DECLASSIFIED SECRETS
INSIDE LOOK AT THE U.S. INTELLIGENCE COMMUNITY.
Sunday, January 24, 2010
Saturday, November 21, 2009
Wednesday, October 7, 2009
(A-11) LEARN THE 8 SIGNS OF TERRORISM!
“The vigilance of individual citizens is critical to protecting our country from the threat of terrorism,” said Secretary Napolitano. “This video provides essential information on how to identify the warning signs and emphasizes the vital role of such assistance in state and local law enforcement’s counterterrorism efforts.”
The video is narrated by John Elway and Kim Christiansen and produced through a partnership between the Colorado Office of Homeland Security, the Colorado Department of Agriculture, the Colorado Information Analysis Center (CIAC) and the Center for Empowered Living & Learning (The CELL)—a non-profit institution dedicated to addressing the global threat of terrorism.
While in Denver, Secretary Napolitano also joined Attorney General Eric Holder, Federal Bureau of Investigation Director Robert Mueller and Office of National Drug Control Policy Director Gil Kerlikowske to participate in the National Association of Chiefs of Police Conference. Enjoy the video...and learn!
Wednesday, August 26, 2009
Wednesday, August 19, 2009
(A-5) 3 HIGH-RANKING CIA AGENTS SAY WE MUST RETHINK AFGHANISTAN
During the campaign trail before his win, it was claimed that President Obama shunned our troops in Afghanistan. Watch the enlightening factcheck video that proves he never snubbed our guys and gals fighting there. Shame on the right-wing crackpots who circulted this lie...using our brave troops as political pawns. http://www.factcheck.org/askfactcheck/print_did_obama_snub_us_troops_in_afghanistan.html
A roadside bomb kills Americans in convoy
American troops drinking tea with local Afghans
Thursday, July 16, 2009
B. OUT OF PATRIOTISM, PRESIDENT OBAMA WILL VETO THE INTELLIGENCE AUTHORIZATION BILL BECAUSE HE CANNOT TRUST CONGRESS TO NOT BABBLE!
I will write my senator and congressmen and urge them to introduce a bill to post John Jay's statement in every representative's office. Yeah, right...as if that move would prevent leaks...perhaps Dick Cheney, Karl Rove, Scooter Libbey and Bob Novak should receive complimentary plaques...from the CIA. Just kidding...I think! Actually, a little humor is needed to get through all of this. The IC, especially the CIA, has always been cannon fodder for certain members of congress...for over two centuries! Thus, the James Bond and Ursula misquotes.
Talk about babbling, The video below proves Karl Rove lied when he denied he outed CIA covert operative Valerie Plame:
And this is from a so-called "liberal" president? Move over Senator Church; I don't think your Committee will be reinstated any time soon. I get the feeling President Obama is fully aware that a genuine terrorist threat exists inside and outside the United States and that the Intelligence Community's agents and case officers hit the streets at home and abroad, daily, to keep Americans out of harm's way. Let's all give these brave souls many KUDOS!
Remember when former Bush Press Secretary Scott McClellan said during his press conferences that both Karl Rove and Scooter Libbey swore to him that they didn't know Valerie Plame or that she was a CIA case officer? Later, of course, McClellan discovered they both lied to him. Thes video with Matt Cooper proves that Rove did know about Valerie Plame and her CIA case officer status:
Wednesday, July 1, 2009
D. BREAKING NEWS! NORTH KOREAN SHIIP KANG NAM 1 TURNING AROUND AND HEADING HOME!
"The North Korean ship tracked by the US Navy and suspected of transporting weapons or military know-how in violation of UN sanctions has turned around, a Pentagon official said
A diplomatic source speaking on condition of anonymity told the Korea Herald that the ship was 'near our waters,' which could suggest that sanctions were having an effect on reclusive North Korea.
'If the ship is on its way back, it would mean that Resolution 1874 is taking effect and causing the North to retreat,' Kim Tae-woo, vice president of the Korea Institute for Defense Analyses, told the newspaper.
The Kang Nam 1 quickly drew the attention of the US military under new UN sanctions designed to punish Pyongyang over its May 25 underground nuclear test.
The US ambassador to the United Nations, Susan Rice, confirmed Sunday that the United States was tracking the cargo ship.
