Tag Archives: Blackwater

EOYS (End Of Year Stage)

We are all in a stage where we try to make sense of the choices we made over the last year. For some it is the elections, for some it is Brexit, for some it is COVID, and others have other matters, mot of us will have a blend of all, and nearly all will have COVID in the equation. So when I stated in earlier articles that the lockdown is to some degree pointless, we are hereby given the setting in ‘Woman on super-yacht that arrived in Cairns one of two people in Queensland with COVID-19’ (at https://www.abc.net.au/news/2020-12-24/coronavirus-queensland-super-yacht-woman-northern-beaches-man/13010536) where we see “She said the crew of the Lady E, which sailed to Australia from the Maldives, was not being helpful with contact tracing information. But the ship’s captain, James Kennedy, said in a statement that he and his crew were complying with all requests”, as such I see the opposites ‘not being helpful with contact tracing information’, as well as ‘he and his crew were complying with all requests’. Infection finds  way, there will always be someone that escapes attention because some people ‘forgot’ to look in that direction. Then we also get ‘cluster grows by nine local cases in NSW after a record 60,000 tests’, so after an additional 1% of the population of Sydney is tested up to 9 new cases are found, and people still debate and oppose that the disease will find a way? So are there still 900 unconfirmed cases in Sydney, and if that is the case, if that confirmation comes in 2-3 days, how many more will have the disease then? It is a real setting, a realistic fear and an absolute realistic case of worry. 

Yes, I worry, but some set worry into a larger stage of fear, which is a wrong stage to fill, there is every chance that that I might get it and the percentage is that there is a 3% chance I might die. Yet the truth is that there is a 97% chance I will not, good odds, especially compared to a lottery ticket, or blindfolded crossing the road on regent street. And others are debating, or they are agreeing that electing a stupid fat guy into the White House, the only man on planet with a haircut worse than Boris Johnson (Prime Minister of the United Kingdom) was not the greatest idea anyone could have had. Even as a Republican I agree. I would diplomatically state it as “John McCain would have been 20 times the President that President Trump ever could be, even dead he would still be 20 times the President that this current President could ever hope to be”. This is the stage that the US had signed up for and whatever gains they made in the middle east, pardoning the sentences of the Blackwater guards will have larger repercussions, as I see it the president is making sure that the US will have no forwards momentum the next 4 years, a stupid person, driven by self-righteous motives like “If I cannot be president, no one can” is setting a long term stage where nothing can be resolved, and in this people still wonder why I was considering selling my IP to a Chinese based corporation?  

We are in the end of year stage, but there is close to zero positivity to show, in that stage, as negativity adds up and up to the floor foundation of what we perceive to be some sort of balance, the setting of balance becomes increasingly distasteful. Consider the stage where we see “Slatten, whom prosecutors said started the shooting, was sentenced to life in prison” (source: NPR) gives rise to the stage where government shielded mass murder is now OK, that is how it reads, for the record, I never looked into the matter, I never saw any of the evidence and I read none of the testimonies, yet a court of law found them guilty and so far I have not seen any legal evidence that absolves them. There was a trial and a re-trial, as such I wonder why any president would involve themselves in this manner, and as I personally see it there is a scorched earth approach, which is “a military founded strategy that aims to destroy anything that might be useful to the enemy. Any assets that could be used by the enemy may be targeted, which usually includes obvious weapons, transport vehicles, communication sites, and industrial resources”, a set stage of diplomacy that has consequences, and as I personally see it, President Trump has now inflicted more damage on the United States than Edward Snowden ever has. When we see these actions as well as his reaction to the COVID-19 mess, when the people tally the reported 18,946,472 infected and the 334,824 who died, we see a scary setting by possibly the worst president in American History. And I need to give a clear stage on ‘the reported’, if the UK is in a stage where 3% has been infected, there is every chance that the infections, the reported and the unreported ones, will add up to (speculatively speaking) a little over 32 million making the stage that up to 10% of the US population is infected and matters will get worse soon enough. 

