Let's get this straight too, while we're at it. I'm a proud Canadian, but that doesn't disqualify me from schooling you on your own country's matters, even if you have no knowledge of mine.
Article says Caddell is "certain" Donilon is the leaker because of his political connections and his status as a known "leaker." So basically he doesn't know but it's what he believes.
Says he is sure because of Donilon's background as a political operative.... oh, and because he's a known leaker. Well there you have it. Long as we got a voucher, eh mrs. nussbaum? Wow the commentary there is a new old kind of amazing. --guess I read more slowly than justtxyank.
an outrage and goes to the heart of a free and civil society. -- The Scandal of Our Age June 17, 2012 - 10:05 pm - by Victor Davis Hanson Like Nothing Before In the Watergate scandal, no one died, at least that we know of. Richard Nixon tried systematically to subvert institutions. Yet most of his unconstitutional efforts were domestic in nature — and an adversarial press soon went to war against his abuses and won, as Congress held impeachment hearings. As far as national security went, Nixon’s crimes were in part culpable for destroying the political consensus that he had won in 1972, at a critical time when the Vietnam War to save the south was all but over, and had been acknowledged as such at the Paris Peace Talks. But Watergate and the destruction of Nixon’s foreign policy spurred congressional cutbacks of aid to South Vietnam and eroded all support for the administration’s promised efforts to ensure that North Vietnam kept to its treaty obligations. Iran-Contra was as serious because there was a veritable war inside the Reagan administration over helping insurgents with covert cash that had in part been obtained by, despite denials, selling arms to enemy Iran to free hostages — all against U.S. laws and therefore off the radar. The Reagan administration was left looking weak, hypocritical, incompetent, and amoral — and never quite recovered. Yet even here the media soon covered the story in detail, and their disclosures led to several resignations and full congressional hearings. Quite Different What I call “Securitygate” — the release of the most intricate details about the cyber war against Iran, the revelations about a Yemeni double-agent, disclosures about covert operations in and against Pakistan, intimate details about the Osama bin Laden raid and the trove of information taken from his compound, and the Predator drone assassination list and the president’s methodology in selecting targets — is far more serious than either prior scandal. David Sanger and others claim that all this was sort of in the public domain anyway; well, “sort of” covers a lot of ground. We sort of knew about the cyber war against Iran, but not to the detail that Sanger provides and not through the direct agency of the Obama administration itself. Here is the crux of the scandal: Obama is formulating a new policy of avoiding overt unpopular engagements, while waging an unprecedented covert war across the world. He’s afraid that the American people do not fully appreciate these once-secret efforts and might in 2012 look only at his mishaps in Afghanistan or his public confusion over Islamic terror. Ergo, feed information to a Sanger or Ignatius so that they can skillfully inform us, albeit with a bit of dramatic “shock” and “surprise,” just how tough, brutal, and deadly Barack Obama really is. Yet these disclosures will endanger our national security, especially in the case of a soon-to-be-nuclear Iran. They will probably get people killed or tortured, and they will weaken America’s ability for years to work covertly with allies. Our state-to-state relations will be altered, and perhaps even the techniques and technology of our cyber and special operations wars dispersed into the wrong hands. There is nothing in the recent “exclusive” writings of David Sanger or David Ignatius that was necessary for the American people to know at this stage, unless one thinks that we had a right to the full story of the Doolittle Raid in 1942, or that Americans by July 1944 needed an insider account of the date and planning of D-Day, or that we should have been apprised about what was really going on in New Mexico in 1944. Here is why Securitygate is a national outrage and goes to the heart of a free and civil society. National Security Iran probably knew of U.S. covert involvement against its nuclear facilities, but now it knows that that the entire world also knows. There is no more plausible deniability on our part. The information about the nature of the cyber war is so detailed, the partnership with the Israelis rendered so complex, and the disclosures about technology and technique so explicit, that the Iranians will not only better defend themselves, but use these details to encourage and support even more terror against the United States. How ironic that Obama once called Guantanamo al-Qaeda’s “chief recruiting tool” only to keep it open, and instead give them a real recruiting tool in the disclosure of the inner workings of the war on terror. Pakistan is a veritable enemy and Iran an explicit one. But now both will recite endlessly David Sanger’s catalog of our efforts to subvert them, and claim any new anti-American efforts on their part were simply justified tit-for-tat. Why would the Gulf states help us, when they come off as brutal supporters of the old doomed dictatorships? Europe and our allies no doubt knew all about predators and the cyber war, but their publics did not. Expect even more anti-Americanism, as our enemies decry targeted assassinations and efforts at subverting governments. George W. Bush turned off the world by waterboarding three known and confessed terrorists — with help from the American Left who publicized that fact hourly for eight years. Barack Obama, we now read, has not only personally selected several hundred suspected terrorists for airborne execution, but alternates between reading their terrorist biographies and theology as he picks who lives and who dies. I am sure Catholic theologians appreciate the fact that St. Thomas Aquinas and St. Augustine bulked up the American president’s fortitude when he chose to press the kill button over Waziristan. Crude presidents watch Patton or wear flight suits under “Mission Accomplished” banners; sophisticated metrosexual wartime Presidents read theology. I am surprised only that we did not hear from leaks that Obama had read these didactic texts in the original Latin. Is the world to be outraged that Russia sends war material to Syria or Iran arms to Hezbollah — when it matter-of-factly now reads that almost all communications inside Pakistan are intercepted? Do we need to know that the U.S. warped medical vaccination programs to gain information about bin Laden — right out of a scene from the film Man on Fire? I bet the Gates Foundation and other American philanthropic organizations will appreciate the doubt that will now be cast on their own vaccination efforts. In the world war of ideas, we accuse Iran of wanting to wipe out Israel and they now will accuse us of resorting even to manipulating vaccination programs for the sick and poor for our own national security. Do we really need to know — or rather does the world need to know — that we sabotaged video cameras in Pakistan? Wait — I err in the use of the past tense: we are still sabotaging video and photographic equipment in Pakistan. We live in dangerous times, with a war in Afghanistan, a soon-to-be-nuclear Iran, a duplicitous nuclear Pakistan, an estranged nuclear ally Israel, an Arab Spring gone haywire, a failed reset with Russia, and almost all of the above conniving over Syria. The work of National Security Advisor Tom Donilon, New York Times reporter David Sanger, and all their assorted subordinate reporters and Obama administration officials may well help to set off a conflagration unlike any in our time. The Timing and Theme Why are we suddenly learning in spring of 2012 of all sorts of classified information about the administration’s war on terror? Why not in 2009? Why is all the disclosed information in the press predictably designed to offer another side of Barack Obama in an election year? The president turns out not to be the familiar senator or presidential candidate Obama, who once demanded that Guantanamo be shut down, who mocked renditions and tribunals, who opposed preventative detentions, who wanted to try Khalid Sheikh Mohammed in a civilian court, and whose team characterized the Major Hasan murders as workplace violence and the Mutallab plot as “allegedly” or came up with the laughable euphemisms “overseas contingency operations” and “man-caused disasters.” In other words, all the prior public knowledge of the Obama administration’s conduct of the war on terror had helped contribute to real public worries about its national security reliability. In contrast, all the recent disclosures paint a much different picture of the real “Obama Doctrine” — a Nobel Peace Prize laureate reading his St. Thomas Aquinas as he struggles with blowing up bad guys from the air, takes out bin Laden, unleashes a cyber war against Iran, or sends his agents into Yemen. A Hollywood scriptwriter could have done Obama the “paradox” no better: ruthlessly sensitive, decisively reflective, and tragically underappreciated. The decision to disclose a multifaceted covert war on terror and ensure the continuance of the administration Barack Obama is supposedly far more important to our long-term national security than is any short-term damage that follows these disclosures. The Role of the Press We all know how the deplorable practice of “leaking” works. But in truth, these were not quite leaks: information was not “leaked” by rogue insiders or hostile outsiders, but rather given freely to the press by administration officials. That fact alone makes Securitygate different from any other past scandal over publicized classified documents or insider accounts of covert operations — or even Bob Woodward’s mythography and insider psychodramas, where he only imagines what presidents and secretary of states are “really” thinking silently to themselves. Usually liberal reporters nurture and stroke unnamed sources and would-be whistle-blowers who claim worry about an administration’s stealthy and dangerous national security efforts. Sometimes they divide and conquer — warning reluctant sources that when the proverbial stuff hits the fan, their own silent narratives will be drowned out by the connivers who squawked. Message? If you can’t beat them, then beat them to the punch. When the leaked story goes public, the administration in question goes bananas; after all, its most private protocols and operations are rendered worthless as they enter the public domain. Our Woodstein-like reporters in question predictably fancy themselves Edward R. Murrows, as if speaking truth to power. They earn praise from the New York-Washington, D.C., corridor, with all