landing and departing Diego Garcia.”
    July 15 2014: The Foreign Office confirms that the water damaged 2002 flight records have not been lost after all — because they’ve “dried out.”
    Foreign Office Minister Mark Simmonds tells MPs that water-damaged records have “dried out”: “Since my answer of 8 July, BIOT [British Indian Ocean Territory] immigration officials have conducted a fuller inspection, and previously wet paper records have been dried out. They report that no flight records have been lost as a result of the water damage.”
    He says that “a small number of immigration arrival cards from 2004” have been damaged, however.
    August 19 2014: The Foreign Office says that not all flight records from 2002 onwards are complete, but they should be able to get a full set anyway.
    Responding to a letter from Reprieve asking for clarification on which flight records are damaged, Philip Hammond, now foreign secretary, writes: “The Administration of the British Indian Ocean Territory holds several different types of record about flights entering the territory, though not all of these are complete for the period you are referring to. By combining different types of records, we are confident we can establish what types of aircraft landed on a particular day, and passenger and crew numbers on these aircraft, for the period since 2002.”
    September 4 2014: It turns out the heavy weather that damaged the records wasn’t so heavy after all…
    VICE News obtains the government’s own records which show that the so-called “extremely heavy weather” in June 2002 amounted to 3.25 inches of rainfall — considerably less than the average for that month.
    “I don’t think it’s very helpful for us to have a discussion about how much rain is a lot of rain,” a FCO spokesperson told VICE.
    By Ben Bryant
    April 8, 2015 | 1:15 pm
    Find this story at 8 April 2015
    Copyright https://news.vice.com/

    CIA interrogated suspects on Diego Garcia, says Colin Powell aide

    Van nieuwsblog.burojansen.nl

    Lawrence Wilkerson is the latest of a number of US officials to say British territory was used in CIA rendition programme
    The UK government is facing renewed pressure to make a full disclosure of its involvement in the CIA’s post-9/11 kidnap and torture programme after another leading Bush-era US official said suspects were held and interrogated on the British territory of Diego Garcia.
    Lawrence Wilkerson, who was chief of staff to Colin Powell at the US state department, said the Indian Ocean atoll was used by the CIA as “a transit site where people were temporarily housed, let us say, and interrogated from time to time”.
    In an interview with Vice News, Wilkerson said three US intelligence sources had informed him that the CIA used Diego Garcia for what he described as “nefarious activities”, with prisoners being held for weeks at a time.
    “What I heard was more along the lines of using it as a transit location when perhaps other places were full or other places were deemed too dangerous or insecure, or unavailable at the moment,” said Wilkerson, who served under Powell from 2002 to 2005.
    “So you might have a case where you simply go in and use a facility at Diego Garcia for a month or two weeks or whatever and you do your nefarious activities there.”
    Donald Campbell, spokesman for the legal rights group Reprieve, said: “We already know Diego Garcia was used for CIA renditions, yet over a decade on the British government has yet to own up to the full part the island played in the CIA’s torture programme.
    “Ministers have consistently claimed that no CIA detainees were held on the island, but Col Wilkerson’s account suggests that either they are lying or they have been lied to. It is high time the British government came clean over the part UK territory played in the CIA’s shameful torture programme.”
    Diego Garcia’s population was removed during the late 1960s and early 70s and forced to settle on the Seychelles and Mauritius. Since then the atoll has been leased by the UK to the US for use as a military base.
    Wilkerson is the latest of a number of well-placed officials who have said that after 9/11 the atoll was also used in the CIA rendition programme.
    Barry McCaffrey, a retired four-star American general, has twice spoken publicly about the use of Diego Garcia to detain suspects.
    Manfred Nowak, a former United Nations special rapporteur on torture, has said he has heard from reliable sources that the US held prisoners on ships in the Indian Ocean.
    Dick Marty, a Swiss senator who led a Council of Europe investigation into the CIA’s use of European territory and air space, said he received confirmation of the use of the atoll. He later said he received the assistance of some CIA officers during his investigation.
    There also is a wealth of circumstantial evidence to suggest that Diego Garcia was used in the so-called rendition programme.
    There have been reports that an al-Qaida terrorist known as Hambali, who was suspected of involvement in the 2002 Bali bombing in which 202 people died, was taken to Diego Garcia to be interrogated following his capture in August 2003. A report in Time magazine quoted a regional intelligence official as saying he was being interrogated there two months after his detention.
    An American detention facility of some sort is known to exist on Diego Garcia. In 1984 a review by the US government’s general accounting office of construction work on the atoll reported that a detention facility had been completed the previous December.
    According to answers given to parliamentary questions, British military officials – who are nominally in command of the atoll – re-designated another building as a prison three months after the September 11 attacks.
    In the past, Tony Blair, as prime minister, and Jack Straw, as foreign secretary, both denied the use of the atoll during the rendition programme, but these denials were contradicted by David Miliband, one of Straw’s successors, who told parliament in February 2008 that information had “just come to light” to show that two rendition flights stopped there to refuel.
    That statement was made after human rights organisations obtained flight data showing that two aircraft closely involved in the CIA’s rendition programme had flown into and out of Diego Garcia.
    A number of sources in the US have said there were a number of references to the CIA’s use of Diego Garcia in the report on the agency’s use of torture that was published last month by the US Senate intelligence committee.
    Since then the UK Foreign Office has evaded a series of media inquiries about Diego Garcia and about the report, and has instead responded with a stock response.
    Asked about Wilkerson’s comments, a spokesperson issued the same statement: “The US government has assured us that apart from the two cases in 2002 there have been no other instances in which US intelligence flights landed in the UK, our overseas territories, or the crown dependencies with a detainee on board since 11 September 2001.”
    The Foreign Office has also performed a number of twists and turns when asked questions about the fate of flight and immigration records relating to Diego Garcia.
    Last July the Foreign Office minister Mark Simmonds told Andrew Tyrie, the Tory MP who has been investigating the UK’s involvement in the rendition programme for almost a decade, that daily records were “incomplete” due to water damage.
    The following day, however, a Foreign Office official was photographed in Whitehall carrying a batch of emails that showed that Scotland Yard detectives had taken possession of “monthly log showing flight details” and “daily records [obscured] month of alleged rendition”.
    A few days later, Simmonds told MPs that “previously wet paper records have been dried out”, and that “no flight records have been lost as a result of the water damage”.
    Two months after that, the Foreign Office told the Commons foreign affairs committee that a number of immigration records relating to civilians landing on Diego Garcia “have been damaged to the point of no longer being useful”.
    Ian Cobain
    Friday 30 January 2015 17.11 GMT Last modified on Saturday 31 January 2015 00.08 GMT
    Find this story at 30 January 2015
    © 2015 Guardian News and Media Limited

    The Red Line and the Rat Line; Seymour M. Hersh on Obama, Erdoğan and the Syrian rebels (2014)

    Van nieuwsblog.burojansen.nl

    In 2011 Barack Obama led an allied military intervention in Libya without consulting the US Congress. Last August, after the sarin attack on the Damascus suburb of Ghouta, he was ready to launch an allied air strike, this time to punish the Syrian government for allegedly crossing the ‘red line’ he had set in 2012 on the use of chemical weapons.​* Then with less than two days to go before the planned strike, he announced that he would seek congressional approval for the intervention. The strike was postponed as Congress prepared for hearings, and subsequently cancelled when Obama accepted Assad’s offer to relinquish his chemical arsenal in a deal brokered by Russia. Why did Obama delay and then relent on Syria when he was not shy about rushing into Libya? The answer lies in a clash between those in the administration who were committed to enforcing the red line, and military leaders who thought that going to war was both unjustified and potentially disastrous.

    Obama’s change of mind had its origins at Porton Down, the defence laboratory in Wiltshire. British intelligence had obtained a sample of the sarin used in the 21 August attack and analysis demonstrated that the gas used didn’t match the batches known to exist in the Syrian army’s chemical weapons arsenal. The message that the case against Syria wouldn’t hold up was quickly relayed to the US joint chiefs of staff. The British report heightened doubts inside the Pentagon; the joint chiefs were already preparing to warn Obama that his plans for a far-reaching bomb and missile attack on Syria’s infrastructure could lead to a wider war in the Middle East. As a consequence the American officers delivered a last-minute caution to the president, which, in their view, eventually led to his cancelling the attack.

    For months there had been acute concern among senior military leaders and the intelligence community about the role in the war of Syria’s neighbours, especially Turkey. Prime Minister Recep Erdoğan was known to be supporting the al-Nusra Front, a jihadist faction among the rebel opposition, as well as other Islamist rebel groups. ‘We knew there were some in the Turkish government,’ a former senior US intelligence official, who has access to current intelligence, told me, ‘who believed they could get Assad’s nuts in a vice by dabbling with a sarin attack inside Syria – and forcing Obama to make good on his red line threat.’

    The joint chiefs also knew that the Obama administration’s public claims that only the Syrian army had access to sarin were wrong. The American and British intelligence communities had been aware since the spring of 2013 that some rebel units in Syria were developing chemical weapons. On 20 June analysts for the US Defense Intelligence Agency issued a highly classified five-page ‘talking points’ briefing for the DIA’s deputy director, David Shedd, which stated that al-Nusra maintained a sarin production cell: its programme, the paper said, was ‘the most advanced sarin plot since al-Qaida’s pre-9/11 effort’. (According to a Defense Department consultant, US intelligence has long known that al-Qaida experimented with chemical weapons, and has a video of one of its gas experiments with dogs.) The DIA paper went on: ‘Previous IC [intelligence community] focus had been almost entirely on Syrian CW [chemical weapons] stockpiles; now we see ANF attempting to make its own CW … Al-Nusrah Front’s relative freedom of operation within Syria leads us to assess the group’s CW aspirations will be difficult to disrupt in the future.’ The paper drew on classified intelligence from numerous agencies: ‘Turkey and Saudi-based chemical facilitators,’ it said, ‘were attempting to obtain sarin precursors in bulk, tens of kilograms, likely for the anticipated large scale production effort in Syria.’ (Asked about the DIA paper, a spokesperson for the director of national intelligence said: ‘No such paper was ever requested or produced by intelligence community analysts.’)

    Last May, more than ten members of the al-Nusra Front were arrested in southern Turkey with what local police told the press were two kilograms of sarin. In a 130-page indictment the group was accused of attempting to purchase fuses, piping for the construction of mortars, and chemical precursors for sarin. Five of those arrested were freed after a brief detention. The others, including the ringleader, Haytham Qassab, for whom the prosecutor requested a prison sentence of 25 years, were released pending trial. In the meantime the Turkish press has been rife with speculation that the Erdoğan administration has been covering up the extent of its involvement with the rebels. In a news conference last summer, Aydin Sezgin, Turkey’s ambassador to Moscow, dismissed the arrests and claimed to reporters that the recovered ‘sarin’ was merely ‘anti-freeze’.

    The DIA paper took the arrests as evidence that al-Nusra was expanding its access to chemical weapons. It said Qassab had ‘self-identified’ as a member of al-Nusra, and that he was directly connected to Abd-al-Ghani, the ‘ANF emir for military manufacturing’. Qassab and his associate Khalid Ousta worked with Halit Unalkaya, an employee of a Turkish firm called Zirve Export, who provided ‘price quotes for bulk quantities of sarin precursors’. Abd-al-Ghani’s plan was for two associates to ‘perfect a process for making sarin, then go to Syria to train others to begin large scale production at an unidentified lab in Syria’. The DIA paper said that one of his operatives had purchased a precursor on the ‘Baghdad chemical market’, which ‘has supported at least seven CW efforts since 2004’.

    A series of chemical weapon attacks in March and April 2013 was investigated over the next few months by a special UN mission to Syria. A person with close knowledge of the UN’s activity in Syria told me that there was evidence linking the Syrian opposition to the first gas attack, on 19 March in Khan Al-Assal, a village near Aleppo. In its final report in December, the mission said that at least 19 civilians and one Syrian soldier were among the fatalities, along with scores of injured. It had no mandate to assign responsibility for the attack, but the person with knowledge of the UN’s activities said: ‘Investigators interviewed the people who were there, including the doctors who treated the victims. It was clear that the rebels used the gas. It did not come out in public because no one wanted to know.’

    London Review Cake Shop
    In the months before the attacks began, a former senior Defense Department official told me, the DIA was circulating a daily classified report known as SYRUP on all intelligence related to the Syrian conflict, including material on chemical weapons. But in the spring, distribution of the part of the report concerning chemical weapons was severely curtailed on the orders of Denis McDonough, the White House chief of staff. ‘Something was in there that triggered a shit fit by McDonough,’ the former Defense Department official said. ‘One day it was a huge deal, and then, after the March and April sarin attacks’ – he snapped his fingers – ‘it’s no longer there.’ The decision to restrict distribution was made as the joint chiefs ordered intensive contingency planning for a possible ground invasion of Syria whose primary objective would be the elimination of chemical weapons.

    The former intelligence official said that many in the US national security establishment had long been troubled by the president’s red line: ‘The joint chiefs asked the White House, “What does red line mean? How does that translate into military orders? Troops on the ground? Massive strike? Limited strike?” They tasked military intelligence to study how we could carry out the threat. They learned nothing more about the president’s reasoning.’

    In the aftermath of the 21 August attack Obama ordered the Pentagon to draw up targets for bombing. Early in the process, the former intelligence official said, ‘the White House rejected 35 target sets provided by the joint chiefs of staff as being insufficiently “painful” to the Assad regime.’ The original targets included only military sites and nothing by way of civilian infrastructure. Under White House pressure, the US attack plan evolved into ‘a monster strike’: two wings of B-52 bombers were shifted to airbases close to Syria, and navy submarines and ships equipped with Tomahawk missiles were deployed. ‘Every day the target list was getting longer,’ the former intelligence official told me. ‘The Pentagon planners said we can’t use only Tomahawks to strike at Syria’s missile sites because their warheads are buried too far below ground, so the two B-52 air wings with two-thousand pound bombs were assigned to the mission. Then we’ll need standby search-and-rescue teams to recover downed pilots and drones for target selection. It became huge.’ The new target list was meant to ‘completely eradicate any military capabilities Assad had’, the former intelligence official said. The core targets included electric power grids, oil and gas depots, all known logistic and weapons depots, all known command and control facilities, and all known military and intelligence buildings.

    Britain and France were both to play a part. On 29 August, the day Parliament voted against Cameron’s bid to join the intervention, the Guardian reported that he had already ordered six RAF Typhoon fighter jets to be deployed to Cyprus, and had volunteered a submarine capable of launching Tomahawk missiles. The French air force – a crucial player in the 2011 strikes on Libya – was deeply committed, according to an account in Le Nouvel Observateur; François Hollande had ordered several Rafale fighter-bombers to join the American assault. Their targets were reported to be in western Syria.

    By the last days of August the president had given the Joint Chiefs a fixed deadline for the launch. ‘H hour was to begin no later than Monday morning [2 September], a massive assault to neutralise Assad,’ the former intelligence official said. So it was a surprise to many when during a speech in the White House Rose Garden on 31 August Obama said that the attack would be put on hold, and he would turn to Congress and put it to a vote.

    At this stage, Obama’s premise – that only the Syrian army was capable of deploying sarin – was unravelling. Within a few days of the 21 August attack, the former intelligence official told me, Russian military intelligence operatives had recovered samples of the chemical agent from Ghouta. They analysed it and passed it on to British military intelligence; this was the material sent to Porton Down. (A spokesperson for Porton Down said: ‘Many of the samples analysed in the UK tested positive for the nerve agent sarin.’ MI6 said that it doesn’t comment on intelligence matters.)

    The former intelligence official said the Russian who delivered the sample to the UK was ‘a good source – someone with access, knowledge and a record of being trustworthy’. After the first reported uses of chemical weapons in Syria last year, American and allied intelligence agencies ‘made an effort to find the answer as to what if anything, was used – and its source’, the former intelligence official said. ‘We use data exchanged as part of the Chemical Weapons Convention. The DIA’s baseline consisted of knowing the composition of each batch of Soviet-manufactured chemical weapons. But we didn’t know which batches the Assad government currently had in its arsenal. Within days of the Damascus incident we asked a source in the Syrian government to give us a list of the batches the government currently had. This is why we could confirm the difference so quickly.’

    The process hadn’t worked as smoothly in the spring, the former intelligence official said, because the studies done by Western intelligence ‘were inconclusive as to the type of gas it was. The word “sarin” didn’t come up. There was a great deal of discussion about this, but since no one could conclude what gas it was, you could not say that Assad had crossed the president’s red line.’ By 21 August, the former intelligence official went on, ‘the Syrian opposition clearly had learned from this and announced that “sarin” from the Syrian army had been used, before any analysis could be made, and the press and White House jumped at it. Since it now was sarin, “It had to be Assad.”’

    The UK defence staff who relayed the Porton Down findings to the joint chiefs were sending the Americans a message, the former intelligence official said: ‘We’re being set up here.’ (This account made sense of a terse message a senior official in the CIA sent in late August: ‘It was not the result of the current regime. UK & US know this.’) By then the attack was a few days away and American, British and French planes, ships and submarines were at the ready.

    The officer ultimately responsible for the planning and execution of the attack was General Martin Dempsey, chairman of the joint chiefs. From the beginning of the crisis, the former intelligence official said, the joint chiefs had been sceptical of the administration’s argument that it had the facts to back up its belief in Assad’s guilt. They pressed the DIA and other agencies for more substantial evidence. ‘There was no way they thought Syria would use nerve gas at that stage, because Assad was winning the war,’ the former intelligence official said. Dempsey had irritated many in the Obama administration by repeatedly warning Congress over the summer of the danger of American military involvement in Syria. Last April, after an optimistic assessment of rebel progress by the secretary of state, John Kerry, in front of the House Foreign Affairs Committee, Dempsey told the Senate Armed Services Committee that ‘there’s a risk that this conflict has become stalemated.’

    Contemporary Ceramics Centre
    Dempsey’s initial view after 21 August was that a US strike on Syria – under the assumption that the Assad government was responsible for the sarin attack – would be a military blunder, the former intelligence official said. The Porton Down report caused the joint chiefs to go to the president with a more serious worry: that the attack sought by the White House would be an unjustified act of aggression. It was the joint chiefs who led Obama to change course. The official White House explanation for the turnabout – the story the press corps told – was that the president, during a walk in the Rose Garden with Denis McDonough, his chief of staff, suddenly decided to seek approval for the strike from a bitterly divided Congress with which he’d been in conflict for years. The former Defense Department official told me that the White House provided a different explanation to members of the civilian leadership of the Pentagon: the bombing had been called off because there was intelligence ‘that the Middle East would go up in smoke’ if it was carried out.

    The president’s decision to go to Congress was initially seen by senior aides in the White House, the former intelligence official said, as a replay of George W. Bush’s gambit in the autumn of 2002 before the invasion of Iraq: ‘When it became clear that there were no WMD in Iraq, Congress, which had endorsed the Iraqi war, and the White House both shared the blame and repeatedly cited faulty intelligence. If the current Congress were to vote to endorse the strike, the White House could again have it both ways – wallop Syria with a massive attack and validate the president’s red line commitment, while also being able to share the blame with Congress if it came out that the Syrian military wasn’t behind the attack.’ The turnabout came as a surprise even to the Democratic leadership in Congress. In September the Wall Street Journal reported that three days before his Rose Garden speech Obama had telephoned Nancy Pelosi, leader of the House Democrats, ‘to talk through the options’. She later told colleagues, according to the Journal, that she hadn’t asked the president to put the bombing to a congressional vote.

    Obama’s move for congressional approval quickly became a dead end. ‘Congress was not going to let this go by,’ the former intelligence official said. ‘Congress made it known that, unlike the authorisation for the Iraq war, there would be substantive hearings.’ At this point, there was a sense of desperation in the White House, the former intelligence official said. ‘And so out comes Plan B. Call off the bombing strike and Assad would agree to unilaterally sign the chemical warfare treaty and agree to the destruction of all of chemical weapons under UN supervision.’ At a press conference in London on 9 September, Kerry was still talking about intervention: ‘The risk of not acting is greater than the risk of acting.’ But when a reporter asked if there was anything Assad could do to stop the bombing, Kerry said: ‘Sure. He could turn over every single bit of his chemical weapons to the international community in the next week … But he isn’t about to do it, and it can’t be done, obviously.’ As the New York Times reported the next day, the Russian-brokered deal that emerged shortly afterwards had first been discussed by Obama and Putin in the summer of 2012. Although the strike plans were shelved, the administration didn’t change its public assessment of the justification for going to war. ‘There is zero tolerance at that level for the existence of error,’ the former intelligence official said of the senior officials in the White House. ‘They could not afford to say: “We were wrong.”’ (The DNI spokesperson said: ‘The Assad regime, and only the Assad regime, could have been responsible for the chemical weapons attack that took place on 21 August.’)

    *

    The full extent of US co-operation with Turkey, Saudi Arabia and Qatar in assisting the rebel opposition in Syria has yet to come to light. The Obama administration has never publicly admitted to its role in creating what the CIA calls a ‘rat line’, a back channel highway into Syria. The rat line, authorised in early 2012, was used to funnel weapons and ammunition from Libya via southern Turkey and across the Syrian border to the opposition. Many of those in Syria who ultimately received the weapons were jihadists, some of them affiliated with al-Qaida. (The DNI spokesperson said: ‘The idea that the United States was providing weapons from Libya to anyone is false.’)

    In January, the Senate Intelligence Committee released a report on the assault by a local militia in September 2012 on the American consulate and a nearby undercover CIA facility in Benghazi, which resulted in the death of the US ambassador, Christopher Stevens, and three others. The report’s criticism of the State Department for not providing adequate security at the consulate, and of the intelligence community for not alerting the US military to the presence of a CIA outpost in the area, received front-page coverage and revived animosities in Washington, with Republicans accusing Obama and Hillary Clinton of a cover-up. A highly classified annex to the report, not made public, described a secret agreement reached in early 2012 between the Obama and Erdoğan administrations. It pertained to the rat line. By the terms of the agreement, funding came from Turkey, as well as Saudi Arabia and Qatar; the CIA, with the support of MI6, was responsible for getting arms from Gaddafi’s arsenals into Syria. A number of front companies were set up in Libya, some under the cover of Australian entities. Retired American soldiers, who didn’t always know who was really employing them, were hired to manage procurement and shipping. The operation was run by David Petraeus, the CIA director who would soon resign when it became known he was having an affair with his biographer. (A spokesperson for Petraeus denied the operation ever took place.)

    The operation had not been disclosed at the time it was set up to the congressional intelligence committees and the congressional leadership, as required by law since the 1970s. The involvement of MI6 enabled the CIA to evade the law by classifying the mission as a liaison operation. The former intelligence official explained that for years there has been a recognised exception in the law that permits the CIA not to report liaison activity to Congress, which would otherwise be owed a finding. (All proposed CIA covert operations must be described in a written document, known as a ‘finding’, submitted to the senior leadership of Congress for approval.) Distribution of the annex was limited to the staff aides who wrote the report and to the eight ranking members of Congress – the Democratic and Republican leaders of the House and Senate, and the Democratic and Republicans leaders on the House and Senate intelligence committees. This hardly constituted a genuine attempt at oversight: the eight leaders are not known to gather together to raise questions or discuss the secret information they receive.

    The annex didn’t tell the whole story of what happened in Benghazi before the attack, nor did it explain why the American consulate was attacked. ‘The consulate’s only mission was to provide cover for the moving of arms,’ the former intelligence official, who has read the annex, said. ‘It had no real political role.’

    Washington abruptly ended the CIA’s role in the transfer of arms from Libya after the attack on the consulate, but the rat line kept going. ‘The United States was no longer in control of what the Turks were relaying to the jihadists,’ the former intelligence official said. Within weeks, as many as forty portable surface-to-air missile launchers, commonly known as manpads, were in the hands of Syrian rebels. On 28 November 2012, Joby Warrick of the Washington Post reported that the previous day rebels near Aleppo had used what was almost certainly a manpad to shoot down a Syrian transport helicopter. ‘The Obama administration,’ Warrick wrote, ‘has steadfastly opposed arming Syrian opposition forces with such missiles, warning that the weapons could fall into the hands of terrorists and be used to shoot down commercial aircraft.’ Two Middle Eastern intelligence officials fingered Qatar as the source, and a former US intelligence analyst speculated that the manpads could have been obtained from Syrian military outposts overrun by the rebels. There was no indication that the rebels’ possession of manpads was likely the unintended consequence of a covert US programme that was no longer under US control.

    World Literature Series Masterclasses
    By the end of 2012, it was believed throughout the American intelligence community that the rebels were losing the war. ‘Erdoğan was pissed,’ the former intelligence official said, ‘and felt he was left hanging on the vine. It was his money and the cut-off was seen as a betrayal.’ In spring 2013 US intelligence learned that the Turkish government – through elements of the MIT, its national intelligence agency, and the Gendarmerie, a militarised law-enforcement organisation – was working directly with al-Nusra and its allies to develop a chemical warfare capability. ‘The MIT was running the political liaison with the rebels, and the Gendarmerie handled military logistics, on-the-scene advice and training – including training in chemical warfare,’ the former intelligence official said. ‘Stepping up Turkey’s role in spring 2013 was seen as the key to its problems there. Erdoğan knew that if he stopped his support of the jihadists it would be all over. The Saudis could not support the war because of logistics – the distances involved and the difficulty of moving weapons and supplies. Erdoğan’s hope was to instigate an event that would force the US to cross the red line. But Obama didn’t respond in March and April.’

    There was no public sign of discord when Erdoğan and Obama met on 16 May 2013 at the White House. At a later press conference Obama said that they had agreed that Assad ‘needs to go’. Asked whether he thought Syria had crossed the red line, Obama acknowledged that there was evidence such weapons had been used, but added, ‘it is important for us to make sure that we’re able to get more specific information about what exactly is happening there.’ The red line was still intact.