There is a speculative (sort of) wisdom to this, consider that 23% of ALL global infections are in the USA, yet less than 0.01% of the fatalities are shown, we see an unbalanced equation, this is not about age, or better healthcare, this is a setting that is far too unbalanced to make sense, a disease is not intelligent, it is an engine, it travels, infects and moves on, so if one number is one thing and if we agree that 2 out of 3 will make a complete recovery, the numbers are not adding up, optionally the numbers are on a few levels bogus. I remain open to which is which and what is actually happening. But I can give you thins, the numbers are not adding up and that setting is out in the open for anyone to see. 

So whilst we wonder hat is what and which is which, consider that there is a set level, there is at all times some level of discrepancy, there always will be, but for numbers to be off by 98%, that is what I call a numerical and statistical impossibility.

And when we see how the stage is in NSW (Australia) and people on yachts dump infected people in Queensland, consider just how many ships there are and how much infected people are travelling to places where we apparently have no control over the situation, so how many yachts are there in California and Florida, how many in the Mediterranean and how many of them remain unchecked? As such, what will the infected numbers be by on December 29th, January 29th and February 29th, I wonder if there will be any indictments soon thereafter. 

Leave a comment

Filed under Politics

When inability drives fear

It is a dangerous place to be in. We all have been there and in most cases it is as innocent as it could ever be. You see, sometimes life throws you a curveball. Gamers tend to identify it most easily. In my particular case it was a game called Magic Carpet. It was a Bullfrog game and I was testing it on the PC. It played magnificently there, and soon thereafter I also tested it on the very first PlayStation. There, because of the controller it was good, but not great. Still, it was fun to play and I tended (in those early years) to really get into a game, so when the situation blew into my face, I got a little frustrated. The next two times were worse and the last time (on that day) I went slightly angry (with myself) and I kicked the door. The issue was not the door, it was my steel tipped boot and I went straight through the door, so, I was not merely ticked off, I had a hole in the door (which would require funds to repair) and the boss in Magic Carpet was still alive. We all have had these moments. Our car, our bike, the TV, things go wobbly on you and we sometimes react wrongly to this situation and in light of that get to reflect on our own ego’s a little.

These are the images going through me when I was confronted to new information when looking at the unrealistic response by America (and Australia) to Huawei. In the case of Australia it seemed the mere application of greed and fear as politicians cater to the greed of a large telecom company, which was not seemingly the case with America. Yet that tip was raised for me less than 24 hours ago. The article (at https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/), shows how the CIA got their own systems handed to them through ego and what I would regard as stupidity. The initial headline ‘The number of informants executed in the debacle is higher than initially thought‘ is rather unsettling. It gets to be worse with “The CIA had imported the system from its Middle East operations, where the online environment was considerably less hazardous, and apparently underestimated China’s ability to penetrate it. “The attitude was that we’ve got this, we’re untouchable,” said one of the officials who, like the others, declined to be named discussing sensitive information. The former official described the attitude of those in the agency who worked on China at the time as “invincible.” Other factors played a role as well, including China’s alleged recruitment of former CIA officer Jerry Chun Shing Lee around the same time.” This is the most dangerous of settings. The wrongful setting comes straight from Sun Tsu where we learn that all war is based on deception. China is not some place that is tinkering at the side of the road, the Art of War COMES FROM CHINA! It gets to be worse when you consider that that book was written long before Americans had adopted proper reading and writing skills, close to 1200 years before that, so that was their first error.