the accruing beneficia of strong book sales, career promotions, TV appearances, or often prizes for their “courage.” The leaker, if found out, often likewise is canonized, in Daniel Ellsberg fashion, as he usually beats the rap. None of that was true of the released information about the bin Laden mission, subversion in Pakistan, the Yemeni double agent, the Predator drone protocols, and the cyber war against Iraq, or our covert war in Africa. The press were lapdogs, not bull terriers. The leakers were not misguided whistle-blowers, but careerist insiders. We don’t quite have an investigative press these days, but rather a Ministry of Truth put in charge of Barack Obama’s public relations: when the worldwide Left worries that Obama is too militaristic, we heard of deep engagement with Catholic theologians and a desire to go after former CIA agents, or more plans to close Guantanamo; when the Right is up in arms that Obama is not pursuing Islamic terrorists, then the drone tally, cyber war, and more details about Osama bin Laden suddenly are all over the news. Complicity not skepticism is the theme of the work of a Sanger or Ignatius and their kindred reporters. Their aim is that we should be “surprised” about just how muscular is the Obama version of the war on terror — an appreciation that is especially timely in mid-2012, rather than, say, 2009 or 2010. Doubt all that? The subtitle of David Sanger’s book – Surprising Use of American Power – says it all, does it not? “Surprising” is a rather mild adjective that one might not usually expect from a New York Times “investigative” reporter hell-bent on rushing into print leaked material about controversial, legally questionable, and covert U.S. operations. “Surprising” is the sort of loaded adjective that reminds us of the press’s other favored word – “unexpectedly” – when citing the latest dismal economic news. Cui Bono? But outrage was not the intent of Sanger, nor of any of the other “reporters” who have been given exclusive access to either Obama administration insiders or once sort of, now kind of, classified materials. When one reads David Ignatius on the covert bin Laden raid, here are the sort of inanities that pop out: “This desire to reattach al-Qaeda to the Muslim mainstream is evident in the documents I reviewed that were taken from bin Laden’s compound the night he was killed. … As Wednesday’s anniversary of bin Laden’s death approaches, I have been going back over my notes of these messages. I found some unpublished passages that show how bin Laden’s legacy is an ironic mix.” Or “The scheme is described in one of the documents taken from bin Laden’s compound by U.S. forces on May 2, the night he was killed. I was given an exclusive look at some of these remarkable documents by a senior administration official. They have been declassified and will be available soon to the public in their original Arabic texts and translations.” How does one seriously claim an “exclusive look” at “remarkable documents” that have been “declassified” and “will be available soon.” (Note the tense gymnastics.) Either a document is in the public domain for all, or it is not. One does not have an “exclusive” look at otherwise common knowledge. This is incoherent: “A senior administration official” calls up a senior Washington Post reporter to provide him with an “exclusive” look at unclassified documents in the public domain. Why would a “senior” official have to remain unnamed when all he was doing was passing along unclassified information? What Next? What should we expect next from the administration rather pleased at these disclosures? More of “how dare you!” denials from Barack Obama who is “shocked” that we might possibly conclude that he runs the defense of the United States like a poorly managed Tony Rezko land deal. Expect the New York Times and Washington Post stable to likewise be aghast at any hint they were massaged, and in vain to point to all sorts of nuanced little qualifiers in their stories that we missed, but that really do prove their own independence and “worry,” “skepticism,” and “concern” over some of the shocking things they wrote. “Classified” is now a postmodern idea, as we see from Ignatius. I think the damage-control procedure will go like this: although we, the public, could not read what the New York Times and Washington Post people read, these “classified” sources were still not really classified. You see, the president decides from moment to moment what is legally classified, what not. When given to a reporter to ensure the public knows that an Achilles rather than a Paris is our commander in chief, the documents in a nanosecond became declassified. In other words, once these leaks go into print, then immediately postfacto all such information was declassified all along: stupid us, we just never asked to read it or talk with these folks who had. If — a big if — and when either Congress or the media goes after the damage that was done to U.S. interests, expect that almost every subpoenaed source imaginable is now “classified” — as in “How dare you ask for classified information that might endanger the national security just to find out how and why we released ‘declassified’ information that did no harm at all.” Reader, forget politics. Just digest the nature, theme, the timing, and the damage of these disclosures. Do that and most of you will conclude they are offenses to the security of the United States — or, in the words of Barack Obama on another matter, “unpatriotic.”