    An American foreign policy expert who speaks regularly with officials in Washington and Ankara told me about a working dinner Obama held for Erdoğan during his May visit. The meal was dominated by the Turks’ insistence that Syria had crossed the red line and their complaints that Obama was reluctant to do anything about it. Obama was accompanied by John Kerry and Tom Donilon, the national security adviser who would soon leave the job. Erdoğan was joined by Ahmet Davutoğlu, Turkey’s foreign minister, and Hakan Fidan, the head of the MIT. Fidan is known to be fiercely loyal to Erdoğan, and has been seen as a consistent backer of the radical rebel opposition in Syria.

    The foreign policy expert told me that the account he heard originated with Donilon. (It was later corroborated by a former US official, who learned of it from a senior Turkish diplomat.) According to the expert, Erdoğan had sought the meeting to demonstrate to Obama that the red line had been crossed, and had brought Fidan along to state the case. When Erdoğan tried to draw Fidan into the conversation, and Fidan began speaking, Obama cut him off and said: ‘We know.’ Erdoğan tried to bring Fidan in a second time, and Obama again cut him off and said: ‘We know.’ At that point, an exasperated Erdoğan said, ‘But your red line has been crossed!’ and, the expert told me, ‘Donilon said Erdoğan “fucking waved his finger at the president inside the White House”.’ Obama then pointed at Fidan and said: ‘We know what you’re doing with the radicals in Syria.’ (Donilon, who joined the Council on Foreign Relations last July, didn’t respond to questions about this story. The Turkish Foreign Ministry didn’t respond to questions about the dinner. A spokesperson for the National Security Council confirmed that the dinner took place and provided a photograph showing Obama, Kerry, Donilon, Erdoğan, Fidan and Davutoğlu sitting at a table. ‘Beyond that,’ she said, ‘I’m not going to read out the details of their discussions.’)

    But Erdoğan did not leave empty handed. Obama was still permitting Turkey to continue to exploit a loophole in a presidential executive order prohibiting the export of gold to Iran, part of the US sanctions regime against the country. In March 2012, responding to sanctions of Iranian banks by the EU, the SWIFT electronic payment system, which facilitates cross-border payments, expelled dozens of Iranian financial institutions, severely restricting the country’s ability to conduct international trade. The US followed with the executive order in July, but left what came to be known as a ‘golden loophole’: gold shipments to private Iranian entities could continue. Turkey is a major purchaser of Iranian oil and gas, and it took advantage of the loophole by depositing its energy payments in Turkish lira in an Iranian account in Turkey; these funds were then used to purchase Turkish gold for export to confederates in Iran. Gold to the value of $13 billion reportedly entered Iran in this way between March 2012 and July 2013.

    The programme quickly became a cash cow for corrupt politicians and traders in Turkey, Iran and the United Arab Emirates. ‘The middlemen did what they always do,’ the former intelligence official said. ‘Take 15 per cent. The CIA had estimated that there was as much as two billion dollars in skim. Gold and Turkish lira were sticking to fingers.’ The illicit skimming flared into a public ‘gas for gold’ scandal in Turkey in December, and resulted in charges against two dozen people, including prominent businessmen and relatives of government officials, as well as the resignations of three ministers, one of whom called for Erdoğan to resign. The chief executive of a Turkish state-controlled bank that was in the middle of the scandal insisted that more than $4.5 million in cash found by police in shoeboxes during a search of his home was for charitable donations.

    Late last year Jonathan Schanzer and Mark Dubowitz reported in Foreign Policy that the Obama administration closed the golden loophole in January 2013, but ‘lobbied to make sure the legislation … did not take effect for six months’. They speculated that the administration wanted to use the delay as an incentive to bring Iran to the bargaining table over its nuclear programme, or to placate its Turkish ally in the Syrian civil war. The delay permitted Iran to ‘accrue billions of dollars more in gold, further undermining the sanctions regime’.

    *

    The American decision to end CIA support of the weapons shipments into Syria left Erdoğan exposed politically and militarily. ‘One of the issues at that May summit was the fact that Turkey is the only avenue to supply the rebels in Syria,’ the former intelligence official said. ‘It can’t come through Jordan because the terrain in the south is wide open and the Syrians are all over it. And it can’t come through the valleys and hills of Lebanon – you can’t be sure who you’d meet on the other side.’ Without US military support for the rebels, the former intelligence official said, ‘Erdoğan’s dream of having a client state in Syria is evaporating and he thinks we’re the reason why. When Syria wins the war, he knows the rebels are just as likely to turn on him – where else can they go? So now he will have thousands of radicals in his backyard.’

    A US intelligence consultant told me that a few weeks before 21 August he saw a highly classified briefing prepared for Dempsey and the defense secretary, Chuck Hagel, which described ‘the acute anxiety’ of the Erdoğan administration about the rebels’ dwindling prospects. The analysis warned that the Turkish leadership had expressed ‘the need to do something that would precipitate a US military response’. By late summer, the Syrian army still had the advantage over the rebels, the former intelligence official said, and only American air power could turn the tide. In the autumn, the former intelligence official went on, the US intelligence analysts who kept working on the events of 21 August ‘sensed that Syria had not done the gas attack. But the 500 pound gorilla was, how did it happen? The immediate suspect was the Turks, because they had all the pieces to make it happen.’

    BIRMINGHAM CITY – MA MEDIA AND CREATIVE ENTERPRISE
    As intercepts and other data related to the 21 August attacks were gathered, the intelligence community saw evidence to support its suspicions. ‘We now know it was a covert action planned by Erdoğan’s people to push Obama over the red line,’ the former intelligence official said. ‘They had to escalate to a gas attack in or near Damascus when the UN inspectors’ – who arrived in Damascus on 18 August to investigate the earlier use of gas – ‘were there. The deal was to do something spectacular. Our senior military officers have been told by the DIA and other intelligence assets that the sarin was supplied through Turkey – that it could only have gotten there with Turkish support. The Turks also provided the training in producing the sarin and handling it.’ Much of the support for that assessment came from the Turks themselves, via intercepted conversations in the immediate aftermath of the attack. ‘Principal evidence came from the Turkish post-attack joy and back-slapping in numerous intercepts. Operations are always so super-secret in the planning but that all flies out the window when it comes to crowing afterwards. There is no greater vulnerability than in the perpetrators claiming credit for success.’ Erdoğan’s problems in Syria would soon be over: ‘Off goes the gas and Obama will say red line and America is going to attack Syria, or at least that was the idea. But it did not work out that way.’

    The post-attack intelligence on Turkey did not make its way to the White House. ‘Nobody wants to talk about all this,’ the former intelligence official told me. ‘There is great reluctance to contradict the president, although no all-source intelligence community analysis supported his leap to convict. There has not been one single piece of additional evidence of Syrian involvement in the sarin attack produced by the White House since the bombing raid was called off. My government can’t say anything because we have acted so irresponsibly. And since we blamed Assad, we can’t go back and blame Erdoğan.’

    Turkey’s willingness to manipulate events in Syria to its own purposes seemed to be demonstrated late last month, a few days before a round of local elections, when a recording, allegedly of a government national security meeting, was posted to YouTube. It included discussion of a false-flag operation that would justify an incursion by the Turkish military in Syria. The operation centred on the tomb of Suleyman Shah, the grandfather of the revered Osman I, founder of the Ottoman Empire, which is near Aleppo and was ceded to Turkey in 1921, when Syria was under French rule. One of the Islamist rebel factions was threatening to destroy the tomb as a site of idolatry, and the Erdoğan administration was publicly threatening retaliation if harm came to it. According to a Reuters report of the leaked conversation, a voice alleged to be Fidan’s spoke of creating a provocation: ‘Now look, my commander, if there is to be justification, the justification is I send four men to the other side. I get them to fire eight missiles into empty land [in the vicinity of the tomb]. That’s not a problem. Justification can be created.’ The Turkish government acknowledged that there had been a national security meeting about threats emanating from Syria, but said the recording had been manipulated. The government subsequently blocked public access to YouTube.

    Barring a major change in policy by Obama, Turkey’s meddling in the Syrian civil war is likely to go on. ‘I asked my colleagues if there was any way to stop Erdoğan’s continued support for the rebels, especially now that it’s going so wrong,’ the former intelligence official told me. ‘The answer was: “We’re screwed.” We could go public if it was somebody other than Erdoğan, but Turkey is a special case. They’re a Nato ally. The Turks don’t trust the West. They can’t live with us if we take any active role against Turkish interests. If we went public with what we know about Erdoğan’s role with the gas, it’d be disastrous. The Turks would say: “We hate you for telling us what we can and can’t do.”’

    Vol. 36 No. 8 · 17 April 2014

    Find this story at 4 April 2014

    © LRB Limited 2014

    THE CIA CAMPAIGN TO STEAL APPLE’S SECRETS

    Van nieuwsblog.burojansen.nl

    RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.

    The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.

    By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.

    The CIA declined to comment for this story.

    The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store.

    The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode.

    Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”

    Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows.

    The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies.

    “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”

    Apple declined to comment for this story, instead pointing to previous comments Cook and the company have made defending Apple’s privacy record.

    lockheed
    Lockheed Martin Dulles Executive Plaza, Herndon, Virginia.
    SECURITY RESEARCHERS from Sandia National Laboratories presented their Apple-focused research at a secret annual CIA conference called the Trusted Computing Base Jamboree. The Apple research and the existence of the conference are detailed in documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

    The conference was sponsored by the CIA’s Information Operations Center, which conducts covert cyberattacks. The aim of the gathering, according to a 2012 internal NSA wiki, was to host “presentations that provide important information to developers trying to circumvent or exploit new security capabilities,” as well as to “exploit new avenues of attack.” NSA personnel also participated in the conference through the NSA’s counterpart to the CIA’s Trusted Computing Base, according to the document. The NSA did not provide comment for this story.

    The Jamboree was held at a Lockheed Martin facility inside an executive office park in northern Virginia. Lockheed is one of the largest defense contractors in the world; its tentacles stretch into every aspect of U.S. national security and intelligence. The company is akin to a privatized wing of the U.S. national security state — more than 80 percent of its total revenue comes from the U.S. government. Via a subsidiary, Lockheed also operates Sandia Labs, which is funded by the U.S. government. The lab’s researchers have presented Apple findings at the CIA conference.

    “Lockheed Martin’s role in these activities should not be surprising given its leading role in the national surveillance state,” says William Hartung, director of the Arms and Security Project at the Center for International Policy and author of Prophets of War, a book that chronicles Lockheed’s history. “It is the largest private intelligence contractor in the world, and it has worked on past surveillance programs for the Pentagon, the CIA and the NSA. If you’re looking for a candidate for Big Brother, Lockheed Martin fits the bill.”

    The Apple research is consistent with a much broader secret U.S. government program to analyze “secure communications products, both foreign and domestic” in order to “develop exploitation capabilities against the authentication and encryption schemes,” according to the 2013 Congressional Budget Justification. Known widely as the “Black Budget,” the top-secret CBJ was provided to The Intercept by Snowden and gives a sprawling overview of the U.S. intelligence community’s spending and architecture. The White House did not respond to a request for comment.

    As of 2013, according to the classified budget, U.S. intelligence agencies were creating new capabilities against dozens of commercially produced security products, including those made by American companies, to seek out vulnerabilities.

    Last week, CIA Director John Brennan announced a major reorganization at the agency aimed, in large part, at expanding U.S. cyber-operations. The Information Operations Center, which organized the Jamboree conferences, will be folded into a new Directorate of Digital Innovation. Notwithstanding its innocuous name, a major priority of the directorate will be offensive cyberattacks, sabotage and digital espionage. Brennan said the CIA reorganization will be modeled after the agency’s Counterterrorism Center, which runs the U.S. targeted killing and drone program.

    THE DOCUMENTS do not address how successful the targeting of Apple’s encryption mechanisms have been, nor do they provide any detail about the specific use of such exploits by U.S. intelligence. But they do shed light on an ongoing campaign aimed at defeating the tech giant’s efforts to secure its products, and in turn, its customers’ private data.

    “Spies gonna spy,” says Steven Bellovin, a former chief technologist for the U.S. Federal Trade Commission and current professor at Columbia University. “I’m never surprised by what intelligence agencies do to get information. They’re going to go where the info is, and as it moves, they’ll adjust their tactics. Their attitude is basically amoral: whatever works is OK.”

    Bellovin says he generally supports efforts by U.S. intelligence to “hack” devices — including Apple’s — used by terrorists and criminals, but expressed concern that such capabilities could be abused. “There are bad people out there, and it’s reasonable to seek information on them,” he says, cautioning that “inappropriate use — mass surveillance, targeting Americans without a warrant, probably spying on allies — is another matter entirely.”

    In the top-secret documents, ranging from 2010 through 2012, the researchers appear particularly intent on extracting encryption keys that prevent unauthorized access to data stored — and firmware run — on Apple products.

    “The Intelligence Community (IC) is highly dependent on a very small number of security flaws, many of which are public, which Apple eventually patches,” the researchers noted in an abstract of their 2011 presentation at the Jamboree. But, they promised, their presentation could provide the intelligence community with a “method to noninvasively extract” encryption keys used on Apple devices. Another presentation focused on physically extracting the key from Apple’s hardware.

    A year later, at the 2012 Jamboree, researchers described their attacks on the software used by developers to create applications for Apple’s popular App Store. In a talk called “Strawhorse: Attacking the MacOS and iOS Software Development Kit,” a presenter from Sandia Labs described a successful “whacking” of Apple’s Xcode — the software used to create apps for iPhones, iPads and Mac computers. Developers who create Apple-approved and distributed apps overwhelmingly use Xcode, a free piece of software easily downloaded from the App Store.

    The researchers boasted that they had discovered a way to manipulate Xcode so that it could serve as a conduit for infecting and extracting private data from devices on which users had installed apps that were built with the poisoned Xcode. In other words, by manipulating Xcode, the spies could compromise the devices and private data of anyone with apps made by a poisoned developer — potentially millions of people. “Trying to plant stuff in Xcode has fascinating implications,” says Bellovin.

    The researchers listed a variety of actions their “whacked” Xcode could perform, including:

    — “Entice” all Mac applications to create a “remote backdoor” allowing undetected access to an Apple computer.

    — Secretly embed an app developer’s private key into all iOS applications. (This could potentially allow spies to impersonate the targeted developer.)

    — “Force all iOS applications” to send data from an iPhone or iPad back to a U.S. intelligence “listening post.”

    — Disable core security features on Apple devices.

    THE INTELLIGENCE COMMUNITY IS HIGHLY DEPENDENT ON A VERY SMALL NUMBER OF SECURITY FLAWS, MANY OF WHICH ARE PUBLIC, WHICH APPLE EVENTUALLY PATCHES.
    For years, U.S. and British intelligence agencies have consistently sought to defeat the layers of encryption and other security features used by Apple to protect the iPhone. A joint task force comprised of operatives from the NSA and Britain’s Government Communications Headquarters, formed in 2010, developed surveillance software targeting iPhones, Android devices and Nokia’s Symbian phones. The Mobile Handset Exploitation Team successfully implanted malware on iPhones as part of WARRIOR PRIDE, a GCHQ framework for secretly accessing private communications on mobile devices.

    That program was disclosed in Snowden documents reported on last year by The Guardian. A WARRIOR PRIDE plugin called NOSEY SMURF allowed spies to remotely and secretly activate a phone’s microphone. Another plugin, DREAMY SMURF, allowed intelligence agents to manage the power system on a phone and thus avoid detection. PARANOID SMURF was designed to conceal the malware in other ways. TRACKER SMURF allowed ultra-precise geolocating of an individual phone. “[If] its [sic] on the phone, we can get it,” the spies boasted in a secret GCHQ document describing the targeting of the iPhone.

    All of the SMURF malware — including the plugin that secretly turns on the iPhone’s microphone — would first require that agencies bypass the security controls built into the iOS operating system. Spies would either need to hack the phone in order to plant their malware on it, or sneak a backdoor into an app the user installed voluntarily. That was one of the clear aims of the Apple-focused research presented at the CIA’s conference.

    “The U.S. government is prioritizing its own offensive surveillance needs over the cybersecurity of the millions of Americans who use Apple products,” says Christopher Soghoian, the principal technologist at the American Civil Liberties Union. “If U.S. government-funded researchers can discover these flaws, it is quite likely that Chinese, Russian and Israeli researchers can discover them, too. By quietly exploiting these flaws rather than notifying Apple, the U.S. government leaves Apple’s customers vulnerable to other sophisticated governments.”

    Security experts interviewed by The Intercept point out that the SMURF capabilities were already available to U.S. and British intelligence agencies five years ago. That raises the question of how advanced the current capacity to surveil smartphone users is, especially in light of the extensive resources poured into targeting the products of major tech companies. One GCHQ slide from 2010 stated that the agency’s ultimate goal was to be able to “Exploit any phone, anywhere, any time.”

    jobs_stage
    Steve Jobs unveiling the first iPhone on January 9, 2007.
    THE FIRST JAMBOREE took place in 2006, just as Apple was preparing to unveil its highly-anticipated iPhone. In March 2010, according to a top-secret document, during a talk called “Rocoto: Implanting the iPhone,” a presenter discussed efforts to target the iPhone 3G. In addition to analyzing the device’s software for potential vulnerabilities, the presentation examined “jailbreak methods,” used within the iPhone community to free phones from their built-in constraints, that could be leveraged by intelligence agencies. “We will conclude with a look ahead at future challenges presented by the iPhone 3GS and the upcoming iPad,” the abstract noted. Over the years, as Apple updates its hardware, software and encryption methods, the CIA and its researchers study ways to break and exploit them.

    The attempts to target vulnerabilities in Apple’s products have not occurred in a vacuum. Rather, they are part of a vast multi-agency U.S./U.K. effort to attack commercial encryption and security systems used on billions of devices around the world. U.S. intelligence agencies are not just focusing on individual terrorists or criminals — they are targeting the large corporations, such as Apple, that produce popular mobile devices.

    “Every other manufacturer looks to Apple. If the CIA can undermine Apple’s systems, it’s likely they’ll be able to deploy the same capabilities against everyone else,” says Green, the Johns Hopkins cryptographer. “Apple led the way with secure coprocessors in phones, with fingerprint sensors, with encrypted messages. If you can attack Apple, then you can probably attack anyone.”

    According to the Black Budget, U.S. intelligence agencies have tech companies dead in their sights with the aim of breaking or circumventing any existing or emerging encryption or antiviral products, noting the threat posed by “increasingly strong commercial” encryption and “adversarial cryptography.”

    The Analysis of Target Systems Project produced “prototype capabilities” for the intelligence community, enabled “the defeat of strong commercial data security systems” and developed ways “to exploit emerging information systems and technologies,” according to the classified budget. The project received $35 million in funding in 2012 and had more than 200 personnel assigned to it. By the end of 2013, according to the budget, the project would “develop new capabilities against 50 commercial information security device products to exploit emerging technologies,” as well as new methods that would allow spies to recover user and device passwords on new products.

    Among the project’s missions:

    — Analyze “secure communications products, both foreign and domestic produced” to “develop exploitation capabilities against the authentication and encryption schemes.”

    — “[D]evelop exploitation capabilities against network communications protocols and commercial network security products.”

    — “Anticipate future encryption technologies” and “prepare strategies to exploit those technologies.”

    — “Develop, enhance, and implement software attacks against encrypted signals.”

    — “Develop exploitation capabilities against specific key management and authentication schemes.”

    — “[D]evelop exploitation capabilities against emerging multimedia applications.”

    — Provide tools for “exploiting” devices used to “store, manage, protect, or communicate data.”

    — “Develop methods to discover and exploit communication systems employing public key cryptography” and “communications protected by passwords or pass phrases.”

    — Exploit public key cryptography.

    — Exploit Virtual Private Networks, or VPNs, which allow people to browse the Internet with increased security and anonymity.

    The black budget also noted that the U.S. intelligence community partners with “National Laboratories” to conduct the type of research presented at the CIA’s annual Jamboree conference. It confirms the U.S. government’s aggressive efforts to steal encryption and authentication keys, as occurred in the NSA and GCHQ operations against Gemalto, the world’s largest manufacturer of SIM cards, through the use of Computer Network Exploitation attacks. In that case, spy agencies penetrated Gemalto’s internal networks and cyberstalked its employees to steal mass quantities of keys used to encrypt mobile phone communications.

    The CIA’s Information Operations Center is currently the second largest of the spy agency’s specialized centers. It not only conducts cyber-ops, but has operated covertly in other nations, working to develop assets from targeted countries to assist in its cyber-surveillance programs, according to the Black Budget. At times, its personnel brief the president.

    obama_ipad
    U.S. President Barack Obama holds up an iPad.
    AT THE CIA’s Jamboree in 2011, the computer researchers conducted workshops where they revealed the specifics of their efforts to attack one of the key privacy elements of Apple’s mobile devices. These machines have two separate keys integrated into the silicon of their Apple-designed processors at the point of manufacture. The two, paired together, are used to encrypt data and software stored on iPhones and iPads. One, the User ID, is unique to an individual’s phone, and is not retained by Apple. That key is vital to protecting an individual’s data and — particularly on Apple’s latest devices — difficult to steal. A second key, the Group ID, is known to Apple and is the same across multiple Apple devices that use the same processor. The GID is used to encrypt essential system software that runs on Apple’s mobile devices.

    The focus of the security researchers, as described at the CIA conferences, was to target the GID key, which Apple implants on all devices that use the same processors. For instance, Apple’s A4 processor was used in the iPhone 4, the iPod Touch and the original iPad. All of those devices used the same GID. As Apple designs new processors and faster devices that use those processors, the company creates new GIDs. If someone has the same iPhone as her neighbor, they have the exact same GID key on their devices. So, if intelligence agencies extract the GID key, it means they have information useful to compromising any device containing that key.

    At the 2011 Jamboree conference, there were two separate presentations on hacking the GID key on Apple’s processors. One was focused on non-invasively obtaining it by studying the electromagnetic emissions of — and the amount of power used by — the iPhone’s processor while encryption is being performed. Careful analysis of that information could be used to extract the encryption key. Such a tactic is known as a “side channel” attack. The second focused on a “method to physically extract the GID key.”

    Whatever method the CIA and its partners use, by extracting the GID — which is implanted on the processors of all Apple mobile devices — the CIA and its allies could be able to decrypt the firmware that runs on the iPhone and other mobile devices. This would allow them to seek out other security vulnerabilities to exploit. Taken together, the documents make clear that researching each new Apple processor and mobile device, and studying them for potential security flaws, is a priority for the CIA.

    According to the 2011 document describing the Jamboree presentations on Apple’s processor, the researchers asserted that extracting the GID key could also allow them to look for other potential gateways into Apple devices. “If successful, it would enable decryption and analysis of the boot firmware for vulnerabilities, and development of associated exploits across the entire A4-based product-line, which includes the iPhone 4, the iPod touch and the iPad.”

    At the CIA conference in 2012, Sandia researchers delivered a presentation on Apple’s A5 processor. The A5 is used in the iPhone 4s and iPad 2. But this time, it contained no abstract or other details, instructing those interested to contact a CIA official on his secure phone or email.

    “If I were Tim Cook, I’d be furious,” says the ACLU’s Soghoian. “If Apple is mad at the intelligence community, and they should be, they should put their lawyers to work. Lawsuits speak louder than words.”

    tim_cook
    Apple CEO Tim Cook testifies on Capitol Hill in Washington, May 21, 2013.
    FOR YEARS, Apple has included encryption features in the products it sells to consumers. In 2014, the company dramatically broadened the types of data stored on iPhones that are encrypted, and it incorporated encryption by default into its desktop and laptop operating system. This resulted in criticism from leading law enforcement officials, including the FBI director. The encryption technology that Apple has built into its products — along with many other security features — is a virtual wall that separates cybercriminals and foreign governments from customer data. But now, because Apple claims it can no longer extract customer data stored on iPhones, because it is encrypted with a key the company does not know, the U.S. government can be locked out too — even with a search warrant. The FBI director and other U.S. officials have referred to the advent of the encryption era — where previously accessible data and communications may now be off limits because of the security technology protecting them — as “going dark.”

    In the face of this rising challenge to its surveillance capabilities, U.S. intelligence has spent considerable time and resources trying to find security vulnerabilities in Apple’s encryption technology, and, more broadly, in its products, which can be leveraged to install surveillance software on iPhones and Macbooks. “The exploitation of security flaws is a high-priority area for the U.S. intelligence community, and such methods have only become more important as U.S. technology companies have built strong encryption into their products,” says the ACLU’s Soghoian.

    Microsoft has, for nearly a decade, included BitLocker, an encryption technology that protects data stored on a computer, in its Windows operating system. Unlike Apple, which made encryption available to all customers, Microsoft had included this feature only in its more expensive premium and professional versions of Windows, up until a few years ago. BitLocker is designed to work with a Trusted Platform Module, a special security chip included in some computers, which stores the encryption keys and also protects against unauthorized software modification.

    Also presented at the Jamboree were successes in the targeting of Microsoft’s disk encryption technology, and the TPM chips that are used to store its encryption keys. Researchers at the CIA conference in 2010 boasted about the ability to extract the encryption keys used by BitLocker and thus decrypt private data stored on the computer. Because the TPM chip is used to protect the system from untrusted software, attacking it could allow the covert installation of malware onto the computer, which could be used to access otherwise encrypted communications and files of consumers. Microsoft declined to comment for this story.

    In the wake of the initial Snowden disclosures, Apple CEO Tim Cook has specifically denounced the U.S. government’s efforts to compel companies to provide backdoor access to their users’ data.

    “I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will,” Cook said last September in announcing Apple’s new privacy policy. More recently, Cook said, “None of us should accept that the government or a company or anybody should have access to all of our private information. This is a basic human right. We all have a right to privacy. We shouldn’t give it up. We shouldn’t give in to scare-mongering.”

    As corporations increasingly integrate default encryption methods and companies like Apple incorporate their own indigenous encryption technologies into easy-to-use text, voice and video communication platforms, the U.S. and British governments are panicking. “Encryption threatens to lead all of us to a very dark place,” declared FBI Director James Comey in an October 2014 lecture at the Brookings Institution. Citing the recent moves by Apple to strengthen default encryption on its operating systems, and commitments by Google to incorporate such tools, Comey said, “This means the companies themselves won’t be able to unlock phones, laptops, and tablets to reveal photos, documents, e-mail, and recordings stored within.”

