It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Many reporters I know are quietly freaking out about having to go through that again. We all remember the WMD fiasco.
But security experts say that the document provides little in the way of forensic "proof" to confirm the government's attribution. Private security firms — like CrowdStrike, who investigated the DNC breach — went much further, they say.
"The DHS statement is a restatement of already known public information, a series of technical indicators that are intended for use by cybersecurity professionals in finding and remediating APT28 malware on private sector networks, and some generic advice for companies as to how to improve their network security," said Matt Tait, founder of the U.K.-based security consultancy Capital Alpha Security.
And the conservative glee is understandable: after all, Bush said Iraq had WMD, and here they are. Unfortunately for the right, however, they are just as wrong about this issue now as they were in 2003 — but for a peculiar, little-understood reason: Saddam Hussein was not trying to hide the chemical munitions found by the U.S. Just the opposite, in fact.
Behind a firewall of impunity and protection from the State Department and the CIA, U.S. clients and puppets have engaged in the worst crimes known to man, from murder and torture to coups and genocide. The trail of blood from this carnage and chaos leads directly back to the steps of the U.S. Capitol and the White House. As historian Gabriel Kolko observed in 1988, “The notion of an honest puppet is a contradiction Washington has failed to resolve anywhere in the world since 1945.” What follows is a brief A to Z guide to the history of that failure.
The Draft Communications Data Bill (nicknamed the Snoopers' Charter or Snooper's Charter) is draft legislation proposed by then Home Secretary Theresa May in the United Kingdom which would require Internet service providers and mobile phone companies to maintain records of each user's internet browsing activity (including social media), email correspondence, voice calls, internet gaming, and mobile phone messaging services and store the records for 12 months. Retention of email and telephone contact data for this time is already required by the Data Retention Regulations 2014.[1] The anticipated cost is £1.8 billion.
Wyden: Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?
Clapper: No sir.
Wyden: It does not?
Clapper: Not wittingly. There are cases where they could, inadvertently perhaps, collect—but not wittingly.
This was a lie. Many people believed it was a lie at the time, but that was confirmed thanks to the documents leaked by Ed Snowden, who later claimed that seeing that bit of testimony helped convince him that he needed to go through with his plan to leak this information.
James Clapper, of course, is the Director of National Intelligence, and the heads of the various intelligence agencies basically report in to him. He's still in that job, which many people argue is a complete travesty. He flat out lied to Congress and got away with it.
I expected to see the IP’s or other signatures of APT’s 28/29 [the entities which the U.S. claims hacked the Democratic emails] and where they were located and how/when the data got transferred to them from DNC/HRC [i.e. Hillary Rodham Clinton]/etc. They seem to have been following APT 28/29 since at least 2015, so, where are they?
Further, once we see the data being transferred to them, when and how did they transfer that data to Wikileaks? This would be evidence of trying to influence our election by getting the truth of our corrupt system out.
And, as Edward Snowden said, once they have the IP’s and/or other signatures of 28/29 and DNC/HRC/etc., NSA would use Xkeyscore to help trace data passing across the network and show where it went. [Background.]
In addition, since Wikileaks is (and has been) a cast iron target for NSA/GCHQ/etc for a number of years there should be no excuse for them missing data going to any one associated with Wikileaks.
Just as there was no al Qaeda or ISIS to attack in Iraq until the U.S. bombed its government, there was no ISIS in Libya until NATO bombed it.
Africa has seen the most dramatic growth in the deployment of America’s elite troops of any region of the globe over the past decade, according to newly released numbers.