Bass, It's simple. Take your tired butt to a Fox News forum where you belong. You can't win here. Maybe it's because you are no longer selective in what you post. I'd estimate that you post 6 threads daily with your traditional bolding technique. It's no longer creative. Bold all your little articles for your family members and send them in some emails. You clutter the BBS with garbage, and for the most part, the crap you post is false, and in many cases, racially motivated. Misery loves company. Go join Texxx.
More leaking, supposedly targeting Israel. If i were netanyahu, i,d probably conclude i couldn't trust obama, which makes the liklihood of an israeli stike greater. -- U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say By Ellen Nakashima, Greg Miller and Julie Tate, Tuesday, June*19, 3:07*PM The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected critical intelligence in preparation for cyber-sabotage attacks aimed at slowing Iran’s ability to develop a nuclear weapon, according to Western officials with knowledge of the effort. The massive piece of malware was designed to secretly map Iran’s computer networks and monitor the computers of Iranian officials, sending back a steady stream of intelligence used to enable an ongoing cyberwarfare campaign, according to the officials. The effort, involving the National Security Agency, the CIA and Israel’s military, has included the use of destructive software such as the so-called Stuxnet virus to cause malfunctions in Iran’s nuclear enrichment equipment. The emerging details about Flame provide new clues about what is believed to be the first sustained campaign of cyber-sabotage against an adversary of the United States. “This is about preparing the battlefield for another type of covert action,” said one former high-ranking U.S. intelligence official, who added that Flame and Stuxnet were elements of a broader assault that continues today. “Cyber collection against the Iranian program is way further down the road than this.” Flame came to light last month after Iran detected a series of cyberattacks on its oil industry. The disruption was directed by Israel in a unilateral operation that apparently caught its U.S. partners off guard, according to several U.S. and Western officials, speaking on the condition of anonymity. There had been speculation that the United States had a role in developing Flame, but the collaboration on the virus between Washington and Israel has not been previously confirmed. Commercial security researchers last week reported that Flame contained some of the same code as Stuxnet. Experts described the overlap as DNA-like evidence that the two sets of malware were parallel projects run by the same entity. Spokespersons for the CIA, the NSA and the Office of the Director of National Intelligence, as well as the Israeli Embassy in Washington, declined to comment. The virus is among the most sophisticated and subversive pieces of malware exposed to date. Experts said the program was designed to replicate across even highly secure networks, then control everyday computer functions to send a flow of secrets back to its creators. The code could activate computer microphones and cameras, log keyboard strokes, take computer screen shots, extract geolocation data from images and send and receive commands and data through Bluetooth wireless technology. Flame was designed to do all this while masquerading as a routine Microsoft software update, evading detection for several years by using a sophisticated program to crack an encryption algorithm. “This is not something that most security researchers have the skills or resources to do,” said Tom Parker, chief technology officer for Fusion X, a security firm specializing in simulating state-sponsored cyberattacks, who does not know who was behind the virus. “You’d expect that of only the most advanced cryptomathematicians, such as those working at NSA.” Flame was developed at least five years ago as part of a classified effort code-named Olympic Games, according to officials familiar with U.S. cyber operations and experts who have scrutinized its code. The U.S.-Israeli collaboration was intended to slow Iran’s nuclear program, reduce the pressure for a conventional military attack and extend the timetable for diplomacy and sanctions. The cyberattacks augmented conventional sabotage efforts by both countries, which included inserting flawed centrifuge parts and other components in Iran’s nuclear supply chain. The best-known cyberweapon set loose on Iran was Stuxnet, a name coined by researchers in the antivirus industry who discovered the virus two years ago. It infected a specific type of industrial controller at Iran’s uranium enrichment plant in Natanz, causing almost 1,000 centrifuges to spin out of control. The damage occurred gradually, over months, and Iranian officials initially thought it was the result of incompetence. The scale of the espionage and