    Under current U.S. regulations, law enforcement agencies can get a court order to access communications channeled through major tech companies and wireless providers. But if those communications are encrypted through a process not accessible by any involved company, the data is essentially meaningless, garbled gibberish. “In a world in which data is encrypted, and the providers don’t have the keys, suddenly, there is no one to go to when they have a warrant,” says Soghoian. “That is, even if they get a court order, it doesn’t help them. That is what is freaking them out.”

    Comey alleged that “even a supercomputer would have difficulty with today’s high-level encryption,” meaning a “brute force” attempt to decrypt intercepted communications would be ineffective, and, even if successful, time-consuming.

    “Encryption isn’t just a technical feature; it’s a marketing pitch,” Comey added. “But it will have very serious consequences for law enforcement and national security agencies at all levels. Sophisticated criminals will come to count on these means of evading detection. It’s the equivalent of a closet that can’t be opened. A safe that can’t be cracked.”

    A few months after Comey’s remarks, Robert Litt, the general counsel for the Office of the Director of National Intelligence, also appeared at Brookings. “One of the many ways in which Snowden’s leaks have damaged our national security is by driving a wedge between the government and providers and technology companies, so that some companies that formerly recognized that protecting our nation was a valuable and important public service now feel compelled to stand in opposition,” Litt said. He appealed to corporations to embrace “a solution that does not compromise the integrity of encryption technology but that enables both encryption to protect privacy and decryption under lawful authority to protect national security.”

    Green, the Johns Hopkins professor, argues that U.S. government attacks against the products of American companies will not just threaten privacy, but will ultimately harm the U.S. economy. “U.S. tech companies have already suffered overseas due to foreign concerns about our products’ security,” he says. “The last thing any of us need is for the U.S. government to actively undermine our own technology industry.”

    The U.S. government is certainly not alone in the war against secure communications. British Prime Minister David Cameron has suggested that if he is re-elected, he may seek to ban encrypted chat programs that do not provide backdoor access to law enforcement. “Are we going to allow a means of communications which it simply isn’t possible to read?” Cameron said in a speech in England earlier this year. “My answer to that question is: ‘No, we must not.’”

    When the Chinese government recently tried to force tech companies to install a backdoor in their products for use by Chinese intelligence agencies, the U.S. government denounced China. “This is something that I’ve raised directly with President Xi,” President Obama said in early March. “We have made it very clear to them that this is something they are going to have to change if they are to do business with the United States.” But China was actually following the U.S. government’s lead. The FBI has called for an expansion of U.S. law, which would require Apple and its competitors to design their products so that all communications could be made available to government agencies. NSA officials have expressed similar sentiments.

    “Obama’s comments were dripping with hypocrisy,” says Trevor Timm, executive director of the Freedom of the Press Foundation. “Don’t get me wrong, his actual criticism of China for attempting to force tech companies to install backdoors was spot on — now if only he would apply what he said to his own government. Since he now knows backdooring encryption is a terrible policy that will damage cybersecurity, privacy, and the economy, why won’t he order the FBI and NSA to stop pushing for it as well?”

    ———

    Documents published with this article:

    TCB Jamboree 2012 Invitation
    Strawhorse: Attacking the MacOS and iOS Software Development Kit
    TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker
    TCB Jamboree 2012
    Apple A4/A5 Application Processors Analysis
    Differential Power Analysis on the Apple A4 Processor
    Secure Key Extraction by Physical De-Processing of Apple’s A4 Processor
    Rocoto: Implanting the iPhone
    Smurf Capability – iPhone
    Black Budget: Cryptanalysis & Exploitation Services – Analysis of Target Systems
    ———

    Andrew Fishman, Alleen Brown, Andrea Jones, Ryan Gallagher, Morgan Marquis-Boire, and Micah Lee contributed to this story.

    Note: An earlier draft of this story incorrectly suggested that the iOS Group ID is used to sign software. An earlier draft also incorrectly stated that Lockheed Martin owns Sandia National Laboratories. Sandia Corporation, a wholly owned subsidiary of Lockheed Martin, operates Sandia National Laboratories as a contractor for the U.S. Department of Energy’s National Nuclear Security Administration.

    Disclosure: Freedom of the Press Foundation, which Trevor Timm represents, has received grant funding from First Look Media, The Intercept’s parent company. Intercept co-founders Glenn Greenwald and Laura Poitras are on the board of the organization.

    Photo: Google Maps; Simon Dawson/Bloomberg/Getty Images; Tony Avelar/Getty Images; Kevin Lamarque/Reuters/Landov; J. Scott Applewhite/AP

    Email the authors: jeremy.scahill@theintercept.com, josh.begley@theintercept.com

    BY JEREMY SCAHILL AND JOSH BEGLEY @jeremyscahill@joshbegley 10 MAR 2015

    Find this story at 10 March 2015

    Copyright firstlook.org

    The Intercept, Mass Surveillance and the State

    Van nieuwsblog.burojansen.nl

    Like a proud father CIA director John Brennan has announced that he’s creating a new directorate to conduct cyberespionage. Never mind all those classified documents published recently by the Intercept which prove that the CIA has been active in the cyber domain for years. While it goes without saying that the CIA’s subversion campaign is unsettling what’s equally thought-provoking is the manner in which the Intercept frames the involvement of the private sector.

    Every year the CIA showcases its latest batch of subversion tools, taking them for a victory lap at a secret conference which internal documents refer to glibly as a “Jamboree.” In 2012 the Jamboree was hosted by Lockheed Martin at a campus in northern Virginia. Journalists at the Intercept describe Lockheed as follows:

    “Lockheed is one of the largest defense contractors in the world; its tentacles stretch into every aspect of U.S. national security and intelligence. The company is akin to a privatized wing of the U.S. national security state — more than 80 percent of its total revenue comes from the U.S. government.”

    Note how this description subtly creates the impression that the ultimate culprit with regard to mass surveillance is the government. Lockheed is merely a “wing” of an overarching “national security state”. All roads lead to U.S. intelligence, it’s all about the state.

    Yet close examination of the history of the CIA yields a different picture. Contractors like Lockheed Martin aren’t a subordinate extension of the national security state. Quite the opposite. It’s probably more accurate to conclude that intelligence agencies, like the NSA, represent a public sector appendage of a much larger corporate power structure whose nexus resides in profound sources of wealth and influence outside of the government. A Deep State, if you will, that’s fundamentally driving what goes on in Washington.

    In the absence of mass public outcry private capital sets the rules. It’s been this way since Ferdinand Lundberg wrote America’s Sixty Families back in 1937. Or perhaps Mr. Scahill hasn’t glimpsed politicians on both sides of the aisle trotting out in front of billionaires to audition for public office?

    Hence there is a recurring theme in L’affaire Snowden that arises from the Intercept’s coverage of mass surveillance. Focus is maintained almost exclusively on the government without acknowledging the central role that corporations play. According to the Intercept’s worldview hi-tech companies are but helpless pawns being coerced and assailed by runaway security services rather than willing symbiotic accomplices that directly benefit from the global panopticon.

    Honestly, doesn’t Ed Snowden have more information on Booz Allen?

    When a doctor is faced with a serious medical condition the diagnosis typically informs the subsequent course of treatment. So it is with mass surveillance. Only in the case of mass surveillance the diagnosis is being shaped by certain actors to fit a preconceived solution. The agenda of the far right is clear. Nothing short of corporate feudalism. Libertarian political operator Grover Norquist boldly spelled it out: “I don’t want to abolish government. I simply want to reduce it to the size where I can drag it into the bathroom and drown it in the bathtub.”

    A messaging scheme which depicts the government as the chief villain is a godsend for people who are itching for reasons to demolish the state. Techno libertarians rejoice and present the public with their version of salvation. “Crypto everywhere” roar CEOs across Silicon Valley. How predictably shallow and self-serving. Their counter-surveillance talking points provide them with something new to sell us. It also absolves them of responsibility while redirecting the public’s attention away from more far-reaching systemic measures.

    In light of this it’s hard not to notice the various twists of fate in L’affaire Snowden. Classified documents gradually trickled into the public record thanks to a whistle-blower who donated money to Ron Paul and exhibited some decidedly right-wing inclinations online. A copy of the classified documents were provided to a journalist who wrote a policy whitepaper for the CATO Institute (formerly known as the Charles Koch Foundation). Then out of the woodwork appears a kindly libertarian billionaire who dazzles the said journalist with fame and fortune, “a dream opportunity that was impossible to decline.”

    The product of coincidence? To an extent. But what’s undeniable is that a member of the financial elite, a man who has clocked over a dozen visits to the Obama White House, deliberately leveraged his assets to inject himself into the unfolding course of events. Once more the narrative about mass surveillance that his news organization conveys tends to cast corporations as champions against mass surveillance while omitting to acknowledge how they stand to benefit from the global panopticon. It appears that elements within the ruling class would have us believe that the Deep State will solve the very problem that it intentionally created.

    Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal , and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

    by BILL BLUNDEN
    WEEKEND EDITION MARCH 13-15, 2015

    Find this story at March 2015

    Copyright © CounterPunch

    CIA Aided Program to Spy on U.S. Cellphones

    Van nieuwsblog.burojansen.nl

    WASHINGTON—The Central Intelligence Agency played a crucial role in helping the Justice Department develop technology that scans data from thousands of U.S. cellphones at a time, part of a secret high-tech alliance between the spy agency and domestic law enforcement, according to people familiar with the work.

    The CIA and the U.S. Marshals Service, an agency of the Justice Department, developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower, these people said.

    Today, the Justice Department program, whose existence wasreported by The Wall Street Journal last year, is used to hunt criminal suspects. The same technology is used to track terror suspects and intelligence targets overseas, the people said.

    The program operates specially equipped planes that fly from five U.S. cities, with a flying range covering most of the U.S. population. Planes are equipped with devices—some past versions were dubbed “dirtboxes” by law-enforcement officials—that trick cellphones into reporting their unique registration information.
    The surveillance system briefly identifies large numbers of cellphones belonging to citizens unrelated to the search. The practice can also briefly interfere with the ability to make calls, these people said.

    Some law-enforcement officials are concerned the aerial surveillance of cellphone signals inappropriately mixes traditional police work with the tactics and technology of overseas spy work that is constrained by fewer rules. Civil-liberties groups say the technique amounts to a digital dragnet of innocent Americans’ phones.

    ….

    The cooperation between technical experts at the CIA and the Marshals Service, which law-enforcement officials have described as a “marriage,” represents one way criminal investigators are increasingly relying on U.S. intelligence agencies for operational support and technical assistance in the wake of the Sept. 11, 2001, attacks. Many Justice Department officials view the joint effort with the CIA as having made valuable contributions to both domestic and overseas operations.

    A CIA spokesman declined to comment on whether the CIA or any other agency uses the devices. Some technologies developed by the agency “have been lawfully and responsibly shared with other U.S. government agencies,” the spokesman said. “How those agencies use that technology is determined by the legal authorities that govern the operations of those individual organizations—not CIA.” He also said the relationship between the Marshals Service and CIA tech experts couldn’t be characterized as a marriage.

    A Justice Department spokesman said Marshals Service techniques are “carried out consistent with federal law, and are subject to court approval.” The agency doesn’t conduct “domestic surveillance, intelligence gathering, or any type of bulk data collection,” the spokesman said, adding that it doesn’t gather any intelligence on behalf of U.S. spy agencies.

    By DEVLIN BARRETT
    Updated March 10, 2015 7:39 p.m. ET

    Find this story at 10 March 2015
    Copyright wsj.com

    CIA looks to expand its cyber espionage capabilities

    Van nieuwsblog.burojansen.nl

    CIA Director John Brennan is planning a major expansion of the agency’s cyber-espionage capabilities as part of a broad restructuring of an intelligence service long defined by its human spy work, current and former U.S. officials said.

    The proposed shift reflects a determination that the CIA’s approach to conventional espionage is increasingly outmoded amid the exploding use of smartphones, social media and other technologies.

    U.S. officials said Brennan’s plans call for increased use of cyber capabilities in almost every category of operations — whether identifying foreign officials to recruit as CIA informants, confirming the identities of targets of drone strikes or penetrating Internet-savvy adversaries such as the Islamic State.

    Several officials said Brennan’s team has even considered creating a new cyber-directorate — a step that would put the agency’s technology experts on equal footing with the operations and analysis branches, which have been pillars of the CIA’s organizational structure for decades.

    U.S. officials emphasized that the plans would not involve new legal authorities and that Brennan may stop short of creating a new directorate. But the suggestion underscores the scope of his ambitions, as well as their potential to raise privacy concerns or lead to turf skirmishes with the National Security Agency, the dominant player in electronic espionage.

    “Brennan is trying to update the agency to make sure it is prepared to tackle the challenges in front of it,” said a U.S. official familiar with the reorganization plan. “I just don’t think you can separate the digital world people operate in from the human intelligence” mission that is the CIA’s traditional domain.

    Like others, the official spoke on the condition of anonymity to discuss internal decision-making.

    The expanded emphasis on cyber is part of a broader restructuring envisioned by Brennan that is expected to break down long-standing boundaries between the CIA’s operations and analysis directorates, creating hybrid “centers” that combine those and other disciplines.

    Brennan is expected to begin implementing aspects of his plan this month, officials said. He recently met with senior members of the House and Senate Intelligence Committees to outline the proposed changes.

    CIA spokesman Dean Boyd declined to comment, saying that “final decisions have not yet been made with respect to agency reorganization efforts.” In a notice to the CIA workforce last year, Brennan said that he had become “increasingly convinced that the time has come to take a fresh look at how we are organized.”

    The changes are designed to replicate the model of the CIA’s Counterterrorism Center, which has surged in size and influence since the Sept. 11, 2001, attacks. The restructuring could lead to new reporting lines for thousands of CIA employees, as long-standing units such the Latin America and Near East divisions give way to new centers that combine analysis, collection and covert operations.

    The National Clandestine Service and the Directorate of Intelligence — the formal names for the operations and analysis branches — would continue to exist, but would focus more on developing talent and resources that could be distributed to the new centers.

    “It would be a huge deal,” said Michael Allen, a former White House and congressional aide who wrote a 2013 book about intelligence reform. Unlike at the FBI and other security agencies, Allen said, “there hasn’t been wholesale structural reform in the CIA post-9/11.”

    Former officials who are familiar with the plan said it has caused generational friction within the CIA’s ranks, with longtime officers resisting changes that younger employees are more eager to embrace.

    The head of the clandestine service recently resigned, in part over objections to the scope of Brennan’s plan, officials said. Brennan quickly replaced him with a longtime officer who had led an internal review panel that broadly endorsed the director’s reform agenda.

    Although limited compared with the larger NSA, the CIA has substantial cyber capabilities. Its Information Operations Center, which handles assignments such as extracting information from stolen laptops and planting surveillance devices, is now second only to the Counterterrorism Center in size, former officials said.

    The CIA also oversees the Open Source Center, an intelligence unit created in 2005 to scour publicly available data, including Twitter feeds, Facebook postings and Web forums where al-Qaeda and other terrorist groups post material.

    Brennan hopes to make the use of such capabilities more pervasive, U.S. officials said, ensuring that expertise and tools that now reside in the Information Operations Center are distributed across the agency.

    The move comes at a time when the CIA has struggled to gain traction against adversaries — including the Islamic State and the Jabhat al-Nusra terrorist group — that recruit and communicate extensively online but operate in combat zones that CIA officers are generally not able to enter.

    But officials said digital changes have transformed even the most conventional cloak-and-dagger scenarios. Secrets that were once obtained by recruiting a source or meeting in a safe house increasingly reside in clouds of digital transmissions that surround espionage targets.

    To recruit a Russian spy, “you may need to manipulate someone’s e-mail, read someone’s e-mail and track the whereabouts of the FSB,” a former official said, referring to the Russian security service. “Cyber is now part of every mission. It’s not a specialized, boutique thing.”

    Beyond elevating the role of the Information Operations Center, U.S. officials said, Brennan is seeking to ensure that the agency is not lagging in other areas, such as counterintelligence work and the CIA’s internal e-mail system.

    Brennan provided only broad outlines of his plan in recent congressional meetings, which excluded all but the four highest-ranking members of the House and Senate intelligence panels. A senior U.S. intelligence official said some senior NSA executives remain in the dark on Brennan’s cyber ambitions.

    In recent years, the CIA has collaborated extensively with the NSA on a range of covert programs, including its drone campaign against al-Qaeda. Documents released by former NSA contractor Edward Snowden showed that e-mails and cellphone signals intercepted by the NSA were used to confirm the identities of targets in strikes.

    But the CIA also has fought budget and bureaucratic battles to maintain its standalone capability, prompting some to view the latest push as an attempt to capi­tal­ize on Washington’s growing alarm over cyberthreats — and the corresponding shifts in federal budgets.

    Former CIA officials said that the agency is mainly concerned about having direct control over the cyber components of its operations and that Brennan’s plans would not encroach on the global surveillance programs run by the NSA. Nor would they interfere with the work of a new agency the Obama administration is creating to fuse intelligence on cyberattacks.

    Brennan’s push to expand the CIA’s cyber capabilities is “entirely appropriate, even overdue,” said Stephen Slick, a former CIA official who directs the Intelligence Studies Project at the University of Texas at Austin. “Advances in digital technology are having a revolutionary impact on the intelligence business, and it’s important for CIA to adapt its collection and covert action missions to account for the new opportunities and dangers.”

    Ellen Nakashima and Julie Tate contributed to this report.

    By Greg Miller February 23

    Find this story at 23 February 2015

    Copyright washingtonpost.com

    Inside Toronto’s secret Cold War History

    Van nieuwsblog.burojansen.nl

    In the 50s and 60s, Soviet and American spies waged a secret war of espionage across the city of Toronto.

    At the height of the Cold War, Toronto was the site of an elaborate game of espionage played between the U.S and the Soviet Union, declassified CIA documents show.
    The records provide new details about how the CIA and the KGB spied on the city’s growing community of eastern European immigrants.
    And those details came as a surprise to at least one Toronto target who learned she was the subject of the CIA investigations.
    “I’m amazed. I’m absolutely in shock,” says Ukrainian-born Natalie Bundza, 78, who worked as a travel agent at an agency on Bloor St. when the CIA first began to monitor her travels.
    Because of her line of work, Bundza was used to being singled out by Soviet authorities. But when the Star showed her the declassified CIA file bearing her name, Bundza was stunned. The depth and breadth of the information that had been collected on her was startling.
    In one of Bundza’s trips to Ukraine in the late ’60s, the CIA had amassed enough intelligence to describe everything from the people she met with overseas to the content of her suitcase, even going as far as to mention the art books she had packed.
    “Took many books to Ukraine: several copies of Archipenko’s monograph Hnizdovsky monograph, poetry collections of the New York group, a Bible for Ivan Mykolaychuk,” the file reads.
    As a young travel agent in her early 30s, Bundza, who now lives in a bungalow in Etobicoke, would often accompany performance groups and tourists across the Iron Curtain and to the Soviet Union. She believes her job and her friends in the art world made her an attractive target for CIA spies.
    Mykolaychuk, an actor, and her other friends, she says, were part of what she calls the “Ukrainian intelligentsia.”
    They included famous sculptor Ivan Honchar, poet Ivan Drach, and prominent political activist Dmytro Pavlychko — names which were all dutifully noted by the CIA spy.
    “I was constantly followed (by the Soviets). They just knew my background. They knew I was a patriot, that I wasn’t a communist,” she says.
    She kept abreast of news from her home country, and she wasn’t afraid to take risks. In her early 30s, Bundza was “all guts, no brains,” she remembers. “I would have knocked on the president’s door if I had to.”
    “We were great tourist guides. We took no BS from (the Soviets),” she says.
    During one of her organized trips, she noticed that a Soviet customs official had been eyeing the stack of Bibles she carried with her. And so, without prompting, Bundza handed him a copy.
    Still, as far as Bundza remembers, she never divulged the minutiae of her travels to anyone — let alone an American spy. How, then, was the CIA able to monitor her travels?
    In Toronto, many served as the agency’s eyes and ears.
    “This was a period of time when the United States did not know nearly as much about the Soviet Union, whether it be its intentions or its capabilities,” said Richard Immerman, a Cold War historian at Temple University in Philadelphia. For the CIA, the goal was to “put different pieces (together) in the hope that one pattern would emerge.”
    Eyewitness accounts were deemed especially important by American intelligence officials.
    At the time, it was not uncommon for those venturing beyond the Iron Curtain to spy on behalf of the CIA, says Immerman. “Our aerial surveillance was limited (so) in many cases, those who did travel to the Soviet Union willingly co-operated with the CIA to provide information — whatever information,” he says. “These could be tourists. These could be businessmen. This was not a time when thousands of people from the West would travel to the Soviet Union.”
    http://www.foia.cia.gov/sites/default/files/document_conversions/1705143/AERODYNAMIC%20%20%20VOL.%2021_0111.pdf
    But for the CIA, Toronto was also rife with potential enemies. In a 1959 declassified file, an American spy describes how 18 Canadians, 11 of whom lived in Toronto, were suspected of working for the KGB. According to the CIA agent, the Canadians had secretly travelled to the Soviet Union and received special training, only to return years later as undercover KGB operatives.
    Other suspected KGB spies, such as Ivan Kolaska, had apparently immigrated to Toronto as part of a bold Soviet plan to infiltrate Ukrainian communities overseas. Kolaska, along with other alleged KGB operatives, one of whom lived a double life as a Toronto City Hall employee, regularly met with Soviet diplomats in Toronto, the files say.
    http://www.foia.cia.gov/sites/default/files/document_conversions/1705143/AERODYNAMIC%20%20%20VOL.%2033%20%20%28OPERATIONS%29_0048.pdf
    In one of those meetings with Soviet embassy staff, the files say, Kolaska revealed the identities of dozens of Ukrainian students who had held a secret meeting in Kyiv. They were later arrested by Soviet authorities, according to the files.
    In many of the declassified documents, the CIA’s informants are named. Bundza’s file contains no such information, leaving only one clue as to the identity of the mysterious spy: Bundza’s full name.
    There is no mention of a “Natalie Bundza” in the file. Her name is listed as “Natalka” instead.
    Only another Ukrainian, she says, would have known her as “Natalka.”
    “It must have been someone from the community here.”

    By: Laurent Bastien Corbeil Staff Reporter, Published on Thu Jul 02 2015

    Find this story at 2 July 2015

    © Copyright Toronto Star Newspapers Ltd. 1996-2015

    How the CIA made Google

    Van nieuwsblog.burojansen.nl

    Inside the secret network behind mass surveillance, endless war, and Skynet—

    INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’

    The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world. The results have been catastrophic: NSA mass surveillance, a permanent state of global war, and a new initiative to transform the US military into Skynet.

    This exclusive is being released for free in the public interest, and was enabled by crowdfunding. I’d like to thank my amazing community of patrons for their support, which gave me the opportunity to work on this in-depth investigation. Please support independent, investigative journalism for the global commons.

    In the wake of the Charlie Hebdo attacks in Paris, western governments are moving fast to legitimize expanded powers of mass surveillance and controls on the internet, all in the name of fighting terrorism.

    US and European politicians have called to protect NSA-style snooping, and to advance the capacity to intrude on internet privacy by outlawing encryption. One idea is to establish a telecoms partnership that would unilaterally delete content deemed to “fuel hatred and violence” in situations considered “appropriate.” Heated discussions are going on at government and parliamentary level to explore cracking down on lawyer-client confidentiality.

    What any of this would have done to prevent the Charlie Hebdo attacks remains a mystery, especially given that we already know the terrorists were on the radar of French intelligence for up to a decade.

    There is little new in this story. The 9/11 atrocity was the first of many terrorist attacks, each succeeded by the dramatic extension of draconian state powers at the expense of civil liberties, backed up with the projection of military force in regions identified as hotspots harbouring terrorists. Yet there is little indication that this tried and tested formula has done anything to reduce the danger. If anything, we appear to be locked into a deepening cycle of violence with no clear end in sight.

    As our governments push to increase their powers, INSURGE INTELLIGENCE can now reveal the vast extent to which the US intelligence community is implicated in nurturing the web platforms we know today, for the precise purpose of utilizing the technology as a mechanism to fight global ‘information war’ — a war to legitimize the power of the few over the rest of us. The lynchpin of this story is the corporation that in many ways defines the 21st century with its unobtrusive omnipresence: Google.

    Google styles itself as a friendly, funky, user-friendly tech firm that rose to prominence through a combination of skill, luck, and genuine innovation. This is true. But it is a mere fragment of the story. In reality, Google is a smokescreen behind which lurks the US military-industrial complex.

    The inside story of Google’s rise, revealed here for the first time, opens a can of worms that goes far beyond Google, unexpectedly shining a light on the existence of a parasitical network driving the evolution of the US national security apparatus, and profiting obscenely from its operation.

    The shadow network
    For the last two decades, US foreign and intelligence strategies have resulted in a global ‘war on terror’ consisting of prolonged military invasions in the Muslim world and comprehensive surveillance of civilian populations. These strategies have been incubated, if not dictated, by a secret network inside and beyond the Pentagon.

    Established under the Clinton administration, consolidated under Bush, and firmly entrenched under Obama, this bipartisan network of mostly neoconservative ideologues sealed its dominion inside the US Department of Defense (DoD) by the dawn of 2015, through the operation of an obscure corporate entity outside the Pentagon, but run by the Pentagon.

    In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. But the inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit.

    Known as the ‘Highlands Forum,’ this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the network around the Highlands Forum has become increasingly successful in dominating US defense policy.

    Giant defense contractors like Booz Allen Hamilton and Science Applications International Corporation are sometimes referred to as the ‘shadow intelligence community’ due to the revolving doors between them and government, and their capacity to simultaneously influence and profit from defense policy. But while these contractors compete for power and money, they also collaborate where it counts. The Highlands Forum has for 20 years provided an off the record space for some of the most prominent members of the shadow intelligence community to convene with senior US government officials, alongside other leaders in relevant industries.

    I first stumbled upon the existence of this network in November 2014, when I reported for VICE’s Motherboard that US defense secretary Chuck Hagel’s newly announced ‘Defense Innovation Initiative’ was really about building Skynet — or something like it, essentially to dominate an emerging era of automated robotic warfare.

