CIA   8176

« earlier    

Trump ends covert CIA program to arm anti-Assad rebels in Syria, a move sought by Moscow - The Washington Post , July 19, 2017
Officials said Trump made the decision to scrap the CIA program nearly a month ago, after an Oval Office meeting with CIA Director Mike Pompeo and national security adviser H.R. McMaster ahead of a July 7 meeting in Germany with Russian President Vladimir Putin.

“This is a momentous decision,” said a current official, who spoke on the condition of anonymity to discuss a covert program. “Putin won in Syria.”

U.S. officials said the decision had the backing of Jordan, where some of the rebels were trained, and appeared to be part of a larger Trump administration strategy to focus on negotiating limited cease-fire deals with the Russians.
CIA  MOC  Mar15  TrumpAdministration  foreign_policy  foreign_aid  Jordan 
13 hours ago by elizrael
Trump Got This One Right | The Weekly Standard, Aug 7, 2017
Earlier this year, President Donald Trump was shown a disturbing video of Syrian rebels beheading a child near the city of Aleppo. It had caused a minor stir in the press as the fighters belonged to the Nour al-Din al-Zenki Movement, a group that had been supported by the CIA as part of its rebel aid program.

The footage is haunting. Five bearded men smirk as they surround a boy in the back of a pickup truck. One of them holds the boy’s head with a tight grip on his hair while another mockingly slaps his face. Then, one of them uses a knife to saw the child’s head off and holds it up in the air like a trophy. It is a scene reminiscent of the Islamic State’s snuff videos, except this wasn’t the work of Abu Bakr al-Baghdadi’s men. The murderers were supposed to be the good guys: our allies.

Trump wanted to know why the United States had backed Zenki if its members are extremists. The issue was discussed at length with senior intelligence officials, and no good answers were forthcoming, according to people familiar with the conversations. After learning more worrisome details about the CIA’s ghost war in Syria—including that U.S.-backed rebels had often fought alongside extremists, among them al Qaeda’s arm in the country—the president decided to end the program altogether.
Mar15  FSA  MOC  CIA  TrumpAdministration  extrajudicial_killing  video 
22 hours ago by elizrael
Twitter
Langer Thread darüber, warum das im #Iran alles so gekommen ist. SEHR lesenswert.

#Mossadegh #CIA
https://t.co/cNLFS7YBD8
– vera bunse (kaffeebeimir) http://twitter.com/kaffeebeimir/status/899407508841910273
Iran  CIA  via:packrati.us  Mossadegh 
3 days ago by kelo
Robert Blum, the spy who shaped the world Part 1
Even for students of the history of the Intelligence Community (IC), Robert Blum is all but forgotten except as a bureaucrat, a professor, and the head of a philanthropic foundation with ties to the CIA. In reality, he was a counterintelligence chief who worked for several agencies, built large pieces of the United States’ foreign economic policies, had the Director of Central Intelligence fired, and redesigned a significant portion of the IC, including its mechanisms for covert action and propaganda.
history  CIA  intelligence  politics  propaganda  reference 
3 days ago by kmt
Obama’s secret struggle to retaliate against Putin’s election interference - Washington Post, June 23, 2017
Inside was an intelligence bombshell, a report drawn from sourcing deep inside the Russian government that detailed Russian President Vladi­mir Putin’s direct involvement in a cyber campaign to disrupt and discredit the U.S. presidential race.

But it went further. The intelligence captured Putin’s specific instructions on the operation’s audacious objectives — defeat or at least damage the Democratic nominee, Hillary Clinton, and help elect her opponent, Donald Trump.