Source: This story came to DECLASSIFIED SECRETS via Homeland Security - National Terror Alert. National Terror Alert is America's trusted source for homeland security news and information and this site subscribe to it.
The Kang Nam 1 has a questionable history, according to intelligence experts: The ship had cleared the Taiwan Strait and was hugging the Chinese mainland. Intelligence experts were pondering if the Kang Nam may need to stop in some port to refuel. In the past, the Kang Nam stopped in Hong Kong's port.
A U.S. defense official said he tended to doubt reports that the Kang Nam was carrying nuclear-related equipment, saying information seems to indicate the cargo is banned conventional munitions. Both officials spoke on condition of anonymity in order to talk about intelligence.
North Korea has carried banned goods to Myanmar before on the Kang Nam, said Bertil Lintner, a Bangkok-based North Korea expert who has written a book about leader Kim Jong Il.
North Korea has been helping the junta in Yangon build up its weapons arsenal, a South Korean intelligence expert said. He spoke on condition of anonymity because of the sensitivity of the issue.
The two regimes, among Asia's most repressive, restored diplomatic ties in 2007. Not long after that, in April 2007, the Kang Nam docked at Thilawa port saying it needed shelter from bad weather. But one expert said reports show the weather was clear then, and two local journalists working for a foreign news agency who went to write about the unusual docking were arrested.
The North Korean cargo ship Kang Nam 1 anchored in Hong Kong waters in Oct. 24, 2006. "The Kang Nam unloaded a lot of heavy equipment in 2007," Lintner said. "Obviously, the ship was carrying something very sensitive at that time as well."
North Korea has also helped Myanmar dig tunnels in recent years, said Lintner, adding that the cash-strapped North may have received rice, rubber and minerals in return for its military and other assistance. "North Korea appears to have exported conventional weapons to Myanmar in exchange for food," another expert said.
Pyongyang is believed to have transported digging equipment to Myanmar, which is seeking to make its new capital a fortress with vast underground facilities, he said, speaking on condition of anonymity to discuss intelligence.
Note: This info was collected from Associated Press writers Hyung-jin Kim and Jae-soon Chang in Seoul, and Pauline Jelinek in Washington, contributed to this report.
Brief on Kang Nam 1: This 3-year old, 2006 news report on the Kang Nam 1 reported suspicions of arms smuggling: http://www.youtube.com/watch?v=xo5FgR64u3Q
Wednesday, June 10, 2009
G. THE U.S. SHOULD SPEND WHATEVER IT TAKES TO DEVELOP GLOBAL FAILURE-PROOF ANTI-BALLISTIC MISSILE SYSTEM
Nuclear proliferation around the world, and the threat of a ballistic missile attack of some kind is mounting as more and more countries obtain rocketry and nuclear technology. The ongoing threat toward America is also accelerating due to the fact that there are many rogue nations and non-state terrorist organizations who either have or are seeking ballistic missiles and nuclear technology.
The challenges of protecting America and its citizens for President Obama's administration are great. Featuring rare footage and in-depth interviews with leading experts in the field, 33 Minutes is the definitive documentary exposing the untold vulnerability we all face and the action plan necessary to revive a strategic missile defense system that America uniquely can develop, maintain, and employ for its own defense and the peace-loving world's security. Note: View THADD videos in upper left Yellow marginThe Heritage Foundation video demonstrates that our technology has advanced so much since President Reagan's "Star Wars" SDI days, that we now can not only hit a bullet with a bullet, but we can hit a spot on a bullet with a bullet. Still, the SDI program is lacking in adequate funding and is incapable of defending the U.S. against ICBM attack. Watch "33 Minutes" trailer video below:
(2) Economic feasibility and Self-sustainment. The system would be free from unstable U.S. federal funding and political whims. We could lease or 'rent out" such a system to our nervous allies. The copious amounts of monies taken in would pay for not only the cost of operation, but for massive and continual R&D to improve the SDI system. It would be an enduring and self-sustaining system, funded from foreign clients.