    That story was based on a little-known Pentagon-funded ‘white paper’ published two months earlier by the National Defense University (NDU) in Washington DC, a leading US military-run institution that, among other things, generates research to develop US defense policy at the highest levels. The white paper clarified the thinking behind the new initiative, and the revolutionary scientific and technological developments it hoped to capitalize on.

    The Highlands Forum
    The co-author of that NDU white paper is Linton Wells, a 51-year veteran US defense official who served in the Bush administration as the Pentagon’s chief information officer, overseeing the National Security Agency (NSA) and other spy agencies. He still holds active top-secret security clearances, and according to a report by Government Executive magazine in 2006 he chaired the ‘Highlands Forum’, founded by the Pentagon in 1994.

    Linton Wells II (right) former Pentagon chief information officer and assistant secretary of defense for networks, at a recent Pentagon Highlands Forum session. Rosemary Wenchel, a senior official in the US Department of Homeland Security, is sitting next to him
    New Scientist magazine (paywall) has compared the Highlands Forum to elite meetings like “Davos, Ditchley and Aspen,” describing it as “far less well known, yet… arguably just as influential a talking shop.” Regular Forum meetings bring together “innovative people to consider interactions between policy and technology. Its biggest successes have been in the development of high-tech network-based warfare.”

    Given Wells’ role in such a Forum, perhaps it was not surprising that his defense transformation white paper was able to have such a profound impact on actual Pentagon policy. But if that was the case, why had no one noticed?

    Despite being sponsored by the Pentagon, I could find no official page on the DoD website about the Forum. Active and former US military and intelligence sources had never heard of it, and neither did national security journalists. I was baffled.

    The Pentagon’s intellectual capital venture firm
    In the prologue to his 2007 book, A Crowd of One: The Future of Individual Identity, John Clippinger, an MIT scientist of the Media Lab Human Dynamics Group, described how he participated in a “Highlands Forum” gathering, an “invitation-only meeting funded by the Department of Defense and chaired by the assistant for networks and information integration.” This was a senior DoD post overseeing operations and policies for the Pentagon’s most powerful spy agencies including the NSA, the Defense Intelligence Agency (DIA), among others. Starting from 2003, the position was transitioned into what is now the undersecretary of defense for intelligence. The Highlands Forum, Clippinger wrote, was founded by a retired US Navy captain named Dick O’Neill. Delegates include senior US military officials across numerous agencies and divisions — “captains, rear admirals, generals, colonels, majors and commanders” as well as “members of the DoD leadership.”

    What at first appeared to be the Forum’s main website describes Highlands as “an informal cross-disciplinary network sponsored by Federal Government,” focusing on “information, science and technology.” Explanation is sparse, beyond a single ‘Department of Defense’ logo.

    But Highlands also has another website describing itself as an “intellectual capital venture firm” with “extensive experience assisting corporations, organizations, and government leaders.” The firm provides a “wide range of services, including: strategic planning, scenario creation and gaming for expanding global markets,” as well as “working with clients to build strategies for execution.” ‘The Highlands Group Inc.,’ the website says, organizes a whole range of Forums on these issue.

    For instance, in addition to the Highlands Forum, since 9/11 the Group runs the ‘Island Forum,’ an international event held in association with Singapore’s Ministry of Defense, which O’Neill oversees as “lead consultant.” The Singapore Ministry of Defense website describes the Island Forum as “patterned after the Highlands Forum organized for the US Department of Defense.” Documents leaked by NSA whistleblower Edward Snowden confirmed that Singapore played a key role in permitting the US and Australia to tap undersea cables to spy on Asian powers like Indonesia and Malaysia.

    The Highlands Group website also reveals that Highlands is partnered with one of the most powerful defense contractors in the United States. Highlands is “supported by a network of companies and independent researchers,” including “our Highlands Forum partners for the past ten years at SAIC; and the vast Highlands network of participants in the Highlands Forum.”

    SAIC stands for the US defense firm, Science Applications International Corporation, which changed its name to Leidos in 2013, operating SAIC as a subsidiary. SAIC/Leidos is among the top 10 largest defense contractors in the US, and works closely with the US intelligence community, especially the NSA. According to investigative journalist Tim Shorrock, the first to disclose the vast extent of the privatization of US intelligence with his seminal book Spies for Hire, SAIC has a “symbiotic relationship with the NSA: the agency is the company’s largest single customer and SAIC is the NSA’s largest contractor.”

    Richard ‘Dick’ Patrick O’Neill, founding president of the Pentagon’s Highlands Forum
    The full name of Captain “Dick” O’Neill, the founding president of the Highlands Forum, is Richard Patrick O’Neill, who after his work in the Navy joined the DoD. He served his last post as deputy for strategy and policy in the Office of the Assistant Secretary for Defense for Command, Control, Communications and Intelligence, before setting up Highlands.

    The Club of Yoda
    But Clippinger also referred to another mysterious individual revered by Forum attendees:

    “He sat at the back of the room, expressionless behind thick, black-rimmed glasses. I never heard him utter a word… Andrew (Andy) Marshall is an icon within DoD. Some call him Yoda, indicative of his mythical inscrutable status… He had served many administrations and was widely regarded as above partisan politics. He was a supporter of the Highlands Forum and a regular fixture from its beginning.”
    Since 1973, Marshall has headed up one of the Pentagon’s most powerful agencies, the Office of Net Assessment (ONA), the US defense secretary’s internal ‘think tank’ which conducts highly classified research on future planning for defense policy across the US military and intelligence community. The ONA has played a key role in major Pentagon strategy initiatives, including Maritime Strategy, the Strategic Defense Initiative, the Competitive Strategies Initiative, and the Revolution in Military Affairs.

    Andrew ‘Yoda’ Marshall, head of the Pentagon’s Office of Net Assessment (ONA) and co-chair of the Highlands Forum, at an early Highlands event in 1996 at the Santa Fe Institute. Marshall is retiring as of January 2015
    In a rare 2002 profile in Wired, reporter Douglas McGray described Andrew Marshall, now 93 years old, as “the DoD’s most elusive” but “one of its most influential” officials. McGray added that “Vice President Dick Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitz” — widely considered the hawks of the neoconservative movement in American politics — were among Marshall’s “star protégés.”

    Speaking at a low-key Harvard University seminar a few months after 9/11, Highlands Forum founding president Richard O’Neill said that Marshall was much more than a “regular fixture” at the Forum. “Andy Marshall is our co-chair, so indirectly everything that we do goes back into Andy’s system,” he told the audience. “Directly, people who are in the Forum meetings may be going back to give briefings to Andy on a variety of topics and to synthesize things.” He also said that the Forum had a third co-chair: the director of the Defense Advanced Research and Projects Agency (DARPA), which at that time was a Rumsfeld appointee, Anthony J. Tether. Before joining DARPA, Tether was vice president of SAIC’s Advanced Technology Sector.

    Anthony J. Tether, director of DARPA and co-chair of the Pentagon’s Highlands Forum from June 2001 to February 2009
    The Highlands Forum’s influence on US defense policy has thus operated through three main channels: its sponsorship by the Office of the Secretary of Defense (around the middle of last decade this was transitioned specifically to the Office of the Undersecretary of Defense for Intelligence, which is in charge of the main surveillance agencies); its direct link to Andrew ‘Yoda’ Marshall’s ONA; and its direct link to DARPA.

    A slide from Richard O’Neill’s presentation at Harvard University in 2001
    According to Clippinger in A Crowd of One, “what happens at informal gatherings such as the Highlands Forum could, over time and through unforeseen curious paths of influence, have enormous impact, not just within the DoD but throughout the world.” He wrote that the Forum’s ideas have “moved from being heretical to mainstream. Ideas that were anathema in 1999 had been adopted as policy just three years later.”

    Although the Forum does not produce “consensus recommendations,” its impact is deeper than a traditional government advisory committee. “The ideas that emerge from meetings are available for use by decision-makers as well as by people from the think tanks,” according to O’Neill:

    “We’ll include people from Booz, SAIC, RAND, or others at our meetings… We welcome that kind of cooperation, because, truthfully, they have the gravitas. They are there for the long haul and are able to influence government policies with real scholarly work… We produce ideas and interaction and networks for these people to take and use as they need them.”
    My repeated requests to O’Neill for information on his work at the Highlands Forum were ignored. The Department of Defense also did not respond to multiple requests for information and comment on the Forum.

    Information warfare
    The Highlands Forum has served as a two-way ‘influence bridge’: on the one hand, for the shadow network of private contractors to influence the formulation of information operations policy across US military intelligence; and on the other, for the Pentagon to influence what is going on in the private sector. There is no clearer evidence of this than the truly instrumental role of the Forum in incubating the idea of mass surveillance as a mechanism to dominate information on a global scale.

    In 1989, Richard O’Neill, then a US Navy cryptologist, wrote a paper for the US Naval War College, ‘Toward a methodology for perception management.’ In his book, Future Wars, Col. John Alexander, then a senior officer in the US Army’s Intelligence and Security Command (INSCOM), records that O’Neill’s paper for the first time outlined a strategy for “perception management” as part of information warfare (IW). O’Neill’s proposed strategy identified three categories of targets for IW: adversaries, so they believe they are vulnerable; potential partners, “so they perceive the cause [of war] as just”; and finally, civilian populations and the political leadership so they “perceive the cost as worth the effort.” A secret briefing based on O’Neill’s work “made its way to the top leadership” at DoD. “They acknowledged that O’Neill was right and told him to bury it.

    Except the DoD didn’t bury it. Around 1994, the Highlands Group was founded by O’Neill as an official Pentagon project at the appointment of Bill Clinton’s then defense secretary William Perry — who went on to join SAIC’s board of directors after retiring from government in 2003.

    In O’Neill’s own words, the group would function as the Pentagon’s ‘ideas lab’. According to Government Executive, military and information technology experts gathered at the first Forum meeting “to consider the impacts of IT and globalization on the United States and on warfare. How would the Internet and other emerging technologies change the world?” The meeting helped plant the idea of “network-centric warfare” in the minds of “the nation’s top military thinkers.”

    Excluding the public
    Official Pentagon records confirm that the Highlands Forum’s primary goal was to support DoD policies on O’Neill’s specialism: information warfare. According to the Pentagon’s 1997 Annual Report to the President and the Congress under a section titled ‘Information Operations,’ (IO) the Office of the Secretary of Defense (OSD) had authorized the “establishment of the Highlands Group of key DoD, industry, and academic IO experts” to coordinate IO across federal military intelligence agencies.

    The following year’s DoD annual report reiterated the Forum’s centrality to information operations: “To examine IO issues, DoD sponsors the Highlands Forum, which brings together government, industry, and academic professionals from various fields.”

    Notice that in 1998, the Highlands ‘Group’ became a ‘Forum.’ According to O’Neill, this was to avoid subjecting Highlands Forums meetings to “bureaucratic restrictions.” What he was alluding to was the Federal Advisory Committee Act (FACA), which regulates the way the US government can formally solicit the advice of special interests.

    Known as the ‘open government’ law, FACA requires that US government officials cannot hold closed-door or secret consultations with people outside government to develop policy. All such consultations should take place via federal advisory committees that permit public scrutiny. FACA requires that meetings be held in public, announced via the Federal Register, that advisory groups are registered with an office at the General Services Administration, among other requirements intended to maintain accountability to the public interest.

    But Government Executive reported that “O’Neill and others believed” such regulatory issues “would quell the free flow of ideas and no-holds-barred discussions they sought.” Pentagon lawyers had warned that the word ‘group’ might necessitate certain obligations and advised running the whole thing privately: “So O’Neill renamed it the Highlands Forum and moved into the private sector to manage it as a consultant to the Pentagon.” The Pentagon Highlands Forum thus runs under the mantle of O’Neill’s ‘intellectual capital venture firm,’ ‘Highlands Group Inc.’

    In 1995, a year after William Perry appointed O’Neill to head up the Highlands Forum, SAIC — the Forum’s “partner” organization — launched a new Center for Information Strategy and Policy under the direction of “Jeffrey Cooper, a member of the Highlands Group who advises senior Defense Department officials on information warfare issues.” The Center had precisely the same objective as the Forum, to function as “a clearinghouse to bring together the best and brightest minds in information warfare by sponsoring a continuing series of seminars, papers and symposia which explore the implications of information warfare in depth.” The aim was to “enable leaders and policymakers from government, industry, and academia to address key issues surrounding information warfare to ensure that the United States retains its edge over any and all potential enemies.”

    Despite FACA regulations, federal advisory committees are already heavily influenced, if not captured, by corporate power. So in bypassing FACA, the Pentagon overrode even the loose restrictions of FACA, by permanently excluding any possibility of public engagement.

    O’Neill’s claim that there are no reports or recommendations is disingenuous. By his own admission, the secret Pentagon consultations with industry that have taken place through the Highlands Forum since 1994 have been accompanied by regular presentations of academic and policy papers, recordings and notes of meetings, and other forms of documentation that are locked behind a login only accessible by Forum delegates. This violates the spirit, if not the letter, of FACA — in a way that is patently intended to circumvent democratic accountability and the rule of law.

    The Highlands Forum doesn’t need to produce consensus recommendations. Its purpose is to provide the Pentagon a shadow social networking mechanism to cement lasting relationships with corporate power, and to identify new talent, that can be used to fine-tune information warfare strategies in absolute secrecy.

    Total participants in the DoD’s Highlands Forum number over a thousand, although sessions largely consist of small closed workshop style gatherings of maximum 25–30 people, bringing together experts and officials depending on the subject. Delegates have included senior personnel from SAIC and Booz Allen Hamilton, RAND Corp., Cisco, Human Genome Sciences, eBay, PayPal, IBM, Google, Microsoft, AT&T, the BBC, Disney, General Electric, Enron, among innumerable others; Democrat and Republican members of Congress and the Senate; senior executives from the US energy industry such as Daniel Yergin of IHS Cambridge Energy Research Associates; and key people involved in both sides of presidential campaigns.

    Other participants have included senior media professionals: David Ignatius, associate editor of the Washington Post and at the time the executive editor of the International Herald Tribune; Thomas Friedman, long-time New York Times columnist; Arnaud de Borchgrave, an editor at Washington Times and United Press International; Steven Levy, a former Newsweek editor, senior writer for Wired and now chief tech editor at Medium; Lawrence Wright, staff writer at the New Yorker; Noah Shachtmann, executive editor at the Daily Beast; Rebecca McKinnon, co-founder of Global Voices Online; Nik Gowing of the BBC; and John Markoff of the New York Times.

    Due to its current sponsorship by the OSD’s undersecretary of defense for intelligence, the Forum has inside access to the chiefs of the main US surveillance and reconnaissance agencies, as well as the directors and their assistants at DoD research agencies, from DARPA, to the ONA. This also means that the Forum is deeply plugged into the Pentagon’s policy research task forces.

    Google: seeded by the Pentagon
    In 1994 — the same year the Highlands Forum was founded under the stewardship of the Office of the Secretary of Defense, the ONA, and DARPA — two young PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency programme of the National Science Foundation (NSF), NASA and DARPA.

    But that’s just one side of the story.

    Throughout the development of the search engine, Sergey Brin reported regularly and directly to two people who were not Stanford faculty at all: Dr. Bhavani Thuraisingham and Dr. Rick Steinheiser. Both were representatives of a sensitive US intelligence community research programme on information security and data-mining.

    Thuraisingham is currently the Louis A. Beecherl distinguished professor and executive director of the Cyber Security Research Institute at the University of Texas, Dallas, and a sought-after expert on data-mining, data management and information security issues. But in the 1990s, she worked for the MITRE Corp., a leading US defense contractor, where she managed the Massive Digital Data Systems initiative, a project sponsored by the NSA, CIA, and the Director of Central Intelligence, to foster innovative research in information technology.

    “We funded Stanford University through the computer scientist Jeffrey Ullman, who had several promising graduate students working on many exciting areas,” Prof. Thuraisingham told me. “One of them was Sergey Brin, the founder of Google. The intelligence community’s MDDS program essentially provided Brin seed-funding, which was supplemented by many other sources, including the private sector.”

    This sort of funding is certainly not unusual, and Sergey Brin’s being able to receive it by being a graduate student at Stanford appears to have been incidental. The Pentagon was all over computer science research at this time. But it illustrates how deeply entrenched the culture of Silicon Valley is in the values of the US intelligence community.

    In an extraordinary document hosted by the website of the University of Texas, Thuraisingham recounts that from 1993 to 1999, “the Intelligence Community [IC] started a program called Massive Digital Data Systems (MDDS) that I was managing for the Intelligence Community when I was at the MITRE Corporation.” The program funded 15 research efforts at various universities, including Stanford. Its goal was developing “data management technologies to manage several terabytes to petabytes of data,” including for “query processing, transaction management, metadata management, storage management, and data integration.”

    At the time, Thuraisingham was chief scientist for data and information management at MITRE, where she led team research and development efforts for the NSA, CIA, US Air Force Research Laboratory, as well as the US Army’s Space and Naval Warfare Systems Command (SPAWAR) and Communications and Electronic Command (CECOM). She went on to teach courses for US government officials and defense contractors on data-mining in counter-terrorism.

    In her University of Texas article, she attaches the copy of an abstract of the US intelligence community’s MDDS program that had been presented to the “Annual Intelligence Community Symposium” in 1995. The abstract reveals that the primary sponsors of the MDDS programme were three agencies: the NSA, the CIA’s Office of Research & Development, and the intelligence community’s Community Management Staff (CMS) which operates under the Director of Central Intelligence. Administrators of the program, which provided funding of around 3–4 million dollars per year for 3–4 years, were identified as Hal Curran (NSA), Robert Kluttz (CMS), Dr. Claudia Pierce (NSA), Dr. Rick Steinheiser (ORD — standing for the CIA’s Office of Research and Devepment), and Dr. Thuraisingham herself.

    Thuraisingham goes on in her article to reiterate that this joint CIA-NSA program partly funded Sergey Brin to develop the core of Google, through a grant to Stanford managed by Brin’s supervisor Prof. Jeffrey D. Ullman:

    “In fact, the Google founder Mr. Sergey Brin was partly funded by this program while he was a PhD student at Stanford. He together with his advisor Prof. Jeffrey Ullman and my colleague at MITRE, Dr. Chris Clifton [Mitre’s chief scientist in IT], developed the Query Flocks System which produced solutions for mining large amounts of data stored in databases. I remember visiting Stanford with Dr. Rick Steinheiser from the Intelligence Community and Mr. Brin would rush in on roller blades, give his presentation and rush out. In fact the last time we met in September 1998, Mr. Brin demonstrated to us his search engine which became Google soon after.”
    Brin and Page officially incorporated Google as a company in September 1998, the very month they last reported to Thuraisingham and Steinheiser. ‘Query Flocks’ was also part of Google’s patented ‘PageRank’ search system, which Brin developed at Stanford under the CIA-NSA-MDDS programme, as well as with funding from the NSF, IBM and Hitachi. That year, MITRE’s Dr. Chris Clifton, who worked under Thuraisingham to develop the ‘Query Flocks’ system, co-authored a paper with Brin’s superviser, Prof. Ullman, and the CIA’s Rick Steinheiser. Titled ‘Knowledge Discovery in Text,’ the paper was presented at an academic conference.

    “The MDDS funding that supported Brin was significant as far as seed-funding goes, but it was probably outweighed by the other funding streams,” said Thuraisingham. “The duration of Brin’s funding was around two years or so. In that period, I and my colleagues from the MDDS would visit Stanford to see Brin and monitor his progress every three months or so. We didn’t supervise exactly, but we did want to check progress, point out potential problems and suggest ideas. In those briefings, Brin did present to us on the query flocks research, and also demonstrated to us versions of the Google search engine.”

    Brin thus reported to Thuraisingham and Steinheiser regularly about his work developing Google.

    ==

    UPDATE 2.05PM GMT [2nd Feb 2015]:

    Since publication of this article, Prof. Thuraisingham has amended her article referenced above. The amended version includes a new modified statement, followed by a copy of the original version of her account of the MDDS. In this amended version, Thuraisingham rejects the idea that CIA funded Google, and says instead:

    “In fact Prof. Jeffrey Ullman (at Stanford) and my colleague at MITRE Dr. Chris Clifton together with some others developed the Query Flocks System, as part of MDDS, which produced solutions for mining large amounts of data stored in databases. Also, Mr. Sergey Brin, the cofounder of Google, was part of Prof. Ullman’s research group at that time. I remember visiting Stanford with Dr. Rick Steinheiser from the Intelligence Community periodically and Mr. Brin would rush in on roller blades, give his presentation and rush out. During our last visit to Stanford in September 1998, Mr. Brin demonstrated to us his search engine which I believe became Google soon after…
    There are also several inaccuracies in Dr. Ahmed’s article (dated January 22, 2015). For example, the MDDS program was not a ‘sensitive’ program as stated by Dr. Ahmed; it was an Unclassified program that funded universities in the US. Furthermore, Sergey Brin never reported to me or to Dr. Rick Steinheiser; he only gave presentations to us during our visits to the Department of Computer Science at Stanford during the 1990s. Also, MDDS never funded Google; it funded Stanford University.”
    Here, there is no substantive factual difference in Thuraisingham’s accounts, other than to assert that her statement associating Sergey Brin with the development of ‘query flocks’ is mistaken. Notably, this acknowledgement is derived not from her own knowledge, but from this very article quoting a comment from a Google spokesperson.

    However, the bizarre attempt to disassociate Google from the MDDS program misses the mark. Firstly, the MDDS never funded Google, because during the development of the core components of the Google search engine, there was no company incorporated with that name. The grant was instead provided to Stanford University through Prof. Ullman, through whom some MDDS funding was used to support Brin who was co-developing Google at the time. Secondly, Thuraisingham then adds that Brin never “reported” to her or the CIA’s Steinheiser, but admits he “gave presentations to us during our visits to the Department of Computer Science at Stanford during the 1990s.” It is unclear, though, what the distinction is here between reporting, and delivering a detailed presentation — either way, Thuraisingham confirms that she and the CIA had taken a keen interest in Brin’s development of Google. Thirdly, Thuraisingham describes the MDDS program as “unclassified,” but this does not contradict its “sensitive” nature. As someone who has worked for decades as an intelligence contractor and advisor, Thuraisingham is surely aware that there are many ways of categorizing intelligence, including ‘sensitive but unclassified.’ A number of former US intelligence officials I spoke to said that the almost total lack of public information on the CIA and NSA’s MDDS initiative suggests that although the progam was not classified, it is likely instead that its contents was considered sensitive, which would explain efforts to minimise transparency about the program and the way it fed back into developing tools for the US intelligence community. Fourthly, and finally, it is important to point out that the MDDS abstract which Thuraisingham includes in her University of Texas document states clearly not only that the Director of Central Intelligence’s CMS, CIA and NSA were the overseers of the MDDS initiative, but that the intended customers of the project were “DoD, IC, and other government organizations”: the Pentagon, the US intelligence community, and other relevant US government agencies.

    In other words, the provision of MDDS funding to Brin through Ullman, under the oversight of Thuraisingham and Steinheiser, was fundamentally because they recognized the potential utility of Brin’s work developing Google to the Pentagon, intelligence community, and the federal government at large.

    ==

    The MDDS programme is actually referenced in several papers co-authored by Brin and Page while at Stanford, specifically highlighting its role in financially sponsoring Brin in the development of Google. In their 1998 paper published in the Bulletin of the IEEE Computer Society Technical Committeee on Data Engineering, they describe the automation of methods to extract information from the web via “Dual Iterative Pattern Relation Extraction,” the development of “a global ranking of Web pages called PageRank,” and the use of PageRank “to develop a novel search engine called Google.” Through an opening footnote, Sergey Brin confirms he was “Partially supported by the Community Management Staff’s Massive Digital Data Systems Program, NSF grant IRI-96–31952” — confirming that Brin’s work developing Google was indeed partly-funded by the CIA-NSA-MDDS program.

    This NSF grant identified alongside the MDDS, whose project report lists Brin among the students supported (without mentioning the MDDS), was different to the NSF grant to Larry Page that included funding from DARPA and NASA. The project report, authored by Brin’s supervisor Prof. Ullman, goes on to say under the section ‘Indications of Success’ that “there are some new stories of startups based on NSF-supported research.” Under ‘Project Impact,’ the report remarks: “Finally, the google project has also gone commercial as Google.com.”

    Thuraisingham’s account, including her new amended version, therefore demonstrates that the CIA-NSA-MDDS program was not only partly funding Brin throughout his work with Larry Page developing Google, but that senior US intelligence representatives including a CIA official oversaw the evolution of Google in this pre-launch phase, all the way until the company was ready to be officially founded. Google, then, had been enabled with a “significant” amount of seed-funding and oversight from the Pentagon: namely, the CIA, NSA, and DARPA.

    The DoD could not be reached for comment.

    When I asked Prof. Ullman to confirm whether or not Brin was partly funded under the intelligence community’s MDDS program, and whether Ullman was aware that Brin was regularly briefing the CIA’s Rick Steinheiser on his progress in developing the Google search engine, Ullman’s responses were evasive: “May I know whom you represent and why you are interested in these issues? Who are your ‘sources’?” He also denied that Brin played a significant role in developing the ‘query flocks’ system, although it is clear from Brin’s papers that he did draw on that work in co-developing the PageRank system with Page.

    When I asked Ullman whether he was denying the US intelligence community’s role in supporting Brin during the development of Google, he said: “I am not going to dignify this nonsense with a denial. If you won’t explain what your theory is, and what point you are trying to make, I am not going to help you in the slightest.”

    The MDDS abstract published online at the University of Texas confirms that the rationale for the CIA-NSA project was to “provide seed money to develop data management technologies which are of high-risk and high-pay-off,” including techniques for “querying, browsing, and filtering; transaction processing; accesses methods and indexing; metadata management and data modelling; and integrating heterogeneous databases; as well as developing appropriate architectures.” The ultimate vision of the program was to “provide for the seamless access and fusion of massive amounts of data, information and knowledge in a heterogeneous, real-time environment” for use by the Pentagon, intelligence community and potentially across government.

