DAMASCUS: ‘ HISTORIC KEY NOTE SPEECH SENDS SHOCK WAVES AROUND THE WORLD ‘

#AceNewsServcies – DAMASCUS:Dec.17-Gordon Duff was part of a Veterans Today Senior Staff Delegation that travelled to Damascus and was in consultation with the Veterans Today Board and other like minded individuals within the Military and Intelligence community. 

By Preston James

vt-syria

Last week Gordon Duff, Senior Editor of Veterans Today delivered an Historic Keynote Speech at the International Conference on Combating Terrorism and Religious Extremism held in Damascus, Syria. This speech is sending shock-waves around the World.

This Delegation included Veterans Today Senior Editor *Gordon Duff, Veterans Today Managing Editor **Jim Dean, Veterans Today Director ***Colonel James Hanke, and Veterans Today Financial Editor ****Mike Harris.

Gordon Duff’s speech quickly changed the focus of the whole conference and is now sending shock-waves around the World in the various Diplomatic, Military and Intelligence corps around the World.

Why is his speech Historic?

For a number of vitally important reasons. This speech is the first time in history an American Intelligence Team of “non-activists” gave a military briefing to an audience of this type, including key Military Leaders of diverse Tribal Forces throughout Lebanon, Syria and Iraq, along with a Russian delegation and many others from around the world. Before this historic speech by Duff, no one has ever dared to speak the simple truth about the true problem, that it is not Terrorism in the Mideast, but it is the effects of large scale international Organized Crime.

3

timthumb.php2

But even more important, Duff, a noted international Intel and Security Consultant, identified the root cause of United States of America’s dysfunctional involvement in Iraq and Syria and the true cause of ISIS/Daish.

Duff’s speech immediately changed the whole tone of the Conference and turned it to a very practical focus on the true causes of ISIS/Daish.

His speech immediately shifted the focus of the Conference from theoretical discussions of Terrorism and Extremism, to what is actually going on at the ground level at a practical level, who is responsible and why they are doing it, that is stealing factories and torturing and killing civilians, folks that are their people.

Gordon Duff laid out the true cause of ISIS/Daish in simple terms for the very first time anyone has ever done so publicly and this disclosure from such a highly credentialed and credible Intel Professional is now sending shock-waves around the World.

Duff declared that there are far too many that have died to continue speaking in unclear terms and that it was time to share a key hypothesis based on signals intelligence. Then Duff proceeded to explain the True Causes of ISIS/Daish in simple understandable terms which provide the clarity needed to form a sustainable solution.

Duff explained that what is going on in Iraq and Syria with ISIS is not Terrorism, it is simply CRIME. That is, it is the works of an international Crime Cabal which has gotten control of the American Congress. Yes, this is a large Organized Crime problem that must be understood at its simple root cause.

Duff identified this Crime Cabal as Israeli and pointed out that this is Worldwide Crime on a scale never experienced before.

Duff explained how the illegal Supreme Court Decision of Citizens United made it possible for an Israeli-American Organized crime magnate now operating out of Macao, Sheldon Adelson to essentially buy control of both Houses of Congress in the last election and being able to bring Congress under control of this International Crime Syndicate which specializes in human trafficking and narcotics.

Duff also identified American Generals McInerney and Vallely as being involved in organizing Daisch along with Senator John McCain.

He also pointed out that Secretary of Defense Chuck Hagel [who has just resigned] was the one that prevented the American bombing of Syria in response to the False-Flag gas attack at Aleppo, Syria.

This keynote address delivered by Gordon Duff was historic because for the very first time ever a Top Intel and Security Consultant publicly explained how the problem with ISIS/Daish is not terrorism but is Crime. He clarified that ISIS/Daish is a result of Criminal Behavior of an Israeli based International Crime Syndicate which essentially bought control over the US Congress during the last election.

Here is Gordon Duff’s keynote speech which was historical and is now sending shock-waves around the World.

It should now be clear to everyone that the creation of ISIS/Daish occurred not because of Terrorism, but because of the undue influence exercised on the American Political system by this Israeli based Crime Syndicate in which a faction inside the American Congress, Military and Intel has been manipulated into supporting the creation of ISIS/Daish.

It is easy to imagine why Duff’s frank disclosure in his keynote address that the real problem on the ground in Iraq and Syria is Crime and the handy-work of an international Israeli Crime Cabal immediately changed the tone of the conference, and is now sending shock-waves around the World.

This is the first time ever that these issues have been clarified for the Syrian Security Services and Military as well as to Intel, Military and Diplomatic representatives from all over the World.

In days and weeks to follow it is expected that such an Historic disclosure based on hard Intel will change the scope and tone of the discussion about what is really going on in Iraq and Syria on the ground and how a worldwide criminal enterprise is behind it.

There were several sophisticated attempts to sidetrack and derail the VT Delegation and keep Gordon Duff from delivering his Historic Speech. Despite all these attempted interceptions, one of which was directly thwarted by VT Financial Editor Mike Harris, Gordon Duff was able to deliver his keynote address and make history by putting the actual facts behind ISIS/Daish on the public record for the very first time. Colonel Jim Hanke spoke at the Conference also and his talk was very well received.

Jim Dean took numerous films which should prove to be quite important when some are published on VT.

Mike Harris gave numerous interviews to the Syrian Press and met with Syrian Security Officials and the Grand Mufti, the World’s top Islamic legal and theological schiolar. These discussions were very productive and did a great deal to further an understanding of what is actually behind the ISIS/Daish crime problem in Iraq and Syria which is nothing more than sophisticated international Organized Crime and must be dealt with as such.

Conclusion:

Obviously Gordon Duff and his team displayed great courage in attending this Conference in Damascus and deserve the highest commendations possible for this fine work representing the true interests of peace for folks with no voice.

When the dust settles time will show this speech will be a major turning point in the Criminal Cabal’s blatant abuse of the American People from their buying and hijacking of the US Congress and some American Generals with deep Intel connections and their abuse of millions around the World in many different nations, especially the Mideast.

No criminal Cabal or conspiracy this large can exist without utmost secrecy, which no longer exists thanks to Duff’s keynote address and complete disclosure. Their crimes are now no longer secret and the “Jig is now up”.

Thanks to Duff the Jig is about up for this International Israeli linked Crime Cabal, some have identified as the International Zionist Crime Cabal (IZCS) which has formed an alliance with the Bush Crime Cabal (BCC) which is now being completely identified all over the Worldwide Internet. It is now realized by many that the BCC was formed when Bush1 ran the Assassination of JFK and rose to power, able to deeply embed his operatives in the CIA, the Military, Congress, the Department of Justice and the Judiciary.

Now if anyone doubts that ISIS/Daish was set up under the Money Power of the International Zionist Crime Cabal (IZCS) operating out of Israel which has now gained Control of the US Congress, consider this. All ISIS/Daish wounded are taken to Israel for medical treatment, all expenses paid and those that can be are returned to Iraq or Syria to attack, torture, murder and asset strip innocent civilians, pretending to be Islamic Terrorists.

This is all done in order to create mass confusion and to empower those governments that exist off the spoils of pushing solutions to their synthetic terrorism which is really nothing more than a massive Organized crime operation to make money and accrue more power.

How do we know that the Criminal cabal has truly gained control over the US Congress. We now have actual specific evidence which has uncovered the Crime Cabal’s control over Congress through the use of large bribes and threats of assassination.

Source: 

#ANS2014

#intelligence, #key-note-speech, #military

WASHINGTON: ‘ CIA TORTURE REPORT TO BE PUBLISHED MONDAY WITHOUT THE WORD _________ ‘

#AceNewsServices – WASHINGTON – Dec.04 – CIA torture report to be published on Monday without the word ‘torture’

Published time: December 04, 2014 17:19

Source: RT Get short URL
Reuters/Kevin Lamarque

Reuters/Kevin Lamarque

The long-awaited publication of the so-called “CIA torture report” is expected to finally occur early next week, but would-be readers, be warned: according to leaks, the executive summary will be absent any and all use of the word “torture.”

Sen. Dianne Feinstein (D-California), the chair of the United States Senate Intelligence Committee, now says that the public will be able to read the executive summary of her panel’s years-long investigation into the CIA’s use of enhanced interrogation techniques next week, with journalist Jason Leopold reporting that the release of the document will come as early as Monday.

After a lengthy back-and-forth between the Senate committee and the CIA, however, the 600 page summary that will soon be made public — less than one-tenth of the actual report — will be ripe with enough redactions and wordplay to still leave much of the agency’s post-9/11 practices a mystery.

“The summary is expected to reignite the debate over whether the CIA’s coercive interrogation techniques in the first years of the war on terror amounted to torture,” Josh Rogin and Eli Lake wrote for Bloomberg View on Wednesday this week. “Although the summary report is said to not use the word ‘torture,’ officials said it would describe practices that any layman would understand as torture.”

In the midst of the months of delays brought on by bickering between the Senate and CIA over what to include in the public version of the report, it was reported in July by the Associated Press that people who read the report said the practices described within “amounted to torture by a common definition.”

“This report tells a story of which no American is proud,” reads part of a State Department document about the Senate panel’s findings that was sent to the White House over the summer and subsequently received by journalists at AP. Indeed, Reuters reported this week that the report concludes that harsh CIA interrogation tactics, including the simulated drowning technique known as “water-boarding,” as well as sleep deprivation and other acts tantamount to torture, provided the US with no intelligence breakthroughs that could have been achieved by other non-coercive means.

The leaked copy of White House talking points obtained by the AP over the summer in anticipation of the eventual release of the report acknowledged that the government will likely be asked, “Isn’t it clear that the CIA engaged in torture as defined in the Torture Convention?” The next day, US President Barack Obama made headlines after offering arguably the most blatant official recognition yet from the executive branch concerning the practices authorized by his predecessor in the wake of September 11 terrorist attacks.

“In the immediate aftermath of 9/11, we did some things that were wrong. We did a whole lot of things that were right, but we tortured some folks. We did things that were contrary to our values,” Pres. Obama said.

Nevertheless, indications from this week suggest that the Senate agreed to omit use of the t-word; according to Bloomberg, both Feinstein’s panel and the CIA agreed to certain concessions through negotiations brokered by the White House through Obama’s chief of staff, Denis McDonough: Rogin and Lake wrote that staffers in the Senate Intelligence Committed objected vigorously to hundreds of redactions the CIA had proposed in the executive summary,” but ultimately both sides had to make sacrifices.

“Among the most significant of Feinstein’s victories, the report will retain information on countries that aided the CIA program by hosting black sites or otherwise participating in the secret rendition of suspected terrorists,” reads part of Wednesday’s Bloomberg report. Per the CIA’s request, however, those host nations won’t actually be named, but rather will reportedly by given code names, like “Country A.”

Elsewhere, Bloomberg reported that Feinstein reluctantly agreed to another request from the CIA: according to this week’s article, the pseudonymous fake names used by undercover agents have been redacted from the executive summary as well. Previously, the New York Times reported that the White House supported the CIA’s stance regarding the matter.

“Hopefully they won’t redact too much and hopefully the White House won’t let them get away with redacting too much,” Senate Armed Services Committee Chairman Carl Levin told The Daily Beast in July. “Until you see what they are going to redact, it’s hard to know what material you have to work with.”

In late August, Sen. Feinstein told “Meet the Press” that her committee was engaged with the Obama administration to ensure that redactions to the executive summary do not destroy the report.”

“If you redact the evidence — heavily — then we cannot sustain our findings. We will not put out a report that does not enable us to sustain our findings. And I believe that that is understood,” Feinstein said then, adding that she expected the summary to be public by late September. Two months later, though, the New York Times reported that Democrats in charge of the Senate were accusing the White House of “trying to censor significant details” of the report, and that negotiations between the Senate and CIA managed by the White House were responsible for the delays.

On her part, Feinstein acknowledged previously that the report “uncovers startling details about the CIA detention and interrogation program and raises critical questions about intelligence operations and oversight.” Her committee’s $40 million, three-years-in-the-making investigation has been stymied in recent months after a stand-off erupted between the Senate panel and the CIA concerning allegations of spying concerning both parties. In late July, the CIA conceded that its officers had penetrated a Senate computer network used by staffers working on the report.

According to Reuters, the forthcoming executive summary includes 20 findings from the Senate about the results of the CIA program, as well as 200 pages of history on the topic, a rebuttal from the CIA and a dissent from congressional Republicans.

#ANS2014

#cia, #intelligence, #obama, #terrorism, #usa

Russia Opens Files on Nuclear 9/11 and Israeli Proliferation

Now is good a time as any for Russia to tell the World 9/11 was indeed an inside USA job, we all know it anyway. This is interesting and sad here http://www.veteranstoday.com/2014/05/20/nuke-cancer-from-911-revealed/ I am trying to get the full PDF report, will post when I get it. But Russia will call America into question on many things. The USA Government is corrupt and Russia know her secrets, so be prepared for more. This is Cyber war, this is economic war, this is an information war! This will make the cold war look like a woman’s handbag fight

The report below is taken from an intelligence dump by Russian sources. As the origin is from an intelligence agency in the form of a “leak,” there are always questions. Thus far, we have found not only is the majority of the material confirmed but several solutions to serious problems involving 9/11 are included. Not much has been redacted little here. However, this arrived with vast supporting documentation which can, in the future, be uploaded on SCRIBD for access. One key area is that the US had supplied Israel with surplus nuclear weapons. Back during the 1980s, Israel showed her inventory of Davy Crockett tactical nuclear warheads to one of an ex media editor, who at the time was a senior NATO intelligence official. These early “micro-nukes” were taken out of US inventory in 1978 and “disappeared.”

This highly classified report is being published unaltered except for bad machine translation errors being repaired. My personal opinion is that this is NOT a disinformation piece but rather represents a significant breakthrough. I believe that this is a rare glimpse behind the curtain.
I am publishing this for the use of those qualified to understand how little of this is really new. Those things that are new are groundbreaking. For those who find this all a bit over their heads, there is little I can do other than to let you know that this is the world “your elders” really live in and that you finally have a chance to look in mom and dads top dresser drawer.

Thanks to these You Tube channels

According to a retired FXX agent specializing in Israeli counter intel: The type of nuclear devices used on 911 were a modified version of the W-54 nuclear artillery shells that were covertly provided to the Israelis between 1988 and 1998 from US surplus stockpiles illegally exported during the Bush/Clinton era.
Chemical analysis done by DOE Sandi was able to identify the chemical/radiation footprint or fingerprint of the warheads based on samples taken after 911 of the fallout at ground zero.
All plutonium based warheads have a chemical fingerprint that can identify the type of design and where the PU was made and how old it is. This was the 911 blackmail on Bush 1 and 2, the illegal transfer of surplus US nuclear weapons to the Israelis and why the continued cover up, along with the stolen gold and stock fraud that was going on Wall Street etc. According to file ENW57.pdf on page 66.
Only a 2 kiloton device was needed to drop the buildings. A 2 kiloton device will produce a fireball of apx 150 to 200 feet in diameter at over 4000 degrees Centigrade. Just large enough to melt the I beams of the central core of the building and drop them in place. The light flash would last less than 1 second and primarily be in the UV light range. Overpressure would only be at 60PSI max and directed upwards with the blast. See underground effect.
Fallout would be minimal and located to within ground zero range only. Radiation would drop to acceptable levels within 72 hrs. after the blast. Most fall out was trapped in the cement dust thus causing all of the recent cancer deaths that we are now seeing in NYC amongst first responders.

Melted steel and iron oxide or “nano thermite” is a byproduct of the very high gamma ray / Neutron flux induced into the central steel core. The radiation dissolves. High FluxIsotope Reactor Core – Cross Sectionthe steel into iron oxide consuming the carbon and silicone in the steel. This explains the missing steel columns and the very important clue of the “vaporized’ 20 ton antenna tower atop the south tower. The upward blast of radiation literally vaporized it. Video evidence proves this to be true.The total XXOO data file from DOE Sandia on the 911 event is well over 72 MB. P.S. Snowden didn’t have a Q clearance so he missed this one. Carnaberry had a pretty good stash of documents on the subject. (All under the transit stuff.) The entire nuclear nonproliferation story of stolen nuclear material coming from Russia was an Israeli cover story to hide the original source of weapons material coming from the US stock piles. Illegal distribution of US nuclear material to foreign allies was not limited to Israel. Virtually all NATO allies were in on this scam too. Dick Cheney was the bad guy on this one. Bush2/Cheney traded nuclear pits to foreign country as IOU’s in order to get what they wanted. Tom Countryman a well-known Israeli operative is curiously now in charge of N.N.P. at the State Department under Obama.(?) He was put there by Ram Emanuel.
the steel into iron oxide consuming the carbon and silicone in the steel. This explains the missing steel columns and the very important clue of the “vaporized’ 20 ton antenna tower atop the south tower. The upward blast of radiation literally vaporized it. Video evidence proves this to be true.

The total XXOO data file from DOE Sandia on the 911 event is well over 72 MB. P.S. Snowden didn’t have a Q clearance so he missed this one. Carnaberry had a pretty good stash of documents on the subject. (All under the transit stuff.) The entire nuclear nonproliferation story of stolen nuclear material coming from Russia was an Israeli cover story to hide the original source of weapons material coming from the US stock piles. Illegal distribution of US nuclear material to foreign allies was not limited to Israel. Virtually all NATO allies were in on this scam too. Dick Cheney was the bad guy on this one. Bush2/Cheney traded nuclear pits to foreign country as IOU’s in order to get what they wanted. Tom Countryman a well-known Israeli operative is curiously now in charge of N.N.P. at the State Department under Obama.(?) He was put there by Ram Emanuel.

Early Israeli core model – Vannunu photo
It appears that the weapon of choice for the Israelis were the W-54 and follow on series of nuclear pits taken from the Amarillo TX storage dump. This was what Carnaberry was working on for Bush senior in Houston. A total of over 350 pits were transferred to the Israelis over a 10 to 20 year period of time. The W-54 type of pit design were the most desirable due to the 2 point implosion pit design. This is the easiest to re manufacture and modify as compared to other circular pit designs.The pill shaped design of the W-54 type weapon contains over 1.5 times more plutonium than a standard pit. This would allow enough Plutonium to be recovered that was still of weapons grade use even after 32 plus years of age. Americium build up in the pit over time eventually makes the Pit unusable as a weapon so they have a limited shelf life based on how fast or slow the Plutonium was produce in the reactor at Stanford. Usually it was about 150 days max. Irradiation time in the reactor during production determines the shelf life of the pit as weapons grade material. All of the micro nukes used by the Israelis are re-manufactured W-54 type series devices.

These devices were used in the Bali bombing and the London bombing and in Japan on their reactors. Nuclear weapon use in Bali confirmed) Also used in Damascus, Iraq and Afghanistan by the US.
These are stored in most Israelite embassies for ease of deployment. The one’s used on 911 were kept at the Israeli consulate in NYC until put in place. After 911 the FBI now checks all diplomatic pouches with a Geiger counter before entering or leaving the US. The South African weapons were also surplus W-54 artillery shells acquired from Israeli and final assembly and testing was done in South Africa with Israel assistance.
This was done because the Israelis needed a testing ground in order to make sure that there rebuilt weapons would work as designed. The North Korean weapons are also of the 155 mm artillery design as provided by Israel.
The true North Korean nuclear weapons program is based on nuclear artillery use and not missiles. The plan is to use a massive artillery barge on South Korea if war breaks out this include the use of small nuclear artillery shells to counter US tanks rockets and artillery.
The Saudi’s also have a stash of W-54′s acquired from the US under Bush2. The Israelis have also provided them to India, Brazil, China, Taiwan, Japan, North and South Korea etc. Canada had been believed to be the source of Dimona is a standard 75 megawatt thermal open top reactor as used in France for their plutonium weapons production program, their version of Stanford

Due to over use as a fast breeder reactor by the Israelis, Dimona suffered a “steam explosion” IE a flash over indecent due to neutron criticality back in the late 1980′s under Bush 1. This shut down its operation for many years until repairs could be made.
It know only operates at very low power levels due to neutron absorption damage to the containment vessel. Now mainly use for isotope production. This forced the Israelis to turn to stolen nuclear stock piles from the US for the continuation of their nuclear program.
The Israelis knowing that the nuclear material that they had acquire only had a limited shelf life left before it was no longer usable as weapons grade then tried to dump it on the surplus market as fast as possible before it was of no use to them. So they dumped it on unsuspecting nations who would only sit on it and not be able to test it. These were the fissile tests in North Korea.
When everybody caught on to the scam such as Japan and Korea. (IE the Korean sub sinkings etc) they were angry because they paid big bucks for junk. This started a mini cold war with Israel and her old clients. However with micro nukes even as the plutonium ages it will still fissile producing a smaller size detonation well under 2 kiloton in size.So they can still be used as small dirty bombs or as very small tactical nukes such as the nuclear artillery strikes on Damascus with rocket assisted W-54′s. On the W-54 pit design it is pill shaped and it is only about 4 inches in diameter and weighs about 24 pounds.
Most of the fuel is consumed in the plasma fire ball when detonated so there is very little plutonium fallout left to escape. If it is salted with other materials the fallout can be even reduced to lower levels such as in an enhanced radiation device or the so called neutron bomb. This is what was used on 911.

The primary purpose of the nuclear weapon used on 911 was to produce a massive Gama ray / neutron flux that would vaporize about 150 to 300 feet of 6 inch thick steal I beams that constituted the central core of the WTC buildings. This created a free fall event as seen on TV that day. The flash would be hidden from sight due to the underground detonation. Most of the light was in the non-visible light spectrum any way. Over pressure would be reduced to 6 psi due to the blast traveling up the central core and neutron radiation vaporizing the TV antenna at the top of the building as see on TV. The fallout would be mainly vaporized concrete cement and iron oxide. This is why after 911 they told everyone on TV that the beta radiation burns that people were getting were due to the caustic cement dust and not due to the radiation effects from the radioactive cement fallout. The iron oxide found all over the place was what was left of the steel I beams. This was the so called Nano Thermite that was found everywhere. Fallout was limited to a 1 mile area around down town NYC. See charts. Radiation decay was reduced to safe low levels after 72 hrs, outside of ground zero its self. This is why the area was blocked off from the public for 3 days after the event, in order to let the radiation drop to safe levels

http://www.veteranstoday.com/

https://lunaticoutpost.com/Topic-Too-Classified-to-Publish-Bush-Nuclear-Piracy-Exposed

http://theartof12.blogspot.co.uk/2014/05/too-classified-to-publish-bush-nuclear.html

http://mastertransformation.com/blog/russia-opens-files/

#911, #russia, #cyber-war, #davy-crockett, #davy-crockett-tactical-nuclear-warheads, #economic-war, #information-war, #intelligence, #intelligence-dump-by-russian-sources, #israel, #israeli-proliferation, #nuclear-artillery-shells, #nuclear-warheads, #nuclear-weapons, #russia-opens-files-on-nuclear-911, #the-usa-government-is-corrupt, #wwiii

` Telecommunications Directorate has blocked access to ` YouTube ‘ after leak of Information Gaffe’

#AceWorldNews – TURKEY – March 27 – The Telecommunications Directorate has blocked access to popular video sharing platform YouTube.

This was just hours after a leaked voice recording in which Turkey’s foreign minister, intelligence chief and a top army general are heard discussing the developments in neighbouring war-torn Syria, uploaded onto YouTube on Thursday.

In the voice recording Foreign Minister Ahmet Davutoğlu, National Intelligence Organization (MİT) Undersecretary Hakan Fidan, Foreign Ministry Undersecretary Feridun Sinirlioğlu and Deputy Chief of General Staff Gen. Yaşar Güler are heard discussing possible intervention into Syria and possible reactions from the world.

CIHAN

#ANS2014

#foreign, #intelligence, #national-intelligence-organisation-mit, #syria, #turkey, #youtube

” Venezuelan Offices of the `Opposition Party Popular Will’ have been raided to arrest their Founder ”

#AceWorldNews says Venezuelan military intelligence officers are reported to have raided the headquarters of the country’s opposition party, Popular Will.

Several of the party’s officials alleged armed officers arrived at the office, threw tear gas, and attempted to remove several individuals from the premises.

“The intelligence officers arrived and began to harass us,” said party activist Adriangela Ruiz. Security camera footage provided by Popular Will, which has not been independently verified, showed officers entering the party’s offices armed with guns.

Venezuela’s government has issued an arrest warrant for Leopoldo Lopez, Popular Will’s founder, who has been accused by the Maduro administration of inciting violence and acts of terrorism.

#activist, #armed, #guns, #intelligence, #leopoldo-lopez, #maduro, #military, #officers, #opposition-party, #popular-will, #terrorism, #venezuelan, #violence

#NSA : ” Newly Declassified Memo Reveals Leaks on NSA Supplied by Edward Snowden Pushed Canada to Review its Surveillance Sharing with other Countries”

#AceWorldNews says a newly declassified memo reveals that leaks on the US National Security Agency supplied by former contractor #Edward-Snowden pushed Canada’s own spy agency to review its policies on sharing intelligence with America and other surveillance partners, Toronto Star reported. The three-page note from Communications Security Establishment Canada head John Forster says the Snowden leaks drove CSEC to examine whether the disclosures would damage its signals intelligence collecting abilities, as well as how the leaks would impact CSEC’s policies on domestic surveillance. The memo was intended for national security adviser Stephen Rigby and was prepared in mid-2013, not long after Snowden’s leaks were first published. The memo was obtained by Toronto Star under the Access to Information Act.

#access-to-information-act, #america, #canadas, #intelligence, #nsa, #snowden, #surveillance, #toronto-star, #us

Iraq: ” Former British Intelligence Officer Denied he made `Death Threats` and `Fired Shots` While Questioning Iraq Detainee’s”

#AceWorldNews says a former British military intelligence officer denied at a public inquiry Thursday that he had made death threats and fired shots while questioning Iraqi detainees in 2004, Reuters reported. The man, referred to as “M004,” said the methods were used to disorient detainees, but denied beating or physically threatening the Iraqis. He was giving evidence at the long-running Al-Sweady inquiry into events during and after a battle in southern Iraq on May 14, 2004.

#al-sweady, #battle, #british, #death, #detainees, #inquiry, #intelligence, #military, #officer, #public, #reuters, #southern-iraq, #threats

#Syria : “Western Intelligence Forces Discuss Security with Damascus” #Peace

#AceWorldNews says the intelligence services of some Western countries have visited Damascus to discuss security cooperation with his government, Syria’s deputy foreign minister said on Wednesday. “I will not specify [which countries] but many of them have visited Damascus,” Faisal Mekdad, told the BBC. The contacts appeared to show a rift between the political and security authorities in some countries opposed to Syrian President Bashar Assad, Mekdad said. “Frankly speaking the spirit has changed,” he added.

#acenewsservices, #bbc, #damascus, #government, #intelligence, #political, #president-bashar-assad, #security, #western-world

#NSA and #CIA Spied on “World of Warcraft Games” and On-line Games

World of Spycraft: NSA and CIA Spied in Online Games

 

by Justin Elliott, ProPublica, and Mark Mazzetti, The New York Times, Dec. 9, 2013, 7 a.m.

 

This story has been reported in partnership between The New York Times, the Guardian and ProPublica based on documents obtained by The Guardian.

 

Editor says this is a Copyrighted Article courtesy of ProPublica and The New York Times.  

 

Banner made for WikiProject Warcraft. Made by ...

Banner made for WikiProject Warcraft. Made by Havok. (Photo credit: Wikipedia)

 

Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.

 

Fearing that terrorist or criminal networks could use the games to communicate secretly, move money or plot attacks, the documents show, intelligence operatives have entered terrain populated by digital avatars that include elves, gnomes and supermodels.

 

The spies have created make-believe characters to snoop and to try to recruit informers, while also collecting data and contents of communications between players, according to the documents, disclosed by the former National Security Agency contractor Edward J. Snowden. Because militants often rely on features common to video games — fake identities, voice and text chats, a way to conduct financial transactions — American and British intelligence agencies worried that they might be operating there, according to the papers.

 

Online games might seem innocuous, a top-secret 2008 NSA document warned, but they had the potential to be a “target-rich communication network” allowing intelligence suspects “a way to hide in plain sight.” Virtual games “are an opportunity!,” another 2008 NSA document declared.