sabotage effort “is proportionate to the problem that’s trying to be resolved,” the former intelligence official said, referring to the Iranian nuclear program. Although Stuxnet and Flame infections can be countered, “it doesn’t mean that other tools aren’t in play or performing effectively,” he said. To develop these tools, the United States relies on two of its elite spy agencies. The NSA, known mainly for its electronic eavesdropping and code-breaking capabilities, has extensive expertise in developing malicious code that can be aimed at U.S. adversaries, including Iran. The CIA lacks the NSA’s level of sophistication in building malware, but is deeply involved in the cyber campaign. The agency’s Information Operations Center is second only to the CIA’s Counterterrorism Center in size. The IOC, as it is known, performs an array of espionage functions, including extracting data from laptops seized in counterterrorism raids. But the center specializes in computer penetrations that require closer contact with the target, such as using spies or unwitting contractors to spread a contagion on a thumb drive. Both agencies analyze the intelligence obtained through malware such as Flame, and have continued to develop new weapons even as recent attacks have been exposed. Flame’s discovery shows the important role of mapping networks and collecting intelligence on targets as the prelude to an attack, especially in closed computer networks. Officials say gaining and keeping access to a network is 99 percent of the challenge. “It is far more difficult to penetrate a network, learn about it, reside on it forever and extract information from it without being detected than it is to go in and stomp around inside the network causing damage,” said Michael V. Hayden, a former NSA director and CIA director who left office in 2009. He declined to discuss any operations he was involved with during his time in government. The effort to delay Iran’s nuclear program using cyber-techniques began in the mid-2000s, when President George W. Bush was in his second term. At that point it consisted mainly of intelligence gathering to identify potential targets and develop tools to disrupt them. In 2008, the program went operational and shifted from military to CIA control, former officials said. Despite their collaboration on developing the malicious code, the United States and Israel have not always coordinated attacks. Israel’s April assaults on Iran’s Oil Ministry and oil export facilities caused only minor disruptions. The episode led Iran to investigate and ultimately discover Flame. “The virus penetrated some fields — one of them was the oil sector,” Gholam Reza Jalali, an Iranian military cyber official, told Iranian state radio in May. “Fortunately, we detected and controlled this single incident.” Some U.S. intelligence officials were dismayed that Israel’s unilateral incursion led to the discovery of the virus, prompting countermeasures. The disruptions led Iran to ask a Russian security firm and a Hungarian cyber lab for help, according to U.S. and international officials familiar with the incident. Last week, researchers with the Kaspersky Labs, the Russian security firm, reported their conclusion that Flame — a name they came up with — was created by the same group or groups that built Stuxnet. Kaspersky declined to comment on whether it was approached by Iran. “We are now 100 percent sure that the Stuxnet and Flame groups worked together,” said Roel Schouwenberg, a Boston-based senior researcher with Kaspersky Labs. Kaspersky also determined that the Flame malware predates Stuxnet. “It looks like the Flame platform was used as a kickstarter of sorts to get the Stuxnet project going,” Schouwenberg said. http://www.washingtonpost.com/world...fficials-say/2012/06/19/gJQA6xBPoV_print.html Staff writer Joby Warrick contributed to this report.
Feinstein: White House Behind National Security Leaks The chairwoman of the Senate Intelligence Committee said Monday the White House was behind recent national security leaks in part, but would not implicate President Obama on the matter, the Associated Press reports. Sen. Dianne Feinstein, D-Calif., said that although she is sure the president is not disclosing secret information to the public, she wasn’t as sure about other White House staff. “I think the White House has to understand that some of this is coming from their ranks,” she said at a World Affairs Council forum, according to AP. But on Obama, she said, “I don’t believe for a moment that he goes out and talks about it.” Attorney General Eric Holder has launched an investigation looking into the leaks that revealed cyber-attacks against Iran and a plot by al Qaida to bomb an airliner. Republicans have been critical of the White House over recent leaks, blaming the administration for playing politics with national security. http://news.yahoo.com/feinstein-white-house-behind-national-security-leaks-064816744.html