    These revelations corroborate the claims of Robert Steele, former senior CIA officer and a founding civilian deputy director of the Marine Corps Intelligence Activity, whom I interviewed for The Guardian last year on open source intelligence. Citing sources at the CIA, Steele had said in 2006 that Steinheiser, an old colleague of his, was the CIA’s main liaison at Google and had arranged early funding for the pioneering IT firm. At the time, Wired founder John Batelle managed to get this official denial from a Google spokesperson in response to Steele’s assertions:

    “The statements related to Google are completely untrue.”
    This time round, despite multiple requests and conversations, a Google spokesperson declined to comment.

    UPDATE: As of 5.41PM GMT [22nd Jan 2015], Google’s director of corporate communication got in touch and asked me to include the following statement:

    “Sergey Brin was not part of the Query Flocks Program at Stanford, nor were any of his projects funded by US Intelligence bodies.”
    This is what I wrote back:

    My response to that statement would be as follows: Brin himself in his own paper acknowledges funding from the Community Management Staff of the Massive Digital Data Systems (MDDS) initiative, which was supplied through the NSF. The MDDS was an intelligence community program set up by the CIA and NSA. I also have it on record, as noted in the piece, from Prof. Thuraisingham of University of Texas that she managed the MDDS program on behalf of the US intelligence community, and that her and the CIA’s Rick Steinheiser met Brin every three months or so for two years to be briefed on his progress developing Google and PageRank. Whether Brin worked on query flocks or not is neither here nor there.
    In that context, you might want to consider the following questions:
    1) Does Google deny that Brin’s work was part-funded by the MDDS via an NSF grant?
    2) Does Google deny that Brin reported regularly to Thuraisingham and Steinheiser from around 1996 to 1998 until September that year when he presented the Google search engine to them?
    Total Information Awareness
    A call for papers for the MDDS was sent out via email list on November 3rd 1993 from senior US intelligence official David Charvonia, director of the research and development coordination office of the intelligence community’s CMS. The reaction from Tatu Ylonen (celebrated inventor of the widely used secure shell [SSH] data protection protocol) to his colleagues on the email list is telling: “Crypto relevance? Makes you think whether you should protect your data.” The email also confirms that defense contractor and Highlands Forum partner, SAIC, was managing the MDDS submission process, with abstracts to be sent to Jackie Booth of the CIA’s Office of Research and Development via a SAIC email address.

    By 1997, Thuraisingham reveals, shortly before Google became incorporated and while she was still overseeing the development of its search engine software at Stanford, her thoughts turned to the national security applications of the MDDS program. In the acknowledgements to her book, Web Data Mining and Applications in Business Intelligence and Counter-Terrorism (2003), Thuraisingham writes that she and “Dr. Rick Steinheiser of the CIA, began discussions with Defense Advanced Research Projects Agency on applying data-mining for counter-terrorism,” an idea that resulted directly from the MDDS program which partly funded Google. “These discussions eventually developed into the current EELD (Evidence Extraction and Link Detection) program at DARPA.”

    So the very same senior CIA official and CIA-NSA contractor involved in providing the seed-funding for Google were simultaneously contemplating the role of data-mining for counter-terrorism purposes, and were developing ideas for tools actually advanced by DARPA.

    Today, as illustrated by her recent oped in the New York Times, Thuraisingham remains a staunch advocate of data-mining for counter-terrorism purposes, but also insists that these methods must be developed by government in cooperation with civil liberties lawyers and privacy advocates to ensure that robust procedures are in place to prevent potential abuse. She points out, damningly, that with the quantity of information being collected, there is a high risk of false positives.

    In 1993, when the MDDS program was launched and managed by MITRE Corp. on behalf of the US intelligence community, University of Virginia computer scientist Dr. Anita K. Jones — a MITRE trustee — landed the job of DARPA director and head of research and engineering across the Pentagon. She had been on the board of MITRE since 1988. From 1987 to 1993, Jones simultaneously served on SAIC’s board of directors. As the new head of DARPA from 1993 to 1997, she also co-chaired the Pentagon’s Highlands Forum during the period of Google’s pre-launch development at Stanford under the MDSS.

    Thus, when Thuraisingham and Steinheiser were talking to DARPA about the counter-terrorism applications of MDDS research, Jones was DARPA director and Highlands Forum co-chair. That year, Jones left DARPA to return to her post at the University of Virgina. The following year, she joined the board of the National Science Foundation, which of course had also just funded Brin and Page, and also returned to the board of SAIC. When she left DoD, Senator Chuck Robb paid Jones the following tribute : “She brought the technology and operational military communities together to design detailed plans to sustain US dominance on the battlefield into the next century.”

    Dr. Anita Jones, head of DARPA from 1993–1997, and co-chair of the Pentagon Highlands Forum from 1995–1997, during which officials in charge of the CIA-NSA-MDSS program were funding Google, and in communication with DARPA about data-mining for counterterrorism
    On the board of the National Science Foundation from 1992 to 1998 (including a stint as chairman from 1996) was Richard N. Zare. This was the period in which the NSF sponsored Sergey Brin and Larry Page in association with DARPA. In June 1994, Prof. Zare, a chemist at Stanford, participated with Prof. Jeffrey Ullman (who supervised Sergey Brin’s research), on a panel sponsored by Stanford and the National Research Council discussing the need for scientists to show how their work “ties to national needs.” The panel brought together scientists and policymakers, including “Washington insiders.”

    DARPA’s EELD program, inspired by the work of Thuraisingham and Steinheiser under Jones’ watch, was rapidly adapted and integrated with a suite of tools to conduct comprehensive surveillance under the Bush administration.

    According to DARPA official Ted Senator, who led the EELD program for the agency’s short-lived Information Awareness Office, EELD was among a range of “promising techniques” being prepared for integration “into the prototype TIA system.” TIA stood for Total Information Awareness, and was the main global electronic eavesdropping and data-mining program deployed by the Bush administration after 9/11. TIA had been set up by Iran-Contra conspirator Admiral John Poindexter, who was appointed in 2002 by Bush to lead DARPA’s new Information Awareness Office.

    The Xerox Palo Alto Research Center (PARC) was another contractor among 26 companies (also including SAIC) that received million dollar contracts from DARPA (the specific quantities remained classified) under Poindexter, to push forward the TIA surveillance program in 2002 onwards. The research included “behaviour-based profiling,” “automated detection, identification and tracking” of terrorist activity, among other data-analyzing projects. At this time, PARC’s director and chief scientist was John Seely Brown. Both Brown and Poindexter were Pentagon Highlands Forum participants — Brown on a regular basis until recently.

    TIA was purportedly shut down in 2003 due to public opposition after the program was exposed in the media, but the following year Poindexter participated in a Pentagon Highlands Group session in Singapore, alongside defense and security officials from around the world. Meanwhile, Ted Senator continued to manage the EELD program among other data-mining and analysis projects at DARPA until 2006, when he left to become a vice president at SAIC. He is now a SAIC/Leidos technical fellow.

    Google, DARPA and the money trail
    Long before the appearance of Sergey Brin and Larry Page, Stanford University’s computer science department had a close working relationship with US military intelligence. A letter dated November 5th 1984 from the office of renowned artificial intelligence (AI) expert, Prof Edward Feigenbaum, addressed to Rick Steinheiser, gives the latter directions to Stanford’s Heuristic Programming Project, addressing Steinheiser as a member of the “AI Steering Committee.” A list of attendees at a contractor conference around that time, sponsored by the Pentagon’s Office of Naval Research (ONR), includes Steinheiser as a delegate under the designation “OPNAV Op-115” — which refers to the Office of the Chief of Naval Operations’ program on operational readiness, which played a major role in advancing digital systems for the military.

    From the 1970s, Prof. Feigenbaum and his colleagues had been running Stanford’s Heuristic Programming Project under contract with DARPA, continuing through to the 1990s. Feigenbaum alone had received around over $7 million in this period for his work from DARPA, along with other funding from the NSF, NASA, and ONR.

    Brin’s supervisor at Stanford, Prof. Jeffrey Ullman, was in 1996 part of a joint funding project of DARPA’s Intelligent Integration of Information program. That year, Ullman co-chaired DARPA-sponsored meetings on data exchange between multiple systems.

    In September 1998, the same month that Sergey Brin briefed US intelligence representatives Steinheiser and Thuraisingham, tech entrepreneurs Andreas Bechtolsheim and David Cheriton invested $100,000 each in Google. Both investors were connected to DARPA.

    As a Stanford PhD student in electrical engineering in the 1980s, Bechtolsheim’s pioneering SUN workstation project had been funded by DARPA and the Stanford computer science department — this research was the foundation of Bechtolsheim’s establishment of Sun Microsystems, which he co-founded with William Joy.

    As for Bechtolsheim’s co-investor in Google, David Cheriton, the latter is a long-time Stanford computer science professor who has an even more entrenched relationship with DARPA. His bio at the University of Alberta, which in November 2014 awarded him an honorary science doctorate, says that Cheriton’s “research has received the support of the US Defense Advanced Research Projects Agency (DARPA) for over 20 years.”

    In the meantime, Bechtolsheim left Sun Microsystems in 1995, co-founding Granite Systems with his fellow Google investor Cheriton as a partner. They sold Granite to Cisco Systems in 1996, retaining significant ownership of Granite, and becoming senior Cisco executives.

    An email obtained from the Enron Corpus (a database of 600,000 emails acquired by the Federal Energy Regulatory Commission and later released to the public) from Richard O’Neill, inviting Enron executives to participate in the Highlands Forum, shows that Cisco and Granite executives are intimately connected to the Pentagon. The email reveals that in May 2000, Bechtolsheim’s partner and Sun Microsystems co-founder, William Joy — who was then chief scientist and corporate executive officer there — had attended the Forum to discuss nanotechnology and molecular computing.

    In 1999, Joy had also co-chaired the President’s Information Technology Advisory Committee, overseeing a report acknowledging that DARPA had:

    “… revised its priorities in the 90’s so that all information technology funding was judged in terms of its benefit to the warfighter.”
    Throughout the 1990s, then, DARPA’s funding to Stanford, including Google, was explicitly about developing technologies that could augment the Pentagon’s military intelligence operations in war theatres.

    The Joy report recommended more federal government funding from the Pentagon, NASA, and other agencies to the IT sector. Greg Papadopoulos, another of Bechtolsheim’s colleagues as then Sun Microsystems chief technology officer, also attended a Pentagon Highlands’ Forum meeting in September 2000.

    In November, the Pentagon Highlands Forum hosted Sue Bostrom, who was vice president for the internet at Cisco, sitting on the company’s board alongside Google co-investors Bechtolsheim and Cheriton. The Forum also hosted Lawrence Zuriff, then a managing partner of Granite, which Bechtolsheim and Cheriton had sold to Cisco. Zuriff had previously been an SAIC contractor from 1993 to 1994, working with the Pentagon on national security issues, specifically for Marshall’s Office of Net Assessment. In 1994, both the SAIC and the ONA were, of course, involved in co-establishing the Pentagon Highlands Forum. Among Zuriff’s output during his SAIC tenure was a paper titled ‘Understanding Information War’, delivered at a SAIC-sponsored US Army Roundtable on the Revolution in Military Affairs.

    After Google’s incorporation, the company received $25 million in equity funding in 1999 led by Sequoia Capital and Kleiner Perkins Caufield & Byers. According to Homeland Security Today, “A number of Sequoia-bankrolled start-ups have contracted with the Department of Defense, especially after 9/11 when Sequoia’s Mark Kvamme met with Defense Secretary Donald Rumsfeld to discuss the application of emerging technologies to warfighting and intelligence collection.” Similarly, Kleiner Perkins had developed “a close relationship” with In-Q-Tel, the CIA venture capitalist firm that funds start-ups “to advance ‘priority’ technologies of value” to the intelligence community.

    John Doerr, who led the Kleiner Perkins investment in Google obtaining a board position, was a major early investor in Becholshtein’s Sun Microsystems at its launch. He and his wife Anne are the main funders behind Rice University’s Center for Engineering Leadership (RCEL), which in 2009 received $16 million from DARPA for its platform-aware-compilation-environment (PACE) ubiquitous computing R&D program. Doerr also has a close relationship with the Obama administration, which he advised shortly after it took power to ramp up Pentagon funding to the tech industry. In 2013, at the Fortune Brainstorm TECH conference, Doerr applauded “how the DoD’s DARPA funded GPS, CAD, most of the major computer science departments, and of course, the Internet.”

    From inception, in other words, Google was incubated, nurtured and financed by interests that were directly affiliated or closely aligned with the US military intelligence community: many of whom were embedded in the Pentagon Highlands Forum.

    Google captures the Pentagon
    In 2003, Google began customizing its search engine under special contract with the CIA for its Intelink Management Office, “overseeing top-secret, secret and sensitive but unclassified intranets for CIA and other IC agencies,” according to Homeland Security Today. That year, CIA funding was also being “quietly” funneled through the National Science Foundation to projects that might help create “new capabilities to combat terrorism through advanced technology.”

    The following year, Google bought the firm Keyhole, which had originally been funded by In-Q-Tel. Using Keyhole, Google began developing the advanced satellite mapping software behind Google Earth. Former DARPA director and Highlands Forum co-chair Anita Jones had been on the board of In-Q-Tel at this time, and remains so today.

    Then in November 2005, In-Q-Tel issued notices to sell $2.2 million of Google stocks. Google’s relationship with US intelligence was further brought to light when an IT contractor told a closed Washington DC conference of intelligence professionals on a not-for-attribution basis that at least one US intelligence agency was working to “leverage Google’s [user] data monitoring” capability as part of an effort to acquire data of “national security intelligence interest.”

    A photo on Flickr dated March 2007 reveals that Google research director and AI expert Peter Norvig attended a Pentagon Highlands Forum meeting that year in Carmel, California. Norvig’s intimate connection to the Forum as of that year is also corroborated by his role in guest editing the 2007 Forum reading list.

    The photo below shows Norvig in conversation with Lewis Shepherd, who at that time was senior technology officer at the Defense Intelligence Agency, responsible for investigating, approving, and architecting “all new hardware/software systems and acquisitions for the Global Defense Intelligence IT Enterprise,” including “big data technologies.” Shepherd now works at Microsoft. Norvig was a computer research scientist at Stanford University in 1991 before joining Bechtolsheim’s Sun Microsystems as senior scientist until 1994, and going on to head up NASA’s computer science division.

    Lewis Shepherd (left), then a senior technology officer at the Pentagon’s Defense Intelligence Agency, talking to Peter Norvig (right), renowned expert in artificial intelligence expert and director of research at Google. This photo is from a Highlands Forum meeting in 2007.
    Norvig shows up on O’Neill’s Google Plus profile as one of his close connections. Scoping the rest of O’Neill’s Google Plus connections illustrates that he is directly connected not just to a wide range of Google executives, but also to some of the biggest names in the US tech community.

    Those connections include Michele Weslander Quaid, an ex-CIA contractor and former senior Pentagon intelligence official who is now Google’s chief technology officer where she is developing programs to “best fit government agencies’ needs”; Elizabeth Churchill, Google director of user experience; James Kuffner, a humanoid robotics expert who now heads up Google’s robotics division and who introduced the term ‘cloud robotics’; Mark Drapeau, director of innovation engagement for Microsoft’s public sector business; Lili Cheng, general manager of Microsoft’s Future Social Experiences (FUSE) Labs; Jon Udell, Microsoft ‘evangelist’; Cory Ondrejka, vice president of engineering at Facebook; to name just a few.

    In 2010, Google signed a multi-billion dollar no-bid contract with the NSA’s sister agency, the National Geospatial-Intelligence Agency (NGA). The contract was to use Google Earth for visualization services for the NGA. Google had developed the software behind Google Earth by purchasing Keyhole from the CIA venture firm In-Q-Tel.

    Then a year after, in 2011, another of O’Neill’s Google Plus connections, Michele Quaid — who had served in executive positions at the NGA, National Reconnaissance Office and the Office of the Director of National Intelligence — left her government role to become Google ‘innovation evangelist’ and the point-person for seeking government contracts. Quaid’s last role before her move to Google was as a senior representative of the Director of National Intelligence to the Intelligence, Surveillance, and Reconnaissance Task Force, and a senior advisor to the undersecretary of defense for intelligence’s director of Joint and Coalition Warfighter Support (J&CWS). Both roles involved information operations at their core. Before her Google move, in other words, Quaid worked closely with the Office of the Undersecretary of Defense for Intelligence, to which the Pentagon’s Highlands Forum is subordinate. Quaid has herself attended the Forum, though precisely when and how often I could not confirm.

    In March 2012, then DARPA director Regina Dugan — who in that capacity was also co-chair of the Pentagon Highlands Forum — followed her colleague Quaid into Google to lead the company’s new Advanced Technology and Projects Group. During her Pentagon tenure, Dugan led on strategic cyber security and social media, among other initiatives. She was responsible for focusing “an increasing portion” of DARPA’s work “on the investigation of offensive capabilities to address military-specific needs,” securing $500 million of government funding for DARPA cyber research from 2012 to 2017.

    Regina Dugan, former head of DARPA and Highlands Forum co-chair, now a senior Google executive — trying her best to look the part
    By November 2014, Google’s chief AI and robotics expert James Kuffner was a delegate alongside O’Neill at the Highlands Island Forum 2014 in Singapore, to explore ‘Advancement in Robotics and Artificial Intelligence: Implications for Society, Security and Conflict.’ The event included 26 delegates from Austria, Israel, Japan, Singapore, Sweden, Britain and the US, from both industry and government. Kuffner’s association with the Pentagon, however, began much earlier. In 1997, Kuffner was a researcher during his Stanford PhD for a Pentagon-funded project on networked autonomous mobile robots, sponsored by DARPA and the US Navy.

    Rumsfeld and persistent surveillance
    In sum, many of Google’s most senior executives are affiliated with the Pentagon Highlands Forum, which throughout the period of Google’s growth over the last decade, has surfaced repeatedly as a connecting and convening force. The US intelligence community’s incubation of Google from inception occurred through a combination of direct sponsorship and informal networks of financial influence, themselves closely aligned with Pentagon interests.

    The Highlands Forum itself has used the informal relationship building of such private networks to bring together defense and industry sectors, enabling the fusion of corporate and military interests in expanding the covert surveillance apparatus in the name of national security. The power wielded by the shadow network represented in the Forum can, however, be gauged most clearly from its impact during the Bush administration, when it played a direct role in literally writing the strategies and doctrines behind US efforts to achieve ‘information superiority.’

    In December 2001, O’Neill confirmed that strategic discussions at the Highlands Forum were feeding directly into Andrew Marshall’s DoD-wide strategic review ordered by President Bush and Donald Rumsfeld to upgrade the military, including the Quadrennial Defense Review — and that some of the earliest Forum meetings “resulted in the writing of a group of DoD policies, strategies, and doctrine for the services on information warfare.” That process of “writing” the Pentagon’s information warfare policies “was done in conjunction with people who understood the environment differently — not only US citizens, but also foreign citizens, and people who were developing corporate IT.”

    The Pentagon’s post-9/11 information warfare doctrines were, then, written not just by national security officials from the US and abroad: but also by powerful corporate entities in the defense and technology sectors.

    In April that year, Gen. James McCarthy had completed his defense transformation review ordered by Rumsfeld. His report repeatedly highlighted mass surveillance as integral to DoD transformation. As for Marshall, his follow-up report for Rumsfeld was going to develop a blueprint determining the Pentagon’s future in the ‘information age.’

    O’Neill also affirmed that to develop information warfare doctrine, the Forum had held extensive discussions on electronic surveillance and “what constitutes an act of war in an information environment.” Papers feeding into US defense policy written through the late 1990s by RAND consultants John Arquilla and David Rondfeldt, both longstanding Highlands Forum members, were produced “as a result of those meetings,” exploring policy dilemmas on how far to take the goal of ‘Information Superiority.’ “One of the things that was shocking to the American public was that we weren’t pilfering Milosevic’s accounts electronically when we in fact could,” commented O’Neill.

    Although the R&D process around the Pentagon transformation strategy remains classified, a hint at the DoD discussions going on in this period can be gleaned from a 2005 US Army School of Advanced Military Studies research monograph in the DoD journal, Military Review, authored by an active Army intelligence officer.

    “The idea of Persistent Surveillance as a transformational capability has circulated within the national Intelligence Community (IC) and the Department of Defense (DoD) for at least three years,” the paper said, referencing the Rumsfeld-commissioned transformation study.

    The Army paper went on to review a range of high-level official military documents, including one from the Office of the Chairman of the Joint Chiefs of Staff, showing that “Persistent Surveillance” was a fundamental theme of the information-centric vision for defense policy across the Pentagon.

    We now know that just two months before O’Neill’s address at Harvard in 2001, under the TIA program, President Bush had secretly authorized the NSA’s domestic surveillance of Americans without court-approved warrants, in what appears to have been an illegal modification of the ThinThread data-mining project — as later exposed by NSA whistleblowers William Binney and Thomas Drake.

    The surveillance-startup nexus
    From here on, Highlands Forum partner SAIC played a key role in the NSA roll out from inception. Shortly after 9/11, Brian Sharkey, chief technology officer of SAIC’s ELS3 Sector (focusing on IT systems for emergency responders), teamed up with John Poindexter to propose the TIA surveillance program. SAIC’s Sharkey had previously been deputy director of the Information Systems Office at DARPA through the 1990s.

    Meanwhile, around the same time, SAIC vice president for corporate development, Samuel Visner, became head of the NSA’s signals-intelligence programs. SAIC was then among a consortium receiving a $280 million contract to develop one of the NSA’s secret eavesdropping systems. By 2003, Visner returned to SAIC to become director of strategic planning and business development of the firm’s intelligence group.

    That year, the NSA consolidated its TIA programme of warrantless electronic surveillance, to keep “track of individuals” and understand “how they fit into models” through risk profiles of American citizens and foreigners. TIA was doing this by integrating databases on finance, travel, medical, educational and other records into a “virtual, centralized grand database.”

    This was also the year that the Bush administration drew up its notorious Information Operations Roadmap. Describing the internet as a “vulnerable weapons system,” Rumsfeld’s IO roadmap had advocated that Pentagon strategy “should be based on the premise that the Department [of Defense] will ‘fight the net’ as it would an enemy weapons system.” The US should seek “maximum control” of the “full spectrum of globally emerging communications systems, sensors, and weapons systems,” advocated the document.

    The following year, John Poindexter, who had proposed and run the TIA surveillance program via his post at DARPA, was in Singapore participating in the Highlands 2004 Island Forum. Other delegates included then Highlands Forum co-chair and Pentagon CIO Linton Wells; president of notorious Pentagon information warfare contractor, John Rendon; Karl Lowe, director of the Joint Forces Command (JFCOM) Joint Advanced Warfighting Division; Air Vice Marshall Stephen Dalton, capability manager for information superiority at the UK Ministry of Defense; Lt. Gen. Johan Kihl, Swedish army Supreme Commander HQ’s chief of staff; among others.

    As of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as ‘Trailblazer.’ Core components of TIA were being “quietly continued” under “new code names,” according to Foreign Policy’s Shane Harris, but had been concealed “behind the veil of the classified intelligence budget.” The new surveillance program had by then been fully transitioned from DARPA’s jurisdiction to the NSA.

    This was also the year of yet another Singapore Island Forum led by Richard O’Neill on behalf of the Pentagon, which included senior defense and industry officials from the US, UK, Australia, France, India and Israel. Participants also included senior technologists from Microsoft, IBM, as well as Gilman Louie, partner at technology investment firm Alsop Louie Partners.

    Gilman Louie is a former CEO of In-Q-Tel — the CIA firm investing especially in start-ups developing data mining technology. In-Q-Tel was founded in 1999 by the CIA’s Directorate of Science and Technology, under which the Office of Research and Development (ORD) — which was part of the Google-funding MDSS program — had operated. The idea was to essentially replace the functions once performed by the ORD, by mobilizing the private sector to develop information technology solutions for the entire intelligence community.

    Louie had led In-Q-Tel from 1999 until January 2006 — including when Google bought Keyhole, the In-Q-Tel-funded satellite mapping software. Among his colleagues on In-Q-Tel’s board in this period were former DARPA director and Highlands Forum co-chair Anita Jones (who is still there), as well as founding board member William Perry: the man who had appointed O’Neill to set-up the Highlands Forum in the first place. Joining Perry as a founding In-Q-Tel board member was John Seely Brown, then chief scientist at Xerox Corp and director of its Palo Alto Research Center (PARC) from 1990 to 2002, who is also a long-time senior Highlands Forum member since inception.

    In addition to the CIA, In-Q-Tel has also been backed by the FBI, NGA, and Defense Intelligence Agency, among other agencies. More than 60 percent of In-Q-Tel’s investments under Louie’s watch were “in companies that specialize in automatically collecting, sifting through and understanding oceans of information,” according to Medill School of Journalism’s News21, which also noted that Louie himself had acknowledged it was not clear “whether privacy and civil liberties will be protected” by government’s use of these technologies “for national security.”

    The transcript of Richard O’Neill’s late 2001 seminar at Harvard shows that the Pentagon Highlands Forum had first engaged Gilman Louie long before the Island Forum, in fact, shortly after 9/11 to explore “what’s going on with In-Q-Tel.” That Forum session focused on how to “take advantage of the speed of the commercial market that wasn’t present inside the science and technology community of Washington” and to understand “the implications for the DoD in terms of the strategic review, the QDR, Hill action, and the stakeholders.” Participants of the meeting included “senior military people,” combatant commanders, “several of the senior flag officers,” some “defense industry people” and various US representatives including Republican Congressman William Mac Thornberry and Democrat Senator Joseph Lieberman.

    Both Thornberry and Lieberman are staunch supporters of NSA surveillance, and have consistently acted to rally support for pro-war, pro-surveillance legislation. O’Neill’s comments indicate that the Forum’s role is not just to enable corporate contractors to write Pentagon policy, but to rally political support for government policies adopted through the Forum’s informal brand of shadow networking.

    Repeatedly, O’Neill told his Harvard audience that his job as Forum president was to scope case studies from real companies across the private sector, like eBay and Human Genome Sciences, to figure out the basis of US ‘Information Superiority’ — “how to dominate” the information market — and leverage this for “what the president and the secretary of defense wanted to do with regard to transformation of the DoD and the strategic review.”