When we see: “But the penetration of the communication system seems to account for the speed and accuracy with which Chinese authorities moved against the CIA’s China-based assets. “You could tell the Chinese weren’t guessing. The Ministry of State Security [which handles both foreign intelligence and domestic security] were always pulling in the right people,” one of the officials said. “When things started going bad, they went bad fast.”“. The entire matter seems to be exponentially wrong. The big issue is not on how it was cracked, or even if it was cracked. My issue had been (for a much longer time now) that for too long, the deciding voices, all listening to some CTO, often with multiple sides lacking wisdom that the setting was not merely that there was ‘a security risk’, there was for the longer time a much larger security flaw. For much too long a time, we got the ‘slides of wisdom’ on how data in transit tends to be safe and data at rest tended to be in danger. Even when I started my CCNA, the amount of knowledge given in the Cisco books gave the rise to the consideration that data in transit is not merely as vulnerable, it was that a lot more could be done unnoticed (not merely by the Chinese mind you). It was some time before the Sony hack that I expected a setting where the routers themselves might be used against the owner, it went further when we consider Wired in 2013 (at https://www.wired.com/2013/09/nsa-router-hacking/). The headline is not merely ‘NSA laughs at pc’s, prefers hacking routers and switches‘. It is the setting where we see: ““No one updates their routers,” he says. “If you think people are bad about patching Windows and Linux (which they are) then they are … horrible about updating their networking gear because it is too critical, and usually they don’t have redundancy to be able to do it properly.” He also notes that routers don’t have security software that can help detect a breach“. This is where I was in 2011, when I started to comprehend the working of a router and router tables, I figured out that it is not the router they can see that is the problem; it is the one they cannot see. That idea came from a presentation by Thomas Akin, CISSP, Director, Southeast Cybercrime Institute who had a presentation for the Blackhat briefings. The 2002 presentation gave me the idea. You see apart from the lack of security, the +1 hop hack allows form something truly unique. Consider [.MIL Server], that server connects to <secure router 1> and things are set into motion. Now, we cannot direct all the traffic, yet materials from that location to let’s say ‘preferred consultant one‘ will go via certain paths, yet the first router after <secure router 1> tends to be merely one or two routers (depending on traffic) to that preferred consultant. It is easy to find a router that could optionally be a link to these routers and duplicate all packages that go to that specific next step. Not only is the task easily done, the path is not hindered, the router is not intervened with and a simple reset takes away whatever evidence existed in the first place. In addition, the additional part is that the compact flash in those routers is ‘The maximum storage capacity for the CF in Slot0 and Slot1 is 4GB‘, yet the only part here is that you only needed 32 MB, which is what most of us used then, but cards that small are no longer made, so most IT people just plug in what they have. You have well over 3GB of package storage, so all packages to that one location could be stored and redirected on the ‘off’ hours as not to leave any monitored spike. Until the CFlash card is ejected from the router and investigated no one will have a clue. That was 7 years ago and the systems are even more capable now, a 3GB glitch will not register on most systems, especially when those IT people do not block Spotify and/or YouTube. By the time they figured it out, the setting is already wiped, and this path can be adjusted on a daily bases so that most IT networkers never had a clue in the first place.

You think that I am alone in this, that I am this clever? No, I am not! There are plenty of IT Networkers running circles around me and that is now set into the stage of ‘we’re untouchable‘. The CIA was never that, they never needed to be touched, the opponent merely needed a clear line of sight to the router that is one skip from the secure router that they needed to get to. We see more in the Foreign Policy article with the quotes “Information about sources is so highly compartmentalized that Lee would not have known their identities. That fact and others reinforced the theory that China had managed to eavesdrop on the communications between agents and their CIA handlers” and “an encrypted digital program, allows for remote communication between an intelligence officer and a source, but it is also separated from the main communications system used with vetted sources, reducing the risk if an asset goes bad“. Now we merely add “But the CIA’s interim system contained a technical error: It connected back architecturally to the CIA’s main covert communications platform. When the compromise was suspected, the FBI and NSA both ran “penetration tests” to determine the security of the interim system. They found that cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources, according to the former officials“. I believe it goes further than that. If we see the entire layer process and consider that in the end, certain systems merely replicate a process. Cisco (at https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html) gives us: “A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1Q are two types of encapsulation that are used to carry data from multiple VLANs over trunk links”, as well as “The DA field of the ISL packet is a 40-bit destination address. This address is a multicast address and is set at “0x01-00-0C-00-00” or “0x03-00-0c-00-00”. The first 40 bits of the DA field signal the receiver that the packet is in ISL format“, so as the destination was known, the people needing this could search very specifically. When we consider ‘It connected back architecturally to the CIA’s main covert communications platform‘, the connection back would enable those seeking to find the needed value of the DA field. That does not merely impede the CIA, it stands to reason that to some degree the NSA would be just as vulnerable.

