New Sources and Newest Release, U.S. Drone Operations

Being a whistleblower is not enough, but stealing documents and releasing them is over the top. Raise your hand if you think Snowden and those working in cooperation with him are covert Russian operatives and is aiding the enemy.

Perhaps it is time to question those who are aiding Snowden as well when it comes to violating the Espionage Act and a handful of other Federal laws.

A Second Snowden has Leaked a Mother Lode of Drone Documents

by Andy Greenberg:

It’s been just over two years since Edward Snowden leaked a massive trove of NSA documents, and more than five since Chelsea Manning gave WikiLeaks a megacache of military and diplomatic secrets. Now there appears to be a new source on that scale of classified leaks—this time with a focus on drones.

On Thursday the Intercept published a groundbreaking new collection of documents related to America’s use of unmanned aerial vehicles to kill foreign targets in countries ranging from Afghanistan to Yemen. The revelations about the CIA and Joint Special Operations Command actions include primary source evidence that as many as 90 percent of US drone killings in one five month period weren’t the intended target, that a former British citizen was killed in a drone strike despite repeated opportunities to capture him instead, and details of the grisly process by which the American government chooses who will die, down to the “baseball cards” of profile information created for individual targets, and the chain of authorization that goes up directly to the president.1

All of this new information, according to the Intercept, appears to have come from a single anonymous whistleblower. A spokesperson for the investigative news site declined to comment on that source. But unlike the leaks of Snowden or Manning, the spilled classified materials are accompanied by statements about the whistleblower’s motivation in his or her own words.

“This outrageous explosion of watchlisting—of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield—it was, from the very first instance, wrong,” the source tells the Intercept. “We’re allowing this to happen. And by ‘we,’ I mean every American citizen who has access to this information now, but continues to do nothing about it.”

Reports first surfaced in the fall of last year that the Intercept, a news site created in part to analyze and publish the remaining cache of Snowden NSA documents, had found a second source of highly classified information. The final scene of the film “Citizenfour,” directed by Intercept co-founder Laura Poitras, shows fellow Intercept co-founder Glenn Greenwald meeting with Snowden in Moscow to tell him about a new source with information about the U.S. drone program, whom he says has been communicating with the Intercept‘s Jeremy Scahill. At one point, Greenwald draws Snowden a diagram of the authorization chain for drone strikes that ends with the president, one that looks very similar to the one included in Thursday’s publication.

“It’s really risky,” Snowden tells Greenwald in the scene. “That person is incredibly bold.”

“The boldness of it is shocking,” Greenwald responds, “But it was obviously motivated by what you did.”

In the scene, Greenwald also tells Snowden the security tools the Intercept is using to communicate with the source, writing the names of the software on a piece of paper in what may have been an attempt to avoid eavesdroppers. Those security tools, along with the Intercept‘s reputation for combative, unapologetic investigation of the U.S. government, may help explain how the site seems to have found another Snowden-like source of national security secrets. The Intercept and its parent company First Look Media employ world-class security staff like former Googler Morgan Marquis-Boire, Tor developer Erinn Clark, and former EFF technologist Micah Lee. Far more than most news sites, its reporters use tools like the encryption software PGP and the anonymous upload system SecureDrop to protect the identities of its sources.

Whether those measures can actually protect this particular source—or whether the source Greenwald told Snowden about is even the same one who leaked the Intercept‘s Drone Papers—remains to be seen. Yahoo News reported last year that the FBI had identified a “second leaker” to the Intercept and searched his or her home as part of a criminal investigation.

If that reported search of the leaker’s home did happen, however, it doesn’t seem to have slowed down the Intercept or its whistleblower. A year later, no arrests or charges have been made public, and the site has now published what appear to be the biggest revelations yet from its new source.

In the Citizenfour scene, Snowden tells Greenwald he hopes that the new leaks could help change the perception of whistleblowers in general. “This could raise the political situation with whistleblowing to a whole new level, he says.

“Exactly,” Greenwald responds. “People are going to see what’s being hidden by a totally different part of the government.”

Read the Intercept‘s full Drone Papers release here.

1 Correction 10/15/2015 12:45pm: An earlier version of this story stated that a former US citizen, Bilal el-Berjawi, was killed by a drone. In fact, el-Berjawi was a former British citizen.

2 Updated 10/15/2015 2:15pm to include Erinn Clark in the list of First Look Media security engineers.

 

Arms Race, Cyber Defenses Fail

By: Damian Paletta, Danny Yadron and Jennifer Valentino-DeVries
Countries toiled for years and spent billions of dollars to build elaborate facilities that would allow them to join the exclusive club of nations that possessed nuclear weapons.
Getting into the cyberweapon club is easier, cheaper and available to almost anyone with cash and a computer.
A series of successful computer attacks carried out by the U.S. and others has kicked off a frantic and destabilizing digital arms race, with dozens of countries amassing stockpiles of malicious code. The programs range from the most elementary, such as typo-ridden emails asking for a password, to software that takes orders from a rotating list of Twitter handles.
The proliferation of these weapons has spread so widely that the U.S. and China-longtime cyber adversaries-brokered a limited agreement last month not to conduct certain types of cyberattacks against each other, such as intrusions that steal corporate information and then pass it along to domestic companies. Cyberattacks that steal government secrets, however, remain fair game.
This comes after other countries have begun to amass cyberweaponry on an unprecedented scale. Pakistan and India, two nuclear-armed rivals, regularly hack each other’s companies and governments, security researchers said. Estonia and Belarus are racing to build defensive shields to counter Russia. Denmark and the Netherlands have begun programs to develop offensive computer weapons, as have Argentina and France.
In total, at least 29 countries have formal military or intelligence units dedicated to offensive hacking efforts, according to a Wall Street Journal compilation of government records and interviews with U.S. and foreign officials. Some 50 countries have bought off-the-shelf hacking software that can be used for domestic and international surveillance. The U.S. has among the most-advanced operations.
In the nuclear arms race, “the acronym was MAD-mutually assured destruction-which kept everything nice and tidy,” said Matthijs Veenendaal, a researcher at the NATO Cooperative Cyber Defence Centre of Excellence, a research group in Estonia. “Here you have the same acronym, but it’s ‘mutually assured doubt,’ because you can never be sure what the attack will be.”
Governments have used computer attacks to mine and steal information, erase computers, disable bank networks and-in one extreme case-destroy nuclear centrifuges.
Nation states have also looked into using cyberweapons to knock out electrical grids, disable domestic airline networks, jam Internet connectivity, erase money from bank accounts and confuse radar systems, experts believe.
Large conventional militaries and nuclear forces are ill-suited to this new kind of warfare, which evens the playing field between big and small countries. Cyberattacks are hard to stop and sometimes impossible to trace. The West, as a result, has been forced to start reconfiguring its militaries to better meet the threat.
 
Access to cyberweapons, according to U.S. and foreign officials and security researchers, is far more widespread than access to nuclear weapons was at the height of the nuclear arms race, a result of inexpensive technology and the power of distributed computing.
More than two dozen countries have accumulated advanced cyberweapons in the past decade. Some Defense Department officials compare the current moment to the lull between the World Wars when militaries realized the potential of armed planes.
“It’s not like developing an air force,” in terms of cost and expertise, said Michael Schmitt, a professor at the U.S. Naval War College and part of an international group studying how international law relates to cyberwarfare. “You don’t need to have your own cyberforce to have a very robust and very scary offensive capability.”
For example, hackers aligned with the Syrian government have spied into the computers of rebel militias, stolen tactical information and then used the stolen intelligence in the ongoing and bloody battle, according to several researchers, including FireEye Inc.
Most cyberattacks linked to the U.S. and foreign governments in recent years involve cyberspying-breaking into a computer network and stealing data. More-aggressive covert weapons go further, either erasing computer records or destroying physical property.
“With some countries, we’re comfortable with knowing what their capabilities are, but with other countries we’re still lost,” said Andre McGregor, a former cyber special agent at the Federal Bureau of Investigation and now the director of security at Tanium Inc., a Silicon Valley cybersecurity startup. “We don’t have the visibility into their toolset.”
The Military Balance, a widely read annual assessment of global military powers published by the International Institute for Strategic Studies in London, tallies tanks, battalions and aircraft carriers. When it comes to national cyberforces it says “capabilities are not assessed quantitatively.”
In the U.S., the National Security Agency, Central Intelligence Agency, FBI and others all play roles in combing through intelligence.
U.S. officials say their biggest concerns are the cyberweapons held by the Chinese, Russians, Iranians and North Koreans, countries that have deployed advanced attacks that either dug inside U.S. government networks or targeted top U.S. companies. Even Israel, a U.S. ally, was linked to hacking tools found on the computers of European hotels used for America’s diplomatic talks with Iran, according to the analysis of the spyware by a top cybersecurity firm. Israeli officials have denied spying on the U.S.
Cyberarmies tend to be integrated with a country’s military, its intelligence services, or both, as is the case in China and the U.S.
In China, hackers are famous for the relatively low-tech tactic of “phishing”-sending a flood of disguised emails to trick corporate employees and government bureaucrats to letting them into their networks.
The U.S. suspects that is how they penetrated the Office of Personnel Management, using a phishing email to breach an OPM contractor and then crack the agency’s network. The records of more than 21 million people were exposed in the 2014 and 2015 data breach, disclosed this summer. China has said it wasn’t involved.
China’s army has divisions devoted to cyberattacks, and recent evidence shows links between the country’s military and hackers who appear to be pressing the country’s interests abroad.
“They used to be snap and grab-get in and dump everything they can,” said Tommy Stiansen, co-founder and chief technology officer at Norse Corp., a California cybersecurity firm that tracks nation-state activity. “Now they trickle out the information, stay hidden in the system. We’ve even seen Chinese actors patch and repair networks once they’ve broken in.”
China opposes the militarization of cyberspace or a cyberarms race, said Zhu Haiquan, a spokesman for the Chinese Embassy in Washington, adding China “firmly opposes and combats all forms of cyberattacks in accordance with law.”
Choosy in targets
 
Russian hackers have targeted diplomatic and political data, burrowing inside unclassified networks at the Pentagon, State Department and White House, also using emails laced with malware, according to security researchers and U.S. officials.
They have stolen President Barack Obama‘s daily schedule and diplomatic correspondence sent across the State Department’s unclassified network, according to people briefed on the investigation. A Russian government spokesman in April denied Russia’s involvement.
“Russia has never waged cyberwarfare against anyone,” Andrey Akulchev, a spokesman for the Russian Embassy in Washington, said in a written statement Friday. “Russia believes that the cybersphere should be used exclusively for peaceful purposes.”
Russia’s top hackers tend to be choosier in their targets, tailoring email attacks to those they believe might unwittingly open links or attachments.
“They are sitting there trying to think through ‘how do I really want to compromise this target?’ ” said Laura Galante, director of threat intelligence at FireEye, a Silicon Valley cybersecurity company that works closely with Washington. “The Chinese just want a foothold into the target. Russian theft is very personal.”
U.S. spies and security researchers say Russia is particularly skilled at developing hacking tools. Some malicious software linked to Russia by security researchers has a feature meant to help it target computers on classified government networks usually not connected to the Internet.
The virus does this by jumping onto USB thumb drives connected to targeted computers, in the hopes that the user-such as U.S. military personnel-will then plug that USB drive into a computer on the classified network.
Russian hackers also make efforts to hide stolen data in normal network traffic. In one example, a piece of malware hides its communications in consumer Web services to fool cybersecurity defenses. The code downloads its instructions from a set of Twitter accounts. It then exports data to commercial storage services. This tactic is effective because corporate cybersecurity systems often don’t block traffic to and from these sites.
Government investigators believe Iranian hackers implanted the Shamoon virus on computers at Saudi Arabia’s Saudi Aramco, the world’s largest energy firm, in 2012. The Aramco attack erased 75% of the company’s computers and replaced screen images with burning American flags. The attack didn’t affect oil production, but it rattled the company, and security officials, as it revealed the extent of Iran’s cybercapabilities. A spokesman for Aramco didn’t respond to a request for comment.
The move was at least partly in retaliation for the alleged U.S.-Israeli attack on Iran discovered in 2010 that deployed the Stuxnet computer worm to destroy Iranian nuclear centrifuges-considered to be the most successful and advanced cyberattack ever. The U.S. and Israel haven’t confirmed or denied involvement with Stuxnet.
Director of National Intelligence James R. Clapper has said that Iran used malware to destroy computers last year at Las Vegas Sands Corp., a casino company run by Sheldon Adelson, a major critic of the Iranian government. A Sands spokesman declined to comment.
Adm. Michael Rogers, center, director of the National Security Agency and commander of the U.S. Cyber Command, confers with Deputy Defense Secretary Robert Work ahead of testifying before the Senate Armed Services Committee in September. Photo: Win McNamee/Getty Images
Defense officials have also said Iranian hackers have temporarily overwhelmed the websites of numerous U.S. banks, in an annoying but relatively pedestrian technique known as a “denial of service” attack. The attack was allegedly in response to a YouTube video depicting the Prophet Muhammad. Some U.S. officials suspected it was retaliation for sanctions and the Stuxnet attack.
In 2012, Iran’s Supreme Leader Ayatollah Ali Khamenei publicly announced the creation of the Supreme Council of Cyberspace charged to oversee the defense of Iran’s computer networks and develop “new ways of infiltrating or attacking the computer networks of its enemies.”
National Security Agency Director Adm. Michael Rogers said Iranian cyberattacks have slowed since nuclear talks intensified last year, but that Tehran appears “fully committed” to using cyberattacks as part of its national strategy.
A spokesman for the Iranian government didn’t respond to request for comment.
Sony hack
 
U.S. officials accused North Korea of destroying computer files and records at Sony Corp.’s Hollywood film unit in 2014, allegedly in retaliation for “The Interview,” a satirical movie about assassins of North Korean leader Kim Jong Un. The breach was considered one of the most successful nation-state attacks. North Korea successfully implanted malware on Sony computers, which allowed them to both steal and destroy company records, the FBI alleged.
South Korea has also accused North Korea of trying to hack a nuclear reactor, television networks and at least one bank.
“Cybercapability, especially offensive cybercapability, is a relatively inexpensive method that a country can exploit to ‘hit above its weight class,’ which North Korea is fully aware of and is attempting to leverage,” said Steve Sin, a former U.S. Army counterintelligence officer who now researches unconventional weapons and technology.
Defense contractor Northrop Grumman Corp., meanwhile, has advertised for a “cyber operations planner” to “facilitate” offensive computer attacks with the South Korean and U.S. governments, according to a job posting it listed online.
A Northrop spokesman said the customer determines the scope of work performed.
A spokesman for North Korea couldn’t be reached for comment. The country hasn’t commented publicly on cyberprograms.
Many cybersecurity experts, however, consider the U.S. government to have the most advanced operations. When Kaspersky Lab ZAO, a Russian cybersecurity company, this year released a report on a group it called the Equation Group-which U.S. officials confirmed was a thinly veiled reference to the NSA-it referred to the operatives as the “crown creator of cyberespionage.”
Former National Security Agency contractor Edward Snowden leaked documents that showed the NSA had implanted malware on tens of thousands of foreign computers. That allowed the U.S. government secret access to data and, potentially, the industrial control systems behind power plants and pipelines. The Pentagon’s U.S. Cyber Command didn’t respond to a request for comment.
In some instances, Kaspersky found, the NSA was able to burrow so deeply into computers that it infected the code that controls how a hard drive spins. So-called firmware isn’t scanned by computer defenses.
“We, too, practice cyberespionage, and, in a public forum, I’m not going to say how successful we are, but we’re not bad,” Mr. Clapper, the Director of National Intelligence, told a Senate panel in September.
U.S. Cyber Command now has nine “National Mission Teams” with plans to build four more. These each comprise 60 military personnel that will “conduct full-spectrum cyberspace operations to provide cyber options to senior policy makers in response to attacks against our nation,” a Pentagon spokesperson said.
The Navy, Army, and Air Force will each build four teams, with the Marines building a single unit. Each will have a “separate mission with a specific focus area,” though these have so far remained secret.
Air Force Chief of Staff Gen. Mark A. Welsh III told a group of reporters in April that he wanted to see the military develop “blunt force trauma” powers with their cyberweapons. He gave examples of computer codes that could “make an enemy air defense system go completely blank” or have an enemy’s “radar show a thousand false targets that all look real.” He didn’t say the military had finished designing such powers.
Defense Secretary Ash Carter has made the development of new cyberweapons a priority, although the policy seems in flux after questions were raised by the Pentagon’s inspector general.
This activity has prompted other countries to join the digital buildup.
In 2014, the Netherlands announced it would begin training its own Internet troops through a domestic cybersecurity company, called Fox-IT. The head of the Dutch armed forces, Major Gen. Tom Middendorp, said in a symposium the group should be prepared to carry out attacks, not just block them, according to a Dutch media report. The Netherlands’ military strategy, laid out in various documents, refers to hacking as a “force multiplier.” A Dutch military spokesman confirmed the efforts but declined to make Gen. Middendorp available for an interview.
In 2013, Denmark’s Defense Ministry began allocating about $10 million a year for “computer network operations,” which include “defensive and offensive military operations,” according to government budget documents. That amount is just 0.24% of the Danish defense budget, reflecting the tiny barrier of entry.
Countries unable to develop their own weapons can buy off-the-shelf systems from private parties. Earlier this year, an attack and document leak on the Italian firm Hacking Team revealed the company had sold its surveillance tools to dozens of countries, including Sudan, Egypt, Ethiopia and Azerbaijan.
Hacking Team touted its product as “the hacking suite for governmental interception,” and computer security researchers who studied its program said it took advantage of holes in popular software to get onto opponents’ computers and mobile devices. The FBI is among the groups listed as clients of Hacking Team. An FBI spokesman said it didn’t comment on specific tools or techniques.
Most of these countries use surveillance software on domestic enemies or insurgent groups, according to officials with numerous countries and researchers.
States aren’t the only players. About 30 Arabic-fluent hackers in the Palestinian territories, Egypt and Turkey are building their own tools to hit targets in Egypt, Israel and the U.S., according to researchers at Kaspersky Lab.
And in August, the U.S. used a drone to kill Islamic State hacker Junaid Hussain in Raqqa, Syria, showing the extent to which digital warfare has upset the balance of power on the modern battlefield.
The British citizen had used inexpensive tools to hack more than 1,000 U.S. military personnel and published personal and financial details online for others to exploit. He helped sharpen the terror group’s defense against Western surveillance and built hacking tools to penetrate computer systems, according to people familiar with the matter.
National-security and cyberweapon experts are watching the growing digital arms stockpile nervously, worried that one-off attacks could eventually turn messier, particularly given how little is known about what each country is capable of doing.
“What we can do, we can expect done back to us,” said Howard Schmidt, who was the White House’s cybersecurity coordinator until 2012. The U.S. is thinking, “Yeah, I don’t want to pull that trigger because it’s going to be more than a single shot that goes off.”

Look Who Hillary Hired for Benghazi Help

Richard Verma: Presently in India selling a ‘people to people cooperation’ to tackle climate change, Verma was nominated by Obama to serve as Assistant Secretary of State for Legislative Affairs when he left in 2011. He is a lawyer at Steptoe & Johnson and was an advisor to Harry Reid from 2002-2007.

Oh, then there were some Hillary and Richard Verma email exchanges with particular questions to the matter of the Russian reset in 2010.

Clinton tapped D.C. lawyer to help respond to Benghazi questions

*Richard Verma had ‘special government employee’ designation

*He worked at State Department while retaining his job at a law firm

*State Department inspector general launched inquiry into the program

Read more here: http://www.mcclatchydc.com/news/politics-government/election/article38260920.html#emlnl=Morning_Newsletter#storylink=cpy

Obama Sells Syrian Peace Talks that Will Never Come

As noted in the Steve Kroft, 60 Minutes interview with Barack Obama, when challenged on leadership, Obama said he leads on climate change.

The White House has falsely created a bucket-load of people to blame for any intelligence failures, including declaring CENTCOM had modified intelligence reports to make al Qaeda appear as though the terror group was decimated, which is hardly a fact of today.

It should also be noted, the U.S. intelligence agencies collaborate several times daily with allied foreign intelligence services and the United Nations has their own intelligence pathways. In fact, the UN has been approached to seek urgent agreements of peace, no-fly zones, cease fires or a discussion on a coalition government for Syria.

WASHINGTON —CIA-backed rebels in Syria, who had begun to put serious pressure on President Bashar Assad’s forces, are now under Russian bombardment with little prospect of rescue by their American patrons, U.S. officials say.

Over the past week, Russia has directed parts of its air campaign against U.S.-funded groups and other moderate opposition in a concerted effort to weaken them, the officials say. The Obama administration has few options to defend those it had secretly armed and trained.

The Russians “know their targets, and they have a sophisticated capacity to understand the battlefield situation,” said Rep. Mike Pompeo, R-Kan., who serves on the House Intelligence Committee and was careful not to confirm a classified program. “They are bombing in locations that are not connected to the Islamic State” group. More here.

So, within DC, there are arguments at every corner about what to do with regard to Russia, Syria, Iran, Iraq, Yemen and Afghanistan. It is not a matter of failed intelligence. Saudi Arabia is especially concerned about Syria and has been equipping anti-Assad forces. The Saudis met with the Russians over the weekend.

DailyBeast;

Politicians in Washington are pointing their fingers at spies for making them look silly on Russia and Syria. Did our spies mess up again?
As Russia continues airstrikes in Syria, a fight is brewing between members of Congress and U.S. intelligence agencies over what lawmakers were told about the Russian military operations, and when.The House Intelligence Committee, which oversees the CIA and other spy agencies responsible for tracking the Russian military buildup in Syria, is “looking at possible problems in the timely provision of information to Congress,” a congressional staff member told The Daily Beast. Three other officials confirmed that the inquiry—which is not a formal investigation—is underway and that lawmakers have been talking to intelligence officials about whether their reports to Congress accurately predicted when the Russian air strikes would begin and that they would target rebel groups fighting the regime of Bashar al-Assad.

U.S. intelligence officials fired back that they had provided lawmakers with warnings about Russia’s intentions to begin military operations in Syria, including in the weeks before airstrikes began in late September.

“Any suggestion that the intelligence community was surprised by Russia’s military support to the Assad regime is misleading,” a senior intelligence official told The Daily Beast. Members of Congress had access to intelligence reports on the movements of Russian aircraft into Syria as well as the buildup of ground troops and could read them anytime they chose, another official said.

Russia has long been a subject of close scrutiny for the CIA and other intelligence agencies. But since the end of the Cold War and a post-9/11 shift to focusing on terrorist organizations and the rise of extremist groups, some lawmakers have questioned whether the agencies are paying enough attention to old foes in Moscow.

“For several years, the Intelligence Community has provided regular assessments of Russia’s military, political, and financial support to the [Assad] regime,” Brian Hale, a spokesperson for the Director of National Intelligence, said in a statement. “In recent months, the Intelligence Community tracked and reported Moscow’s determination to play a more direct role in propping up Assad’s grip on power, including its deployment of offensive military assets to Syria. While these events unfolded quickly, the IC carried out its responsibilities with equal agility.”

The pushback from officials underscored how sensitive the agencies are to allegations of “intelligence failures” and in particular being behind the curve about Russia’s international ambitions and the rise of extremists groups in the Middle East. The Defense Department is also investigating allegations that senior intelligence officials at the military’s Central Command manipulated intelligence reports to paint a rosy picture about the U.S.-led air campaign against the so-called Islamic State, widely known as ISIS, in Iraq and Syria.

The congressional inquiry also highlights how politicized the Obama administration’s strategy in Syria has become in the wake of a total breakdown in the U.S. military’s training of rebel groups and a 13-month-old U.S.-led air campaign that has failed to destroy ISIS forces in Syria or Iraq.

The White House defended the quality of the intelligence reporting on Syria and noted that journalists had also been tracking the deployment of military aircraft and ground troops into the country.

“I don’t think there was anybody that had the expectation in the administration that Russia wasn’t prepared to use that equipment to advance what they view as their interests inside of Syria,” White House press secretary Josh Earnest said on Thursday, adding that officials had already assessed Russia and wanted to prop up the embattled Assad regime before the airstrikes began.

“I don’t think that’s a surprise,” Earnest said. “The president, before Russia commenced their military activities, said that a decision by Russia to double down on Assad militarily would be a losing bet. That’s something that the President said before we saw this Russian military activity and we continue to believe that that’s true.”

Reuters first reported that lawmakers were examinig possible intelligence lapses over Russia’s intervention and were concerned that intelligence agencies were slow to grasp Putin’s intentions.

That’s a charge that lawmakers have made in the past.

After Russian forces invaded the Crimean peninsula in Ukraine in 2014, lawmakers blasted the Pentagon and intelligence community for failing to anticipate Putin’s plans.

“It was not predicted by our intelligence. That is well known, which is another massive failure because of our total misreading of the intentions of Vladimir Putin,” Sen. John McCain told then-Defense Secretary Chuck Hagel during a hearing. That prompted James Clapper, the director of national intelligence, to defend his analysts’ work.

“I have lived through some genuine intelligence failures in my career, and this was not a failure by any stretch,” Clapper said in an interview with Washington news radio station WTOP in March 2014.

“We tracked [the situation in Ukraine] pretty carefully and portrayed what the possibilities were and certainly portrayed the difficulties we’d have, because of the movements of Russian troops and provided anticipatory warning of their incursion into Crimea,” Clapper said.

Three months later, when ISIS forces rolled into the Iraqi city of Mosul and established a major foothold inside the country, the agencies again found themselves on the defensive, recounting all the times they’d said they warned lawmakers about the rising strength of ISIS in the region and how it could threaten security. Critics said, however, that the intelligence agencies hadn’t predicted ISIS would take over whole cities, and that the reporting wasn’t specific enough to develop a counterattack.

The debate over intelligence assessments on Russia’s recent airstrikes has a similar theme. Lawmakers are zeroing in on specific reporting about military movements and potential targets, as well assessments about Putin’s intentions and his strategy, to get at the question of how the U.S. response to Russia’s operation might have been different with other kinds of information.

Rep. Adam Schiff, the senior Democrat on the House Intelligence Committee said in a statement on Thursday that it was “certainly true that few would have predicted that Putin would react to the weakening position of the Assad regime by sending in combat aircraft and augmenting its naval presence. An increase in Russia’s material support for the Assad regime seemed much more probable.”

That suggested that some lawmakers viewed the intelligence assessments as not declarative or precise enough for Congress to understand how the events would unfold.

But, Schiff added, “As Putin’s intention to deploy more military power to Syria became clearer in recent weeks, the Intelligence Community kept the Committee apprised of those developments. Although we will continue to look into the timeliness and accuracy of intelligence assessments, I do not think we should rush to find fault with the Intelligence Community in its ability to discern exactly what is in Putin’s head.”

Military and intelligence officials did warn that Russia was likely to begin military operations in Syria in the days before air strikes began.

Nine days before Russia’s first bombing runs on Syrian rebel groups, including those that the CIA had given weapons and training, three U.S. officials told The Daily Beast that airstrikes would begin “soon.” They noted that Russian drone flights to scout potential targets were underway—those same flights were also reported on social media by eyewitnesses in Syria.

The officials’ assessment on the imminence of Russian airstrikes marked a shift from previous statements, when officials had said they weren’t sure whether Russia intended to use force in Syria and enter into the country’s long and brutal civil war. That shifting analysis reflected the rapid increase in the number of Russian jets in the region, as well as reports by eyewitnesses that Russian military forces were working with Assad’s army. Videos supporting those claims could be found on YouTube.

And yet, those aggressive, visible moves were met with hardly a shrug in some circles in Washington.

“There are not discussions happening here about what this means for U.S. influence on the war against ISIS,” one defense official told The Daily Beast at the time.

In light of the administration’s response, it’s questionable whether more precise assessments of Russia’s movements would have led to any attempts to head off its intervention.

Schiff, the top Democrat on the House Intelligence Committee, said that reading the Russian leader’s mind was all but impossible.

“Putin notoriously keeps a tight counsel and employs a deliberate strategy of improvisation and unpredictability,” Schiff said. “That said, we need to make sure that we appropriately prioritize so-called hard targets like Russia.”

Obama Does Gun Control, Putin Does Hockey, No Phone Calls

Scary with all this going on…no one is talking to each other especially when Defense Secretary Ash Carter says we will not cooperate or coordinate with Russia.

Carter: “Now, the Russians originally said they were going in to fight ISIL and al-Nusra and other terrorist organizations. However, within days of deploying their forces, the Russians began striking targets that are not any of these groups. I have said repeatedly over the last week that we, the United States, believed this is a fundamental strategic mistake and that it will inflame and prolong the Syrian civil war. We have not and will not agree to cooperate with Russia so long as they continue to pursue this misguided strategy. We’ve seen increasingly unprofessional behavior from Russian forces. They violated Turkish airspace, which as all of us here made clear earlier this week, and strongly affirmed today here in Brussels, is NATO airspace.” The full remarks by Carter while in Belgium are here.

Confluence or Conflating

Kearsarge ARG Deploys for Europe, Middle East Operations

The Kearsarge Amphibious Ready Group and 26th Marine Expeditionary Unit departed Oct. 6 from the East Coast for a deployment to the Middle East.

The more than 4,000 sailors and Marines will support theater security cooperation and maritime security operations and provide an added crisis response capability to U.S. 5th and 6th Fleet areas of operations.

The ARG/MEU includes amphibious assault ship USS Kearsarge (LHD-3), amphibious transport dock ship USS Arlington (LPD-24), amphibious dock landing ship USS Oak Hill (LSD-51),

The amphibious assault ship USS Kearsarge (LHD-3) as the ship departs for deploymentOct. 6, 2015. US Navy Photo

Kearsarge and the 26th MEU last deployed from March to November 2013, during a time of great unrest in the region. Kearsarge and USS San Antonio (LPD-17) spent a lot of time in the northern part of the region – operating in the Mediterranean out of Rota, Spain, and in the northern Red Sea – while USS Carter Hall (LSD-50) spent time operating independently near Bahrain and Djibouti.

Upon returning home, Kearsarge spent five months in maintenance at BAE Systems Norfolk Ship Repair before beginning sea trials last summer. Kearsarge served as the flagship in the Bold Alligator 2014 amphibious exercise last fall.

Rocket Launch with Secret Payload

United Launch Alliance aims to launch its second Atlas V rocket in less than a week with a blastoff planned Thursday morning from California’s Central Coast.

The rocket is targeting a liftoff at 5:49 a.m. PT from Vandenberg Air Force Base, carrying a classified mission for the National Reconnaissance Office.

There’s a 70% chance of acceptable weather at Vandenberg’s Space Launch Complex-3. The full launch window has not been disclosed.

“We are excited and ready to take on our first Atlas launch of 2015,” said Col. J. Christopher Moss, commander of the 30th Space Wing, in a statement Wednesday. “Our team and mission partners have put a lot of hard work into preparing for this important mission for our nation.”
Amateur spacecraft observers speculate that the rocket is carrying a pair of satellites updating the Naval Ocean Surveillance System, or NOSS.

In addition to the primary mission, the rocket’s Centaur upper stage will deliver a group of 13 experimental and student-developed CubeSats to orbit.

The tiny spacecraft include nine missions sponsored by the NRO and four by NASA. Kennedy Space Center’s Launch Services Program was responsible for securing the ride for the NASA-sponsored payloads known as ElaNA-12.

A successful launch would keep ULA on track to return to Cape Canaveral for an Oct. 30 launch of the Air Force’s next Global Positioning System satellite on an Atlas V. The booster for that mission was delivered to the Cape on Tuesday.
An Atlas V last Friday successfully delivered Mexico’s Morelos-3 communications satellite to orbit, completing ULA’s 100th launch since Boeing and Lockheed Martin formed the joint venture in December 2006.

And Wednesday, in the first launch since an Antares rocket exploded shortly after takeoff on Oct. 29, 2014, a sounding rocket successfully blasted off from NASA’s Wallops Space Facility in Virginia.

 

“It wasn’t an easy decision,” an Iranian official source said when asked about Russia’s intervention in Syria. “The Russians were certain that if they did not move now, the next war they would fight would be inside their borders; this is about Russia’s national security before being about Syria. Therefore, a decision to start this pre-emptive war was taken by the Kremlin.”

For decades, Syria has been one of Russia’s main allies in the Middle East. The collapse of the Soviet Union didn’t change anything in this regard. Moscow continued to support Damascus with whatever necessary to keep the old empire’s last balcony on the warm waters of the Mediterranean Sea.

Russian President Vladimir Putin arrives to speak at a Presidential Council for Civil Society and Human Rights meeting in the Grand Kremlin Palace on Oct. 1, 2015, in Moscow, Russia.

Russia Gets Back in the Game

In 2011, amid the eruption of the revolution in Syria, the Russians started feeling the heat. It was almost obvious to them that the fall of the regime in Damascus would lead to serious changes in Russia’s status in the Middle East; thus this wasn’t an option to even think about, and everything possible should be done to maintain the regime and keep it breathing, should this be using the veto in the UN Security Council, sending arms and ammunitions, or as we are witnessing today, intervening militarily and fighting to keep the status quo. Russia is not the only ally of the Syrian government; Iran also has been supporting President Bashar al-Assad.

Russia and Iran have not previously been allies. They share common interests, common allies and common rivals; however, this doesn’t necessarily mean they act as allies. In Syria, their common interest has been — and still is — keeping their common ally, the regime, alive. Even within the Syrian regime, there are different views among the ranks on how to deal with both countries; there are officials who are seen as “Iranians” and others as “Russians.” This is prompted by fears among one wing that the Islamic Republic’s agenda in Syria involves Islamization of society, while the other wing that prefers the Iranians sees them as very reliable since they were the first to roll their sleeves up in the fight for the regime’s existence. Yet, this is only a matter of preferences, and nothing more.