    By 2007, a year after the Island Forum meeting that included Gilman Louie, Facebook received its second round of $12.7 million worth of funding from Accel Partners. Accel was headed up by James Breyer, former chair of the National Venture Capital Association (NVCA) where Louie also served on the board while still CEO of In-Q-Tel. Both Louie and Breyer had previously served together on the board of BBN Technologies — which had recruited ex-DARPA chief and In-Q-Tel trustee Anita Jones.

    Facebook’s 2008 round of funding was led by Greylock Venture Capital, which invested $27.5 million. The firm’s senior partners include Howard Cox, another former NVCA chair who also sits on the board of In-Q-Tel. Apart from Breyer and Zuckerberg, Facebook’s only other board member is Peter Thiel, co-founder of defense contractor Palantir which provides all sorts of data-mining and visualization technologies to US government, military and intelligence agencies, including the NSA and FBI, and which itself was nurtured to financial viability by Highlands Forum members.

    Palantir co-founders Thiel and Alex Karp met with John Poindexter in 2004, according to Wired, the same year Poindexter had attended the Highlands Island Forum in Singapore. They met at the home of Richard Perle, another Andrew Marshall acolyte. Poindexter helped Palantir open doors, and to assemble “a legion of advocates from the most influential strata of government.” Thiel had also met with Gilman Louie of In-Q-Tel, securing the backing of the CIA in this early phase.

    And so we come full circle. Data-mining programs like ExecuteLocus and projects linked to it, which were developed throughout this period, apparently laid the groundwork for the new NSA programmes eventually disclosed by Edward Snowden. By 2008, as Facebook received its next funding round from Greylock Venture Capital, documents and whistleblower testimony confirmed that the NSA was effectively resurrecting the TIA project with a focus on Internet data-mining via comprehensive monitoring of e-mail, text messages, and Web browsing.

    We also now know thanks to Snowden that the NSA’s XKeyscore ‘Digital Network Intelligence’ exploitation system was designed to allow analysts to search not just Internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communications — essentially the entire global telecommunications grid. Highlands Forum partner SAIC played a key role, among other contractors, in producing and administering the NSA’s XKeyscore, and was recently implicated in NSA hacking of the privacy network Tor.

    The Pentagon Highlands Forum was therefore intimately involved in all this as a convening network—but also quite directly. Confirming his pivotal role in the expansion of the US-led global surveillance apparatus, then Forum co-chair, Pentagon CIO Linton Wells, told FedTech magazine in 2009 that he had overseen the NSA’s roll out of “an impressive long-term architecture last summer that will provide increasingly sophisticated security until 2015 or so.”

    The Goldman Sachs connection
    When I asked Wells about the Forum’s role in influencing US mass surveillance, he responded only to say he would prefer not to comment and that he no longer leads the group.

    As Wells is no longer in government, this is to be expected — but he is still connected to Highlands. As of September 2014, after delivering his influential white paper on Pentagon transformation, he joined the Monterey Institute for International Studies (MIIS) Cyber Security Initiative (CySec) as a distinguished senior fellow.

    Sadly, this was not a form of trying to keep busy in retirement. Wells’ move underscored that the Pentagon’s conception of information warfare is not just about surveillance, but about the exploitation of surveillance to influence both government and public opinion.

    The MIIS CySec initiative is now formally partnered with the Pentagon Highlands Forum through a Memorandum of Understanding signed with MIIS provost Dr Amy Sands, who sits on the Secretary of State’s International Security Advisory Board. The MIIS CySec website states that the MoU signed with Richard O’Neill:

    “… paves the way for future joint MIIS CySec-Highlands Group sessions that will explore the impact of technology on security, peace and information engagement. For nearly 20 years the Highlands Group has engaged private sector and government leaders, including the Director of National Intelligence, DARPA, Office of the Secretary of Defense, Office of the Secretary of Homeland Security and the Singaporean Minister of Defence, in creative conversations to frame policy and technology research areas.”
    Who is the financial benefactor of the new Pentagon Highlands-partnered MIIS CySec initiative? According to the MIIS CySec site, the initiative was launched “through a generous donation of seed funding from George Lee.” George C. Lee is a senior partner at Goldman Sachs, where he is chief information officer of the investment banking division, and chairman of the Global Technology, Media and Telecom (TMT) Group.

    But here’s the kicker. In 2011, it was Lee who engineered Facebook’s $50 billion valuation, and previously handled deals for other Highlands-connected tech giants like Google, Microsoft and eBay. Lee’s then boss, Stephen Friedman, a former CEO and chairman of Goldman Sachs, and later senior partner on the firm’s executive board, was a also founding board member of In-Q-Tel alongside Highlands Forum overlord William Perry and Forum member John Seely Brown.

    In 2001, Bush appointed Stephen Friedman to the President’s Intelligence Advisory Board, and then to chair that board from 2005 to 2009. Friedman previously served alongside Paul Wolfowitz and others on the 1995–6 presidential commission of inquiry into US intelligence capabilities, and in 1996 on the Jeremiah Panel that produced a report to the Director of the National Reconnaisance Office (NRO) — one of the surveillance agencies plugged into the Highlands Forum. Friedman was on the Jeremiah Panel with Martin Faga, then senior vice president and general manager of MITRE Corp’s Center for Integrated Intelligence Systems — where Thuraisingham, who managed the CIA-NSA-MDDS program that inspired DARPA counter-terrorist data-mining, was also a lead engineer.

    In the footnotes to a chapter for the book, Cyberspace and National Security (Georgetown University Press), SAIC/Leidos executive Jeff Cooper reveals that another Goldman Sachs senior partner Philip J. Venables — who as chief information risk officer leads the firm’s programs on information security — delivered a Highlands Forum presentation in 2008 at what was called an ‘Enrichment Session on Deterrence.’ Cooper’s chapter draws on Venables’ presentation at Highlands “with permission.” In 2010, Venables participated with his then boss Friedman at an Aspen Institute meeting on the world economy. For the last few years, Venables has also sat on various NSA cybersecurity award review boards.

    In sum, the investment firm responsible for creating the billion dollar fortunes of the tech sensations of the 21st century, from Google to Facebook, is intimately linked to the US military intelligence community; with Venables, Lee and Friedman either directly connected to the Pentagon Highlands Forum, or to senior members of the Forum.

    Fighting terror with terror
    The convergence of these powerful financial and military interests around the Highlands Forum, through George Lee’s sponsorship of the Forum’s new partner, the MIIS Cysec initiative, is revealing in itself.

    MIIS Cysec’s director, Dr, Itamara Lochard, has long been embedded in Highlands. She regularly “presents current research on non-state groups, governance, technology and conflict to the US Office of the Secretary of Defense Highlands Forum,” according to her Tufts University bio. She also, “regularly advises US combatant commanders” and specializes in studying the use of information technology by “violent and non-violent sub-state groups.”

    Dr Itamara Lochard is a senior Highlands Forum member and Pentagon information operations expert. She directs the MIIS CyberSec initiative that now supports the Pentagon Highlands Forum with funding from Goldman Sachs partner George Lee, who led the valuations of Facebook and Google.
    Dr Lochard maintains a comprehensive database of 1,700 non-state groups including “insurgents, militias, terrorists, complex criminal organizations, organized gangs, malicious cyber actors and strategic non-violent actors,” to analyze their “organizational patterns, areas of cooperation, strategies and tactics.” Notice, here, the mention of “strategic non-violent actors” — which perhaps covers NGOs and other groups or organizations engaged in social political activity or campaigning, judging by the focus of other DoD research programs.

    As of 2008, Lochard has been an adjunct professor at the US Joint Special Operations University where she teaches a top secret advanced course in ‘Irregular Warfare’ that she designed for senior US special forces officers. She has previously taught courses on ‘Internal War’ for senior “political-military officers” of various Gulf regimes.

    Her views thus disclose much about what the Highlands Forum has been advocating all these years. In 2004, Lochard was co-author of a study for the US Air Force’s Institute for National Security Studies on US strategy toward ‘non-state armed groups.’ The study on the one hand argued that non-state armed groups should be urgently recognized as a ‘tier one security priority,’ and on the other that the proliferation of armed groups “provide strategic opportunities that can be exploited to help achieve policy goals. There have and will be instances where the United States may find collaborating with armed group is in its strategic interests.” But “sophisticated tools” must be developed to differentiate between different groups and understand their dynamics, to determine which groups should be countered, and which could be exploited for US interests. “Armed group profiles can likewise be employed to identify ways in which the United States may assist certain armed groups whose success will be advantageous to US foreign policy objectives.”

    In 2008, Wikileaks published a leaked restricted US Army Special Operations field manual, which demonstrated that the sort of thinking advocated by the likes of Highlands expert Lochard had been explicitly adopted by US special forces.

    Lochard’s work thus demonstrates that the Highlands Forum sat at the intersection of advanced Pentagon strategy on surveillance, covert operations and irregular warfare: mobilizing mass surveillance to develop detailed information on violent and non-violent groups perceived as potentially threatening to US interests, or offering opportunities for exploitation, thus feeding directly into US covert operations.

    That, ultimately, is why the CIA, the NSA, the Pentagon, spawned Google. So they could run their secret dirty wars with even greater efficiency than ever before.

    Mass surveillance is about control. It’s promulgators may well claim, and even believe, that it is about control for the greater good, a control that is needed to keep a cap on disorder, to be fully vigilant to the next threat. But in a context of rampant political corruption, widening economic inequalities, and escalating resource stress due to climate change and energy volatility, mass surveillance can become a tool of power to merely perpetuate itself, at the public’s expense.

    A major function of mass surveillance that is often overlooked is that of knowing the adversary to such an extent that they can be manipulated into defeat. The problem is that the adversary is not just terrorists. It’s you and me. To this day, the role of information warfare as propaganda has been in full swing, though systematically ignored by much of the media.

    Here, INSURGE INTELLIGENCE exposes how the Pentagon Highlands Forum’s co-optation of tech giants like Google to pursue mass surveillance, has played a key role in secret efforts to manipulate the media as part of an information war against the American government, the American people, and the rest of the world: to justify endless war, and ceaseless military expansionism.

    The war machine
    In September 2013, the website of the Montery Institute for International Studies’ Cyber Security Initiative (MIIS CySec) posted a final version of a paper on ‘cyber-deterrence’ by CIA consultant Jeffrey Cooper, vice president of the US defense contractor SAIC and a founding member of the Pentagon’s Highlands Forum. The paper was presented to then NSA director Gen. Keith Alexander at a Highlands Forum session titled ‘Cyber Commons, Engagement and Deterrence’ in 2010.

    Gen. Keith Alexander (middle), who served as director of the NSA and chief of the Central Security Service from 2005 to 2014, as well as commander of the US Cyber Command from 2010 to 2014, at the 2010 Highlands Forum session on cyber-deterrence
    MIIS CySec is formally partnered with the Pentagon’s Highlands Forum through an MoU signed between the provost and Forum president Richard O’Neill, while the initiative itself is funded by George C. Lee: the Goldman Sachs executive who led the billion dollar valuations of Facebook, Google, eBay, and other tech companies.

    Cooper’s eye-opening paper is no longer available at the MIIS site, but a final version of it is available via the logs of a public national security conference hosted by the American Bar Association. Currently, Cooper is chief innovation officer at SAIC/Leidos, which is among a consortium of defense technology firms including Booz Allen Hamilton and others contracted to develop NSA surveillance capabilities.

    The Highlands Forum briefing for the NSA chief was commissioned under contract by the undersecretary of defense for intelligence, and based on concepts developed at previous Forum meetings. It was presented to Gen. Alexander at a “closed session” of the Highlands Forum moderated by MIIS Cysec director, Dr. Itamara Lochard, at the Center for Strategic and International Studies (CSIS) in Washington DC.

    SAIC/Leidos’ Jeffrey Cooper (middle), a founding member of the Pentagon’s Highlands Forum, listening to Phil Venables (right), senior partner at Goldman Sachs, at the 2010 Forum session on cyber-deterrence at the CSIS
    Like Rumsfeld’s IO roadmap, Cooper’s NSA briefing described “digital information systems” as both a “great source of vulnerability” and “powerful tools and weapons” for “national security.” He advocated the need for US cyber intelligence to maximize “in-depth knowledge” of potential and actual adversaries, so they can identify “every potential leverage point” that can be exploited for deterrence or retaliation. “Networked deterrence” requires the US intelligence community to develop “deep understanding and specific knowledge about the particular networks involved and their patterns of linkages, including types and strengths of bonds,” as well as using cognitive and behavioural science to help predict patterns. His paper went on to essentially set out a theoretical architecture for modelling data obtained from surveillance and social media mining on potential “adversaries” and “counterparties.”

    A year after this briefing with the NSA chief, Michele Weslander Quaid — another Highlands Forum delegate — joined Google to become chief technology officer, leaving her senior role in the Pentagon advising the undersecretary of defense for intelligence. Two months earlier, the Defense Science Board (DSB) Task Force on Defense Intelligence published its report on Counterinsurgency (COIN), Intelligence, Surveillance and Reconnaissance (IRS) Operations. Quaid was among the government intelligence experts who advised and briefed the Defense Science Board Task Force in preparing the report. Another expert who briefed the Task Force was Highlands Forum veteran Linton Wells. The DSB report itself had been commissioned by Bush appointee James Clapper, then undersecretary of defense for intelligence — who had also commissioned Cooper’s Highlands Forum briefing to Gen. Alexander. Clapper is now Obama’s Director of National Intelligence, in which capacity he lied under oath to Congress by claiming in March 2013 that the NSA does not collect any data at all on American citizens.

    Michele Quaid’s track record across the US military intelligence community was to transition agencies into using web tools and cloud technology. The imprint of her ideas are evident in key parts of the DSB Task Force report, which described its purpose as being to “influence investment decisions” at the Pentagon “by recommending appropriate intelligence capabilities to assess insurgencies, understand a population in their environment, and support COIN operations.”

    The report named 24 countries in South and Southeast Asia, North and West Africa, the Middle East and South America, which would pose “possible COIN challenges” for the US military in coming years. These included Pakistan, Mexico, Yemen, Nigeria, Guatemala, Gaza/West Bank, Egypt, Saudi Arabia, Lebanon, among other “autocratic regimes.” The report argued that “economic crises, climate change, demographic pressures, resource scarcity, or poor governance could cause these states (or others) to fail or become so weak that they become targets for aggressors/insurgents.” From there, the “global information infrastructure” and “social media” can rapidly “amplify the speed, intensity, and momentum of events” with regional implications. “Such areas could become sanctuaries from which to launch attacks on the US homeland, recruit personnel, and finance, train, and supply operations.”

    The imperative in this context is to increase the military’s capacity for “left of bang” operations — before the need for a major armed forces commitment — to avoid insurgencies, or pre-empt them while still in incipient phase. The report goes on to conclude that “the Internet and social media are critical sources of social network analysis data in societies that are not only literate, but also connected to the Internet.” This requires “monitoring the blogosphere and other social media across many different cultures and languages” to prepare for “population-centric operations.”

    The Pentagon must also increase its capacity for “behavioral modeling and simulation” to “better understand and anticipate the actions of a population” based on “foundation data on populations, human networks, geography, and other economic and social characteristics.” Such “population-centric operations” will also “increasingly” be needed in “nascent resource conflicts, whether based on water-crises, agricultural stress, environmental stress, or rents” from mineral resources. This must include monitoring “population demographics as an organic part of the natural resource framework.”

    Other areas for augmentation are “overhead video surveillance,” “high resolution terrain data,” “cloud computing capability,” “data fusion” for all forms of intelligence in a “consistent spatio-temporal framework for organizing and indexing the data,” developing “social science frameworks” that can “support spatio-temporal encoding and analysis,” “distributing multi-form biometric authentication technologies [“such as fingerprints, retina scans and DNA samples”] to the point of service of the most basic administrative processes” in order to “tie identity to all an individual’s transactions.” In addition, the academy must be brought in to help the Pentagon develop “anthropological, socio-cultural, historical, human geographical, educational, public health, and many other types of social and behavioral science data and information” to develop “a deep understanding of populations.”

    A few months after joining Google, Quaid represented the company in August 2011 at the Pentagon’s Defense Information Systems Agency (DISA) Customer and Industry Forum. The forum would provide “the Services, Combatant Commands, Agencies, coalition forces” the “opportunity to directly engage with industry on innovative technologies to enable and ensure capabilities in support of our Warfighters.” Participants in the event have been integral to efforts to create a “defense enterprise information environment,” defined as “an integrated platform which includes the network, computing, environment, services, information assurance, and NetOps capabilities,” enabling warfighters to “connect, identify themselves, discover and share information, and collaborate across the full spectrum of military operations.” Most of the forum panelists were DoD officials, except for just four industry panelists including Google’s Quaid.

    DISA officials have attended the Highlands Forum, too — such as Paul Friedrichs, a technical director and chief engineer of DISA’s Office of the Chief Information Assurance Executive.

    Knowledge is Power
    Given all this it is hardly surprising that in 2012, a few months after Highlands Forum co-chair Regina Dugan left DARPA to join Google as a senior executive, then NSA chief Gen. Keith Alexander was emailing Google’s founding executive Sergey Brin to discuss information sharing for national security. In those emails, obtained under Freedom of Information by investigative journalist Jason Leopold, Gen. Alexander described Google as a “key member of [the US military’s] Defense Industrial Base,” a position Michele Quaid was apparently consolidating. Brin’s jovial relationship with the former NSA chief now makes perfect sense given that Brin had been in contact with representatives of the CIA and NSA, who partly funded and oversaw his creation of the Google search engine, since the mid-1990s.

    In July 2014, Quaid spoke at a US Army panel on the creation of a “rapid acquisition cell” to advance the US Army’s “cyber capabilities” as part of the Force 2025 transformation initiative. She told Pentagon officials that “many of the Army’s 2025 technology goals can be realized with commercial technology available or in development today,” re-affirming that “industry is ready to partner with the Army in supporting the new paradigm.” Around the same time, most of the media was trumpeting the idea that Google was trying to distance itself from Pentagon funding, but in reality, Google has switched tactics to independently develop commercial technologies which would have military applications the Pentagon’s transformation goals.

    Yet Quaid is hardly the only point-person in Google’s relationship with the US military intelligence community.

    One year after Google bought the satellite mapping software Keyhole from CIA venture capital firm In-Q-Tel in 2004, In-Q-Tel’s director of technical assessment Rob Painter — who played a key role in In-Q-Tel’s Keyhole investment in the first place — moved to Google. At In-Q-Tel, Painter’s work focused on identifying, researching and evaluating “new start-up technology firms that were believed to offer tremendous value to the CIA, the National Geospatial-Intelligence Agency, and the Defense Intelligence Agency.” Indeed, the NGA had confirmed that its intelligence obtained via Keyhole was used by the NSA to support US operations in Iraq from 2003 onwards.

    A former US Army special operations intelligence officer, Painter’s new job at Google as of July 2005 was federal manager of what Keyhole was to become: Google Earth Enterprise. By 2007, Painter had become Google’s federal chief technologist.

    That year, Painter told the Washington Post that Google was “in the beginning stages” of selling advanced secret versions of its products to the US government. “Google has ramped up its sales force in the Washington area in the past year to adapt its technology products to the needs of the military, civilian agencies and the intelligence community,” the Post reported. The Pentagon was already using a version of Google Earth developed in partnership with Lockheed Martin to “display information for the military on the ground in Iraq,” including “mapping out displays of key regions of the country” and outlining “Sunni and Shiite neighborhoods in Baghdad, as well as US and Iraqi military bases in the city. Neither Lockheed nor Google would say how the geospatial agency uses the data.” Google aimed to sell the government new “enhanced versions of Google Earth” and “search engines that can be used internally by agencies.”

    White House records leaked in 2010 showed that Google executives had held several meetings with senior US National Security Council officials. Alan Davidson, Google’s government affairs director, had at least three meetings with officials of the National Security Council in 2009, including White House senior director for Russian affairs Mike McFaul and Middle East advisor Daniel Shapiro. It also emerged from a Google patent application that the company had deliberately been collecting ‘payload’ data from private wifi networks that would enable the identification of “geolocations.” In the same year, we now know, Google had signed an agreement with the NSA giving the agency open-ended access to the personal information of its users, and its hardware and software, in the name of cyber security — agreements that Gen. Alexander was busy replicating with hundreds of telecoms CEOs around the country.

    Thus, it is not just Google that is a key contributor and foundation of the US military-industrial complex: it is the entire Internet, and the wide range of private sector companies — many nurtured and funded under the mantle of the US intelligence community (or powerful financiers embedded in that community) — which sustain the Internet and the telecoms infrastructure; it is also the myriad of start-ups selling cutting edge technologies to the CIA’s venture firm In-Q-Tel, where they can then be adapted and advanced for applications across the military intelligence community. Ultimately, the global surveillance apparatus and the classified tools used by agencies like the NSA to administer it, have been almost entirely made by external researchers and private contractors like Google, which operate outside the Pentagon.

    This structure, mirrored in the workings of the Pentagon’s Highlands Forum, allows the Pentagon to rapidly capitalize on technological innovations it would otherwise miss, while also keeping the private sector at arms length, at least ostensibly, to avoid uncomfortable questions about what such technology is actually being used for.

    But isn’t it obvious, really? The Pentagon is about war, whether overt or covert. By helping build the technological surveillance infrastructure of the NSA, firms like Google are complicit in what the military-industrial complex does best: kill for cash.

    As the nature of mass surveillance suggests, its target is not merely terrorists, but by extension, ‘terrorism suspects’ and ‘potential terrorists,’ the upshot being that entire populations — especially political activists — must be targeted by US intelligence surveillance to identify active and future threats, and to be vigilant against hypothetical populist insurgencies both at home and abroad. Predictive analytics and behavioural profiles play a pivotal role here.

    Mass surveillance and data-mining also now has a distinctive operational purpose in assisting with the lethal execution of special operations, selecting targets for the CIA’s drone strike kill lists via dubious algorithms, for instance, along with providing geospatial and other information for combatant commanders on land, air and sea, among many other functions. A single social media post on Twitter or Facebook is enough to trigger being placed on secret terrorism watch-lists solely due to a vaguely defined hunch or suspicion; and can potentially even land a suspect on a kill list.

    The push for indiscriminate, comprehensive mass surveillance by the military-industrial complex — encompassing the Pentagon, intelligence agencies, defense contractors, and supposedly friendly tech giants like Google and Facebook — is therefore not an end in itself, but an instrument of power, whose goal is self-perpetuation. But there is also a self-rationalizing justification for this goal: while being great for the military-industrial complex, it is also, supposedly, great for everyone else.

    The ‘long war’
    No better illustration of the truly chauvinistic, narcissistic, and self-congratulatory ideology of power at the heart of the military-industrial complex is a book by long-time Highlands Forum delegate, Dr. Thomas Barnett, The Pentagon’s New Map. Barnett was assistant for strategic futures in the Pentagon’s Office of Force Transformation from 2001 to 2003, and had been recommended to Richard O’Neill by his boss Vice Admiral Arthur Cebrowski. Apart from becoming a New York Times bestseller, Barnett’s book had been read far and wide in the US military, by senior defense officials in Washington and combatant commanders operating on the ground in the Middle East.

    Barnett first attended the Pentagon Highlands Forum in 1998, then was invited to deliver a briefing about his work at the Forum on December 7th 2004, which was attended by senior Pentagon officials, energy experts, internet entrepreneurs, and journalists. Barnett received a glowing review in the Washington Post from his Highlands Forum buddy David Ignatius a week later, and an endorsement from another Forum friend, Thomas Friedman, both of which helped massively boost his credibility and readership.

    Barnett’s vision is neoconservative to the root. He sees the world as divided into essentially two realms: The Core, which consists of advanced countries playing by the rules of economic globalization (the US, Canada, UK, Europe and Japan) along with developing countries committed to getting there (Brazil, Russia, India, China, and some others); and the rest of the world, which is The Gap, a disparate wilderness of dangerous and lawless countries defined fundamentally by being “disconnected” from the wonders of globalization. This includes most of the Middle East and Africa, large swathes of South America, as well as much of Central Asia and Eastern Europe. It is the task of the United States to “shrink The Gap,” by spreading the cultural and economic “rule-set” of globalization that characterizes The Core, and by enforcing security worldwide to enable that “rule-set” to spread.

    These two functions of US power are captured by Barnett’s concepts of “Leviathan” and “System Administrator.” The former is about rule-setting to facilitate the spread of capitalist markets, regulated via military and civilian law. The latter is about projecting military force into The Gap in an open-ended global mission to enforce security and engage in nation-building. Not “rebuilding,” he is keen to emphasize, but building “new nations.”

    For Barnett, the Bush administration’s 2002 introduction of the Patriot Act at home, with its crushing of habeas corpus, and the National Security Strategy abroad, with its opening up of unilateral, pre-emptive war, represented the beginning of the necessary re-writing of rule-sets in The Core to embark on this noble mission. This is the only way for the US to achieve security, writes Barnett, because as long as The Gap exists, it will always be a source of lawless violence and disorder. One paragraph in particular sums up his vision:

    “America as global cop creates security. Security creates common rules. Rules attract foreign investment. Investment creates infrastructure. Infrastructure creates access to natural resources. Resources create economic growth. Growth creates stability. Stability creates markets. And once you’re a growing, stable part of the global market, you’re part of the Core. Mission accomplished.”
    Much of what Barnett predicted would need to happen to fulfill this vision, despite its neoconservative bent, is still being pursued under Obama. In the near future, Barnett had predicted, US military forces will be dispatched beyond Iraq and Afghanistan to places like Uzbekistan, Djibouti, Azerbaijan, Northwest Africa, Southern Africa and South America.

    Barnett’s Pentagon briefing was greeted with near universal enthusiasm. The Forum had even purchased copies of his book and had them distributed to all Forum delegates, and in May 2005, Barnett was invited back to participate in an entire Forum themed around his “SysAdmin” concept.

