Witness a Pentagon victory lap in today's edition of the New York Times. This individual report, which may offer the impression of progress, obscures a larger trend. The Taliban are (as one U.S. military leader put it) 'not losing'.
This is because the overall trajectory of war in Afghanistan is function of the underlying organizations involved. The Taliban may indeed occasionally lose senior leaders but their replacements are drawn from a broad pool of capable and devoted subordinates who believe in their long-term mission. As brutal as they are, had this not been the case the Taliban would have been snuffed out years ago.
The opposing side does not have this kind of resilience. The U.S.-sponsored government forces have been hobbled by corruption and internal turmoil. Numerous operations have resulted in civilian deaths. It's gotten to the point where the government is actually having trouble recruiting soldiers. Which is a warning sign that the Afghan security services are unhealthy relative to their enemies. Yet the United States desperately pumps in resources, failing to recall that Afghanistan is the graveyard of empires. -BB (2018-12-02)
"The Kingdom agreed to spend and invest $450 billion in the United States. This is a record amount of money. It will create hundreds of thousands of jobs, tremendous economic development, and much additional wealth for the United States. Of the $450 billion, $110 billion will be spent on the purchase of military equipment from Boeing, Lockheed Martin, Raytheon and many other great U.S. defense contractors... After the United States, Saudi Arabia is the largest oil producing nation in the world."
A rather candid admission about power and who wields it. What really matters to the American Deep State is arms sales and oil. Channeling the profits from oil imports back to U.S. arms merchants. Of course Trump isn't alone, President Obama made similar, less blatant, statements. Never mind that it's kind of difficult to wage a war on terror when the global wellspring of Sunni extremism is Saudi Arabia. Our own leaders admit as much (usually in private).
"We need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region"
Interests over stated values. Access to resources and opening up new markets. That's what the Deep State wants despite the cost. -BB(2018-11-21)
"The CIA doesn’t say they did it. They do point out certain things. And in pointing out those things, you can conclude that maybe he did or maybe he didn’t." [what's the degree of confidence? The evidence? Details matter]...
"The fact is, they’ve been a very strong ally. They create tremendous wealth. They create, really, a tremendous number of jobs in their purchases. And very importantly, they keep the oil price down. If you want to see a global depression, all you have to do is lift the oil price $50 a barrel, which could happen very quickly, once we lose that relationship" [yep, it's all about arms sales and oil]...
"Maybe the world should be held accountable, because the world is a vicious place. The world is a very, very vicious place" [diffusing responsibility]."
And to top it all off, Saudi Arabia wants a nuclear program. Good grief, nuclear winter here we come.
It looks like Donald Trump and members of the #Resistance have finally found common ground. Republicans, with the help of a half dozen democrats, just sent an ominous message to the world. An official directly involved in torture has been rewarded with power and status. Accountability, it would seem, is reserved for leaders who don't have the military strength or clout necessary to garner immunity, and for whistleblowers.
The CIA has a long and storied history of torturing people. When you hear the name Gina Haspel, think of Dan Mitrione. A monster who built a sound-proofed basement in his Uruguay residence so that he could test out his methods:
"If you ask me whether there were interrogations, I'd say no, because the unfortunate beggars who were being tortured had no way of answering because they were asked no questions. They were merely guinea pigs to show the effect of electric shock on different parts of the human body."
Matt Taibbi at Rolling Stone covers a recent paper by Thomas Pikkety:
"Piketty just puts numbers behind an observation that anyone covering recent American presidential elections could have made: That huge pluralities of voters on both sides of the aisle feel unrepresented and even insulted, and increasingly see both major parties as tools of the very rich... This simple idea, that the real split in American society was less like 50-50 and more like 99-1, was completely logical in a country where the top 1% owns more wealth than the bottom 90%."
Or, in Piketty's words, "high-education elites now vote for the 'left', while high-income/high-wealth elites still vote for the 'right' (though less and less so). I argue that this can contribute to explain rising inequality and the lack of democratic response to it, as well as the rise of 'populism'"
Thus the fracturing that's taking place within both parties as the oligarchs fight to maintain control. -BB(2018-03-31)
What's scandal for one side is brilliance for the other. A member of Obama's 2012 analytics team (which scraped fives times as much data as Cambridge Analytica) explains how Facebook played favorites with regard to data access:
"'Facebook was surprised we were able to suck out the whole social graph, but they didn’t stop us once they realized that was what we were doing.' The social graph is Facebook's map of relationships between users and brands on its platform. And after the election, she recently acknowledged, Facebook was 'very candid that they allowed us to do things they wouldn't have allowed someone else to do because they were on our side.'"