 

But for all their enthusiasm — so many CIA, FBI and Pentagon spies were hunting around in Second Life, the document noted, that a “deconfliction” group was needed to avoid collisions — the intelligence agencies may have inflated the threat.

 

The documents do not cite any counterterrorism successes from the effort, and former American intelligence officials, current and former gaming company employees and outside experts said in interviews that they knew of little evidence that terrorist groups viewed the games as havens to communicate and plot operations.

 

Games “are built and operated by companies looking to make money, so the players’ identity and activity is tracked,” said Peter W. Singer of the Brookings Institution, an author of “Cybersecurity and Cyberwar: What Everyone Needs to Know.” “For terror groups looking to keep their communications secret, there are far more effective and easier ways to do so than putting on a troll avatar.”

 

The surveillance, which also included Microsoft’s Xbox Live, could raise privacy concerns. It is not clear exactly how the agencies got access to gamers’ data or communications, how many players may have been monitored or whether Americans’ communications or activities were captured.

 

One American company, the maker of World of Warcraft, said that neither the NSA nor its British counterpart, the Government Communications Headquarters, had gotten permission to gather intelligence in its game. Many players are Americans, who can be targeted for surveillance only with approval from the nation’s secret intelligence court. The spy agencies, though, face far fewer restrictions on collecting certain data or communications overseas.

 

“We are unaware of any surveillance taking place,” said a spokesman for Blizzard Entertainment, based in Irvine, Calif., which makes World of Warcraft. “If it was, it would have been done without our knowledge or permission.”

 

A spokeswoman for Microsoft declined to comment. Philip Rosedale, the founder of Second Life and a former chief executive officer of Linden Lab, the game’s maker, declined to comment on the spying revelations. Current Linden executives did not respond to requests for comment.

 

A Government Communications Headquarters spokesman would neither confirm nor deny any involvement by that agency in gaming surveillance, but said that its work is conducted under “a strict legal and policy framework” with rigorous oversight. An NSA spokeswoman declined to comment.

 

Intelligence and law enforcement officials became interested in games after some became enormously popular, drawing tens of millions of people worldwide, from preteens to retirees. The games rely on lifelike graphics, virtual currencies and the ability to speak to other players in real-time. Some gamers merge the virtual and real worlds by spending long hours playing and making close online friends.

 

In World of Warcraft, players share the same fantasy universe — walking around and killing computer-controlled monsters or the avatars of other players, including elves, animals or creatures known as orcs. In Second Life, players create customized human avatars that can resemble themselves or take on other personas — supermodels and bodybuilders are popular — who can socialize, buy and sell virtual goods, and go places like beaches, cities, art galleries and strip clubs. In Microsoft’s Xbox Live service, subscribers connect online in games that can involve activities like playing soccer or shooting at each other in space.

 

According to American officials and documents that Mr. Snowden provided to The Guardian, which shared them with The New York Times and ProPublica, spy agencies grew worried that terrorist groups might take to the virtual worlds to establish safe communications channels.

 

In 2007, as the NSA and other intelligence agencies were beginning to explore virtual games, NSA officials met with the chief technology officer for the manufacturer of Second Life, the San Francisco-based Linden Lab. The executive, Cory Ondrejka, was a former Navy officer who had worked at the NSA with a top-secret security clearance.

 

He visited the agency’s headquarters at Fort Meade, Md., in May 2007 to speak to staff members over a brown bag lunch, according to an internal agency announcement. “Second Life has proven that virtual worlds of social networking are a reality: come hear Cory tell you why!” said the announcement. It added that virtual worlds gave the government the opportunity “to understand the motivation, context and consequent behaviors of non-Americans through observation, without leaving U.S. soil.”

 

Ondrejka, now the director of mobile engineering at Facebook, said through a representative that the NSA presentation was similar to others he gave in that period, and declined to comment further.

 

Even with spies already monitoring games, the NSA thought it needed to step up the effort.

 

“The Sigint Enterprise needs to begin taking action now to plan for collection, processing, presentation and analysis of these communications,” said one April 2008 NSA document, referring to “signals intelligence.” The document added, “With a few exceptions, NSA can’t even recognize the traffic,” meaning that the agency could not distinguish gaming data from other Internet traffic.

 

By the end of 2008, according to one document, the British spy agency, known as GCHQ, had set up its “first operational deployment into Second Life” and had helped the police in London in cracking down on a crime ring that had moved into virtual worlds to sell stolen credit card information. The British spies running the effort, which was code-named “Operation Galician,” were aided by an informer using a digital avatar “who helpfully volunteered information on the target group’s latest activities.”

 

Though the games might appear to be unregulated digital bazaars, the companies running them reserve the right to police the communications of players and store the chat dialogues in servers that can be searched later. The transactions conducted with the virtual money common in the games, used in World of Warcraft to buy weapons and potions to slay monsters, are also monitored by the companies to prevent illicit financial dealings.

 

In the 2008 NSA document, titled “Exploiting Terrorist Use of Games & Virtual Environments,” the agency said that “terrorist target selectors” — which could be a computer’s Internet Protocol address or an email account — “have been found associated with Xbox Live, Second Life, World of Warcraft” and other games. But that document does not present evidence that terrorists were participating in the games.

 

Still, the intelligence agencies found other benefits in infiltrating these online worlds. According to the minutes of a January 2009 meeting, GCHQ’s “network gaming exploitation team” had identified engineers, embassy drivers, scientists and other foreign intelligence operatives to be World of Warcraft players — potential targets for recruitment as agents.

 

At Menwith Hill, a Royal Air Force base in the Yorkshire countryside that the NSA has long used as an outpost to intercept global communications, American and British intelligence operatives started an effort in 2008 to begin collecting data from World of Warcraft.

 

One NSA document said that the World of Warcraft monitoring “continues to uncover potential Sigint value by identifying accounts, characters and guilds related to Islamic extremist groups, nuclear proliferation and arms dealing.” In other words, targets of interest appeared to be playing the fantasy game, though the document does not indicate that they were doing so for any nefarious purposes. A British document from later that year said that GCHQ had “successfully been able to get the discussions between different game players on Xbox Live.”

 

By 2009, the collection was extensive. One document says that while GCHQ was testing its ability to spy on Second Life in real time, British intelligence officers vacuumed up three days’ worth of Second Life chat, instant message and financial transaction data, totaling 176,677 lines of data, which included the content of the communications.

 

For their part, players have openly worried that the NSA might be watching them.

 

In one World of Warcraft discussion thread, begun just days after the first Snowden revelations appeared in the news media in June, a human death knight with the user name “Crrassus” asked whether the NSA might be reading game chat logs.

 

“If they ever read these forums,” wrote a goblin priest with the user name “Diaya,” “they would realize they were wasting” their time.

 

Even before the American government began spying in virtual worlds, the Pentagon had identified the potential intelligence value of video games. The Pentagon’s Special Operations Command in 2006 and 2007 worked with several foreign companies — including an obscure digital media business based in Prague — to build games that could be downloaded to mobile phones., according to people involved in the effort. They said the games, which were not identified as creations of the Pentagon, were then used as vehicles for intelligence agencies to collect information about the users.

 

Eager to cash in on the government’s growing interest in virtual worlds, several large private contractors have spent years pitching their services to American intelligence agencies. In one 66-page document from 2007, part of the cache released by Mr. Snowden, the contracting giant SAIC promoted its ability to support “intelligence collection in the game space,” and warned that online games could be used by militant groups to recruit followers and could provide “terrorist organizations with a powerful platform to reach core target audiences.”

 

It is unclear whether SAIC received a contract based on this proposal, but one former SAIC employee said that the company at one point had a lucrative contract with the CIA for work that included monitoring the Internet for militant activity. An SAIC spokeswoman declined to comment.

 

In spring 2009, academics and defense contractors gathered at the Marriott at Washington Dulles International Airport to present proposals for a government study about how players’ behavior in a game like World of Warcraft might be linked to their real-world identities. “We were told it was highly likely that persons of interest were using virtual spaces to communicate or coordinate,” said Dmitri Williams, a professor at the University of Southern California who received grant money as part of the program.

 

After the conference, both SAIC and Lockheed Martin won contracts worth several million dollars, administered by an office within the intelligence community that finances research projects.

 

It is not clear how useful such research might be. A group at the Palo Alto Research Center, for example, produced a government-funded study of World of Warcraft that found “younger players and male players preferring competitive, hack-and-slash activities, and older and female players preferring noncombat activities,” such as exploring the virtual world. A group from the nonprofit SRI International, meanwhile, found that players under age 18 often used all capital letters both in chat messages and in their avatar names.

 

Those involved in the project were told little by their government patrons. According to Nick Yee, a Palo Alto researcher who worked on the effort, “We were specifically asked not to speculate on the government’s motivations and goals.”

 

Andrew W. Lehren contributed reporting.

 

Editor says this is a Copy Righted Article Courtesy of ProPublica and The New York Times. 

 

LIVE DISCUSSION: What are intelligence agencies doing in virtual worlds? Join ProPublica reporter Justin Elliott and New York Times reporter Mark Mazzetti this Monday, Dec. 9, at 2 pm ET to discuss. Submit your questions here or on Twitter with the hashtag #spygames.

 

Editor says this is a Copy Righted Article courtesy of ProPublica and The New York Times. 

 

Tweet #SpyGames

 

Follow @justinelliott

 

 

 

#acenewsservices, #acesecuritynews, #cia, #communications, #government-communications-headquarters, #guardian, #intelligence, #microsoft, #national-security-agency, #new-york-times, #nsa, #online-games, #propublica, #second-life, #virtual-worlds, #world-of-warcraft