    The Highlands Forum has thus played a leading role in defining the Pentagon’s entire conceptualization of the ‘war on terror.’ Irving Wladawsky-Berger, a retired IMB vice president who co-chaired the President’s Information Technology Advisory Committee from 1997 to 2001, described his experience of one 2007 Forum meeting in telling terms:

    “Then there is the War on Terror, which DoD has started to refer to as the Long War, a term that I first heard at the Forum. It seems very appropriate to describe the overall conflict in which we now find ourselves. This is a truly global conflict… the conflicts we are now in have much more of the feel of a battle of civilizations or cultures trying to destroy our very way of life and impose their own.”
    The problem is that outside this powerful Pentagon-hosted clique, not everyone else agrees. “I’m not convinced that Barnett’s cure would be any better than the disease,” wrote Dr. Karen Kwiatowski, a former senior Pentagon analyst in the Near East and South Asia section, who blew the whistle on how her department deliberately manufactured false information in the run-up to the Iraq War. “It would surely cost far more in American liberty, constitutional democracy and blood than it would be worth.”

    Yet the equation of “shrinking The Gap” with sustaining the national security of The Core leads to a slippery slope. It means that if the US is prevented from playing this leadership role as “global cop,” The Gap will widen, The Core will shrink, and the entire global order could unravel. By this logic, the US simply cannot afford government or public opinion to reject the legitimacy of its mission. If it did so, it would allow The Gap to grow out of control, undermining The Core, and potentially destroying it, along with The Core’s protector, America. Therefore, “shrinking The Gap” is not just a security imperative: it is such an existential priority, that it must be backed up with information war to demonstrate to the world the legitimacy of the entire project.

    Based on O’Neill’s principles of information warfare as articulated in his 1989 US Navy brief, the targets of information war are not just populations in The Gap, but domestic populations in The Core, and their governments: including the US government. That secret brief, which according to former senior US intelligence official John Alexander was read by the Pentagon’s top leadership, argued that information war must be targeted at: adversaries to convince them of their vulnerability; potential partners around the world so they accept “the cause as just”; and finally, civilian populations and the political leadership so they believe that “the cost” in blood and treasure is worth it.

    Barnett’s work was plugged by the Pentagon’s Highlands Forum because it fit the bill, in providing a compelling ‘feel good’ ideology for the US military-industrial complex.

    But neoconservative ideology, of course, hardly originated with Barnett, himself a relatively small player, even though his work was extremely influential throughout the Pentagon. The regressive thinking of senior officials involved in the Highlands Forum is visible from long before 9/11, which was ceased upon by actors linked to the Forum as a powerful enabling force that legitimized the increasingly aggressive direction of US foreign and intelligence policies.

    Yoda and the Soviets
    The ideology represented by the Highlands Forum can be gleaned from long before its establishment in 1994, at a time when Andrew ‘Yoda’ Marshall’s ONA was the primary locus of Pentagon activity on future planning.

    A widely-held myth promulgated by national security journalists over the years is that the ONA’s reputation as the Pentagon’s resident oracle machine was down to the uncanny analytical foresight of its director Marshall. Supposedly, he was among the few who made the prescient recognition that the Soviet threat had been overblown by the US intelligence community. He had, the story goes, been a lone, but relentless voice inside the Pentagon, calling on policymakers to re-evaluate their projections of the USSR’s military might.

    Except the story is not true. The ONA was not about sober threat analysis, but about paranoid threat projection justifying military expansionism. Foreign Policy’s Jeffrey Lewis points out that far from offering a voice of reason calling for a more balanced assessment of Soviet military capabilities, Marshall tried to downplay ONA findings that rejected the hype around an imminent Soviet threat. Having commissioned a study concluding that the US had overestimated Soviet aggressiveness, Marshall circulated it with a cover note declaring himself “unpersuaded” by its findings. Lewis charts how Marshall’s threat projection mind-set extended to commissioning absurd research supporting staple neocon narratives about the (non-existent) Saddam-al-Qaeda link, and even the notorious report by a RAND consultant calling for re-drawing the map of the Middle East, presented to the Pentagon’s Defense Policy Board on the invitation of Richard Perle in 2002.

    Investigative journalist Jason Vest similarly found from Pentagon sources that during the Cold War, Marshall had long hyped the Soviet threat, and played a key role in giving the neoconservative pressure group, the Committee on the Present Danger, access to classified CIA intelligence data to re-write the National Intelligence Estimate on Soviet Military Intentions. This was a precursor to the manipulation of intelligence after 9/11 to justify the invasion and occupation of Iraq. Former ONA staffers confirmed that Marshall had been belligerent about an imminent Soviet threat “until the very end.” Ex-CIA sovietologist Melvin Goodman, for instance, recalled that Marshall was also instrumental in pushing for the Afghan mujahideen to be provided with Stinger missiles — a move which made the war even more brutal, encouraging the Russians to use scorched earth tactics.

    Enron, the Taliban and Iraq
    The post-Cold War period saw the Pentagon’s creation of the Highlands Forum in 1994 under the wing of former defense secretary William Perry — a former CIA director and early advocate of neocon ideas like preventive war. Surprisingly, the Forum’s dubious role as a government-industry bridge can be clearly discerned in relation to Enron’s flirtations with the US government. Just as the Forum had crafted the Pentagon’s intensifying policies on mass surveillance, it simultaneously fed directly into the strategic thinking that culminating in the wars in Afghanistan and Iraq.

    On November 7th 2000, George W. Bush ‘won’ the US presidential elections. Enron and its employees had given over $1 million to the Bush campaign in total. That included contributing $10,500 to Bush’s Florida recount committee, and a further $300,000 for the inaugural celebrations afterwards. Enron also provided corporate jets to shuttle Republican lawyers around Florida and Washington lobbying on behalf of Bush for the December recount. Federal election documents later showed that since 1989, Enron had made a total of $5.8 million in campaign donations, 73 percent to Republicans and 27 percent to Democrats — with as many as 15 senior Bush administration officials owning stock in Enron, including defense secretary Donald Rumsfeld, senior advisor Karl Rove, and army secretary Thomas White.

    Yet just one day before that controversial election, Pentagon Highlands Forum founding president Richard O’Neill wrote to Enron CEO, Kenneth Lay, inviting him to give a presentation at the Forum on modernizing the Pentagon and the Army. The email from O’Neill to Lay was released as part of the Enron Corpus, the emails obtained by the Federal Energy Regulatory Commission, but has remained unknown until now.

    The email began “On behalf of Assistant Secretary of Defense (C3I) and DoD CIO Arthur Money,” and invited Lay “to participate in the Secretary of Defense’s Highlands Forum,” which O’Neill described as “a cross-disciplinary group of eminent scholars, researchers, CEO’s/CIO’s/CTO’s from industry, and leaders from the media, the arts and the professions, who have met over the past six years to examine areas of emerging interest to all of us.” He added that Forum sessions include “seniors from the White House, Defense, and other agencies of government (we limit government participation to about 25%).”

    Here, O’Neill reveals that the Pentagon Highlands Forum was, fundamentally, about exploring not just the goals of government, but the interests of participating industry leaders like Enron. The Pentagon, O’Neill went on, wanted Lay to feed into “the search for information/ transformation strategies for the Department of Defense (and government in general),” particularly “from a business perspective (transformation, productivity, competitive advantage).” He offered high praise of Enron as “a remarkable example of transformation in a highly rigid, regulated industry, that has created a new model and new markets.”

    O’Neill made clear that the Pentagon wanted Enron to play a pivotal role in the DoD’s future, not just in the creation of “an operational strategy which has information superiority,” but also in relation to the DoD’s “enormous global business enterprise which can benefit from many of the best practices and ideas from industry.”

    “ENRON is of great interest to us,” he reaffirmed. “What we learn from you may help the Department of Defense a great deal as it works to build a new strategy. I hope that you have time on your busy schedule to join us for as much of the Highlands Forum as you can attend and speak with the group.”

    That Highlands Forum meeting was attended by senior White House and US intelligence officials, including CIA deputy director Joan A. Dempsey, who had previously served as assistant defense secretary for intelligence, and in 2003 was appointed by Bush as executive director of the President’s Foreign Intelligence Advisory Board, in which capacity she praised extensive information sharing by the NSA and NGA after 9/11. She went on to become executive vice president at Booz Allen Hamilton, a major Pentagon contractor in Iraq and Afghanistan that, among other things, created the Coalition Provisional Authority’s database to track what we now know were highly corrupt reconstruction projects in Iraq.

    Enron’s relationship with the Pentagon had already been in full swing the previous year. Thomas White, then vice chair of Enron energy services, had used his extensive US military connections to secure a prototype deal at Fort Hamilton to privatize the power supply of army bases. Enron was the only bidder for the deal. The following year, after Enron’s CEO was invited to the Highlands Forum, White gave his first speech in June just “two weeks after he became secretary of the Army,” where he “vowed to speed up the awarding of such contracts,” along with further “rapid privatization” of the Army’s energy services. “Potentially, Enron could benefit from the speedup in awarding contracts, as could others seeking the business,” observed USA Today.

    That month, on the authority of defense secretary Donald Rumsfeld — who himself held significant shares in Enron — Bush’s Pentagon invited another Enron executive and one of Enron’s senior external financial advisors to attend a further secret Highlands Forum session.

    An email from Richard O’Neill dated June 22nd, obtained via the Enron Corpus, showed that Steven Kean, then executive vice president and chief of staff of Enron, was due to give another Highlands presentation on Monday 25th. “We are approaching the Secretary of Defense-sponsored Highlands Forum and very much looking forward to your participation,” wrote O’Neill, promising Kean that he would be “the centerpiece of discussion. Enron’s experience is quite important to us as we seriously consider transformative change in the Department of Defense.”

    Steven Kean is now president and COO (and incoming CEO) of Kinder Morgan, one of the largest energy companies in North America, and a major supporter of the controversial Keystone XL pipeline project.

    Due to attend the same Highlands Forum session with Kean was Richard Foster, then a senior partner at the financial consultancy McKinsey. “I have given copies of Dick Foster’s new book, Creative Destruction, to the Deputy Secretary of Defense as well as the Assistant Secretary,” said O’Neill in his email, “and the Enron case that he outlines makes for important discussion. We intend to hand out copies to the participants at the Forum.”

    Foster’s firm, McKinsey, had provided strategic financial advice to Enron since the mid-1980s. Joe Skilling, who in February 2001 became Enron CEO while Kenneth Lay moved to chair, had been head of McKinsey’s energy consulting business before joining Enron in 1990.

    McKinsey and then partner Richard Foster were intimately involved in crafting the core Enron financial management strategies responsible for the company’s rapid, but fraudulent, growth. While McKinsey has always denied being aware of the dodgy accounting that led to Enron’s demise, internal company documents showed that Foster had attended an Enron finance committee meeting a month before the Highlands Forum session to discuss the “need for outside private partnerships to help drive the company’s explosive growth” — the very investment partnerships responsible for the collapse of Enron.

    McKinsey documents showed that the firm was “fully aware of Enron’s extensive use of off-balance-sheet funds.” As The Independent’s economics editor Ben Chu remarks, “McKinsey fully endorsed the dubious accounting methods,” which led to the inflation of Enron’s market valuation and “that caused the company to implode in 2001.”

    Indeed, Foster himself had personally attended six Enron board meetings from October 2000 to October 2001. That period roughly coincided with Enron’s growing influence on the Bush administration’s energy policies, and the Pentagon’s planning for Afghanistan and Iraq.

    But Foster was also a regular attendee at the Pentagon Highlands Forum — his LinkedIn profile describes him as member of the Forum since 2000, the year he ramped up engagement with Enron. He also delivered a presentation at the inaugural Island Forum in Singapore in 2002.

    Enron’s involvement in the Cheney Energy Task Force appears to have been linked to the Bush administration’s 2001 planning for both the invasions of Afghanistan and Iraq, motivated by control of oil. As noted by Prof. Richard Falk, a former board member of Human Rights Watch and ex-UN investigator, Enron’s Kenneth Lay “was the main confidential consultant relied upon by Vice President Dick Cheney during the highly secretive process of drafting a report outlining a national energy policy, widely regarded as a key element in the US approach to foreign policy generally and the Arab world in particular.”

    The intimate secret meetings between senior Enron executives and high-level US government officials via the Pentagon Highlands Forum, from November 2000 to June 2001, played a central role in establishing and cementing the increasingly symbiotic link between Enron and Pentagon planning. The Forum’s role was, as O’Neill has always said, to function as an ideas lab to explore the mutual interests of industry and government.

    Enron and Pentagon war planning
    In February 2001, when Enron executives including Kenneth Lay began participating concertedly in the Cheney Energy Task Force, a classified National Security Council document instructed NSC staffers to work with the task force in “melding” previously separate issues: “operational policies towards rogue states” and “actions regarding the capture of new and existing oil and gas fields.”

    According to Bush’s treasury secretary Paul O’Neill, as quoted by Ron Suskind in The Price of Loyalty (2004), cabinet officials discussed an invasion of Iraq in their first NSC meeting, and had even prepared a map for a post-war occupation marking the carve-up of Iraq’s oil fields. The message at that time from President Bush was that officials must “find a way to do this.”

    Cheney Energy Task Force documents obtained by Judicial Watch under Freedom of Information revealed that by March, with extensive industry input, the task force had prepared maps of Gulf state and especially Iraqi oilfields, pipelines, and refineries, along with a list titled ‘Foreign Suitors for Iraqi Oilfield Contracts.’ By April, a think-tank report commissioned by Cheney, overseen by former secretary of state James Baker, and put together by a committee of energy industry and national security experts, urged the US government “to conduct an immediate policy review toward Iraq including military, energy, economic and political/diplomatic assessments,” to deal with Iraq’s “destabilizing influence” on oil flows to global markets. The report included recommendations from Highlands Forum delegate and Enron chair, Kenneth Lay.

    But Cheney’s Energy Task Force was also busily pushing forward plans for Afghanistan involving Enron, that had been in motion under Clinton. Through the late 1990s, Enron was working with California-based US energy company Unocal to develop an oil and gas pipeline that would tap Caspian basin reserves, and carry oil and gas across Afghanistan, supplying Pakistan, India and potentially other markets. The endeavor had the official blessing of the Clinton administration, and later the Bush administration, which held several meetings with Taliban representatives to negotiate terms for the pipeline deal throughout 2001. The Taliban, whose conquest of Afghanistan had received covert assistance under Clinton, was to receive formal recognition as the legitimate government of Afghanistan in return for permitting the installation of the pipeline. Enron paid $400 million for a feasibility study for the pipeline, a large portion of which was siphoned off as bribes to Taliban leaders, and even hired CIA agents to help facilitate.

    Then in summer 2001, while Enron officials were liaising with senior Pentagon officials at the Highlands Forum, the White House’s National Security Council was running a cross-departmental ‘working group’ led by Rumsfeld and Cheney to help complete an ongoing Enron project in India, a $3 billion power plant in Dabhol. The plant was slated to receive its energy from the Trans-Afghan pipeline. The NSC’s ‘Dabhol Working Group,’ chaired by Bush’s national security adviser Condoleeza Rice, generated a range of tactics to enhance US government pressure on India to complete the Dabhol plant — pressure that continued all the way to early November. The Dabhol project, and the Trans-Afghan pipeline, was by far Enron’s most lucrative overseas deal.

    Throughout 2001, Enron officials, including Ken Lay, participated in Cheney’s Energy Task Force, along with representatives across the US energy industry. Starting from February, shortly after the Bush administration took office, Enron was involved in about half a dozen of these Energy Task Force meetings. After one of these secret meetings, a draft energy proposal was amended to include a new provision proposing to dramatically boost oil and natural gas production in India in a way that would apply only to Enron’s Dabhol power plant. In other words, ensuring the flow of cheap gas to India via the Trans-Afghan pipeline was now a matter of US ‘national security.’

    A month or two after this, the Bush administration gave the Taliban $43 million, justified by its crackdown on opium production, despite US-imposed UN sanctions preventing aid to the group for not handing over Osama bin Laden.

    Then in June 2001, the same month that Enron’s executive vice president Steve Kean attended the Pentagon Highlands Forum, the company’s hopes for the Dabhol project were dashed when the Trans-Afghan pipeline failed to materialize, and as a consequence, construction on the Dabhol power plant was shut down. The failure of the $3 billion project contributed to Enron’s bankruptcy in December. That month, Enron officials met with Bush’s commerce secretary, Donald Evans, about the plant, and Cheney lobbied India’s main opposition party about the Dhabol project. Ken Lay had also reportedly contacted the Bush administration around this time to inform officials about the firm’s financial troubles.

    By August, desperate to pull off the deal, US officials threatened Taliban representatives with war if they refused to accept American terms: namely, to cease fighting and join in a federal alliance with the opposition Northern Alliance; and to give up demands for local consumption of the gas. On the 15th of that month, Enron lobbyist Pat Shortridge told then White House economic advisor Robert McNally that Enron was heading for a financial meltdown that could cripple the country’s energy markets.

    The Bush administration must have anticipated the Taliban’s rejection of the deal, because they had planned a war on Afghanistan from as early as July. According to then Pakistani foreign minister Niaz Naik, who had participated in the US-Taliban negotiations, US officials told him they planned to invade Afghanistan in mid-October 2001. No sooner had the war commenced, Bush’s ambassador to Pakistan, Wendy Chamberlain, called Pakistani’s oil minister Usman Aminuddin to discuss “the proposed Turkmenistan-Afghanistan-Pakistan gas pipeline project,” according to the Frontier Post, a Pakistani English-language broadsheet. They reportedly agreed that the “project opens up new avenues of multi-dimensional regional cooperation particularly in view of the recent geo-political developments in the region.”

    Two days before 9/11, Condoleeza Rice received the draft of a formal National Security Presidential Directive that Bush was expected to sign immediately. The directive contained a comprehensive plan to launch a global war on al-Qaeda, including an “imminent” invasion of Afghanistan to topple the Taliban. The directive was approved by the highest levels of the White House and officials of the National Security Council, including of course Rice and Rumsfeld. The same NSC officials were simultaneously running the Dhabol Working Group to secure the Indian power plant deal for Enron’s Trans-Afghan pipeline project. The next day, one day before 9/11, the Bush administration formally agreed on the plan to attack the Taliban.

    The Pentagon Highlands Forum’s background link with the interests involved in all this, show they were not unique to the Bush administration — which is why, as Obama was preparing to pull troops out of Afghanistan, he re-affirmed his government’s support for the Trans-Afghan pipeline project, and his desire for a US firm to construct it.

    The Pentagon’s propaganda fixer
    Throughout this period, information war played a central role in drumming up public support for war — and the Highlands Forum led the way.

    In December 2000, just under a year before 9/11 and shortly after George W. Bush’s election victory, key Forum members participated in an event at the Carnegie Endowment for International Peace to explore “the impact of the information revolution, globalization, and the end of the Cold War on the US foreign policy making process.” Rather than proposing “incremental reforms,” the meeting was for participants to “build from scratch a new model that is optimized to the specific properties of the new global environment.”

    Among the issues flagged up in the meeting was the ‘Global Control Revolution’: the “distributed” nature of the information revolution was altering “key dynamics of world politics by challenging the primacy of states and inter-state relations.” This was “creating new challenges to national security, reducing the ability of leading states to control global policy debates, challenging the efficacy of national economic policies, etc.”

    In other words, how can the Pentagon find a way to exploit the information revolution to “control global policy debates,” particularly on “national economic policies”?

    The meeting was co-hosted by Jamie Metzl, who at the time served on Bill Clinton’s National Security Council, where he had just led the drafting of Clinton’s Presidential Decision Directive 68 on International Public Information (IPI), a new multiagency plan to coordinate US public information dissemination abroad. Metzl went on to coordinate IPI at the State Department.

    The preceding year, a senior Clinton official revealed to the Washington Times that Metz’s IPI was really aimed at “spinning the American public,” and had “emerged out of concern that the US public has refused to back President Clinton’s foreign policy.” The IPI would plant news stories favorable to US interests via TV, press, radio and other media based abroad, in hopes it would get picked up in American media. The pretext was that “news coverage is distorted at home and they need to fight it at all costs by using resources that are aimed at spinning the news.” Metzl ran the IPI’s overseas propaganda operations for Iraq and Kosovo.

    Other participants of the Carnegie meeting in December 2000, included two founding members of the Highlands Forum, Richard O’Neill and SAIC’s Jeff Cooper — along with Paul Wolfowitz, another Andrew Marshall acolyte who was about to join the incoming Bush administration as Rumsfelds’ deputy defense secretary. Also present was a figure who soon became particularly notorious in the propaganda around Afghanistan and Iraq War 2003: John W. Rendon, Jr., founding president of The Rendon Group (TRG) and another longtime Pentagon Highlands Forum member.

    John Rendon (right) at the Highlands Forum, accompanied by BBC anchor Nik Gowing (left) and Jeff Jonas, IBM Entity Analytics chief engineer (middle)
    TRG is a notorious communications firm that has been a US government contractor for decades. Rendon played a pivotal role in running the State Department’s propaganda campaigns in Iraq and Kosovo under Clinton and Metzl. That included receiving a Pentagon grant to run a news website, the Balkans Information Exchange, and a US Agency for International Development (USAID) contract to promote “privatization.”

    Rendon’s central role in helping the Bush administration hype up the non-existent threat of weapons of mass destruction (WMD) to justify a US military invasion is now well-known. As James Bamford famously exposed in his seminal Rolling Stone investigation, Rendon played an instrumental role on behalf of the Bush administration in deploying “perception management” to “create the conditions for the removal of Hussein from power” under multi-million dollar CIA and Pentagon contracts.

    Among Rendon’s activities was the creation of Ahmed Chalabi’s Iraqi National Congress (INC) on behalf of the CIA, a group of Iraqi exiles tasked with disseminating propaganda, including much of the false intelligence about WMD. That process had begun concertedly under the administration of George H W. Bush, then rumbled along under Clinton with little fanfare, before escalating after 9/11 under George W. Bush. Rendon thus played a large role in the manufacture of inaccurate and false news stories relating to Iraq under lucrative CIA and Pentagon contracts — and he did so in the period running up to the 2003 invasion as an advisor to Bush’s National Security Council: the same NSC, of course, that planned the invasions of Afghanistan and Iraq, achieved with input from Enron executives who were simultaneously engaging the Pentagon Highlands Forum.

    But that is the tip of iceberg. Declassified documents show that the Highlands Forum was intimately involved in the covert processes by which key officials engineered the road to war on Iraq, based on information warfare.

    A redacted 2007 report by the DoD’s Inspector General reveals that one of the contractors used extensively by the Pentagon Highlands Forum during and after the Iraq War was none other than The Rendon Group. TRG was contracted by the Pentagon to organize Forum sessions, determine subjects for discussion, as well as to convene and coordinate Forum meetings. The Inspector General investigation had been prompted by accusations raised in Congress about Rendon’s role in manipulating information to justify the 2003 invasion and occupation of Iraq. According to the Inspector General report:

    “… the Assistant Secretary of Defense for Networks and Information Integration/Chief Information Officer employed TRG to conduct forums that would appeal to a cross-disciplinary group of nationally regarded leaders. The forums were in small groups discussing information and technologies and their effects on science, organizational and business processes, international relations, economics, and national security. TRG also conducted a research program and interviews to formulate and develop topics for the Highlands Forum focus group. The Office of the Assistant Secretary of Defense for Networks and Information Integration would approve the subjects, and TRG would facilitate the meetings.”
    TRG, the Pentagon’s private propaganda arm, thus played a central role in literally running the Pentagon Highlands Forum process that brought together senior government officials with industry executives to generate DoD information warfare strategy.

    The Pentagon’s internal investigation absolved Rendon of any wrongdoing. But this is not surprising, given the conflict of interest at stake: the Inspector General at the time was Claude M. Kicklighter, a Bush nominee who had directly overseen the administration’s key military operations. In 2003, he was director of the Pentagon’s Iraq Transition Team, and the following year he was appointed to the State Department as special advisor on stabilization and security operations in Iraq and Afghanistan.

    The surveillance-propaganda nexus
    Even more telling, Pentagon documents obtained by Bamford for his Rolling Stone story revealed that Rendon had been given access to the NSA’s top-secret surveillance data to carry out its work on behalf of the Pentagon. TRG, the DoD documents said, is authorized “to research and analyze information classified up to Top Secret/SCI/SI/TK/G/HCS.”

    ‘SCI’ means Sensitive Compartmented Information, data classified higher than Top Secret, while ‘SI’ designates Special Intelligence, that is, highly secret communications intercepted by the NSA. ‘TK’ refers to Talent/Keyhole, code names for imagery from reconnaissance aircraft and spy satellites, while ‘G’ stands for Gamma, encompassing communications intercepts from extremely sensitive sources, and ‘HCS’ means Humint Control System — information from a very sensitive human source. In Bamford’s words:

    “Taken together, the acronyms indicate that Rendon enjoys access to the most secret information from all three forms of intelligence collection: eavesdropping, imaging satellites and human spies.”
    So the Pentagon had:

    1. contracted Rendon, a propaganda firm;

    2. given Rendon access to the intelligence community’s most classified information including data from NSA surveillance;

    3. tasked Rendon to facilitating the DoD’s development of information operations strategy by running the Highlands Forum process;

    4. and further, tasked Rendon with overseeing the concrete execution of this strategy developed through the Highlands Forum process, in actual information operations around the world in Iraq, Afghanistan and beyond.

    TRG chief executive John Rendon remains closely involved in the Pentagon Highlands Forum, and ongoing DoD information operations in the Muslim world. His November 2014 biography for the Harvard Kennedy School ‘Emerging Leaders’ course describes him as “a participant in forward-thinking organizations such as the Highlands Forum,” “one of the first thought-leaders to harness the power of emerging technologies in support of real time information management,” and an expert on “the impact of emerging information technologies on the way populations think and behave.” Rendon’s Harvard bio also credits him with designing and executing “strategic communications initiatives and information programs related to operations, Odyssey Dawn (Libya), Unified Protector (Libya), Global War on Terrorism (GWOT), Iraqi Freedom, Enduring Freedom (Afghanistan), Allied Force and Joint Guardian (Kosovo), Desert Shield, Desert Storm (Kuwait), Desert Fox (Iraq) and Just Cause (Panama), among others.”

