Lesson 2 – USA Full Spectrum Dominance 101

‘Full spectrum dominance’ normally refers to overwhelming military superiority across all military domains, that is, air, land, sea, space, cyber space, the electronic spectrum, nuclear and biological warfare; and includes propaganda and psychological operations. It is the official doctrine and goal of the United States military. It explains little things like why the US transport aircraft is called the ‘Globe Master’, and it explains big things like surrounding Russia with early warning radars and nuclear capable cruise missiles. It also explains other terms like ‘Global Strike Capability’ which is the ability to strike any target anywhere on the planet at short notice.[1] The US Department of Defense has now divided the entire planet into different ‘Commands’.[2]

Source: US Department of Defense

In more recent times the concept has been extended to the civilian realm where US foreign policy is directed at obtaining full spectrum dominance of the global financial system, trade in services, global food supply and seed storage, control of internal policy making within target nations, and even now extends to social policy such as homosexual marriage.[i]

Full spectrum dominance is of course the goal of all great empires. The British empire provides a recent example. The United States however was previously constrained by the Communist Block. After the Russian people dissolved the USSR there was a historic opportunity for the United States to form new cooperative partnerships to tackle global issues such as arms reduction, narcotics, terrorism, poverty and organised crime. Policy makers in the US turned their back on this opportunity and chose instead to pursue global hegemony by whatever means necessary.[3]

Well that’s a big thing to say, although I would suggest it is only stating the obvious; but let’s consider our method. If the United States wanted to take over the world, what sustained systematic behaviours would we expect, and do we see them?

At a minimum we would expect to see:

  • A truly global and expansionist military with bases in every available country
  • The building of trade blocks and military alliances aimed at excluding rivals and tying other countries to the US politically, economically, and militarily
  • Policies directed at US interests taking control of key infrastructure in target countries – telecommunications, roads, rail, water etc
  • Policies aimed at influencing the internal culture and political processes of other countries – NGOs, media acquisition, direct funding for aligned political groups
  • Involvement in and sponsorship of ‘friendly’ regimes, and a program of destabilisation, coups, revolution, economic sanctions, and financial instability aimed at ‘unfriendly’ governments
  • The systematic undermining of rival trade and cultural blocks such as ASEAN and BRICS
  • The isolation and containment of rival powers such as Russia and China

Let’s consider the evidence. We will start in the nineties with the Neocons then work back.

The New American Century

The chief advocates of ‘American exceptionalism’ are known as the ‘Neo conservatives’ or Neocons. The best known of these are Kristol, Kagan, Brzezinski, Rumsfeld, Wolfowitz, and Cheney. You will recognise some of these as key figures in the presidency of George W Bush. You might also recall that Kagan, Rumsfeld, Wolfowitz, and Cheney were key architects of the invasion of Iraq. During the most recent US election key neocons including Kagan supported Hillary Clinton.

Much of their material that I read in the 90’s has disappeared off the web but their seminal policy statement was set out in the American Journal ‘Foreign Affairs’ following which a think tank ‘Project for the New American Century’ was created to advance their goals. This has since closed and a new think tank ‘Foreign Policy Initiative’ created. Wikipedia has a fairly comprehensive summary but in essence the Neocons argued for the Unites States to take on the responsibility of global government through the use of military force rather than diplomacy.[4]

The Neocons marked a break from traditional American conservatives. What sets them apart is a messianic zeal, a belief in manifest destiny, and contempt for the rule of law or international norms. This contempt for the rule of law brought early neocons into conflict with the Reagan administration under which a number of operatives were indicted.[ii]

President George W Bush pardoned a number of key criminals sending a message of immunity to would be offenders. I have not personally followed the careers of the various neocon operatives but others have. Suffice to say that their program has been strictly adhered to by the Obama administration. Hillary Clinton made clear that she will continue the program of illegal wars, destabilisation of target states, and support for terrorism, that has become synonymous with US foreign policy. Most importantly, Mrs Clinton has stated that Russia should be ‘punished’ for their assistance in combating terrorism in Syria. How she intends to punish a democratic nation of 150 million people with the world’s biggest and most advanced nuclear arsenal is not clear. Wolfowitz  declared his support for Hillary Clinton during the most recent presidential campaign.

In the early 1990’s Neocons laid out a strategy of invading seven Middle Eastern countries in seven years starting with Iraq. This became the policy of the Bush administration and great effort was expended to achieve the political support necessary for an invasion of Iraq. As momentum for the war built, similar efforts were made by the Blair government in Britain.[5] The Iraq war was to be a demonstration to the world of American military might and the first step to the ‘new American century’ of global hegemony. I will now provide an outline sketch of some key American military adventures in pursuit of that century.

On 11 September 2001 a number of men with no connection whatsoever to Iraq, its people or government, flew planes into prominent buildings in the United States. Following this event, the Neocons moved swiftly to use this event as a pretext for their pre-planned war against Iraq.

The invasion of Iraq occurred in early 2003. The initial invasion killed approximately 600,000 people.[6] Subsequent deaths from uranium poisoning[7], civil strife, war induced poverty, sectarian violence, and suicide of service men are difficult to estimate but suggest a total figure possibly exceeding three quarters of a million.[8] From the neocon perspective the war achieved a number of important objectives. Firstly, it removed a potential, though unlikely, security threat to Israel. Secondly, it privatised Iraqi oil.[9] It ensured that the oil was sold in US dollars rather than Euro’s.[10] It made clear to the world that the US could visit unmitigated horror on any country at will. Apart from that, things did not go as the Neocons intended.

Despite the sincere efforts by many in the military and civilian establishment to establish a functioning democracy, what was predicted would happen, happened. Iraq descended into sectarian violence.[11] To all intents Iraq became a failed State. Knowing they were next on the list, Iran assisted a long insurgency against the US occupation forces in Iraq. Faced with another insurgency in Afghanistan and vanishing public support, the US military found itself grounded. One US commander (Admiral Fallon) stated bluntly that he would not comply with any order to invade Iran. The invasion of Iran would wait, but the US was able to persuade much of the world community to impose punishing economic sanctions on Iran. This was a repeat of the strategy against Iraq. Weaken the State through sanctions then invade. The pretext this time was Iran’s legitimate pursuit of nuclear power. Iran has switched to domestic manufacture instead of imports and is preparing for invasion. The United States has also imposed sanctions on Russia and Russia is also preparing to repel an invasion.[12]

Next to North Africa and the country of Libya. In 2009 as chair of the African Union, Libya’s national dictator of Gadhafi went public with a proposal for a pan African currency backed by gold and oil.[iii] Significantly, each and every citizen of Libya received income directly from the nationalised oil industry. To put that in perspective, Julia Gillard’s decision to capitulate on a super profits tax for mineral resources cost Australia $300 billion just in lost tax revenue. If the profits themselves belonged to Australia the wealth that would have flowed to this country would make us global investors rather than global debtors. In Libya oil profits flowed directly into people’s bank accounts. Meanwhile creation of a pan African currently could potentially have freed Africa from financial bondage to Western loans and lifted millions out of poverty.

In the US focus shifted away from Iran to Libya. Protests began in January 2011 and quickly turned into a violent uprising as similar protests would later do in Ukraine. By March 2011 a civil war was progressing and a UN mandate was obtained for a ‘no-fly’ zone to protect civilians from Libyan air force attacks. The purpose of the mandate was to allow conditions for a negotiated settlement. Russia supported this mandate. Despite Russian protests the US and allies promptly exceeded this mandate with a punishing air campaign that quickly led to the fall of the Libyan government. Gadhafi was captured and sodomised with a bayonet. Reflecting on this, Hillary Clinton stated: “we came, we saw, he died”.[13] He was not the only one who died. Rebel factions were not able to create an alternative government or stabilise the country. Islamist terrorist organisations are now running unchecked across vast territories in North Africa, and Libya is now a failed State. Libya’s oil is however in private hands and no rival currency has arisen in Africa.[iv] The US has no real strategy in Libya and has resorted to more bombing.

Having destroyed Iraq, isolated Iran, and destroyed Libya, attention turned to Syria – one of the key nations in the neocon ‘seven nations in seven years’ strategy. Syria was a stable country with a secular leader and national control of its oil. Historically and today it enjoys good relations with Russia, tense relations with Israel, and provides a docking facility for Russian warships. Syrian civilisation dates from Biblical times. Indeed, it was on the way to the capital of Syria, Damascus, that Saul of Tarsus received his epiphany, converted to a new faith and became St Paul. It was Paul who then transitioned a minority Jewish sect to become one of the world’s major religions known today as Christianity. Syria today still hosts one of the biggest and most ancient Christian populations in the Middle East, together with numerous antiquities. As was the case in Iraq, the secular government protected religious minorities including Christians and minority Islamic groups.