(3) Nation-Empowerment. No longer would “weaker” nations acquiesce to the desires of rogue neighbors. As the heavyweight prizefighter Jack Dempsey once said, “The best offense is a good defense.” Such a system, certainly, would be a peaceful, defensive venture, but would carry a deadly message to rogue regimes who see their power, dominance and threat-mongering capabilities grow useless. Many "weaker" nations would be more inclined to join the world community's push for peaceful existence rather than stay neutral and crouch before a derelict neighbor. (Photo 3 above)- Test launch of Pakistan's Hatf-3 {Ghaznai} SRBM in October, 2003. It's capable of delivering 20 kiloton nuclear warhead.
(4) Create Agenda for Global Peace Agenda. Participating countries would meet regularly to discuss connectivity, since each SDI system could communicate with another. The worldwide SDI system would be installed and managed by the U.S., so administrative and daily managerial difficulties could be worked out. There would also be a treaty binding participating nations together: they must protect each other with this system. For example, if a rogue nation launched a missile attack against another, and their missile passed over several participating countries, each would attempt to destroy it, even though it wasn’t targeted at them. On the same note, participating countries that do not possess long-range missiles or nuclear technology, will have have the ABM installations removed if they pursue these ventures.
March 23, 1983
Excerp from speech:
"I call upon the scientific community in our country, those who gave us nuclear weapons, to turn their great talents now to the cause of mankind and world peace, to give us the means of rendering these nuclear weapons impotent and obsolete.
My fellow Americans, tonight we're launching an effort which holds the promise of changing the course of human history. There will be risks, and results take time. But I believe we can do it. As we cross this threshold,
I ask for your prayers and your support.
Thank you, good night, and God bless you.
Note: Please take "POLL: SHOULD THE U.S. DEVELOP ANTI-BALLISTIC MISSILE SYSTEM?" in right margin.
Friday, June 5, 2009
H. NEED INFO ON CRYPTOLOGIST WHO DIED IN PLANE EXPLOSION IN 1971
I am married to the widow of a deceased E-6 cryptologist whose plane exploded enroute from Cubi Point, PI to the Tan Son Nhut facility just outside Saigon, Vietnam. My question why his mission would still be classified? I contacted NSA to get information because I am trying to get his name and the other 9 in the crash on the Vietnam Memorial Wall here in Washington, D.C.
The lady I spoke with said she couldn't give me more information because I was not next-of-kin. What I really don't have is something saying the mission the cryptologists were on was an operational mission in support of the fleet or an operation somewhere in the world. Since he was flying on a C2A from Cubi Point, PI to Tan Son Nhut it appears on the surface he was just on a ordinary "logistics support mission" (something like a mail run) but I know cryptologists don't just fly around (6 of them) to deliver mail. I believe he was enroute to Tan Son Nhut to pick up a different aircraft for further transfer to the USS Enterprise which had just been turned around and headed back towards the Indian Ocean. I believe the 6 cryptologists were going to pick up another plane and fly to the Enterprise where they would then begin their cryptologic mission. I need something official that will say that, because the C2A is not a plane the cryptologists would be conducting operational mission tasks from. That's why they needed to get to Tan Son Nhut to pick up a plane that could fly them to the Enterprise where they could begin their mission once aboard.
One of his two surviving daughters will have to use the FOIA to see what they can find out. Lastly, the lady at NSA told me that the mission that CTR1 Walter Ray Woods Jr. was on has not yet been declassified. His name does appear on the NSA Memorial Wall along with 5 other cryptologists who died that day. This tragic accident occurred on December 12, 1971. You would think it would have been declassified by now. I know what the mission was and where he was going. However, I do not have proof of my knowledge.
Is there any way you could assist by pointing me in the direction of someone who could provide help? I have already written to our congressmen and senators from the state of Maryland and that proved fruitless. I have been supplying information to a man down in Tennessee who puts the packages together to forward up to the Washington area where it is reviewed and if accepted the man in Tennessee is given the word to make the arrangements for his name to be put on the wall, where a ceremony is held every Memorial Day. I really need all the help I can get to crack this one. Anything you can do to help would be greatly appreciated. His daughters are grown now with children of their own.
By all means, do anything you need to find people to help us.
Sincerely,
Dick Willis
Stanley Associates, Inc
Senior Analyst
1100 New Jersey Ave. SE Suite 800
Washington, D.C. 20003
(202) 314-4244 Office
(202) 488-1951 Fax
(301) 448-0491 Cell
richard.willis@stanleyassociates.com
COMMENT FROM DECLASSIFIED SECRETS: Mr. Dick Willis mentions The National Security Agency/Central Security Service Cryptologic Memorial honors E-6 cryptologist Walter Ray Woods Jr. and the five other cryptologists who were killed on that ill-fated flight bound for the Tan Son Nhut facility just outside Saigon, Vietnam. I found the name of Willis and the other cryptologists who died with Woods on that tragic flight on December 12, 1971. They are listed below:
CT03 James M. Coon, USN 12 Dec 1971
CTISN John M. Deremigio, USN 12 Dec 1971
CTO1 Donald E. Dickerson, USN 12 Dec 1971
CTOSN Stephen H. Elliott, USN 12 Dec 1971
CTRI Walter R. Woods, Jr., USN 12 Dec 1971
CTM2 Gregory K. Zeller, USN 12 Dec 1971
In total, there are 153 names on the black granite memorial, which stands 8 feet tall and rests inside the NSA complex. The words, “THEY SERVED IN SILENCE” are etched into the polished stone at the cap of a triangle (Photo above). I attended a seminar inside the CIA HQ not long ago. Just like the memorial inside the NSA HQ, I paused to look at the CIA memorial (Photo below), which has stars for each man and woman who died while in service of country.
To me, both memorials possess a shared voiceless hush of secrecy: men and women who breathed their last breath in the line of duty…little mention of their names……guarded discussions of their undertakings…no public fanfare or shiny medals to wear on duty...no ticker tape parades upon arriving home...living under false identities…operating under a cloak of darkness, even after they give their lives in the line of duty.
Any members of the AFIO who are familiar with the mission the six cryptologists undertook when the plane they were on exploded may want to contact Mr. Dick Willis, the writer of the above letter. Perhaps, their assignment should still remain classified- I do not know. However, the NSA still keeps the operation they were on classified. So, any one who knew CTRI Walter R. Woods, Jr., USN or his five cryptologist friends flying with him may want to contact Mr. Willis (and Woods’ widow) and simply share with them your memories of CTRI Walter R. Woods, Jr., USN ...declassified ones, of course!
Robert Morton, M.Ed., Ed.S. robertsmorton@hotmail.com
Related links:
C2A unsuccessful landing on aircraft carrier: http://www.youtube.com/watch?v=rEESp1HiSzc
C2A aircraft landing successfully on USS Nimitz: http://www.youtube.com/watch?v=vVYdjkwpXDw
Note: Aboard ship, Cryptologic Technicians control the flow of messages and information. Their work depends on their special branch: CTAs or Administration Cryptologic Technicians (As of 01 OCT 07 CTA merged with the YN rating) perform administrative and clerical duties that control access to classified material. CTIs or Interpretive Cryptologic Technicians handle radiotelephone communications and foreign language translation. CTMs or Maintenance Cryptologic Technicians maintain electronic and electromechanical equipment. CTNs or Networking Cryptologic Technicians handle computer communication. CTRs or Collection Cryptologic Technicians handle all Morse code communications and operate radio direction-finding equipment. Finally, CTTs or Technical Cryptologic Technicians handle all communications by means other than Morse code and electronic countermeasures. (1)
(1) U.S. Navy Enlisted Ratings". University of California Berkeley, Naval Reserve Officer Training Corps. U.S. Navy. http://navyrotc.berkeley.edu/resources/gouge/Ratings.pdf
Saturday, January 24, 2009
CYBER TERRORISM
THE SPYMASTERS I MEET: FBI SPECIAL-AGENT-IN-CHARGE FRANK FIGLIUZZI
In April 2009, at an endisclosed location in Cleveland, AFIO members heard FBI Special Agent Figliuzzi discuss "Cyber Attack." Frank Figliuzzi earned his undergrad degree from Fairfield University CT, and a Juris Doctorate with honors from the Un. of Connecticut School of Law.
He joined the FBI in 1987 and was assigned to the Atlanta Division, working terrorism and foreign counterintelligence investigations. Later, his assignments with the FBI involved economic espionage and foreign sponsored theft of trade secrets. Agent Figliuzzi led the FBI's first squad devoted exclusively to crimes against children, and following 9/11, he was selected to head FBI Miami's new Counterterrorism Branch. He implemented the South Florida Joint Terrorism Task Force with 160 personnel from 34 agencies and served as on-scene commander during the nation's first anthrax murder in Boca Raton, Florida.