The main course

In my case, I tend to go for the Bambi burger, ideally I watch Bambi whilst having that lovely slice of venison. You see when we get to “As part of China’s Great Firewall, internet traffic there is watched closely, and unusual patterns are flagged. Even in 2010, online anonymity of any kind was proving increasingly difficult. Once Chinese intelligence obtained access to the interim communications system,­ penetrating the main system would have been relatively straightforward, according to the former intelligence officials. The window between the two systems may have only been open for a few months before the gap was closed, but the Chinese broke in during this period of vulnerability“, I believe the setting is worse than that. These players still require their consultants. It does not matter whether you call them construction workers, members of Blackwater, Xe Services, or Academi. It is those places as well as Booz Allan Hamilton and other providers that still require to be informed, and that is where the interception could start. The setting is not ‘the Chinese broke in during this period of vulnerability‘, it is the long term flags that they were able to test at this point and that is the fear we see with their setting of Huawei and partners. Not that Huawei is the danger, but the fact that Chinese intelligence is just as able to get into nearly all systems, it merely can get into Chinese systems faster (for now). This is where it gets a little more complicated, because it is not about the now, it is about tomorrow and the tomorrows that are coming. The only ones who have a chance of getting things done are players like the Constellis Group and Palantir when they unite abilities. It is going to be about data and about the ability to forecast how traffic goes. Thomas Akin was teaching this wisdom 16 years ago. We see this when we are made to realise

  • Live system data is the most valuable.
  • Immediate shutdown destroys all of this data.
  • Investigators must recover live data for analysis.