At that point, the outlines of the Russian assault on the U.S. election were increasingly apparent. Hackers with ties to Russian intelligence services had been rummaging through Democratic Party computer networks, as well as some Republican systems, for more than a year. In July, the FBI had opened an investigation of contacts between Russian officials and Trump associates. And on July 22, nearly 20,000 emails stolen from the Democratic National Committee were dumped online by WikiLeaks.
Obama  obama_administration  Russia  hacking  2016USElections  sanctions  decision_making  NSC  Susan_Rice  CIA  intelligence_assessment  TrumpAdministration 
3 days ago by elizrael
Palantir Contract Dispute Exposes NYPD’s Lack of Transparency | Brennan Center for Justice
First, some background. Palantir is a secretive tech company founded in part with funds from In-Q-Tel, the venture capital arm of the CIA. Immigrations and Customs Enforcement (ICE) is one of dozens of government agencies with multimillion-dollar Palantir contracts, fueling fears that the technology could be used to enforce President Donald Trump’s aggressive immigration agenda. The NYPD has also had a contract with Palantir for years, but the specifics are still unknown.

All we know is that the NYPD was licensing Palantir software to produce analysis from data collected by the police, such as arrest records, license-plate reads, and parking tickets. According to BuzzFeed, Palatir’s software “graphs this data in a way that can reveal connections among crimes and people.” The NYPD’s continued use of this analytic data is at the center of the ongoing contract dispute. Palantir has declined to hand over a readable version of the data to the NYPD, claiming that doing so would threaten its intellectual property.

All of this begs the question: Why are New Yorkers just learning about this now, and where is the public oversight? 