Here a side comment. The President of Syria is a gentleman called ‘Assad’ who inherited the country from his father. There is a lot of difference though between and Assad and Saddam Hussein. Where Saddam Hussein was a small town thug who murdered his way into power, Assad is much more of a statesman.

Popular agitation and revolt broke out in early 2011. Having seen what happened in Libya, the Syrian government took no chances and the revolt was crushed. Whatever secular or moderate opposition existed was silenced or went into exile. Never-the-less Syria has fought a brutal five year (and counting) war against well-armed opponents that have overrun and devastated much of the country.[14] How is this possible?

This time the US proposal for a land invasion was turned down cold by even staunch US allies like Australia. There would be no ‘coalition of the willing’ in Syria. America’s political capital was spent.

…enter the Terrorists

So what to do? The Obama administration found the answer in Iraq.

The humanitarian disaster in Iraq, and the sectarian conflict, radicalised a generation of young Muslims who were drawn to the idea of a single Arab caliphate which would sweep away the infidels once and for all and re-establish past glories. That caliphate was quietly declared in Norther Iraq. It speaks volumes that the Iraqi government was unable to prevent the rise if a caliphate on its own territory. Parts of the Iraqi army defected and took their weapons with them. Mostly they were the weapons the Americans had left behind. The newly declared Islamic State of the Levant then went on a blitzkrieg travelling in convoys under open skies. The US could have bombed and crippled the Caliphate but chose instead to weaponise them, and send them against Syria to overthrow the government of that country.

This is consistent with the strategy revealed in a now public US Defence Intelligence Agency memo compiled in 2012. A heavily redacted version of the memo can be read online at the website Judicial Watch which obtained it under Freedom of Information.[15] The Memo shows a detailed intelligence briefing stating that “there is the possibility of establishing a declared or undeclared Salafist principality in Eastern Syria, and this is exactly what the supporting powers to the opposition want, in order to isolate the Syrian regime.” Former DIA chief Michael Flyn stated that this advice was ignored and the CIA continued to arm Insurgents.[16]  It was partly to defeat this policy that Flyn jointed the Trump Presidential team and explains why such great efforts were expended to prize him away from that team.

ISL or ISIS as it became known, is now an umbrella organisation for a dozen of the world’s most evil terrorist organisations. In all their captured territories they have undertaken a genocidal campaign against Christians, Yazadi’s, and others. This has been marked by pathological cruelty including crucifixions, beheadings, murder of children, throwing homosexuals off buildings, mass executions, and a market in sex slavery and human trafficking. Education of women is banned. It is important to understand that while there are many organisations and factions in Syria, the Islamists are essentially the same.[v] There is no ‘moderate opposition’ that can govern the country should the current regime fall, just as there was ‘no moderate opposition’ that could unite and govern Libya.

NATO, Turkey and the US stood-by while ISL captured the Northern Syrian oil fields. No single mainstream Western Media outlet noticed oil trucks bumper to bumper to the horizon exporting the oil to Turkey.[17] Turkey is member State of NATO. No member NATO State questioned who was buying the oil or where it went. The Caliphate now had a multimillion dollar revenue stream with which to fund both is civil administration and its military expansion. It is this organisation to which the United States has supplied hundreds of millions of dollars worth of military hardware and intelligence, and which US and British special forces are training. American anti-tank missiles in particular have been key to the success if ISL since they largely nullify the Syrian army’s advantage in tanks. All this was known of course to Russian intelligence who repeatedly warned against creating a terrorist monster in Syria. Russia however did little to support their ally having other troubles in Ukraine which we will discuss later.

During the last five years of war the US illegally flew combat aircraft over Syria and engaged on a bombing campaign of sorts. I call it a ‘cosmetic’ bombing campaign because it achieved no military objectives. The world’s pre-eminent military superpower didn’t bomb the Caliphate’s oil trucks, administration centres, arms depots, training and recruitment centres, or anything much else useful. They also refused to cooperate with Syrian ground forces. It can only be concluded that the air operation was to create a pretense that the US was actually fighting the same terrorists they were supplying weapons to.

So what about the ‘moderate Syrian opposition’ which apparently stands by ready to lead the country once the Americans have finally got rid of Assad? In the early days of the revolt against Assad there were secular nationalistic elements who wanted to preserve the country they lived in, but with a more participative government. Today they are either dead, fled, or militarily and politically irrelevant within Syria. Those ‘moderates’ to which the US has supplied weapons have either been massacred, handed their weapons to the Islamists, or joined them. There is no armed democratic opposition in Syria of any significance. The war against Assad is being fought almost entirely by terrorist groups. The US State Department for example lists Al Nusra as a ‘moderate group’ despite their self-declared and open allegiance to Al Qaida and to the ISIS Caliphate. They recently beheaded a nine year old boy, and refused to participate in any cease-fire arrangement.

Sometime in summer 2015 US intelligence sources casually mentioned to Russian sources that Damascus would fall by Christmas.[vi] From this time Russia swung into operation. At the request of the Syrian government, and in compliance with international law, Russia embarked on an air campaign against the Caliphate. With a relative handful of aircraft[18] they destroyed the entire oil extraction and export operation in three months. You can see the footage on youtube that never made it into the Western press.[19] They smashed all the key targets which the US ignored, and halted the ISIS advance. This stunning tactical success with a tiny force in three months exposed the US to ridicule, and while the Western press worked hard to play down NATO’s obvious support for ISIS oil smuggling, the rest of the world took note. Russia began looking for allies and found them in the Iranian backed force called Hezbollah. The situation in Syria is now complex. On one side is a coalition of terrorist groups under the ISIS banner. These are supported by British, Israeli and American special forces and are supplied by the United States. They have various international sponsors including Saudi Arabia and Qatar. Turkey allows them free passage through its borders and immigrant status in the European Union.

On the other side the Syrian government fields the Free Arab Army comprised of regular army corps and volunteer groups. These forces receive supplies and technical support from a small Russian contingent and are supported by Russian aircraft, advisors and special forces. Several thousand Iranian Hezbollah fighters are heavily engaged and there is a small Chinese presence. Interestingly, while the US supports ISIS in Syria, American and Iraqi forces have pushed them back in Northern Iraq.

…enter Russia

So why did Russia intervene?

Putin’s stated reason for Russia’s intervention in Syria was to create the conditions for a negotiated settlement between the rival groups so the country could be stabilised. That’s it. It wasn’t to destroy ISIS. It wasn’t to save Assad. It wasn’t to build an empire or engender a conflict with the West. It was simply to create the possibility of peace. Essentially it was the same mandate the UN gave Western forces in Libya. [20]

Also, quite obviously Russia desires a presence in the Mediterranean for its naval fleet. But the other perhaps bigger reason, which Putin has explained domestically, is to protect Russia from the threat of Islamic terrorism. Russia has been the target of numerous terrorist attacks including the recent downing of a Russian airliner in Egypt. Recall that Russia fought a lengthy war against Islamic insurgents in Chechnya. Russia has a large Muslim population, elements of which could be radicalised. Better to fight them in Syria than fight them at home. For its part the US continues to refuse to share intelligence with Russia on terrorism despite repeated invitations to do so.[21]

Russian forces achieved their first stated objective – to bring the parties to the negotiating table. During this break in hostilities the US continued to supply tonnes of military equipment to terrorist groups which enabled them to gain tactical advantages on the ground and halt the Syrian advance, notably in Aleppo.[22] Russia has resumed bombing and the situation on the ground is now a tactical stalemate. Basically it has become a war of attrition although since early 2017 the Syrian army has been on the offensive.

…and the Winners are?

OK that’s a fairly long story although it is only the highlights. Let’s now apply our method. In the Syrian instance, who wins and who loses from the American policy?

The winners are:

  • US arms manufacturers who have made hundreds of millions dollars supplying arms
  • Islamic terrorism globally
  • Those who profited from oil smuggling and financing the Caliphate
  • Should Syria fall, Western petro-chemical interests will be the main beneficiaries
  • President Putin who has gained international standing and a platform from which to point out the hypocrisy of the US support for terrorism

The losers are:

  • Europe which now has a refugee/illegal immigration crisis and a terrorism crisis
  • The American tax payer
  • The population of Syria

What will happen next?