And the loss is merely a reset away, in most cases if there is an automatic reset; the only data available is the last transgression at best. With the coming of 5G live real-time capturing data streams is what is more likely to set the stage of finding out what happened, in this the entire setting of ‘China’s Great Firewall‘, we are already looking at outdated Chinese technology and I do believe that those behind the article, as well as some DARPA people are aware of that. America and Europe are behind in ways that we cannot even perceive, because the players that need to move forward are doing so iteratively, that whilst the time of reengineering is now merely 10% of what the development time was. We see this with “Call this the IBM problem, which faced an existential threat as soon as Asian groups started churning out cheap PCs in the 1990s. But here IBM also provides a few tips to the future, with its pivot to software and solutions. By the time of IBM’s iconic “solutions for a small planet” ad campaign in 1996, the company was trumpeting voice recognition and ecommerce — producing the sort of digital enterprise backbone that ended up helping develop the internet economy” (source: Australian Financial Review). In the first instance the Asian market required 10-15 years to catch up, the second time around it took 2-3 years and now with Google and Apple working globally, it takes months. IBM (others too) took iterative steps to maximise the economic footprint, instead of truly leaping forward whenever possible, they lost the advantage and are now trailing the markets. Huawei is one clear example where the American market was surpassed. Samsung showed its supremacy by having 5G home routers ahead of everyone else and the advantage in Asia is only growing. It is seen with “Alternatively, authorities might have identified the system through a pattern analysis of suspicious online activities. China was so determined to crack the system that it had set up a special task force composed of members of the Ministry of State Security and the Chinese military’s signals directorate (roughly equivalent to the NSA), one former official said“. I do not read this part in the same way. I believe that with ‘set up a special task force composed of members of the Ministry of State Security‘, was not about cracking. I personally believe that the Cisco books were so illuminating that they decided to change the setting in their own game. I believe that the Chinese now have a more advanced system. They have done what players like Cisco should have done before 2014 and they did not. I believe that when we see a partnership between Constellis and Palantir, their findings will bear that out with in addition an optional link that shows part of the accusation that China let Russia in on certain findings (and the Russian evolution of certain networking devices). This and the next part is largely speculative, but it is supported to some extent. We see this in: “Once one person was identified as a CIA asset, Chinese intelligence could then track the agent’s meetings with handlers and unravel the entire network. (Some CIA assets whose identities became known to the Ministry of State Security were not active users of the communications system, the sources said.)“. I believe that he part given in ‘not active users of the communications system‘ gives us the third part. I believe that the system was not merely invaded. There is every chance that certain systems when activated also leave tags behind and that is where the intrusion would have paid off. You see, in the Cisco setting (as an example), the data frame has an optional 60 bytes of extension headers, yet is that always empty? More important, when were these data packages truly thoroughly checked? In this speculative setting I take you to the movie Die Hard 2. In that movie we see on how someone decided to get clever and uses the outer marker beacon to warn the planes that were in danger. The beacon can be used in other ways than merely give a beep. I believe that Cisco data packages have other optional parts than can be ‘reused’ to do something different, like the optional headers. They are to most merely empty pre-set ‘spaces’, but they could have more. That is the setting that America faces and the fact that they could get overwhelmed by Chinese intelligence because they did not rely on iterative parts. Huawei had been leaping forward, for example now offering a 128GB Android 8.1 phone (the Huawei nova 3i 128GB Handset), for 50% less than its competitors. A system that is just as advanced as anything Apple and Samsung offer; at merely half the price whilst Chinese Intelligence has been digging into that device for months, unlike the NSA that needs to queue up with all the other users to get to look at the Pixel 3 and the iPhone 8 on launch day. That is the setting we seem to be seeing and America is indeed and rightfully worried, not because Huawei has backdoors (which I never really believed) but because the players here had been held backwards through iterative technology. Apple is actually staged by Forbes that way with the quote ‘a minor point update for the iOS 11.1 iteration‘, even Forbes speaks about iterative changes. That is the setting that they are up against and they have been surpassed for years and with Huawei leading the 5G stage on a global setting the US authorities are merely getting more and more afraid that not only are they no longer the leading players, they are now sidelined by not being able to keep up with what will be presented ‘tomorrow’.

That part can be supported through the CIA with analyses reports (at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no3/html_files/Collection_Analysis_Iraq_5.htm), in here we see that Richard Kerr, Thomas Wolfe, Rebecca Donegan, and Aris Pappas give us (in a different context): “The analysis on this issue by the Intelligence Community clearly was wide of the mark. That analysis relied heavily on old information acquired largely before late 1998 and was strongly influenced by untested, long-held assumptions. Moreover, the analytic judgments rested almost solely on technical analysis, which has a natural tendency to put bits and pieces together as evidence of coherent programs and to equate programs to capabilities. As a result the analysis, although understandable and explainable, arrived at conclusions that were seriously flawed, misleading, and even wrong“. It is important to realise that this was on the WMD setting, so in a different context and on a different setting. Yet the information systems were all designed to upholster that flaw to an ‘evolved’ placement, the systems in their entirety are nowhere near ready, now even for the previous setting. The movement from a lot of staff to more fruitful consultant settings is now paying off in a negative way for the CIA (and the NSA too). This is where it gets interesting. You see, the previous setting that I gave should partially have been dealt with through the flashlight program that DARPA has. Raytheon BBN is working on that with Professor Richard Guidorizzi from George Mason University Fairfax. I think that the system is not entirely ready here, not if the packages can be duplicated via the router and as long as the original is not touched, that system will not get the alert lights ringing.