We know who’s not being kept in the loop: the New York City Council.
CIA  NYPD  police  surveillance  data 
6 days ago by Quercki
CIA Torture Psychologists Settle Lawsuit | American Civil Liberties Union
“Government officials and contractors are on notice that they cannot hide from accountability for torture,” said Hina Shamsi, director of the ACLU National Security Project. “Our clients’ groundbreaking case has changed the legal landscape. It showed that the courts are fully capable of handling lawsuits involving abuses committed in the name of national security.”
ifttt  facebook  CIA  Torture 
6 days ago by minorjive
CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time
After disclosing CIA's strategies to hijack and manipulate webcams and microphones to corrupt or delete recordings, WikiLeaks has now published another Vault 7 leak, revealing CIA's ability to spy on video streams remotely in real-time.
Dubbed 'CouchPotato,' document leaked from the CIA details how the CIA agents use a remote tool to stealthy collect RTSP/H.264 video streams.
Real Time Streaming Protocol, or RTSP, is a network control protocol designed for use in entertainment and communication systems for controlling streaming media servers.
security  privacy  CIA  wikileaks  video  hack  spying 
13 days ago by rgl7194
Vault 7: Wikileaks Divulges CIA Tool for Capturing RTSP and H.264 Video Streams
Wikileaks published today a manual for an alleged CIA tool that can capture the content of remote video streams and save them to disk for further analysis.
The tool's name is CouchPotato and is described in a usage manual dated to February 14, 2014, available online here.
According to its manual, CIA operatives can use a command-line interface to start the tool and point it to the URL of an RTSP or H.264 video stream and the location where to save the stream on disk.
security  privacy  CIA  wikileaks  video  hack  spying 
13 days ago by rgl7194
The CIA, Washington Post, And Russia: What You're Not Being Told | Zero Hedge
According to an unsubstantiated article by the Washington Post, anonymous CIA officials have confirmed that the Russian government hacked the United States election to favor Donald Trump. Though it’s entirely possible the Russian government attempted to influence the election, the Post has been widely criticized — for the second time in a month — for its failure to follow basic journalistic practices. Nevertheless, the narrative is sticking. But the outlet’s behind-the-scenes relationship with the CIA is nothing new. In 2013, a conflict of interest arose shortly after Jeff Bezos, founder and CEO of Amazon, purchased the newspaper.
LIF-blog  CIA  journalism 
14 days ago by icresource
Politico’s Challenge to JFK Orthodoxy That Isn’t - WhoWhatWhy
Webster’s dictionary defines disinformation as: “false information deliberately and often covertly spread (as by the planting of rumors) in order to influence public opinion or obscure the truth.” For a fascinating example of disinformation, mainstream-media style, consider this story in Politico Magazine, How the CIA Came to Doubt the Official Story of JFK’s Murder by Philip Shenon and Larry J. Sabato.
At face value the headline sounds quite intriguing. It promises great new revelations. But skeptics will look at it differently: they believe that, since CIA operatives had a great deal to do with setting up Oswald in the first place, then of course they knew the official story was false from the beginning. They helped invent it.
POTUS  RIP  kennedy  60s  gov2.0  CIA  crime  politics  guns 
14 days ago by rgl7194
Vault 7: CIA Tool Can Shut Down Webcams and Corrupt Video Recordings
WikiLeaks has released today eight manuals from the CIA's Dumbo project, a tool that the Agency uses to disable webcams, microphones, and other surveillance software.
The purpose of this tool is to cripple audio and video surveillance on critical targets so that field agents can perform their missions.
The tool — named Dumbo — isn't malware but a Windows-only utility that agents carry around on a USB thumb drive. The agent inserts the tool in one of the target's computers and runs it. The tool uses the following GUI...
gov2.0  CIA  spying  video  camera  security  privacy  wikileaks 
15 days ago by rgl7194
This is How CIA Disables Security Cameras During Hollywood-Style Operations
In last 20 years, we have seen hundreds of caper/heist movies where spies or bank robbers hijack surveillance cameras of secure premises to either stop recording or set up an endless loop for covert operations without leaving any evidence.
Whenever I see such scenes in a movie, I wonder and ask myself: Does this happen in real-life?
Yes, it does, trust me—at least CIA agents are doing this.
gov2.0  CIA  spying  video  camera  security  privacy  wikileaks 
15 days ago by rgl7194
3 New CIA-developed Hacking Tools For MacOS & Linux Exposed
WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed 'Imperial,' which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and different flavours of Linux operating systems.
If you are a regular reader of THN, you must be aware that this latest revelation by the whistleblower organisation is the part of an ongoing CIA-Vault 7 leaks, marking it as the 18th batch in the series.
If you are unaware of the Vault 7 leaks, you can head on to the second of this article for having a brief look on all the leaks at once.
Achilles — Tool to Backdoor Mac OS X Disk Images
Dubbed Achilles, the hacking tool allows CIA operators to combine malicious Trojan applications with a legitimate Mac OS app into a disk image installer (.DMG) file.
The binding tool, the shell script is written in Bash, gives the CIA operators "one or more desired operator specified executables" for a one-time execution.
gov2.0  malware  mac  installer  security  privacy  CIA 
16 days ago by rgl7194
Achilles, Aeris, and SeaPea Are 3 CIA Tools for Hacking Mac and POSIX Systems
Today, Wikileaks published more documents part of its Vault 7 CIA exposé series, revealing new manuals for three tools named Achilles, Aeris, and SeaPea, part of a larger CIA project named Imperial.
Each of the three tools has a different purpose, being developed to target only a specific set of operating systems.
Achilles
The first of these tools is named Achilles and this is a utility for trojanizing macOS DMG installers.
According to a one-page user guide released by WikiLeaks, Achilles allows an operator to bind an executable to a DMG file for a one-time execution.
Running the DMG file installs the original app, installs the payload, and then removes the payload from the DMG file. Using a one-time execution routine is typical to US cyber-intelligence, who are known to put a lot of effort into remaining undetected on targeted machines.
gov2.0  malware  mac  installer  security  privacy  CIA 
16 days ago by rgl7194
Twitter
RT : ’s list of ways to censor information because it’s classified has been censored because it’s classified…
CIA  from twitter
16 days ago by DocDre
The Mapmaker’s Craft: A History of Cartography at CIA — Central Intelligence Agency
Tracing its roots to October 1941, CIA’s Cartography Center has a long, proud history of service to the Intelligence Community (IC) and continues to respond to a variety of finished intelligence map requirements. The mission of the Cartography Center is to provide a full range of maps, geographic analysis, and research in support of the Agency, the White House, senior policymakers, and the IC at large. Its chief objectives are to analyze geospatial information, extract intelligence-related geodata, and present the information visually in creative and effective ways for maximum understanding by intelligence consumers.
Since 1941, the Cartography Center maps have told the stories of post-WWII reconstruction, the Suez crisis, the Cuban Missile crisis, the Falklands War, and many other important events in history.
CIA  maps  cartography 
17 days ago by shannon_mattern