In the event of a Clinton Presidency I anticipate that some catastrophe will be orchestrated in Syria – a chemical weapons attack, an anthrax release, or some terrible massacre. Following this the US will claim a right to protect civilians and launch a full scale air war against the Syrian government and allied forces. With the Syrian army and air force destroyed ISIS will indeed capture Damascus. After that, the country will face all the horrors of a terrorist occupation, and the terrorists will partition the country into impoverished state-lets engaged in semi perpetual conflict, and which must be continually bought off or fought off. Syria’s antiquities will be plundered, her minorities enslaved, and an American colony established to extract the oil. Anyone who is able, will flee to any other country they can get to, and those who can will go to Europe. Russia cannot prevail in a military confrontation with US forces a thousand miles from Russia and will be forced out.[23] Russia will not risk nuclear war to protect Syria. Game over.

[This was written shortly before the Presidential election but remains relevant because the policy is adhered to by the US security establishment, the Neocon network, the Democratic party, and much of the Republican establishment].

Thanks to the creation of an alliance between Syria, Iran, Hezbollah, and Russia, the election of Donald Trump, and Russian diplomacy, the nightmare scenario has not happened.  Syrians are returning home, the long task of re-building a ruined country is beginning without American military/civilian contractors, and the country is being liberated. However ISIS and its affiliates still have a presence throughout the country and US backed forces have captured key oil fields to the north. At the time of writing at the end of 2017 Israel and the US are colluding with Saudi Arabia to create one or more wars against the Shia axis – Syria, Lebanon and Iran. President Trump’s strategy seems to be to outsource the war(s) to Saudi and sell them the weapons.

In the materials to this lesson I have provided the text of Putin and Obama’s speeches to the 70th General Assembly in September 2015 which discuss Syria and Terrorism. A fulsome explanation by Putin of current events visa-vis Russia and the United States can be found here:[24] Judge for yourself.

[1] Warning: this link contains graphic images: http://www.globalresearch.ca/the-pentagons-strategy-for-world-domination-full-spectrum-dominance-from-asia-to-africa/5397514

[2] See further: https://en.wikipedia.org/wiki/Unified_Combatant_Command

[3] Note: this interview contains some graphic images of torture. https://youtu.be/kgig1QVU2lY

[4] The pre-run for Iraq was arguably the illegal invasion of Panama. See further here: http://www.motherjones.com/politics/2014/12/our-forgotten-invasion-panama-key-understanding-us-foreign-policy-today

[5] For an expert review see here: http://www.iraqinquiry.org.uk/the-inquiry/sir-john-chilcots-public-statement/

[6] See further: http://www.thelancet.com/journals/lancet/article/PIIS0140-6736(06)69491-9/abstract

[7] From depleted uranium rounds used by the US military in Iraq and previously also used in Serbia.

[8] This is a conservative estimate. For a historical summary of the Iraq war see here: https://www.britannica.com/event/Iraq-War

[9] See further: http://www.aljazeera.com/indepth/features/2011/12/2011122813134071641.html

[10] See further: https://www.theguardian.com/business/2003/feb/16/iraq.theeuro

[11] For an account of the sincere efforts of many people to establish a functioning democracy in Iraq see Major Jim Molan Running the War in Iraq, Harper Collins

[12] All branches of the Russian military have conducted a range of exercises since 2014 which collectively address every aspect of military preparedness and a range of threat scenarios. For an example see here: https://southfront.org/russia-defense-report-kavkaz-2016-strategic-exercise/

[13] See further: http://www.cbsnews.com/news/clinton-on-qaddafi-we-came-we-saw-he-died/  and here: https://youtu.be/Fgcd1ghag5Y

[14] For a brief history and account of the humanitarian consequences of the Syrian conflict see below (contains graphic images). Note that it fails to mention Russia’s decisive contribution to combating ISIS: http://www.bbc.com/news/world-middle-east-26116868

[15] http://www.judicialwatch.org/wp-content/uploads/2015/05/Pg.-291-Pgs.-287-293-JW-v-DOD-and-State-14-812-DOD-Release-2015-04-10-final-version11.pdf

[16] http://www.foreignpolicyjournal.com/2015/08/07/rise-of-islamic-state-was-a-willful-decision-former-dia-chief-michael-flynn/

[17] For a sample of Russian air force footage showing the extent of the oil smuggling operation see here: https://www.youtube.com/watch?v=Ae6XwvY2jiE

[18] Fifty front line combat aircraft in Syria plus strategic bombers flown from the Russian mainland.

[19] See for example here: https://www.youtube.com/watch?v=GhAxHZ4fMUU

[20] For a serious analysis with links see here: http://thesaker.is/analysis-of-the-russian-military-pullout-from-syria/

[21] For an example from 2013 see here: http://www.voanews.com/a/putin-urges-cooperation-with-us-against-terrorism/1648532.html In the Syrian context see here: http://www.nytimes.com/2016/08/07/world/middleeast/military-syria-putin-us-proxy-war.html?_r=0

[22] See further here: http://www.zerohedge.com/news/2016-04-09/us-government-reveals-3000-ton-delivery-weapons-and-ammo-al-qaeda-linked-syrian-rebe

[23] For a professional analysis see here: http://thesaker.is/assessing-the-russian-military-as-an-instrument-of-power/

[24] https://youtu.be/MEkpZ2PQfxQ

[i] The following is an excerpt from an article in Forbes Magazine December 2011

Materials

 

Address by President Obama to the 70th General Assembly of the United Nations

Mr. President, Mr. Secretary General, fellow delegates, ladies and gentlemen, each year we come together to reaffirm the founding vision of this institution. For most of recorded history, individual aspirations were subject to the whims of tyrants and empires and divisions of race and religion and tribe were settled through the sword and the clash of armies.

The idea that nations and peoples could come together in peace to solve their disputes and advance a common prosperity seemed unimaginable. It took the awful carnage of two world wars to shift our thinking.

The leaders who built the United Nations were not naive. They did not think this body could eradicate all wars. But in the wake of millions dead and (inaudible) rubble, and with the development of nuclear weapons that could annihilate a planet, they understand that humanity could not survive the course it was on.

And so, they gave us this institution, believing that it could allow us to resolve conflicts, enforce rules of behavior and build habits of cooperation that would grow stronger over time.

And for much of my tenure as president, some of our most urgent challenges have involved around an increasingly integrated global economy and our efforts to recover from the worst economic crisis of our lifetime.

Now, five years after the global economy collapsed, and thanks to coordinated efforts by the countries here today, jobs are being created, global financial systems have stabilized and people are once again being lifted out of poverty.

But this progress is fragile, and unequal and we still have work to do together to assure that our citizens can access the opportunities that they need to thrive in the 21st century.

Together we’ve also worked to end a decade of war. Five years ago nearly 180,000 Americans were serving in harms way, and the war in Iraq was the dominant issue in our relationship with the rest of the world. Today, all of our troops have left Iraq. Next year, an international coalition will end its war in Afghanistan, having achieved its mission of dismantling the core of Al Qaida that attacked us on 9/11.

The United States — these new circumstances have also meant shifting away from a perpetual war footing. Beyond bringing our troops home we have limited the use of drones so they target only those who pose a continuing imminent threat to the United States where capture is not feasible and there’s a near certainty of no civilian casualties.

We’re transferring detainees to other countries and trying terrorists in courts of law while working diligently to close the prison at Guantanamo Bay. And just as we reviewed how we deploy our extraordinary military capabilities in a way that lives up to our ideals, we’ve begun to review the way that we gather intelligence so that we properly balance the legitimate security concerns of our citizens and allies with the privacy concerns that all people share.

As a result of this work and cooperation with allies and partners, the world is more stable than it was five years ago. But even a glance at today’s headlines indicates that dangers remain. In Kenya, we’ve seen terrorists target innocent civilians in a crowded shopping mall. And our hearts go out to the families of those who’ve been affected.

In Pakistan, nearly 100 people were recently killed by suicide bombers outside a church. In Iraq, killings and car bombs continue to be a terrible part of life.

And meanwhile, Al Qaida has splintered into regional networks and militias which doesn’t give them the capacity at this point to carry out attacks like 9/11, but does pose serious threats to governments and diplomats, businesses and civilians all across the globe.

Just as significantly, the convulsions in the Middle East and North Africa have laid bare deep divisions within societies, as an old order is upended and people grapple with what comes next.

Peaceful movements have too often been answered by violence from those resisting change and from extremists trying to hijack change.

Sectarian conflict has re-emerged, and the potential spread of weapons of mass destruction continues to cast a shadow over the pursuit of peace.

Nowhere have we seen these trends converge more powerfully than in Syria. There, peaceful protests against an authoritarian regime were met with repression and slaughter. In the face of such carnage, many retreated to their sectarian identifies — Alawites and Sunni, Christian and Kurd, and the situation spiraled into civil war.

The international community recognized the stakes early on, but our response has not matched the scale of the challenge. Aid cannot keep pace with the suffering of the wounded and displaced. A peace process is stillborn. America and others have worked to bolster the moderate opposition, but extremist groups have still taken root to exploit the crisis.

Assad’s traditional allies have propped him up, citing principles of sovereignty to shield his regime. And on August 21st, the regime used chemical weapons in an attack that killed more than 1,000 people, including hundreds of children.

Now, the crisis in Syria and the destabilization of the region goes to the heart of broader challenges that the international community must now confront. How should we respond to conflicts in the Middle East and North Africa? Conflicts between countries, but also conflicts within them. How do we address the choice of standing callously by while children are subjected to nerve gas, but we’re embroiling ourselves in someone else’s civil war?

What’s the role of force in resolving disputes that threaten the stability of the region and undermine all basic standards of civilized conduct? And what’s the role of the United Nations and international law in meeting cries for justice?

Today, I want to outline where the United States of America stands on these issues.

With respect to Syria, we believe that as a starting point the international community must enforce the ban on chemical weapons.

When I stated my willingness to order a limited strike against the Assad regime in response to the brazen use of chemical weapons, I did not do so lightly. I did so because I believe it is in the national security interests of the United States and in the interest of the world to meaningfully enforce a prohibition whose origins are older than the United Nations itself.

The ban against the use of chemical weapons, even in war, has been agreed to by 98 percent of humanity. It is strengthened by the searing memories of soldiers suffocated in the trenches, Jews slaughtered in gas chambers, Iranians poisoned in the many tens of thousands.

The evidence is overwhelming that the Assad regime used such weapons on August 21st. U.N. inspectors gave a clear accounting that advanced rockets fired large quantities of sarin gas at civilians. These rockets were fired from a regime-controlled neighborhood and landed in opposition neighborhoods.

It’s an insult to human reason and to the legitimacy of this institution to suggest that anyone other than the regime carried out this attack.

Now, I know that in the immediate aftermath of the attack there were those who questioned the legitimacy of even a limited strike in the absence of a clear mandate from the Security Council. But without a credible military threat, the Security Council had demonstrated no inclination to act at all.

However, as I’ve discussed with President Putin for over a year, most recently in St. Petersburg, my preference has always been a diplomatic resolution to this issue. And in the past several weeks, the United States, Russia and our allies have reached an agreement to place Syria’s chemical weapons under international control and then to destroy them.

The Syrian government took a first step by giving an accounting of its stockpiles. Now, there must be a strong Security Council resolution to verify that the Assad regime is keeping its commitments. And there must be consequences if they fail to do so. If we cannot agree even on this, then it will show that the United Nations is incapable of enforcing the most basic of international laws.

On the other hand, if we succeed, it will send a powerful message that the use of chemical weapons has no place in the 21st century and that this body means what it says. Our agreement on chemical weapons should energize a larger diplomatic effort to reach a political settlement within Syria.

I do not believe that military action by those within Syria or by external powers can achieve a lasting peace. Nor do I believe that America or any nation should determine who will lead Syria. That is for the Syrian people to decide.

Nevertheless, a leader who slaughtered his citizens and gassed children to death cannot regain the legitimacy to lead a badly fractured country. The notion that Syria can somehow return to a pre- war status quo is a fantasy. It’s time for Russia and Iran to realize that insisting on Assad’s rule will lead directly to the outcome that they fear: An increasingly violent space for extremists to operate.

In turn, those of us who continue to support the moderate opposition must persuade them the Syrian people can’t afford a collapse of state institutions, and that a political settlement cannot be reached without addressing the legitimate fears and concerns of Alawites and other minorities.

We are committed to working this political trek. And, as we pursue a settlement, let’s remember this is not a zero sum endeavor. We’re no longer in a cold war. There’s no great game to be won, nor does America have any interest in Syria beyond the well being of its people, the stability of its neighbors, the elimination of chemical weapons and insuring that it does not become a safe haven for terrorists.

I welcome the influence of all nations that can help bring about a peaceful resolution of Syria’s civil war. As we move the Geneva process forward, I urge all nations here to step up to meet humanitarian needs in Syria and surrounding countries. America’s committed over $1 billion to this effort. And today I can announce that we will be providing an additional $340 million.

No aid can take the place of a political resolution that give the Syrian people a chance to rebuild their country, but it can help desperate people to survive.

What broader conclusions can be drawn from America’s policy towards Syria? I know there are those who’ve been frustrated by our unwillingness to use our military might to depose Assad and believe that a failure to do so indicates a weakening of American resolve in the region.

Others have suggested that my willingness to direct even limited military strikes to deter the further use of chemical weapons shows we’ve learned nothing from Iraq and that America continues to seek control over the Middle East for our own purposes.

In this way, the situation in Syria mirrors the contradiction that has persisted in the region for decades. The United States is chastised for meddling in the region, accused of having a hand in all manner of conspiracy, at the same time the United States is blamed for failing to do enough to solve the region’s problems and for showing indifference towards suffering Muslim populations.

I realize some of this is inevitable, giving — given America’s role in the world. But these contradictory attitudes have a practical impact on the American people’s support for our involvement in the region and allow leaders in the region, as well as the international community sometimes, to avoid addressing difficult problems themselves.

So let me take this opportunity to outline what has been U.S. policy toward the Middle East and North Africa and what will be my policy during the remainder of my presidents (sic).

The United States of America is prepared to use all elements of our power, including military force, to secure our core interests in the region. We will confront external aggression against our allies and partners, as we did in the Gulf War.

We will ensure the free flow of energy from the region to the world. Although America is steadily reducing our own dependence on imported oil, the world still depends on the region’s energy supply and a severe disruption could destabilize the entire global economy.

We will dismantle terrorist networks that threaten our people. Wherever possible, we will build the capacity of our partners, respect the sovereignty of nations, and work to address the root causes of terror. But when it’s necessary, defend the United States against terrorist attack, we will take direct action.

And finally, we will not tolerate the development or use of weapons of mass destruction. Just as we consider the use of chemical weapons in Syria to be a threat to our own national security, we reject the development of nuclear weapons that could trigger a nuclear arms race in the region and undermine the global nonproliferation regime.

Now, to say that these are America’s core interests is not to say that they are our only interests. We deeply believe it is in our interests to see a Middle East and North Africa that is peaceful and prosperous. And we’ll continue to promote democracy and human rights and open markets because we believe these practices achieve peace and prosperity.

But I also believe that we can rarely achieve these objectives through unilateral American action, particularly through military action. Iraq shows us that democracy cannot simply be imposed by force. Rather, these objectives are best achieved when we partner with the international community and with the countries and peoples of the region.

So what does this mean going forward?

In the near term, America’s diplomatic efforts will focus on two particular issues: Iran’s pursuit of nuclear weapons and the Arab- Israeli conflict…. [speech continues]

 

Address by President Putin to the 70th General Assembly of the United Nations

President of Russia Vladimir Putin: Mr. President,

Mr. Secretary General,

Distinguished heads of state and government,

Ladies and gentlemen,

The 70th anniversary of the United Nations is a good occasion to both take stock of history and talk about our common future. In 1945, the countries that defeated Nazism joined their efforts to lay a solid foundation for the postwar world order. Let me remind you that key decisions on the principles defining interaction between states, as well as the decision to establish the UN, were made in our country, at the Yalta Conference of the leaders of the anti-Hitler coalition.

The Yalta system was truly born in travail. It was born at the cost of tens of millions of lives and two world wars that swept through the planet in the 20th century. Let’s be fair: it helped humankind pass through turbulent, and at times dramatic, events of the last seven decades. It saved the world from large-scale upheavals.

The United Nations is unique in terms of legitimacy, representation and universality. True, the UN has been criticized lately for being inefficient or for the fact that decision-making on fundamental issues stalls due to insurmountable differences, especially among Security Council members.

However, I’d like to point out that there have always been differences in the UN throughout the 70 years of its history, and that the veto right has been regularly used by the United States, the United Kingdom, France, China and the Soviet Union, and later Russia. It is only natural for such a diverse and representative organization. When the UN was first established, nobody expected that there would always be unanimity. The mission of the organization is to seek and reach compromises, and its strength comes from taking different views and opinions into consideration. The decisions debated within the UN are either taken in the form of resolutions or not. As diplomats say, they either pass or they don’t. Any action taken by circumventing this procedure is illegitimate and constitutes a violation of the UN Charter and contemporary international law.

We all know that after the end of the Cold War the world was left with one center of dominance, and those who found themselves at the top of the pyramid were tempted to think that, since they are so powerful and exceptional, they know best what needs to be done and thus they don’t need to reckon with the UN, which, instead of rubber-stamping the decisions they need, often stands in their way.

That’s why they say that the UN has run its course and is now obsolete and outdated. Of course, the world changes, and the UN should also undergo natural transformation. Russia is ready to work together with its partners to develop the UN further on the basis of a broad consensus, but we consider any attempts to undermine the legitimacy of the United Nations as extremely dangerous. They may result in the collapse of the entire architecture of international relations, and then indeed there will be no rules left except for the rule of force. The world will be dominated by selfishness rather than collective effort, by dictate rather than equality and liberty, and instead of truly independent states we will have protectorates controlled from outside.

What is the meaning of state sovereignty, the term which has been mentioned by our colleagues here? It basically means freedom, every person and every state being free to choose their future.

By the way, this brings us to the issue of the so-called legitimacy of state authorities. You shouldn’t play with words and manipulate them. In international law, international affairs, every term has to be clearly defined, transparent and interpreted the same way by one and all.

We are all different, and we should respect that. Nations shouldn’t be forced to all conform to the same development model that somebody has declared the only appropriate one.

We should all remember the lessons of the past. For example, we remember examples from our Soviet past, when the Soviet Union exported social experiments, pushing for changes in other countries for ideological reasons, and this often led to tragic consequences and caused degradation instead of progress.

It seems, however, that instead of learning from other people’s mistakes, some prefer to repeat them and continue to export revolutions, only now these are “democratic” revolutions. Just look at the situation in the Middle East and Northern Africa already mentioned by the previous speaker. Of course, political and social problems have been piling up for a long time in this region, and people there wanted change. But what was the actual outcome? Instead of bringing about reforms, aggressive intervention rashly destroyed government institutions and the local way of life. Instead of democracy and progress, there is now violence, poverty, social disasters and total disregard for human rights, including even the right to life.

I’m urged to ask those who created this situation: do you at least realize now what you’ve done? But I’m afraid that this question will remain unanswered, because they have never abandoned their policy, which is based on arrogance, exceptionalism and impunity.

Power vacuum in some countries in the Middle East and Northern Africa obviously resulted in the emergence of areas of anarchy, which were quickly filled with extremists and terrorists. The so-called Islamic State has tens of thousands of militants fighting for it, including former Iraqi soldiers who were left on the street after the 2003 invasion. Many recruits come from Libya whose statehood was destroyed as a result of a gross violation of UN Security Council Resolution 1973. And now radical groups are joined by members of the so-called “moderate” Syrian opposition backed by the West. They get weapons and training, and then they defect and join the so-called Islamic State.

In fact, the Islamic State itself did not come out of nowhere. It was initially developed as a weapon against undesirable secular regimes. Having established control over parts of Syria and Iraq, Islamic State now aggressively expands into other regions. It seeks dominance in the Muslim world and beyond. Their plans go further.

The situation is extremely dangerous. In these circumstances, it is hypocritical and irresponsible to make declarations about the threat of terrorism and at the same time turn a blind eye to the channels used to finance and support terrorists, including revenues from drug trafficking, the illegal oil trade and the arms trade.

It is equally irresponsible to manipulate extremist groups and use them to achieve your political goals, hoping that later you’ll find a way to get rid of them or somehow eliminate them.

I’d like to tell those who engage in this: Gentlemen, the people you are dealing with are cruel but they are not dumb. They are as smart as you are. So, it’s a big question: who’s playing who here? The recent incident where the most “moderate” opposition group handed over their weapons to terrorists is a vivid example of that.

We consider that any attempts to flirt with terrorists, let alone arm them, are short-sighted and extremely dangerous. This may make the global terrorist threat much worse, spreading it to new regions around the globe, especially since there are fighters from many different countries, including European ones, gaining combat experience with Islamic State. Unfortunately, Russia is no exception.

Now that those thugs have tasted blood, we can’t allow them to return home and continue with their criminal activities. Nobody wants that, right?

Russia has consistently opposed terrorism in all its forms. Today, we provide military-technical assistance to Iraq, Syria and other regional countries fighting terrorist groups. We think it’s a big mistake to refuse to cooperate with the Syrian authorities and government forces who valiantly fight terrorists on the ground.

We should finally admit that President Assad’s government forces and the Kurdish militia are the only forces really fighting terrorists in Syria. Yes, we are aware of all the problems and conflicts in the region, but we definitely have to consider the actual situation on the ground.

Dear colleagues, I must note that such an honest and frank approach on Russia’s part has been recently used as a pretext for accusing it of its growing ambitions — as if those who say that have no ambitions at all. However, it is not about Russia’s ambitions, dear colleagues, but about the recognition of the fact that we can no longer tolerate the current state of affairs in the world.

What we actually propose is to be guided by common values and common interests rather than by ambitions. Relying on international law, we must join efforts to address the problems that all of us are facing, and create a genuinely broad international coalition against terrorism. Similar to the anti-Hitler coalition, it could unite a broad range of parties willing to stand firm against those who, just like the Nazis, sow evil and hatred of humankind. And of course, Muslim nations should play a key role in such a coalition, since Islamic State not only poses a direct threat to them, but also tarnishes one of the greatest world religions with its atrocities. The ideologues of these extremists make a mockery of Islam and subvert its true humanist values.

I would also like to address Muslim spiritual leaders: Your authority and your guidance are of great importance right now. It is essential to prevent people targeted for recruitment by extremists from making hasty decisions, and those who have already been deceived and, due to various circumstances, found themselves among terrorists, must be assisted in finding a way back to normal life, laying down arms and putting an end to fratricide.

In the days to come, Russia, as the current President of the UN Security Council, will convene a ministerial meeting to carry out a comprehensive analysis of the threats in the Middle East. First of all, we propose exploring opportunities for adopting a resolution that would serve to coordinate the efforts of all parties that oppose Islamic State and other terrorist groups. Once again, such coordination should be based upon the principles of the UN Charter.

We hope that the international community will be able to develop a comprehensive strategy of political stabilization, as well as social and economic recovery in the Middle East. Then, dear friends, there would be no need for setting up more refugee camps. Today, the flow of people forced to leave their native land has literally engulfed, first, the neighbouring countries, and then Europe. There are hundreds of thousands of them now, and before long, there might be millions. It is, essentially, a new, tragic Migration Period, and a harsh lesson for all of us, including Europe.

I would like to stress that refugees undoubtedly need our compassion and support. However, the only way to solve this problem for good is to restore statehood where it has been destroyed, to strengthen government institutions where they still exist, or are being re-established, to provide comprehensive military, economic and material assistance to countries in a difficult situation, and certainly to people who, despite all their ordeals, did not abandon their homes. Of course, any assistance to sovereign nations can, and should, be offered rather than imposed, in strict compliance with the UN Charter. In other words, our Organisation should support any measures that have been, or will be, taken in this regard in accordance with international law, and reject any actions that are in breach of the UN Charter. Above all, I believe it is of utmost importance to help restore government institutions in Libya, support the new government of Iraq, and provide comprehensive assistance to the legitimate government of Syria.

Dear colleagues, ensuring peace and global and regional stability remains a key task for the international community guided by the United Nations. We believe this means creating an equal and indivisible security environment that would not serve a privileged few, but everyone. Indeed, it is a challenging, complicated and time-consuming task, but there is simply no alternative.

Sadly, some of our counterparts are still dominated by their Cold War-era bloc mentality and the ambition to conquer new geopolitical areas. First, they continued their policy of expanding NATO – one should wonder why, considering that the Warsaw Pact had ceased to exist and the Soviet Union had disintegrated.