(Above right photo- deadly anthrax spore)
In 2006, FBI Director Robert S. Mueller, III, has named C. Frank Figliuzzi the Special Agent in Charge of the Cleveland Field Office. The Cleveland Field Office is headquartered in downtown Cleveland, Ohio, with nine resident agencies in Akron, Canton, Elyria, Lima, Mansfield, Painesville, Sandusky, Toledo, and Youngstown.
Agent Figliuzzi discussed Cyber Terrorism ath this private meeting, information which I plan to write newspaper commentaries about.
Links:
http://cleveland.fbi.gov/ = Cleveland FBI Office
http://www.youtube.com/watch?v=6obA2NTDa_M = Video of 2001 attackXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
In March 2009, as a member of the Association of Former Intelligence Officers (AFIO), I'll be meeting retired Colonel Behram A. Sahukar of The Parachute Regiment, Indian Army. The location is classifed. He's an invaluable resource for DHS. After reading his writings, particularly the document "THE INDIAN APPROACH TO COUNTER- INSURGENCY OPERATIONS," it is obvious he has much to offer the U.S. in countering terrorism and insurgency-related violence.
He's fought counter-insurgency operations in India for years and in the last two decades, the casualties of violence in India have been high:
1. Over 65,000-75,000 killed.
2. Over 760,000 persons displaced from their homes.
3. Over 10,000 security personnel killed.
4. Assassination of Prime Minister Indira Gandhi in 1984 by her Sikh bodyguards. 5. The blowing up of Air India passenger aircraft Kanishka by Canada-based Sikh extremists killing all 329 persons on aboard in 1985.
6. Assassination of Rajiv Gandhi, former Primer Minister of India by a Liberation Tiger of Tamil Eelam (LTTE) female suicide bomber in May 1991.
7. The hijacking of an Indian Airlines aircraft with over 180 persons on board by Pakistani terrorists from Katmandu to Taliban-held Kandahar in December 1999 and the subsequent release of hardcore Pakistani terrorists held in Indian jails.
8. A suicide attack on India’s Parliament to kill or hold hostage over 200 parliamentarians who were in session inside the building in December 2001.
9. A suicide attack on the Jammu and Kashmir State Legislature building (Srinagar) in October 2001 killing over 45.
10. Multiple bomb attacks on economic and soft targets in Bombay in March 1993 killing 257 and injuring over 1,700; in August 2003 killing 52; and on commuter trains in July 2006 killing 209 and injuring hundreds more.
11. Multiple bombings in October 2005 two days before the Hindu festival of Diwali and the Muslim festival of Eid in Delhi killing 61 and injuring over 200.
12. Bombings on the Delhi-Lahore Samjhauta Express (India-Pakistan Peace train) in February 2007 killing over 68. Several other unexploded bombs were located on the train and defused by the authorities.
13. Twin bombings in market places in August 2007 killing over 42 in the South Indian city of Hyderabad. 19 other bombs were set to go off across the city but were detected and defused by the police well in time.
14. Various attacks on civilians in market places, towns and villages, places of Hindu worship, and pilgrims killing hundreds all over India as a fallout of the simmering unrest in Jammu and Kashmir and the ongoing insurgency in some of India’s Northeastern States.
15. Mumbai (below photo & right photo)
Colonel Behram A. Sahukar offers 12 basic tenets to follow (Declassified Secrets comments are in parenthesis):
1. Indian approach to COIN (counter insurgency) has been a mix of political accommodation, economic development and the use of force. (Sounds like Gen. Petraeus may have adopted the Indian COIN stategy).
2. Demands for secession or independence from the Union are put down firmly and not accepted. India is willing to wear down the insurgents until this demand is dropped or modified.
3. India is willing to talk to separatist groups and its neighbors even though they support cross border terrorism and insurgency (Pres. Obama accepts this strategy in Iranian and general terrorist relations; Pres. Bush did not).
4. While India is willing to create new states within the Union to accommodate ethno-nationalist aspirations and tribal boundaries, it is not willing to create additional states based solely on any one religion (This doctrine isn't what Vice Pres. Biden recommended for Iraq; remember, he wanted Iraq divided up into separate regions, based on religion).
5. India has been very particular not to use indiscriminate force, aerial bombardment and heavy firepower in COIN despite its conventional and nuclear superiority in the region (To what extent are we creating enemies by killing civilians, albeit unintentionally....collateral damage? Perhaps, this is why Col. Sahukar follows this tenet).
6. COIN operations in Kashmir have been very particular to minimize the impact on India’s 140 million moderate Muslims (Torture, secret prisons, Guantanamo, etc.,...could these factors be negatively impacting the Muslim mindset more than we realize? Why create more enemies? Unfortunately, simply having western boots on middle east soil negatively impacts most Muslims, who feel our ways is a threat to their religious beliefs).
7. Despite proof of external support, India has always conducted its COIN within its own borders.
8. India COIN approach follows the strategy of ‘an iron fist in a velvet glove,’ adopting an aggressive military approach towards hard-core insurgents and a humane face towards the local population (I believe General Petraeus is now mastering this strategy in Iraq).
9. India’s COIN approach has been aimed at using the security forces to create conditions for a political solution to restore normalcy in the insurgency affected area (We are using this strategem in Iraq and will in Afghanistan).
10. Human rights and weaning the population away from supporting the insurgents is the major plank of India’s COIN operations. To achieve this a multi-dimension approach to include, people-centric civic action programs, economic development, perception management programs, cultivating a responsible media, training of troops for COIN operations, force modernization, good governance, the rule of law, accountability and transparency, diplomatic and international cooperation and support, and a functioning corruption free democracy form parts of the comprehensive Indian approach to COIN operations (A lesson here for the U.S.; Iraq has much corruption resulting in much of our U.S. monies and efforts having been wasted).
11. India has the capability to stay the course and fight an insurgency in a protracted low intensity conflict to wear down the insurgencies and its supporters however, it prefers to resolve the legitimate grievances and welcome its citizens into the democratic process as quickly as possible (Declassified Secrets likes the term "low intensity conflict." The enormous cost of the Iraq war is wearing us down. If we had focused more on tenets 1 to 11 after invading Iraq, Declassified Secrets wonders if the U.S. would have lost less lives, wounded the war down quicker, and saved billions of dollars).
12. In Kashmir, the Indian approach has been based on three major thrust lines to wean away Kashmiri support to the insurgency and restore normalcy; first, cut off the insurgents from their support base in Pakistan and destroy them within India to provide security to the state, improve the socio-economic structure of the state by increasing development projects, ensuring good governance, and improving the daily life of the people ravaged by decades of insurgency and terrorism, psychological initiatives to win the hearts and minds of the people and initiate a genuine dialogue with all parties to the conflict restore India’s credibility within Kashmir and arrive at a just resolution within the Union ("Wean awayt Kashmiri support to the insurgency." Let's wean away support to the Taliban. How about starting by sending teams of agricultural scientists into Afghanistan with the mission of finding crops that will grow there that have a ready world market. Then, R&D will allow us to plow up hundreds of thousands of Poppy acres to grow these crops. Americans won't mind their tax monies paying the Afghan farmers to grow any crop that replaces the Taliban's main income...poppy plants.
Afghanistan's 407,550 acres of poppy fields could be "replaced" with this new cash crop. The government has boosted efforts to plough up poppy, only to spark often-deadly clashes between police and farmers, thus alienating the populace from their government and the U.S. We're playing into the Taliban's hands here!
Let's start with the southern provinces that were worst hit by a Taliban-led insurgency such as Helmand, the biggest opium-growing region. Our agricultural R&D will produce genetically-modified crops that can grow in Afghanistan. Actually, switchgrass and other “second-generation” biomass products could grow there unmodified.
We could build refineries to turn switchgrass and other biomass plants into fuel: good-paying jobs for the Afghans).
This curious graffiti was left on the embankments of Marine Drive Mumbai after the terrorist attack. Does it perhaps reflect the mood of Indians after the Mumbai Terror Attacks on Novermber 26, 2008? I think so!
The Indian Army, Navy and the Air Force of the Gujarat coast on February 9 jointly took up an integrated Theatre Level Operational Readiness Exercise. It was designed to send a message to Pakistan. The exercise designed to validate synergy between the forces. Click below and view Indian TV network coverage of this coordinated operation: http://www.youtube.com/watch?v=gNuGvt_KxdU&feature=related