« earlier    

related tags

1993  1afsym  2011  2016presidentialelection  2016uselections  2017-07-21  2017-07-23  20c  60s  7wtc  9-11  911  911e.p.heidner  911officeofnavalintelligence  911oni  911pentagon  analysis  anticommunism  apple  arabs  art  assassinations  barackobama  barrypollack  big_brother  bigbrother  blacksites  book  bothanspy  brainwashing  brennanjohn  bsa  bureaucracy  camera  cannabis  capitalism  cartelesdedrogas  cartography  cg-3d  china  cia  cis3360  cis4615  civil.rights  civilunrest  clapperjames  clintonhillary  clippings  coldwar  computer_security  congress/forculturalfreedom  conspiracy  corruption  country(france)  court  crime  critical-theory  crowdstrike  cults  dailyintell  data  decision_making  democratic  denismcdonough  dennisblair  discrimination  dnc  donaldtrump  dulles/allen  dulles/johnfoster  east  edwardmacmahon  election  election2016  emails  espionage  espionnage  excia  exploit  extrajudicial_killing  facebook  fake_news  fakenews  farsi  fbi  feedly  firmware  foreign-policy  foreign_aid  foreign_policy  fsa  fundaciones  gardening  general  ghwbush  good  goodman/melvina.  gop  gov2.0  government  gryfalcon  guide  guns  gwbush  hack  hacked  hacker  hacking  harrietmiers  hemp  history  hollybrooke  hrc  hrmcmaster  hydroponics  ifttt  illuminati  installer  inteligencia  intellectual  intellectuals  intelligence  intelligence_assessment  interesting  interference  interrogations  iran  israel  jamesrisen  jamestrump  jeffreysterling  jfk  johnbrennan  johnrizzo  jordan  journalism  judithehrlich  kansas  kennedy  kitv  landscapes  langley  law  lawsuit  leoniebrinkema  lif-blog  linux  mac  maduro  malcomhoward  malware  management  maps  mar15  marxism  merlin  middle  military  mindcontrol  mkultra  mmm  moc  moral.panic  mossadegh  movies  muckrock  museum  national+archives+and+records+administration  nationalsecurity  nazis  nsa  nsc  nuremburgtribunals  nypd  nyt  obama  obama_administration  obamabarack  ofallon-mo  oni  outlaw  peculiar-figures  podesta  poisongas  police.state  police  politics  politics:us  potus  prison  privacy  projectmonarch  propaganda  psy-ops  psychology  psyops  putin  putinvladimir  qatar  qualified.immunity  race  racist  redhat  reference  republican  rextillerson  rhat  richardmilhousnixon  rip  ronaldreagan  router  routers  russia  russiagate  russianhackers  russland  sabotage  sanctions  saudi  secrets  security  shite  spy  spying  staffers  statedepartment  stephenbannon  stlouis  sunni  surveillance  susan_rice  syrian-civil  taliban  terrorism  theintercept  thesixties  toblog  torture  tradecraft  trial  truman/harrys  trump  trumpadministration  trumpdonald  trumprussia  tweet  térkép  ukraine  us-military  usa  usaid  uswarcrimes  vault7  venezuela  video  wapo  war/on/drugs  war.on.drugs  war  warcrimes  warren+commission  wellpoint  whistleblowers  whitehouse  wi-fi  wikespooks  wikileaks  wireless  writing  yemen 

Copy this bookmark:



description:


tags: