WikiLeaks Publishes Second Round of CIA Directors Emails

Most interesting is CIA Director John Brennan’s early email address rolodex list. Mr. Brennan apparently was a big user of Craig’s list, had deep contacts with academia and even sent flowers.

Today, 21 October 2015 and over the coming days WikiLeaks is releasing documents from one of CIA chief John Brennan’s non-government email accounts. Brennan used the account occasionally for several intelligence related projects.

John Brennan became the Director of the Central Intelligence Agency in March 2013, replacing General David Petraeus who was forced to step down after becoming embroiled in a classified information mishandling scandal. Brennan was made Assistant to the President for Homeland Security and Counterterrorism on the commencement of the Obama presidency in 2009–a position he held until taking up his role as CIA chief.

According to the CIA Brennan previously worked for the agency for a 25 year stretch, from 1980 to 2005.

Brennan went private in 2005-2008, founding an intelligence and analysis firm The Analysis Corp (TAC). In 2008 Brennan became a donor to Obama. The same year TAC, led by Brennan, became a security advisor to the Obama campaign and later that year to the Obama-Biden Transition Project. It is during this period many of the Obama administration’s key strategic policies to China, Iran and “Af-Pak” were formulated. When Obama and Biden entered into power, Brennan was lifted up on high, resulting in his subsequent high-level national security appointments.

If you have similar official documents that have not been published yet, submit them to WikiLeaks.

Published on 22nd October 2015

Afghanistan-Pakistan Executive Summary

Recommendations for a USG strategy in the Afghanistan-Pakistan (AF-PK) region. (7. November 2008, Author: SAA)

Download PDF or view HTML version.

Preface Memo to ExSum

A draft report from Louis Tucker, Minority Staff Director to Vice Chairman Christopher Bond, Senate Select Committee on Intelligence, outlining the recommendations of the previous document. (7 November 2008, Author: Louis Tucker)

Download PDF or view HTML version.

Contacts

A list of contacts as stored in the AOL email account of John Brennan. It mostly contains email addresses (people in active email exchange with the account holder) as well as some Instant-Messenger IDs (AIM).

Download original TXT.


Published on 21st October 2015

John Brennan Draft SF86

“National Security Position” form for John Brennan. This form, filled out by Brennan himself before he assumed his current position, reveals a quite comprehensive social graph of the current Director of the CIA with a lot of additional non-govermental and professional/military career details. (17 November 2008, Author: John Brennan)

Download PDF or view HTML version.

The Analysis Corporation

FAX from the General Counsel of the CIA to the Goverment Accountability Office about a legal quarrel between the CIA and “The Analysis Corporation”. TAC seems to have lost a tender for a US watchlist-related software project to a competitor. Issues seem to revolve around “growth of historical data” and “real-time responsiveness” of the system. (15 February 2008, Sender: CIA, Office of General Counsel, Larry Passar)

Download PDF or view HTML version.

Draft: Intel Position Paper

Challenges for the US Intelligence Community in a post cold-war and post-9/11 world; a calling for inter-agency cooperation, a ten-year term for the Director of the CIA and the Director of National Intelligence. It also demands the autonomy of the Intelligence Community, that it “… must never be subject to political manipulation and interference.” An unfinished paragraph is titled “Damaging Leaks of Classified Information”. (15 July 2007, Author: John Brennan)

Download PDF or view HTML version.

The Conundrum of Iran

Recommendations to the next President (assuming office in Jan. 2009) on how to play the figures on the U.S.-Iranian Chessboard (18 November 2007, Author: John Brennan)

Download PDF or view HTML version.

Torture

Letter from Vice Chairman Bond, Senate Select Committee on Intelligence, to his fellow board members with a proposal on how to make future interrogation methods “compliant” and “legal”. Instead of listing all allowed methods, every kind of interrogation should be considered compliant, as long as it is not explicitly forbidden by the “Army Field Manual” (AFM). (May 2008)

Download PDF or view HTML version.

Torture Ways

A bill from July 2008 called “Limitations on Interrogation Techniques Act of 2008” explicitly list the forbidden interrogation techniques mentioned in the previous document and can be considered a direct implementation of the recommendations of Christopher Bond. (31 July 2008)

Download PDF or view HTML version.

Stingray and Warrantless Cell Phone Tracking Policy

DHS issues stingray policy and answers to Oversight Committee

SCMagazine: The Department of Homeland (DHS) followed the Department of Justice’s (DOJ) lead on Wednesday with the release of its cell-site simulator, or “stingray,” policy.