Keep in mind that Cambridge Analytica is just one influence peddler in an industry devoted to subtle cognitive manipulation. There are customers with deep pockets in both the GOP and the Democratic Party.
Don't buy into the myth that you can protect your privacy on Facebook. The very act of using social media creates a significant trail of data. This information will be sold to the highest bidder and generously shared with spies at home and abroad. Social media is surveillance. The service is free because your personal data is the product. The only way to truly protect yourself is to opt out.
Big Brother, like the oligarhcy it serves, is bipartisan. -BB(2018-03-22)
"The basic nature of some of these vulnerabilities amounts to complete disregard of fundamental security principles. This raises concerning questions regarding security practices, auditing, and quality controls at AMD."
Note how the researchers don't mince their words:
"The CHIMERA vulnerabilities are an array of hidden manufacturer backdoors inside AMD's Promontory chipsets."
I repeat, "manufacturer backdoors." In other words, deliberate neglect is a distinct possibility. In light of compartmented efforts like BULLRUN and the SIGINT Enabling Program, it would be naïve to think that these flaws are the product of innocent mistakes.
The IC's subversion programs didn't magically vanish after Ed Snowden went public. Implement whatever mitigation strategies you want and American spies will dance right over them. They don't call it information dominance for nothing. This report is a graphic reminder. Facing down the NSA/CIA entails severe controls. You've been warned -BB(2018-03-13)
This is why, when it comes to nation-states, attribution is wishful thinking. Spy masters have invested the resources in technology and operational planning necessary to thwart investigators. Witness the CIA's Hive software:
"Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA..."
"Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated."
What? The CIA is masquerading as Kaspersky to launch attacks? Who would've guessed?... -BB(2017-11-09)
A campaign involving hundreds of journalists has spent the better part of a year wading through 13.4 million files acquired by the German newspaper Süddeutsche Zeitung. Here's a nutshell summary:
"[The investigation] reveals offshore interests and activities of more than 120 politicians and world leaders, including Queen Elizabeth II, and 13 advisers, major donors and members of U.S. President Donald J. Trump"
"One of the Kremlin-owned firms, VTB Bank, quietly directed $191 million into an investment fund, DST Global, that used the money to buy a large stake in Twitter in 2011. They also show that a subsidiary of the Kremlin-controlled energy giant Gazprom heavily funded an offshore company that partnered with DST Global in a large investment in Facebook."
Think of these documents every time you hear the political class mention "shared sacrifice". -BB(2017-11-05)
A WikiLeaks press release describes the CIA's efforts to develop firmware-level rootkits:
"Included in this release is the manual for the CIA's 'NightSkies 1.2' a 'beacon/loader/implant tool' for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.
"While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise."
The notion that all of Silicon Valley's secret deals somehow ended in 2013 is delusional. In a recent interview Julian Assange calls out the usual suspects:
"Other companies affected by the CIA's hacking tools, such as Google, Microsoft and Apple, in contrast, simply forwarded WikiLeaks' offer to provide further information to their legal departments. Assange claims that this was done because these companies work with US intelligence agencies. It is also the reason that so many employees at such companies have US government security clearance, especially those who work in cybersecurity departments."
The bitter pill is this: you cannot have your cake and eat it too regardless of how much money the C-suites in the Bay Area throw at public relations and overt gestures of defiance. -BB(2017-03-23)
"By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified."
Cryptome has a history of being correct about spies and their ops. And so I'll repeat a prescient observation from John Young:
"The last thing CIA and its supporters want is a revelation of its manipulation of civilian leaders institutionalized by the 1947 National Security Act (also opposed by the military)."
Note the mention of anti-forensic techniques. Does this raise a few questions about allegations of Russian hacking? There's a reason why President Truman regretted the cloak and dagger authorization he granted the CIA. -BB(2017-03-07)
Update: The CIA has responded with an official statement. Which is essentially a pack of lies. The CIA's job is to implement policy which is mandated primarily by economic elites and organized groups representing business interests. It exists to assist in opening up markets and providing access to resources on behalf of oligarchic factions. Executive Order 12333 enables CIA operations within our borders. As Dennis Kucinich correctly notes "we are sliding down the slippery slope toward totalitarianism."
Several weeks ago, an exec at Microsoft called for a "Digital Geneva Convention." This may be interpreted as a public relations gesture by a documented NSA partner. Arms control in the cyber realm is nothing more than pleasant fiction.