To get you on board on how far all the NATO partners are behind, let me give you two settings. The first is a DARPA Project called ‘Probabilistic Programming for Advancing Machine Learning (PPAML)‘, the man in charge is Dr. Suresh Jagannathan, yet the bigger brain might be MIT graduate Dr. Jennifer Roberts. The given setting is “Probabilistic programming is a new programming paradigm for managing uncertain information. Using probabilistic programming languages, PPAML seeks to greatly increase the number of people who can successfully build machine learning applications and make machine learning experts radically more effective“, whilst we also see the goods in the DARPA article by Dr Roberts with “If successful, PPAML could help revolutionize machine learning capabilities in fields from Intelligence, Surveillance and Reconnaissance (ISR) and Natural Language Processing (NLP) to predictive analytics and cybersecurity“, this is certainly leaping forward, but it is still based on a system. I believe that the Chinese decided to turn the funnel upside down. To illustrate this I need to get you to an app called Inke. The article (at https://thenextweb.com/contributors/2018/02/09/hidden-world-chinese-livestreaming-app-inke/), gives us ‘The hidden world of Chinese livestreaming app Inke‘, this is not a few people; this is a craze that has already infected millions upon millions. So with “he was actually doing a livestream, an extremely popular hobby for young people in China. China is way ahead of the rest of the world when it comes to embracing livestreams.” you are missing out and missing out by a lot. These streams are real-time and often geo-tagged. I believe that the Chinese have changed the setting, they are optionally collecting Terabytes of daily data and they are converting that to actionable intelligence. Facial recognitions in phones, geo-tagged and all uploaded and streamed, all converted on the spot, like the SETI screensaver, millions of affordable mobiles (this is where the Huawei nova 3i 128GB Handset and all other new handsets come in), parsing all that data into uploaded files and Chinese intelligence gets global information close to real time, whilst their learning machines are about efficiencies of collected data, it is not about the better application by making them more effective, it is about the massive amounts of data offered to get the systems to upgrade the efficiency of parsing data, because parsing data is where the bottleneck will be in 5G and they already have a larger advantage.

In the meantime, on any given day thousands of Inke users are filming life around them in malls and famous places looking awesome doing it. Yet, if you look at the CCTV settings, how many users would have passed 935 Pennsylvania Avenue, Washington DC, or at London SE1 9EL, UK walking towards London Bridge? How many people were merely assuming that they were tourists face timing with mom and dad? Are you getting that picture now? and also realise that Inke is merely one of more than 300 live streaming companies, all capturing that data all those tags that a smartphone allows it to capture and at the top of all this, Facebook and YouTube are eagerly pushing people to gain following by doing just that. So how long until the user realises that uploading the same stream to 2-3 providers gets them to gain a lot more following and optionally cash? Yes, the intelligence community is that far behind at present. So when we are worrying on “The system was not designed to withstand the scrutiny of a place like China, where the CIA faced a highly sophisticated intelligence service and a completely different online environment“, we need to consider that China is already ahead of the game and the CIA systems might be merely an option to scrutinise their own data, because that remains the Chinese bottleneck, the data will require verification and that is the one field where their opposition could gain the advantage if they set their minds to a different algorithm, one on reliability, not on likelihood. It is a setting where all the players involved have a second tier of consideration. They embrace a ‘not now, but soon‘ thought, when ‘I needed this yesterday‘ is the proper setting as I personally see it, because data without proper vetting is merely used space on any given storage device.

That final part can be considered when we look at the linked article that NBC had from last January. There we see: “When agents searched Lee’s hotel rooms in 2012, they found notebooks with the names of covert CIA sources, according to court documents. But not all of the agent arrests and deaths could be linked to information possessed by Lee, who left the CIA in 2007“, an issue I mentioned in an earlier blog. We get there when we consider his actions and ‘found notebooks with the names of covert CIA sources‘, do you think that anyone, especially in this setting would be that stupid? It’s like keeping the condom as a trophy after having intercourse, its useless and stupid. I believe that either it is not the ‘covcom’ system, or not merely the ‘covcom’ system. I believe that (if it is all correct) that Chinese intelligence got in further and deeper into acquiring the data required and the notebook is the proverbial red herring in all this, especially as Jerry Chun Shing Lee left the CIA in 2007. You do not hold on to that level of information 11 years after you might have had some level of valid reasons to have it in the first place. That is the part many overlooked, or looked away from.