The policy, as the agency wrote, “provides guidance and establishes common principles for the use of cell-site simulators across DHS.” The policy applies to the “use of cell-site simulator technology inside the United States in furtherance of criminal investigations,” the memorandum states.

Primarily, the policy hits on a required search warrant before operating a stingray device. In the past, the government has been derided for picking up innocent citizens’ data while they’re sharing public spaces with criminal investigation targets.

The majority of cases will require prosecutors to obtain a search warrant supported by probable cause; however, in exigent circumstances under the Fourth Amendment, such as situations where law enforcement’s needs are “so compelling that they render a warrantless search objectively reasonable” the warrant requirement can be waved. Exceptional circumstances are also exempt from a mandatory warrant. These instances often occur when obtaining a search warrant is “impracticable,” such as when Secret Service agents are protecting the president.

As far as data collection, data must be deleted as soon as the target is identified and no less than once every 30 days.

The policy release was accompanied by a hearing at the U.S. House Committee on Oversight and Government Reform. The representatives asked for clarification from both DHS and the DOJ on their stingray use and rules.

When Rod Blum (R-Iowa) probed about how agents would be reprimanded if they didn’t follow these policies, both the DOJ and DHS said individuals would be left to the agencies’ idea of appropriate punishment, but employees would definitely be held accountable.

“As with any technology procedure within an agency if individuals violate their agency’s orders they’re accountable to their agencies and subject to discipline,” said Elana Tyrangiel, principal deputy assistant attorney general, Office of Legal Policy at DOJ.

To ensure their policies are followed, both agencies instated an auditing procedure with designated executive-level contacts serving as direct lines of contact.

Secret Service allowed to use warrantless cellphone tracking

WASHINGTON (AP) – A new policy allows the Secret Service to use intrusive cellphone-tracking technology without a warrant if there’s believed to be a nonspecific threat to the president or another protected person.

Homeland Security Assistant Secretary Seth M. Stodder described to a House subcommittee Wednesday the department’s policy on the use of cell-site simulators.

Civil libertarians and privacy advocates have long expressed concern about the suitcase-size devices, known as Stingrays, which mimic cell-towers to scoop up electronic data that can be used to locate nearby phones and identify their owners. The devices don’t listen in to phone calls or capture text messages, Stodder said.

The policy the department unveiled this week is similar to the one announced in September by the Justice Department, which includes the FBI.

Federal law enforcement officers are required to get a warrant signed by a judge before using Stingrays, except under emergency “exigent circumstances” meeting the constitutional standard for probable cause under the Fourth Amendment, but when there is no time to get a warrant.

Stodder cited the example of kidnappings, such as a recent case where Immigration and Customs Enforcement officers used a Stingray to help locate and rescue a 6-year-old girl being held hostage by human smugglers in Arizona.

But Stodder said another allowed exception under the policy would let the Secret Service use Stingrays in “exceptional circumstances” without meeting the legal threshold for probable cause. In such cases, using the devices would require direct approval from “executive-level personnel” at Secret Service headquarters and the U.S. attorney for the relevant jurisdiction.

Asked whether that essentially granted a blanket exception for the Secret Service, Stodder said that the exemption would not be used in routine criminal probes, such as a counterfeiting investigation.

“The key exception that we envision is the Secret Service’s protective mission,” Stodder said. “In certain circumstances where you could have an immediate threat to the president and you have cryptic information, our conclusion in drawing the line between security and privacy here is to err on the side of protection.”

Stodder added that such information could be “a cryptic email or something like that” indicating a security threat to the president where agents would lack the time or the information to determine probable cause, “but you need to locate that person.”

Cell-site stimulators have been used for years by both state and federal law enforcement agencies, who tout them as a vital tool to catch fugitives and locate suspects. But privacy groups and some lawmakers have raised alarms about the secrecy surrounding its use and the collection of cellphone information of innocent bystanders who happen to be in a particular neighborhood or location.

Stodder could not immediately say how many times department law-enforcement officers had used Stingrays without warrants in recent years.

Rep. Ted Lieu, D-Calif., said Wednesday the newly announced guidelines are a good first step, but added that the policy still lacks transparency and provides overly broad permission for Stingrays to be used without warrants. The new federal policies also don’t apply to state and local law enforcement agencies that have purchased Stingrays, sometimes through the use of federal grants. More here.

WikiLeaks Posts the Hacked Emails of CIA Director

Yet another Obama administration placeholder that was using a private email for sensitive material.