    Rendon’s work on perception management and information operations has also “assisted a number of US military interventions” elsewhere, as well as running US information operations in Argentina, Colombia, Haiti, and Zimbabwe — in fact, a total of 99 countries. As a former executive director and national political director of the Democratic Party, John Rendon remains a powerful figure in Washington under the Obama administration.

    Pentagon records show that TRG has received over $100 million from the DoD since 2000. In 2009, the US government cancelled a ‘strategic communications’ contract with TRG after revelations it was being used to weed out reporters who might write negative stories about the US military in Afghanistan, and to solely promote journalists supportive of US policy. Yet in 2010, the Obama administration re-contracted Rendon to supply services for “military deception” in Iraq.

    Since then, TRG has provided advice to the US Army’s Training and Doctrine Command, the Special Operations Command, and is still contracted to the Office of the Secretary of Defense, the US Army’s Communications Electronic Command, as well as providing “communications support” to the Pentagon and US embassies on counter-narcotics operations.

    TRG also boasts on its website that it provides “Irregular Warfare Support,” including “operational and planning support” that “assists our government and military clients in developing new approaches to countering and eroding an adversary’s power, influence and will.” Much of this support has itself been fine-tuned over the last decade or more inside the Pentagon Highlands Forum.

    Irregular war and pseudo-terrorism
    The Pentagon Highlands Forum’s intimate link, via Rendon, to the propaganda operations pursued under Bush and Obama in support of the ‘Long War,’ demonstrate the integral role of mass surveillance in both irregular warfare and ‘strategic communications.’

    One of the major proponents of both is Prof John Arquilla of the Naval Postgraduate School, the renowned US defense analyst credited with developing the concept of ‘netwar,’ who today openly advocates the need for mass surveillance and big data mining to support pre-emptive operations to thwart terrorist plots. It so happens that Arquilla is another “founding member” of the Pentagon’s Highlands Forum.

    Much of his work on the idea of ‘networked warfare,’ ‘networked deterrence,’ ‘information warfare,’ and ‘swarming,’ largely produced for RAND under Pentagon contract, was incubated by the Forum during its early years and thus became integral to Pentagon strategy. For instance, in Arquilla’s 1999 RAND study, The Emergence of Noopolitik: Toward an American Information Strategy, he and his co-author David Ronfeldt express their gratitude to Richard O’Neill “for his interest, support and guidance,” and to “members of the Highlands Forum” for their advance comments on the study. Most of his RAND work credits the Highlands Forum and O’Neill for their support.

    Prof. John Arquilla of the Naval Postgraduate School, and a founding member of the Pentagon Highlands Forum
    Arquilla’s work was cited in a 2006 National Academy of Sciences study on the future of network science commissioned by the US Army, which found based on his research that: “Advances in computer-based technologies and telecommunications are enabling social networks that facilitate group affiliations, including terrorist networks.” The study conflated risks from terror and activist groups: “The implications of this fact for criminal, terror, protest and insurgency networks has been explored by Arquilla and Ronfeldt (2001) and are a common topic of discussion by groups like the Highlands Forum, which perceive that the United States is highly vulnerable to the interruption of critical networks.” Arquilla went on to help develop information warfare strategies “for the military campaigns in Kosovo, Afghanistan and Iraq,” according to military historian Benjamin Shearer in his biographical dictionary, Home Front Heroes (2007) — once again illustrating the direct role played by certain key Forum members in executing Pentagon information operations in war theatres.

    In his 2005 New Yorker investigation, the Pulitzer Prize-winning Seymour Hersh referred to a series of articles by Arquilla elaborating on a new strategy of “countering terror” with pseudo-terror. “It takes a network to fight a network,” said Arquilla, drawing on the thesis he had been promoting in the Pentagon through the Highlands Forum since its founding:

    “When conventional military operations and bombing failed to defeat the Mau Mau insurgency in Kenya in the 1950s, the British formed teams of friendly Kikuyu tribesmen who went about pretending to be terrorists. These ‘pseudo gangs’, as they were called, swiftly threw the Mau Mau on the defensive, either by befriending and then ambushing bands of fighters or by guiding bombers to the terrorists’ camps.”
    Arquilla went on to advocate that western intelligence services should use the British case as a model for creating new “pseudo gang” terrorist groups, as a way of undermining “real” terror networks:

    “What worked in Kenya a half-century ago has a wonderful chance of undermining trust and recruitment among today’s terror networks. Forming new pseudo gangs should not be difficult.”
    Essentially, Arquilla’s argument was that as only networks can fight networks, the only way to defeat enemies conducting irregular warfare is to use techniques of irregular warfare against them. Ultimately, the determining factor in victory is not conventional military defeat per se, but the extent to which the direction of the conflict can be calibrated to influence the population and rally their opposition to the adversary. Arquilla’s ‘pseudo-gang’ strategy was, Hersh reported, already being implemented by the Pentagon:

    “Under Rumsfeld’s new approach, I was told, US military operatives would be permitted to pose abroad as corrupt foreign businessmen seeking to buy contraband items that could be used in nuclear-weapons systems. In some cases, according to the Pentagon advisers, local citizens could be recruited and asked to join up with guerrillas or terrorists…
    The new rules will enable the Special Forces community to set up what it calls ‘action teams’ in the target countries overseas which can be used to find and eliminate terrorist organizations. ‘Do you remember the right-wing execution squads in El Salvador?’ the former high-level intelligence official asked me, referring to the military-led gangs that committed atrocities in the early nineteen-eighties. ‘We founded them and we financed them,’ he said. ‘The objective now is to recruit locals in any area we want. And we aren’t going to tell Congress about it.’ A former military officer, who has knowledge of the Pentagon’s commando capabilities, said, ‘We’re going to be riding with the bad boys.’”
    Official corroboration that this strategy is now operational came with the leak of a 2008 US Army special operations field manual. The US military, the manual said, can conduct irregular and unconventional warfare by using surrogate non-state groups such as “paramilitary forces, individuals, businesses, foreign political organizations, resistant or insurgent organizations, expatriates, transnational terrorism adversaries, disillusioned transnational terrorism members, black marketers, and other social or political ‘undesirables.’” Shockingly, the manual specifically acknowledged that US special operations can involve both counterterrorism and “Terrorism,” as well as: “Transnational criminal activities, including narco-trafficking, illicit arms-dealing, and illegal financial transactions.” The purpose of such covert operations is, essentially, population control — they are “specifically focused on leveraging some portion of the indigenous population to accept the status quo,” or to accept “whatever political outcome” is being imposed or negotiated.

    By this twisted logic, terrorism can in some cases be defined as a legitimate tool of US statecraft by which to influence populations into accepting a particular “political outcome” — all in the name fighting terrorism.

    Is this what the Pentagon was doing by coordinating the nearly $1 billion of funding from Gulf regimes to anti-Assad rebels, most of which according to the CIA’s own classified assessments ended up in the coffers of violent Islamist extremists linked to al-Qaeda, who went on to spawn the ‘Islamic State’?

    The rationale for the new strategy was first officially set out in an August 2002 briefing for the Pentagon’s Defense Science Board, which advocated the creation of a ‘Proactive, Preemptive Operations Group’ (P2OG) within the National Security Council. P2OG, the Board proposed, must conduct clandestine operations to infiltrate and “stimulate reactions” among terrorist networks to provoke them into action, and thus facilitate targeting them.

    The Defense Science Board is, like other Pentagon agencies, intimately related with the Highlands Forum, whose work feeds into the Board’s research, which in turn is regularly presented at the Forum.

    According to the US intelligence sources who spoke to Hersh, Rumsfeld had ensured that the new brand of black operations would be conducted entirely under Pentagon jurisdiction, firewalled off from the CIA and regional US military commanders, and executed by its own secret special operations command. That chain of command would include, apart from the defense secretary himself, two of his deputies including the undersecretary of defense for intelligence: the position overseeing the Highlands Forum.

    Strategic communications: war propaganda at home and abroad
    Within the Highlands Forum, the special operations techniques explored by Arquilla have been taken up by several others in directions focused increasingly on propaganda — among them, Dr. Lochard, as seen previously, and also Dr. Amy Zalman, who focuses particularly on the idea of the US military using ‘strategic narratives’ to influence public opinion and win wars.

    Like her colleague, Highlands Forum founding member Jeff Cooper, Zalman was schooled in the bowels of SAIC/Leidos. From 2007 to 2012, she was a senior SAIC strategist, before becoming Department of Defense Information Integration Chair at the US Army’s National War College, where she focused on how to fine-tune propaganda to elicit the precise responses desired from target groups, based on complete understanding of those groups. As of summer last year, she became CEO of the World Futures Society.

    Dr. Amy Zalman, an ex-SAIC strategist, is CEO of the World Futures Society, and a long-time Pentagon Highlands Forum delegate consulting for the US government on strategic communications in irregular warfare
    In 2005, the same year Hersh reported that the Pentagon strategy of “stimulating reactions” among terrorists by provoking them was underway, Zalman delivered a briefing to the Pentagon Highlands Forum titled, ‘In Support of a Narrative Theory Approach to US Strategic Communication.’ Since then, Zalman has been a long-time Highlands Forum delegate, and has presented her work on strategic communications to a range of US government agencies, NATO forums, as well as teaching courses in irregular warfare to soldiers at the US Joint Special Operations University.

    Her 2005 Highlands Forum briefing is not publicly available, but the thrust of Zalman’s input into the information component of Pentagon special operations strategies can be gleaned from some of her published work. In 2010, when she was still attached to SAIC, her NATO paper noted that a key component of irregular war is “winning some degree of emotional support from the population by influencing their subjective perceptions.” She advocated that the best way of achieving such influence goes far further than traditional propaganda and messaging techniques. Rather, analysts must “place themselves in the skins of the people under observation.”

    Zalman released another paper the same year via the IO Journal, published by the Information Operations Institute, which describes itself as a “special interest group” of the Associaton of Old Crows. The latter is a professional association for theorists and practitioners of electronic warfare and information operations, chaired by Kenneth Israel, vice president of Lockheed Martin, and vice chaired by David Himes, who retired last year from his position as senior advisor in electronic warfare at the US Air Force Research Laboratory.

    In this paper, titled ‘Narrative as an Influence Factor in Information Operations,’ Zalman laments that the US military has “found it difficult to create compelling narratives — or stories — either to express its strategic aims, or to communicate in discrete situations, such as civilian deaths.” By the end, she concludes that “the complex issue of civilian deaths” should be approached not just by “apologies and compensation” — which barely occurs anyway — but by propagating narratives that portray characters with whom the audience connects (in this case, ‘the audience’ being ‘populations in war zones’). This is to facilitate the audience resolving struggles in a “positive way,” defined, of course, by US military interests. Engaging emotionally in this way with “survivors of those dead” from US military action might “prove to be an empathetic form of influence.” Throughout, Zalman is incapable of questioning the legitimacy of US strategic aims, or acknowledging that the impact of those aims in the accumulation of civilian deaths, is precisely the problem that needs to change — as opposed to the way they are ideologically framed for populations subjected to military action.

    ‘Empathy,’ here, is merely an instrument by which to manipulate.

    In 2012, Zalman wrote an article for The Globalist seeking to demonstrate how the rigid delineation of ‘hard power’ and ‘soft power’ needed to be overcome, to recognize that the use of force requires the right symbolic and cultural effect to guarantee success:

    “As long as defense and economic diplomacy remain in a box labeled ‘hard power,’ we fail to see how much their success relies on their symbolic effects as well as their material ones. As long as diplomatic and cultural efforts are stored in a box marked ‘soft power,’ we fail to see the ways in which they can be used coercively or produce effects that are like those produced by violence.”
    Given SAIC’s deep involvement in the Pentagon Highlands Forum, and through it the development of information strategies on surveillance, irregular warfare, and propaganda, it is hardly surprising that SAIC was the other key private defense firm contracted to generate propaganda in the run up to Iraq War 2003, alongside TRG.

    “SAIC executives have been involved at every stage… of the war in Iraq,” reported Vanity Fair, ironically, in terms of deliberately disseminating false claims about WMD, and then investigating the ‘intelligence failure’ around false WMD claims. David Kay, for instance, who had been hired by the CIA in 2003 to hunt for Saddam’s WMD as head of the Iraq Survey Group, was until October 2002 a senior SAIC vice president hammering away “at the threat posed by Iraq” under Pentagon contract. When WMD failed to emerge, President Bush’s commission to investigate this US ‘intelligence failure’ included three SAIC executives, among them Highlands Forum founding member Jeffrey Cooper. The very year of Kay’s appointment to the Iraq Survey Group, Clinton’s defense secretary William Perry — the man under whose orders the Highlands Forum was set-up — joined the board of SAIC. The investigation by Cooper and all let the Bush administration off the hook for manufacturing propaganda to legitimize war — unsurprisingly, given Cooper’s integral role in the very Pentagon network that manufactured that propaganda.

    SAIC was also among the many contractors that profited handsomely from Iraqi reconstruction deals, and was re-contracted after the war to promote pro-US narratives abroad. In the same vein as Rendon’s work, the idea was that stories planted abroad would be picked up by US media for domestic consumption.

    Delegates at the Pentagon’s 46th Highlands Forum in December 2011, from right to left: John Seely Brown, chief scientist/director at Xerox PARC from 1990–2002 and an early board member of In-Q-Tel; Ann Pendleton-Jullian, co-author with Brown of a manuscript, Design Unbound; Antonio and Hanna Damasio, a neurologist and neurobiologist respectively who are part of a DARPA-funded project on propaganda
    But the Pentagon Highlands Forum’s promotion of advanced propaganda techniques is not exclusive to core, longstanding delegates like Rendon and Zalman. In 2011, the Forum hosted two DARPA-funded scientists, Antonio and Hanna Damasio, who are principal investigators in the ‘Neurobiology of Narrative Framing’ project at the University of Southern California. Evoking Zalman’s emphasis on the need for Pentagon psychological operations to deploy “empathetic influence,” the new DARPA-backed project aims to investigate how narratives often appeal “to strong, sacred values in order to evoke an emotional response,” but in different ways across different cultures. The most disturbing element of the research is its focus on trying to understand how to increase the Pentagon’s capacity to deploy narratives that influence listeners in a way that overrides conventional reasoning in the context of morally-questionable actions.

    The project description explains that the psychological reaction to narrated events is “influenced by how the narrator frames the events, appealing to different values, knowledge, and experiences of the listener.” Narrative framing that “targets the sacred values of the listener, including core personal, nationalistic, and/or religious values, is particularly effective at influencing the listener’s interpretation of narrated events,” because such “sacred values” are closely tied with “the psychology of identity, emotion, moral decision making, and social cognition.” By applying sacred framing to even mundane issues, such issues “can gain properties of sacred values and result in a strong aversion to using conventional reasoning to interpret them.” The two Damasios and their team are exploring what role “linguistic and neuropsychological mechanisms” play in determining “the effectiveness of narrative framing using sacred values in influencing a listener’s interpretation of events.”

    The research is based on extracting narratives from millions of American, Iranian and Chinese weblogs, and subjecting them to automated discourse analysis to compare them quantitatively across the three languages. The investigators then follow up using behavioral experiments with readers/listeners from different cultures to gauge their reaction different narratives “where each story makes an appeal to a sacred value to explain or justify a morally-questionable behavior of the author.” Finally, the scientists apply neurobiological fMRI scanning to correlate the reactions and personal characteristics of subjects with their brain responses.

    Why is the Pentagon funding research investigating how to exploit people’s “sacred values” to extinguish their capacity for logical reasoning, and enhance their emotional openness to “morally-questionable behavior”?

    The focus on English, Farsi and Chinese may also reveal that the Pentagon’s current concerns are overwhelmingly about developing information operations against two key adversaries, Iran and China, which fits into longstanding ambitions to project strategic influence in the Middle East, Central Asia and Southeast Asia. Equally, the emphasis on English language, specifically from American weblogs, further suggests the Pentagon is concerned about projecting propaganda to influence public opinion at home.

    Rosemary Wenchel (left) of the US Department of Homeland Security with Jeff ‘Skunk’ Baxter, a former musician and now US defense consultant who has worked for contractors like SAIC and Northrup Grumman. SAIC/Leidos executive Jeff Cooper is behind them
    Lest one presume that DARPA’s desire to mine millions of American weblogs as part of its ‘neurobiology of narrative framing’ research is a mere case of random selection, an additional co-chair of the Pentagon Highlands Forum in recent years is Rosemary Wenchel, former director of cyber capabilities and operations support at the Office of the Secretary of Defense. Since 2012, Wenchel has been deputy assistant secretary for strategy and policy in the Department of Homeland Security.

    As the Pentagon’s extensive funding of propaganda on Iraq and Afghanistan demonstrates, population influence and propaganda is critical not just in far-flung theatres abroad in strategic regions, but also at home, to quell the risk of domestic public opinion undermining the legitimacy of Pentagon policy. In the photo above, Wenchel is talking to Jeff Baxter, a long-time US defense and intelligence consultant. In September 2005, Baxter was part of a supposedly “independent” study group (chaired by NSA-contractor Booz Allen Hamilton) commissioned by the Department of Homeland Security, which recommended a greater role for US spy satellites in monitoring the domestic population.

    Meanwhile, Zalman and Rendon, while both remaining closely involved in the Pentagon Highlands Forum, continue to be courted by the US military for their expertise on information operations. In October 2014, both participated in a major Strategic Multi-Layer Assessment conference sponsored by the US Department of Defense and the Joint Chiefs of Staff, titled ‘A New Information Paradigm? From Genes to “Big Data” and Instagram to Persistent Surveillance… Implications for National Security.’ Other delegates represented senior US military officials, defense industry executives, intelligence community officials, Washington think-tanks, and academics.

    John Rendon, CEO of The Rendon Group, at a Highlands Forum session in 2010
    Rendon and SAIC/Leidos, two firms that have been central to the very evolution of Pentagon information operations strategy through their pivotal involvement in the Highlands Forum, continue to be contracted for key operations under the Obama administration. A US General Services Administration document, for instance, shows that Rendon was granted a major 2010–2015 contract providing general media and communications support services across federal agencies. Similarly, SAIC/Leidos has a $400 million 2010–2015 contract with the US Army Research Laboratory for “Expeditionary Warfare; Irregular Warfare; Special Operations; Stabilization and Reconstruction Operations” — a contract which is “being prepared now for recomplete.”

    The empire strikes back
    Under Obama, the nexus of corporate, industry, and financial power represented by the interests that participate in the Pentagon Highlands Forum has consolidated itself to an unprecedented degree.

    Coincidentally, the very day Obama announced Hagel’s resignation, the DoD issued a media release highlighting how Robert O. Work, Hagel’s deputy defense secretary appointed by Obama in 2013, planned to take forward the Defense Innovation Initiative that Hagel had just announced a week earlier. The new initiative was focused on ensuring that the Pentagon would undergo a long-term transformation to keep up with leading edge disruptive technologies across information operations.

    Whatever the real reasons for Hagel’s ejection, this was a symbolic and tangible victory for Marshall and the Highlands Forum vision. Highlands Forum co-chair Andrew Marshall, head of the ONA, may indeed be retiring. But the post-Hagel Pentagon is now staffed with his followers.

    Robert Work, who now presides over the new DoD transformation scheme, is a loyal Marshall acolyte who had previously directed and analyzed war games for the Office of Net Assessment. Like Marshall, Wells, O’Neill and other Highlands Forum members, Work is also a robot fantasist who lead authored the study, Preparing for War in the Robotic Age, published early last year by the Center for a New American Security (CNAS).

    Work is also pitched to determine the future of the ONA, assisted by his strategist Tom Ehrhard and DoD undersecretary for intelligence Michael G. Vickers, under whose authority the Highlands Forum currently runs. Ehrard, an advocate of “integrating disruptive technologies in DoD,” previously served as Marshall’s military assistant in the ONA, while Mike Vickers — who oversees surveillance agencies like the NSA — was also previously hired by Marshall to consult for the Pentagon.

    Vickers is also a leading proponent of irregular warfare. As assistant defense secretary for special operations and low intensity conflict under former defense secretary Robert Gates in both the Bush and Obama administrations, Vickers’s irregular warfare vision pushed for “distributed operations across the world,” including “in scores of countries with which the US is not at war,” as part of a program of “counter network warfare” using a “network to fight a network” — a strategy which of course has the Highlands Forum all over it. In his previous role under Gates, Vickers increased the budget for special operations including psychological operations, stealth transport, Predator drone deployment and “using high-tech surveillance and reconnaissance to track and target terrorists and insurgents.”

    To replace Hagel, Obama nominated Ashton Carter, former deputy defense secretary from 2009 to 2013, whose expertise in budgets and procurement according to the Wall Street Journal is “expected to boost some of the initiatives championed by the current Pentagon deputy, Robert Work, including an effort to develop new strategies and technologies to preserve the US advantage on the battlefield.”

    Back in 1999, after three years as Clinton’s assistant defense secretary, Carter co-authored a study with former defense secretary William J. Perry advocating a new form of ‘war by remote control’ facilitated by “digital technology and the constant flow of information.” One of Carter’s colleagues in the Pentagon during his tenure at that time was Highlands Forum co-chair Linton Wells; and it was Perry of course that as then-defense secretary appointed Richard O’Neill to set-up the Highlands Forum as the Pentagon’s IO think-tank back in 1994.

    Highlands Forum overlord Perry went on to join the board of SAIC, before eventually becoming chairman of another giant defense contractor, Global Technology Partners (GTP). And Ashton Carter was on GTP’s board under Perry, before being nominated to defense secretary by Obama. During Carter’s previous Pentagon stint under Obama, he worked closely with Work and current undersecretary of defense Frank Kendall. Defense industry sources rejoice that the new Pentagon team will “dramatically improve” chances to “push major reform projects” at the Pentagon “across the finish line.”

    Indeed, Carter’s priority as defense chief nominee is identifying and acquiring new commercial “disruptive technology” to enhance US military strategy — in other words, executing the DoD Skynet plan.

    The origins of the Pentagon’s new innovation initiative can thus be traced back to ideas that were widely circulated inside the Pentagon decades ago, but which failed to take root fully until now. Between 2006 and 2010, the same period in which such ideas were being developed by Highlands Forum experts like Lochard, Zalman and Rendon, among many others, the Office of Net Assessment provided a direct mechanism to channel these ideas into concrete strategy and policy development through the Quadrennial Defense Reviews, where Marshall’s input was primarily responsible for the expansion of the “black” world: “special operations,” “electronic warfare” and “information operations.”

    Andrew Marshall, now retired head of the DoD’s Office of Net Assessment and Highlands Forum co-chair, at a Forum session in 2008
    Marshall’s pre-9/11 vision of a fully networked and automated military system found its fruition in the Pentagon’s Skynet study released by the National Defense University in September 2014, which was co-authored by Marshall’s colleague at the Highlands Forum, Linton Wells. Many of Wells’ recommendations are now to be executed via the new Defense Innovation Initiative by veterans and affiliates of the ONA and Highlands Forum.

    Given that Wells’ white paper highlighted the Pentagon’s keen interest in monopolizing AI research to monopolize autonomous networked robot warfare, it is not entirely surprising that the Forum’s sponsoring partners at SAIC/Leidos display a bizarre sensitivity about public use of the word ‘Skynet.’

    On a Wikipedia entry titled ‘Skynet (fictional)’, people using SAIC computers deleted several paragraphs under the ‘Trivia’ section pointing out real-world ‘Skynets’, such as the British military satellite system, and various information technology projects.

    Hagel’s departure paved the way for Pentagon officials linked to the Highlands Forum to consolidate government influence. These officials are embedded in a longstanding shadow network of political, industry, media and corporate officials that sit invisibly behind the seat of government, yet literally write its foreign and domestic national security policies whether the administration is Democrat of Republican, by contributing ‘ideas’ and forging government-industry relationships.

    It is this sort of closed-door networking that has rendered the American vote pointless. Far from protecting the public interest or helping to combat terrorism, the comprehensive monitoring of electronic communications has been systematically abused to empower vested interests in the energy, defense, and IT industries.

    The state of permanent global warfare that has resulted from the Pentagon’s alliances with private contractors and unaccountable harnessing of information expertise, is not making anyone safer, but has spawned a new generation of terrorists in the form of the so-called ‘Islamic State’ — itself a Frankenstein by-product of the putrid combination of Assad’s brutality and longstanding US covert operations in the region. This Frankenstein’s existence is now being cynically exploited by private contractors seeking to profit exponentially from expanding the national security apparatus, at a time when economic volatility has pressured governments to slash defense spending.

    According to the Securities and Exchange Commission, from 2008 to 2013, the five largest US defense contractors lost 14 percent of their employees, as the winding down of US wars in Iraq and Afghanistan led to lack of business and squeezed revenues. The continuation of the ‘Long War’ triggered by ISIS has, for now, reversed their fortunes. Companies profiting from the new war include many connected to the Highlands Forum, such as Leidos, Lockheed Martin, Northrup Grumman, and Boeing. War is, indeed, a racket.

    No more shadows
    Yet in the long-run, the information imperialists have already failed. This investigation is based entirely on open source techniques, made viable largely in the context of the same information revolution that enabled Google. The investigation has been funded entirely by members of the public, through crowd-funding. And the investigation has been published and distributed outside the circuits of traditional media, precisely to make the point that in this new digital age, centralized top-down concentrations of power cannot overcome the power of people, their love of truth and justice, and their desire to share.

    What are the lessons of this irony? Simple, really: The information revolution is inherently decentralized, and decentralizing. It cannot be controlled and co-opted by Big Brother. Efforts to do so will in the end invariably fail, in a way that is ultimately self-defeating.

    The latest mad-cap Pentagon initiative to dominate the world through control of information and information technologies, is not a sign of the all-powerful nature of the shadow network, but rather a symptom of its deluded desperation as it attempts to ward off the acceleration of its hegemonic decline.

    But the decline is well on its way. And this story, like so many before it, is one small sign that the opportunities to mobilize the information revolution for the benefit of all, despite the efforts of power to hide in the shadows, are stronger than ever.

    By Nafeez Ahmed
    Published on Jan 22.

    Find this story at 22 January 2015
    Copyright Nafeez Ahmed

    << oudere artikelen  nieuwere artikelen >>