Nevertheless, NATO has kept on expanding, together with its military infrastructure. Next, the post-Soviet states were forced to face a false choice between joining the West and carrying on with the East. Sooner or later, this logic of confrontation was bound to spark off a major geopolitical crisis. And that is exactly what happened in Ukraine, where the people’s widespread frustration with the government was used for instigating a coup d’état from abroad. This has triggered a civil war. We are convinced that the only way out of this dead end lies through comprehensive and diligent implementation of the Minsk agreements of February 12th, 2015. Ukraine’s territorial integrity cannot be secured through the use of threats or military force, but it must be secured. The people of Donbas should have their rights and interests genuinely considered, and their choice respected; they should be engaged in devising the key elements of the country’s political system, in line with the provisions of the Minsk agreements. Such steps would guarantee that Ukraine will develop as a civilized state, and a vital link in creating a common space of security and economic cooperation, both in Europe and in Eurasia.

Ladies and gentlemen, I have deliberately mentioned a common space for economic cooperation. Until quite recently, it seemed that we would learn to do without dividing lines in the area of the economy with its objective market laws, and act based on transparent and jointly formulated rules, including the WTO principles, which embrace free trade and investment and fair competition. However, unilaterally imposed sanctions circumventing the UN Charter have all but become commonplace today. They not only serve political objectives, but are also used for eliminating market competition.

I would like to note one more sign of rising economic selfishness. A number of nations have chosen to create exclusive economic associations, with their establishment being negotiated behind closed doors, secretly from those very nations’ own public and business communities, as well as from the rest of the world. Other states, whose interests may be affected, have not been informed of anything, either. It seems that someone would like to impose upon us some new game rules, deliberately tailored to accommodate the interests of a privileged few, with the WTO having no say in it. This is fraught with utterly unbalancing global trade and splitting up the global economic space.

These issues affect the interests of all nations and influence the future of the entire global economy. That is why we propose discussing those issues within the framework of the United Nations, the WTO and the G20. Contrary to the policy of exclusion, Russia advocates harmonizing regional economic projects. I am referring to the so-called ”integration of integrations“ based on the universal and transparent rules of international trade. As an example, I would like to cite our plans to interconnect the Eurasian Economic Union with China’s initiative for creating a Silk Road economic belt. We continue to see great promise in harmonizing the integration vehicles between the Eurasian Economic Union and the European Union.

Ladies and gentlemen, one more issue that shall affect the future of the entire humankind is climate change…..[speech continues]

See further: https://youtu.be/q13yzl6k6w0

‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑

 

Central Intelligence Agency Information Operations Center

CIA Global Population Surveillence

Full spectrum dominance requires full spectrum surveillance. See below details of the CIA’s global cyber espionage program. Of note is their apparent lack in interest in organised crime and their clear interest in keeping every aspect of citizen’s lives under surveillance.

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.”

‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑

Obama Fights Nigerian Anti-Gay Bill, Threatens To Cut Off Aid

Dec 9, 2011

U.S President Barack Obama is threatening to cut off foreign aid to Nigeria if a recent anti-gay bill is passed, but Nigerians are unwavering.

A couple of weeks ago the Nigerian senate passed a bill that strictly prohibits same-sex romantic liaisons. The consequences are dire and well stated: Erring individuals stand to bag a jail sentence of 10 to 14 years.

The bill has yet to pass through the country’s lower legislative chamber, the House of Representatives. If that happens, Nigerian President Goodluck Jonathan can sign it into law.

Expectedly, the bill has raised furor among lesbian, gay, bisexual, and transgender groups (LGBT), human rights organizations and western governments. On Tuesday, Obama issued a memo ordering American diplomats abroad to advance the rights of Lesbian, Gay, Bisexual, and Transgender Persons. The U.S government also announced that the fight against gay and lesbian discrimination would be a central point of its foreign policy, and transgressing nations like Nigeria could be denied aid.

But the overwhelming majority of Nigerians who support the anti-gay bill are adamant. Addressing the Nigerian press on Obama’s threat, Zakari Mohammed, a Nigerian lawmaker said, “We have a culture. We have religious beliefs and we have a tradition. We are black people. We are not white, and so the U.S cannot impose its culture on us. Same sex marriage is alien to our culture and we can never give it a chance. So if [Western nations] withhold their aid to us, to hell with them.”…[article continues].

‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑

The following is an excerpt from LifeSiteNews magazine  July 2015

Kenyan leaders to Obama: Don’t lecture us on gay ‘marriage’

Kenyan National Assembly Speaker Justin Muturi and four other legislators have warned U.S. President Barack Obama against promoting homosexual “rights” in his visit to the country this month.

“Individual rights must not violate the rights of others,” Muturi said. “Those advancing gay rights must similarly appreciate our Christian, Islamic and African traditional values which abhor homosexuality.”

Pointing out that sodomy is a criminal offence in Kenya, Muturi said his government has the right to “sanction any advances perceived to encroach on our social fabric” and that he believes advocacy of same-sex “marriage” is a form of Western ideological oppression disguised as human rights.

‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑

[ii] Following is an excerpt from a blog article by Paul Craig Roberts

(http://www.paulcraigroberts.org/2016/01/24/presidential-crimes-then-and-now-paul-craig-roberts/ )

24 January 2016

Presidential Crimes Then And Now

… unlike the Clinton, Bush, and Obama regimes, the Reagan administration prosecuted those who broke the law. Assistant Secretary of State Elliott Abrams was convicted, National Security Advisor Robert McFarlane was convicted, Chief of CIA Central American Task Force Alan Fiers was convicted, Clair George, Chief of the CIA’s Division of Covert Operations was convicted. Richard Secord was convicted. National Security Advisor John Poindexter was convicted. Oliver North was convicted. North’s conviction was later overturned, and President George H.W. Bush pardoned others. But the Reagan Administration held its operatives accountable to law. No American President since Reagan has held the government accountable.

Clair George was convicted of lying to congressional committees. Richard Secord was convicted of lying to Congress. John Poindexter was convicted of lying to Congress. Alan Fiers was convicted of withholding information from Congress. Compare these convictions then with James R. Clapper now. President Obama appointed Clapper Director of National Intelligence on June 5, 2010, declaring that Clapper “possesses a quality that I value in all my advisers: a willingness to tell leaders what we need to know even if it’s not what we want to hear.” With this endorsement, Clapper proceeded to lie to Congress under oath, a felony. Clapper was not indicted and prosecuted. He was not even fired or forced to resign. For executive branch officials, perjury is now a dead letter law.

In the US the rule of law, and with it liberty, have been lost…

‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑

 

[iii] This has been widely commented on. For a detailed analysis of US and French involvement in the Libyan war see The Levant Report www.levantreport.com article 4 January 2016. A scan of the original email to Hillary Clinton proving the connection between the French and American involvement in the war and Gadhafi’s proposal can be viewed here: https://wikileaks.org/clinton-emails/emailid/6528 An excerpt is reproduced below with emphasis.

 

H: FRANCE’S CLIENT & Q’S GOLD. SID

From: Sidney Blumenthal To: Hillary Clinton Date: 2011-04-01 15:44 Subject: H: FRANCE’S CLIENT & Q’S GOLD. SID

UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05779612 Date: 12/31/2015 RELEASE IN PART B6 From: sbwhoeop Sent: Saturday, April 2, 2011 10:44 PM To: Subject: H: France’s client & Q’s gold. Sid

Attachments: hrc memo France’s client & Q’s gold 040211.docx; hrc memo France’s client & Q’s gold 040211.docx CONFIDENTIAL April 2,.2011 For: Hillary From: Sid Re: France’s client & Qaddafi’s gold

  1. A high ranking official on the National Libyan Council states that factions have developed within it. In part this reflects the cultivation by France in particular of clients among the rebels. …. It is understood that France has clear economic interests at stake. Sarkozy’s occasional emissary, the intellectual self-promoter Bernard Henri-Levy, is considered by those in the NLC who have dealt with him as a semi-useful, semi-joke figure.
  2. Rumors swept the NLC upper. echelon this week that Qaddafi may be dead or maybe not.
  3. Qaddafi has nearly bottomless financial resources to continue indefinitely, according to the latest report we have received: On April 2, 2011 sources with access to advisors to Salt al-Islam Qaddafi stated in strictest confidence that while the freezing of Libya’s foreign bank accounts presents Muammar Qaddafi with serious challenges, his ability to equip and maintain his armed forces and intelligence services remains intact. According to sensitive information available to this these individuals, Qaddafi’s government holds 143 tons of gold, and a similar amount in silver. During late March, 2011 these stocks were moved to SABHA (south west in the direction of the Libyan border with Niger and Chad); taken from the vaults of the Libyan Central Bank in Tripoli. This gold was accumulated prior to the current rebellion and was intended to be used to establish a pan-African currency based on the Libyan golden Dinar. This plan was designed to provide the Francophone African Countries with an alternative to the French.franc (CFA). (Source Comment: According to knowledgeable individuals this quantity of gold and silver is valued at more than $7 billion. French intelligence officers discovered this plan shortly after the current rebellion began, and this was one of the factors that influenced President Nicolas Sarkozy’s decision to commit France to the attack on Libya. According to these individuals Sarkozy’s plans are driven by the following issues:
  4. A desire to gain a greater share of Libya oil production,

b.Increase French influence in North Africa, UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05779612 Date: 12/31/2015