Of particular note is the partially written summary on Iran from 2009, which appear to be the genesis and words the White House used to justify normalizing relations with the rogue nation. John Brennan was applying to obtain high security clearance to enter the Obama White House before 2009 and later assuming the role of the chief of the CIA.

*** “The United States has no choice but to find ways to coexist — and to come to terms — with whatever government holds power in Tehran,” Brennan said in the three-page memo. He added that Iran would have to “come to terms” with the U.S. and that “Tehran’s ability to advance its political and economic interests rests on a non-hostile relationship with the United States and the West.”

In the memo, Brennan advised Obama to “tone down” rhetoric with Iran, and swiped at former President George W. Bush for his “gratuitous” labeling of Iran as part of a worldwide “axis of evil.” Brennan also said the U.S. should establish a direct dialogue with Tehran and “seek realistic, measurable steps.” Although he didn’t specifically call for the regime of financial sanctions that the Obama administration, along with Europe, Russia and China, pushed against Iran, Brennan told the president-elect to “hold out meaningful carrots as well as sticks.” ***

In part, a deeper look at the text is as follows:

The Conundrum of Iran

Iran will be a major player on the world stage in the decades ahead, and its actions and
behavior will have a major and enduring impact on near- and long-term U.S. interests on
a wide variety of regional and global issues. With a population of over 70 million, xx
percent of the world’s proven oil reserves, a geostrategic location of tremendous
(enviable?) significance, and a demonstrated potential to develop a nuclear-weapons
program, the United States has no choice but to find a way to coexist—and to come to
terms—with whatever government holds power in Tehran. At the same time, the Iranian
Government also must come to terms with Washington, as Tehran’s ability to advance its
political and economic interests rests on a non-hostile relationship with the United States
and the West.
There are numerous hurdles that stand in the way of improved U.S.-Iranian relations, but
none is more daunting than the theocratic regime’s nearly 30-year track record of
engaging in transnational terrorism, both directly and indirectly, to advance its
revolutionary agenda. Tehran’s proclivity to promote its interests by playing the terrorist
card undermines its standing as a responsible sovereign state and calls into question
virtually all of its actions, even when pursuing legitimate political, economic, and
strategic interests. While the use of terrorism(*footnote on definition) is reprehensible
and of serious concern irrespective of the source, the wielding of the terrorism club by a
nation state such as Iran is particularly alarming and insidious because of the ability of a
government to use its instruments of national power to support, conceal, facilitate, and
employ terrorist violence. Specifically, a sovereign government has the ready ability to
provide all of the logistical requirements—e.g. the fabrication of official documentation,
explosives, and weapons; the protected use of diplomatic facilities, staff, and pouches;
and the provision of expertise, funding, and targeting intelligence—that can be used to
great effect to plan and carry out successful terrorist attacks. Too often, and for too long,
Iran has excelled at such activities.

An anonymous teen hacker claimed to have stolen a handful of files from CIA Director John Brennan’s private email account, U.S. officials reported on Monday.

CIA Director John Brennan emails

Today, 21 October 2015 and over the coming days WikiLeaks is releasing documents from one of CIA chief John Brennan’s non-government email accounts. Brennan used the account occasionally for several intelligence related projects.

John Brennan became the Director of the Central Intelligence Agency in March 2013, replacing General David Petraeus who was forced to step down after becoming embroiled in a classified information mishandling scandal. Brennan was made Assistant to the President for Homeland Security and Counterterrorism on the commencement of the Obama presidency in 2009–a position he held until taking up his role as CIA chief.

According to the CIA Brennan previously worked for the agency for a 25 year stretch, from 1980 to 2005.

Brennan went private in 2005-2008, founding an intelligence and analysis firm The Analysis Corp (TAC). In 2008 Brennan became a donor to Obama. The same year TAC, led by Brennan, became a security advisor to the Obama campaign and later that year to the Obama-Biden Transition Project. It is during this period many of the Obama administration’s key strategic policies to China, Iran and “Af-Pak” were formulated. When Obama and Biden entered into power, Brennan was lifted up on high, resulting in his subsequent high-level national security appointments.

If you have similar official documents that have not been published yet, send them to WikiLeaks.

John Brennan Draft SF86

“National Security Position” form for John Brennan. This form, filled out by Brennan himself before he assumed his current position, reveals a quite comprehensive social graph of the current Director of the CIA with a lot of additional non-govermental and professional/military career details. (17 November 2008, Author: John Brennan)

Download PDF or view HTML version.

The Analysis Corporation

FAX from the General Counsel of the CIA to the Goverment Accountability Office about a legal quarrel between the CIA and “The Analysis Corporation”. TAC seems to have lost a tender for a US watchlist-related software project to a competitor. Issues seem to revolve around “growth of historical data” and “real-time responsiveness” of the system. (15 February 2008, Sender: CIA, Office of General Counsel, Larry Passar)

Download PDF or view HTML version.

Draft: Intel Position Paper

Challenges for the US Intelligence Community in a post cold-war and post-9/11 world; a calling for inter-agency cooperation, a ten-year term for the Director of the CIA and the Director of National Intelligence. It also demands the autonomy of the Intelligence Community, that it “… must never be subject to political manipulation and interference.” An unfinished paragraph is titled “Damaging Leaks of Classified Information”. (15 July 2007, Author: John Brennan)

Download PDF or view HTML version.

The Conundrum of Iran

Recommendations to the next President (assuming office in Jan. 2009) on how to play the figures on the U.S.-Iranian Chessboard (18 November 2007, Author: John Brennan)

Download PDF or view HTML version.

Torture

Letter from Vice Chairman Bond, Senate Select Committee on Intelligence, to his fellow board members with a proposal on how to make future interrogation methods “compliant” and “legal”. Instead of listing all allowed methods, every kind of interrogation should be considered compliant, as long as it is not explicitly forbidden by the “Army Field Manual” (AFM). (May 2008)

Download PDF or view HTML version.

Torture Ways

A bill from July 2008 called “Limitations on Interrogation Techniques Act of 2008” explicitly list the forbidden interrogation techniques mentioned in the previous document and can be considered a direct implementation of the recommendations of Christopher Bond. (31 July 2008)

Download PDF or view HTML version.

54 in SW Border Detention Center from Terror Countries

ElPaso: Activists gathered Saturday to protest the treatment of 54 detainees who started a hunger strike at the El Paso immigration detention center.

Members of the Detained Migrant Solidarity Committee said they took issue with the alleged mistreatment of the 54 detainees from South Asia, Bangladesh, Afghanistan and Pakistan. They are currently detained at the El Paso Processing Detention Center, 8915 Montana.

“The idea is to show solidarity for the hunger strikers,” said organizer Roxana Bendezu. “We had to communicate what was going on at the detention center very quickly. These people have stayed here for months. They are seeking asylum and should be processed and released right away.”

The 54 detainees started a hunger strike Wednesday. Organizers said all of the hunger strikers are seeking asylum and have passed the credible fear test, a measure immigration officials use when determining who is fleeing from danger and is in need of asylum. Some detainees have been held for as many as 11 months, organizers said.

Migrants from Terrorist Nations in Texas ICE Center Seeking Asylum

JudicialWatch: The Obama administration insists the southern border is secure, yet dozens of illegal aliens from terrorist nations entered the United States through Mexico and are being held in a Texas Immigration and Customs Enforcement (ICE) processing center.

The detainees are nationals of Afghanistan, Pakistan and Bangladesh and they are seeking asylum in the U.S. This week the 54 migrants from terrorist nations started a hunger strike to protest their detention at an ICE facility in El Paso. A local news report reveals that the foreign nationals “refused to eat or drink water” and a leftist immigrant advocacy group blasted the government for jailing the Afghans, Pakistanis and Bangladeshis without proper medical care.

One of the detainees released from the ICE processing center over the weekend said he arrived in El Paso after traveling from South America to Juarez, Mexico. He is a national of Bangladesh, his name is MD Nasir Uddin and he claims to be a refugee seeking asylum. In the news report Uddin complains that he was jailed for no valid reason and was not provided with an interpreter, legal documents or judgements against him. “We are not criminals and they don’t have any proof of criminals,” Uddin is quoted.

Just last month the U.S. issued a terrorism alert warning that militants in Bangladesh may be targeting westerners. “The U.S. government continues to receive information that terrorist groups in South Asia may also be planning attacks in the region, possibly against U.S. government facilities, U.S. citizens, or U.S. interests,” the bulletin states. “Terrorists have demonstrated their willingness and ability to attack locations where U.S. citizens or Westerners are known to congregate or visit.” Afghanistan and Pakistan have long been known as the headquarters of Al Qaeda’s global leadership and the State Department’s Country Reports on Terrorism offers all the juicy details.

The fact that individuals from these three terrorist nations have made it all the way to the U.S. through the Mexican border is downright alarming. Judicial Watch contacted officials from several Homeland Security agencies—including ICE and the Border Patrol—but none would comment on the 54 Afghans, Pakistanis and Bangladeshis held in El Paso. The reality is that it’s unlikely the story would have been covered if not for the hunger strike and involvement of a publicity-seeking immigrant advocacy organization. In fact, the focus of the El Paso news report is the “critical medical condition” of some of the detainees and the fact that one was held in solitary confinement.

The reality is that this is part of a very serious issue involving the dangerously porous southern border. Judicial Watch has covered this extensively and over the summer published a story detailing how Mexican drug cartels are smuggling foreigners from countries with terrorist links into a small Texas rural town near El Paso. To elude the Border Patrol and other law enforcement barriers, they use remote farm roads—rather than interstates—and they are being transported to stash areas in Acala, a rural crossroads located around 54 miles from El Paso on a state road. The foreigners are classified as Special Interest Aliens (SIA) by the U.S. government, which prefers to keep this from the American public.

ICE, WH, Sanctuary Cities and Sex Parties

America is losing her identity and in less than 10 years, it is all but gone. There are many reasons as noted below. Fasten your seat belt, this is chilling. Sadly, there is no topic or agency where corruption and scandal is exempt.

Sessions-Brat: 14 million MORE immigrants in 10 years, 5-times all U.S. high school seniors

WashingtonExaminer: If nothing is done to address legal and illegal immigration, some 14 million more immigrants will come to the United States over the next 10 years, according to a warning call from two congressional immigration critics.

In a full-page ad to run in Roll Call Tuesday, and previewed in the paper today, Alabama Sen. Jeff Sessions and Virginia Rep. Dave Brat provided the raw data on the nation’s building immigration problem and blew the whistle on the so-called “Gang of Eight” proposal to ease immigration rules.

“Including all forms of immigration, the Census Bureau estimates another 14 million immigrants will enter the U.S. on net between now and 2025 — that’s almost five times the number of students who will graduate from public high school in America this year,” the two wrote.

And much of it is legal, and threatens U.S. workers, they added.

White House threatens to veto anti-sanctuary city bill, ahead of Senate test vote

FNC: The White House on Tuesday threatened to veto a Republican-backed bill that would crack down on so-called sanctuary cities by withholding funding to local governments that don’t cooperate with federal immigration officials.

The veto threat comes ahead of a critical Senate test vote Tuesday afternoon.

GOP sponsors furiously are trying to peel off a few Democrats to advance the Stop Sanctuary Cities Act, whose consideration comes months after a young woman’s murder in San Francisco allegedly at the hands of an illegal immigrant touched off a national debate over immigration law.

“Sanctuary cities and the associated violent crimes by illegal immigrants are reaching a critical point, and we cannot wait any longer to take action to protect Americans here at home,” sponsor Sen. David Vitter, R-La., said in a statement.

The White House, though, claimed in a written statement that the bill “fails to offer comprehensive reforms needed to fix the Nation’s broken immigration laws and undermines current Administration efforts to remove the most dangerous convicted criminals and to work collaboratively with State and local law enforcement agencies.”

According to the White House, it would “essentially turn State and local law enforcement into Federal immigration law enforcement officials, in certain circumstances.” The chamber’s top Democrat also has tried to discredit the measure by calling it “The Donald Trump Act,” linking its provisions to controversial statements made by the Republican presidential front-runner about illegal immigrants.

Government Worker Accused of Recruiting Co-Workers for Sex Parties

FreeBeacon: U.S. Immigration and Customs Enforcement (ICE) is probing allegations that a supervisor during work time tried to recruit fellow employees to attend private sex parties at his home.

According to NBC NewsICE spokeswoman Lauren Mack confirmed that the federal agency has launched an internal misconduct investigation after a report in the San Diego Union-Tribune publicized the accusation about a supervisor in San Diego recruiting employees for “private sexual ‘swinger’ parties.”

The Tribune reported:

The accusation of “gross sexual misconduct” was made in a complaint submitted to the Inspector General for the Department of Homeland Security earlier this year. … It says that employees at the ICE Enforcement Removal Operations office in downtown San Diego have been approached during work hours to participate in the parties held at the home of a supervisor in the office along with his wife, who is also an agent.The complaint says the recruitment has been going on for more than a year, and alleges the practice is coercive of subordinate employees and an abuse of authority.

In a statement, Mack emphasized that the government agency takes the accusation “seriously.”

“The agency takes all allegations of misconduct seriously,” she stated. “The matter you reference has been referred to ICE Homeland Security Investigations Office of Professional Responsibility for further investigation. That inquiry is ongoing and, as such, we are unable to offer further comment at this time.”