In the end, I do believe that it is not merely the inability that drove the anti-Huawei waves, it is the fact that those decision makers have no idea where to navigate towards next is what drives their fears almost exponentially.

 

Leave a comment

Filed under IT, Military, Politics, Science

First Blood

It’s nice to see the Guardian this morning, first there is the news on Alan Rushbridger who stops being a teenager and starts heading the Scott Trust the power that be, behind the Guardian and several other media companies. Why Teenager? Well, as I see it, when you follow your passion you tend to avoid having to grow up (a sort of Peter Pan syndrome) and this man has lived his dream as I see it. I have written against the Guardian more than once, but it is clear Alan knows what he was doing and he was doing it quite well. Lastly, the bastard looks 15 years younger than his actual age (geriatric envy).

Anyway, now that is out of the way, let’s focus on some first blood. Some will have missed it, but with this jab, President Obama has started his feeble attempt in getting the Democratic Party re-elected in 2016. He needs to get an early start, because if the House Elections are anywhere near an indication, the democrats will lose by a landslide as I see it at present. The Republicans now have 246 seats against the democrats 188, which means that minority speaker Pelosi needs to seriously woe the republicans to get anything sorted, this also implies that President Obama needs to get used to the word ‘No’ a lot more then that he is comfortable with.

So, as we look at the continuation of a white horse, we look at the latest article called ‘White House under pressure as calls for CIA accountability grows stronger‘ (at http://www.theguardian.com/us-news/2014/dec/10/white-house-cia-torture-report). Now there is nothing really against the article itself, it is just a reflection for that what seems to be. But the following parts jumped out at me.

The White House is under growing pressure to hold individuals accountable for covering up the torture of terrorist suspects, with calls coming from a senator for a purge of top CIA officials and a furious row over whether the agency kept both Congress and the previous administration sufficiently informed of the program“, which senators? To give some of these people the label ‘pussy’ seems harsh but in effect that is the truth. These people are all about ‘not getting hands tainted’, ‘I still need to sleep at night’ and ‘as long as I am kept in the dark’. The real terror world outside the US is a nightmare realm, if you can stomach it, the consequences and the acts you have to live with you do not and never will belong on the hill and you belong as a part of the Langley brotherhood, likely trained or to be trained in Quantico or Lejeune. Going up against terrorists is a dirty business and it will damage your soul, whether you believe it or not. Now, I spoke out against the acts yesterday and to the major extent I believe that it was a flawed approach from the beginning. But the reality is that bringing a terrorist into the yard for a meeting with Sir Bernard Hogan-Howe, having tea and a biscuit will not lead to information or determent. You must become the beast they fear. If there is one clear directive that we learned from the KGB (now the FSB) and how they dealt with the Russian Mafia, it is that a soft glove leads nowhere.

So which senator made that call? Well, the information is that it came from Senator Mark Udall from the state of Colorado, which seems to be predominantly Republican. By the way, how loud were some of these people before 2010?

The next statement: “When countries are threatened, oftentimes they act rationally in ways that in retrospect were wrong”, is one I can go along with, it is true that this happens, yet the one thing we still ignore is that the terrorist attack we saw had been so unprecedented, that any ‘rational’ response could be thrown out of the window. This compared to the Chechnyan act of parking trucks loaded with explosives next to apartment buildings and blow them (Moscow 1999), try that approach in San Francisco and watch millions go insane with rage. It is a mere and simple cause & effect. If you go into a war against such opponents you need to keep your cool and show that you are willing to do that what they could not fathom. In other words you need your own kind of monster available.