  1. Improve his intemai political situation in France,
  2. Provide the French military with an opportunity to reassert its position in the world, e. Address the concern of his advisors over Qaddafi’s long term plans to supplant France as the dominant power in Francophone Africa) …

‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑

 

[iv] Source: New Eastern Outlook

http://journal-neo.org/2016/03/17/hillary-emails-gold-dinars-and-arab-springs/

Buried amid tens of thousands of pages of former US Secretary of State Hillary Clinton’s secret emails, now being made public by the US Government, is a devastating email exchange between Clinton and her confidential adviser, Sid Blumenthal. It’s about Qaddafi and the US-coordinated intervention in 2011 to topple the Libyan ruler. It’s about gold and a potentially existential threat to the future of the US dollar as world reserve currency. It’s about Qaddafi’s plans then for the gold-based Dinar for Africa and the Arab oil world.

Two paragraphs in a recently declassified email from the illegal private server used by then-Secretary of State Hillary Clinton during the US-orchestrated war to destroy Libya’s Qaddafi in 2011 reveal a tightly-held secret agenda behind the Obama Administration’s war against Qaddafi, cynically named “Responsibility to Protect.”

Barack Obama, an indecisive and weak President, delegated all presidential responsibility for the Libya war to his Secretary of State, Hillary Clinton. Clinton, who was an early backer of an Arab “regime change,” using the secret Muslim Brotherhood, invoked the new, bizarre principle of “responsibility to protect” (R2P) to justify the Libyan war, which she quickly turned into a NATO-led war. Under R2P, a silly notion promoted by the networks of George Soros’ Open Society Foundations, Clinton claimed, with no verifiable proof, that Qaddafi was bombing innocent Libyan civilians in the Benghazi region.

According to a New York Times report at the time, citing Obama Administration senior sources, it was Hillary Clinton, backed by Samantha Power, then a senior aide at the National Security Council and today Obama’s UN Ambassador; and Susan Rice, then Obama’s ambassador to the United Nations, and now National Security Adviser. That triad pushed Obama into military action against Libya’s Qaddafi. Clinton, flanked by Powers and Rice, was so powerful that Clinton managed to overrule Defense Secretary Robert Gates, Tom Donilon, Obama’s national security adviser, and John Brennan, Obama’s counterterrorism chief, today CIA head.

Secretary of State Clinton was also knee-deep in the conspiracy to unleash what came to be dubbed the “Arab Spring,” the wave of US-financed regime changes across the Arab Middle East, part of the Greater Middle East project unveiled in 2003 by the Bush Administration after occupation of Iraq. The first three target countries of that 2011 US “Arab Spring”–an action in which Washington used its “human rights” NGOs such as Freedom House and National Endowment for Democracy, in cahoots as usual, with the Open Society Foundations of billionaire speculator, George Soros, along with US State Department and CIA operatives–were Ben Ali’s Tunisia, Mubarak’s Egypt and Qaddafi’s Libya.

Now the timing and targeting of Washington’s 2011 “Arab Spring” destabilizations of select Middle East states assume a new light in relation to just-released declassified Clinton emails to her private Libya “adviser” and friend, Sid Blumenthal. Blumenthal is the slick lawyer who defended then-President Bill Clinton in the Monika Lewinsky and other sex scandal affairs when Bill was President and facing impeachment.

Qaddafi’s gold dinar

For many it remains a mystery just why Washington decided that Qaddafi personally must be destroyed, murdered, not just sent into exile like Mubarak. Clinton, when informed of Qaddafi’s brutal murder by US-financed Al Qaeda “democratic opposition” terrorists, told CBS news, in a sick, joking paraphrase of Julius Caesar, “We came, we saw, he died,” words spoken by her with a hearty, macabre laugh.

Little is known in the West about what Muammar Qaddafi did in Libya or, for that matter, in Africa and in the Arab world. Now, release of a new portion of Hillary Clinton’s emails as Secretary of State, at the time she was running Obama Administration war on Qaddafi, sheds dramatic new light on the background.

It was not a personal decision of Hillary Clinton to eliminate Qaddafi and destroy his entire state infrastructure. The decision, it’s now clear, came from circles very high in the US money oligarchy. She was merely another Washington political tool implementing the mandate of those oligarchs. The intervention was about killing Qaddafi’s well-laid plans to create a gold-based African and Arabic currency to replace the dollar in oil trades. Since the US dollar abandoned gold exchange for dollars in 1971 the dollar in terms of gold has dramatically lost value. Arab and African OPEC oil states have long objected to the vanishing purchasing power of their oil sales, mandated since the 1970’s by Washington to be solely in US dollars, as dollar inflation soared more than 2000% to 2001.

In a newly declassified Clinton email from Sid Blumenthal to Secretary of State Hillary Clinton dated April 2, 2011, Blumenthal reveals the reason that Qaddafi must be eliminated. Using the pretext of citing an unidentified “high source” Blumenthal writes to Clinton, “According to sensitive information available to this source, Qaddafi’s government holds 143 tons of gold, and a similar amount in silver… This gold was accumulated prior to the current rebellion and was intended to be used to establish a pan-African currency based on the Libyan golden Dinar. This plan was designed to provide the Francophone African Countries with an alternative to the French franc (CFA).” That French aspect was only the tip of the Qaddafi gold dinar iceberg.

Golden Dinar and more

During the first decade of this century, Gulf Arab OPEC countries, including Saudi Arabia, Qatar and others, began seriously diverting a significant portion of the revenues from their vast oil and gas sales into state sovereign wealth funds, many based on the success of Norway’s Oil Fund.

Growing discontent with the US War on Terror, with the wars in Iraq and in Afghanistan, and with overall US Middle East policies after September 2001, led most OPEC Arab states to divert a growing share of oil revenues into state-controlled funds rather than trusting it to the sticky fingers of New York and London bankers as had been the custom since the 1970’s when oil prices went through the roof, creating what Henry Kissinger fondly called the “petro-dollar” to replace the gold-backed dollar Washington walked away from on August 15, 1971. The present Sunni-Shi’ite war or clash of civilizations is in fact a result of the US manipulations after 2003 in the region— “divide and rule.”

By 2008 the prospect of sovereign control by a growing number of African and Arab oil states of their state oil and gas revenues was causing serious concern in Wall Street as well as the City of London. It was huge liquidity, in the trillions, they potentially no longer controlled.

The timing of the Arab Spring, in retrospect, increasingly looks tied to Washington and Wall Street efforts to control not only the huge Arab Middle East oil flows. It is now clear it was equally aimed at controlling their money, their trillions of dollars accumulating in their new sovereign wealth funds.

However, as is now confirmed in the latest Clinton-Blumenthal April 2, 2011 email exchange, there was a qualitatively new threat emerging for Wall Street and the City of London “gods of money,” from the African and Arab oil world. Libya’s Qaddafi, Tunisia’s Ben Ali and Mubarak’s Egypt were about to launch a gold-backed Islamic currency independent of the US dollar. I was first told of this plan in early 2012, at a Swiss financial and geopolitical conference, by an Algerian with extensive knowledge of the project. Documentation was scarce at the time and the story remained in my mental back-burner. Now a far more interesting picture emerges that puts the ferocity of Washington’s Arab Spring and its urgency in the case of Libya into perspective.

‘United States of Africa’

In 2009, Qaddafi, who was at the time the President of the African Union, had proposed that the economically depressed continent adopt the “Gold Dinar.”

In the months prior to the US decision, with British and French backing, to get a UN Security Council resolution that would give them the legal fig-leaf for a NATO destruction of the Qaddafi regime, Muammar Qaddafi had been organizing the creation of a gold-backed dinar that would be used by African oil states as well as Arab OPEC countries in their sales of oil on the world market.