This does not change my premise that the intelligence gained from prolonged torture tends to be ineffective and mostly useless. Whatever answer in regards to state ‘we got Bin Laden this way‘ is on thin ice, regarding how many people it took to get any information on one person.

many insiders perceive as an attempt to isolate the intelligence community from Washington’s political leaders was also supported by former CIA director Michael Hayden“, which is exactly what I would consider to be a fact and the administration had some knowledge of what happened (like water boarding), yet they would never know, or want to know the details, they wanted to see results. Which calls the following to be called into question: “White House rejects claims agency misled President Bush“, which might be academically true, but ““That’s a point of some contention,” he said, when asked whether the CIA had lied to the White House. “There are some people who have said that that’s not true.”” here we see the crux, what EXACTLY was not true? You see, we get a number of ambiguous references, but did the CIA lie, or did they not reveal all facts? There is a large difference here, and as such part of this what we read becomes a deception on how ‘guilty’ the previous administration could have been. It is first blood, the Democrats seem to be pushing for a moral guilt call, in reflection on President Obama ‘stopping’ the torture procedures, yet, if we believe the Huffington Post (at http://www.huffingtonpost.com/2012/08/20/obama-black-sites-rendition-torture_n_1812578.html), we see that like the technical support of their phone lines, it had been outsourced. The headline that gave us ‘Obama Administration Outsources Torture: Can U.S. Ever End Human Rights Abuses?‘ also tells us: “Despite the closure of these facilities, the administration’s use of extraordinary rendition has outsourced human rights abuse to other countries. Will we ever get rid of torture?” It gives a whole new meaning to the claim ‘it was not us!’

Black water anyone, or do we call it coffee?

What is in a name, in an act and in any non-written, non-verbal agreement is being looked at, which means it is a discussion of innuendo, whilst the politicians hide behind ‘if it is not written down, it does not exist’, knowing that they play this game, selling whatever service they condoned for their own selfish need of re-election. That is how this reads between the lines. So when we read “Director [John] Brennan and the CIA are continuing to wilfully provide inaccurate information and misrepresent the efficacy of torture. In other words, the CIA is lying,”, we should ask certain questions of Senator Udall as well, The senator, who was before that in the House of Representatives, representing the community of Boulder (where Mork from Ork used to live), representing the Judiciary and Agriculture Livestock & Natural Resources Committees, can we all agree that litigating for cattle is not really the same as discussing the finesses of intelligence?

The final part is seen with “Yet Obama’s spokesman went out of his way to defend Brennan on Wednesday, denying that he had lied about any aspect of the torture inquiry“, yes, the President would not like to get his hands tainted on fingering guilt towards Director John Brennan, yet overall this entire article reads like the Democratic administration has started regaining votes and visibility through false morality by having a Minority Democratic Senator stand up and voice thoughts that are morally right, but for the morally wrong reasons. It is almost like the initial invasion on Iraq, when you do the right thing for the wrong reasons you corrupt whatever banner you wish to hold high. In a faltered economy, virtually boosted, the losing party of the next election will feel the consequences of this depreciated position. The democrats are desperate to make sure it is not them.

There is one more quote that calls it all into question. Consider ““The lines of accountability that needed to be set up weren’t always in place and that some of these techniques that were described were not only wrong were counterproductive.”“, it is so nice that President Obama is trying to fit this into the hands of the Intelligence community, like ‘vice holds’ and ‘muzzles’, would it not be nice if he had taken that approach towards the financial industry at least three years ago? If he had done that, America might not be in the desperate economic state it is now; moreover Russia might take America serious when they discuss the Ukraine. This article is all fine, but it read like the democrats will be using this for something entirely different, I hope the people can read between the lines here, because holding certain people to account after the fact, whilst the condoning politicians remain unaccounted for is more than just a little shady.

 

Leave a comment

Filed under Finance, Media, Military, Politics