Had that happened at the time Wall Street and the City of London were deep into the financial crisis of 2007-2008, the challenge to the reserve currency role of the dollar would have been more than serious. It would be a death knell to American financial hegemony, and to the Dollar System. Africa is one of the world’s richest continents, with vast unexplored gold and mineral wealth, had been intentionally kept for centuries underdeveloped or in wars to prevent their development. The International Monetary Fund and World Bank for the recent decades have been the Washington instruments to suppress African real development.

Gaddafi had called upon African oil producers in the African Union and in Muslim nations to join an alliance that would make the gold dinar their primary form of money and foreign exchange. They would sell oil and other resources to the US and the rest of the world only for gold dinars. As President of the African Union in 2009, Qaddafi introduced for discussion to African Union member states Qaddafi’s proposal to use the Libyan dinar and the silver dirham as the only possible money for the rest of the world to buy African oil.

Along with the Arab OPEC sovereign wealth funds for their oil, other African oil nations, specifically Angola and Nigeria, were moving to create their own national oil wealth funds at the time of the 2011 NATO bombing of Libya. Those sovereign national wealth funds, tied to Qaddafi’s concept of the gold dinar, would make Africa’s long-held dream of independence from colonial monetary control, whether of the British Pound, the French Franc, the euro or the US dollar, a reality.

Qaddafi was moving forward, as head of the African Union, at the time of his assassination, with a plan to unify the sovereign States of Africa with one gold currency, a United States of Africa. In 2004, a Pan-African Parliament of 53 nations had laid plans for an African Economic Community – with a single gold currency by 2023.

African oil-producing nations were planning to abandon the petro-dollar, and demand gold payment for their oil and gas. The list included Egypt, Sudan, South Sudan, Equatorial Guinea, Congo, Democratic Republic of Congo, Tunisia, Gabon, South Africa, Uganda, Chad, Suriname, Cameroon, Mauritania, Morocco, Zambia, Somalia, Ghana, Ethiopia, Kenya, Tanzania, Mozambique, Cote d’Ivoire, plus Yemen which had just made significant new oil discoveries. The four African member-states of OPEC–Algeria, Angola, Nigeria, a giant oil producer and the largest natural gas producer in Africa with huge natural gas reserves, and Libya with the largest reserves–would be in the new gold dinar system.

Little wonder that French President Nicolas Sarkozy, who was given the up-front role in the war on Qaddafi by Washington, went so far as to call Libya a “threat” to the financial security of the world.

Hillary’s ‘rebels’ create a central bank

One of the most bizarre features of Hillary Clinton’s war to destroy Qaddafi was the fact that the US-backed “rebels” in Benghazi, in the oil-rich eastern part of Libya, in the midst of battle, well before it was at all clear if they would topple the Qaddafi regime, declared they had created a Western-style central bank, “in exile.”

In the very first weeks of the rebellion, the rebel leaders declared that they had created a central bank to replace Gadhafi’s state-owned monetary authority. The rebel council, in addition to creating their own oil company to sell the oil they captured announced: “Designation of the Central Bank of Benghazi as a monetary authority competent in monetary policies in Libya and appointment of a Governor to the Central Bank of Libya, with a temporary headquarters in Benghazi.”

Commenting on the odd decision, before the outcome of battle was even decided, to create a western-style central bank to replace Qaddafi’s sovereign national bank that was issuing gold-backed dinars, Robert Wenzel in the Economic Policy Journal, remarked, “I have never before heard of a central bank being created in just a matter of weeks out of a popular uprising. This suggests we have a bit more than a rag tag bunch of rebels running around and that there are some pretty sophisticated influences.”

It becomes clear now in light of the Clinton-Blumenthal emails that those “pretty sophisticated influences” were tied to Wall Street and the City of London. The person brought in by Washington to lead the rebels in March 2011, Khalifa Hifter, had spent the previous twenty years of his life in suburban Virginia, not far from CIA headquarters, after a break with Libya as a leading military commander of Qaddafi.

The risk to the future of the US dollar as world reserve currency, if Qaddafi had been allowed to proceed–together with Egypt, Tunisia and other Arab OPEC and African Union members– to introduce oil sales for gold not dollars, would clearly have been the financial equivalent of a Tsunami.

New Gold Silk Road

The Qaddafi dream of an Arabic and African gold system independent of the dollar, unfortunately, died with him. Libya, after Hillary Clinton’s cynical “responsibility to protect” destruction of the country, today is a shambles, torn by tribal warfare, economic chaos, al-Qaeda and DAESH or ISIS terrorists. The monetary sovereignty held by Qaddafi’s 100% state-owned national monetary agency and its issuance of gold dinars is gone, replaced by an “independent” central bank tied to the dollar.

Despite that setback, it’s more than notable that now an entirely new grouping of nations is coming together to build a similar gold-backed monetary system. This is the group led by Russia and China, the world’s number three and number one gold producing countries, respectively.

This group is tied to the construction of China’s One Belt, One Road New Silk Road Eurasian infrastructure great project. It involves China’s $16 billion Gold Development Fund, and very firm steps by China to replace the City of London and New York as the center of world gold trade. The Eurasian gold system emerging now poses an entirely new quality of challenge to American financial hegemony. This Eurasian challenge, its success or failure, could well determine whether we allow our civilization to survive and prosper under entirely different conditions, or whether we decide to sink along with the bankrupt dollar system.

  1. William Engdahl is strategic risk consultant and lecturer, he holds a degree in politics from Princeton University and is a best-selling author on oil and geopolitics, exclusively for the online magazine “New Eastern Outlook”.
    ‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑

[v] For a detailed and scholarly analysis see the Levant Report (www.levantreport.com) article 1 March 2016. The following is an extract:

…In a highly classified 2013 assessment put together by the DIA [Defence Intelligence Agency ed] and the Joint Chiefs of Staff (JCS), an “all-source” appraisal which draws on information from signals, satellite, and human intelligence, it was concluded that the US program to arm the rebels quickly turned into a logistical operation for the entire opposition, including al-Nusra and ISIS.  The so-called moderates had evaporated, “there was no viable ‘moderate’ opposition to Assad,” and “the US was arming extremists.”

DIA chief Michael Flynn confirmed that his agency had sent a constant stream of warnings to the civilian administration between 2012 and 2014 saying that the jihadists were in control of the opposition.

“If the American public saw the intelligence we were producing daily, at the most sensitive level, they would go ballistic,” Flynn said.

Yet, as Flynn stated previously, it was a “willful decision” for the administration “to do what they’re doing.”

By summer of 2013, Seymour Hersh reported that “although many in the American intelligence community were aware that the Syrian opposition was dominated by extremists,” still “the CIA-sponsored weapons kept coming.”

According to a JCS advisor, despite heavy Pentagon objections there was simply “no way to stop the arms shipments that had been authorised by the president.”

“I felt that they did not want to hear the truth,” Flynn said.

‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑

 

[vi] Source: Alexander Mercouris ((http://russia-insider.com/en/users/alexander-mercouris) quoting the London Evening Standard print media article on Russia Insider (http://russia-insider.com/en/politics/russias-ambassador-uk-drops-bombshell-us-expected-isis-seize-damascus-october/ri12860)

Alexander Yakovenko, Russia’s ambassador to Britain, dropped something of a bombshell on Monday, though one that has gone completely unnoticed.

In a piece in the print edition of the London Evening Standard defending Russian policy in Syria he made the following extraordinary disclosure:

“Last summer we were told by our Western partners that in October Damascus would fall to IS (ie. the Islamic State – AM).

What they were planning to do next we don’t know.  Probably, they would have ended up painting the extremists white and accepting them as a Sunni state straddling Iraq and Syria”.

The summer – when these conversations between the Western powers and the Russians allegedly took place – was the time when the US was in discussions with Turkey and Jordan about setting up a no-fly zone and safe havens in Syria.

I discussed in this article how “no-fly zone” is today simply a euphemism for a US bombing campaign.

What Yakovenko is therefore in effect saying is that the US was planning in the summer to start a bombing campaign to overthrow the government of Syria in the knowledge that this would result by October in the victory of the Islamic State and its capture of Damascus.

Russia Insider has previously explained that it was to stop the US proclaiming a no-fly zone – i.e. commencing a bombing campaign aimed at overthrowing the Syrian government – that Russia intervened in Syria.

The fact Yakovenko says the US told the Russians this would result in the Islamic State capturing Damascus by October explains why the Russians felt they had to act as they did…..

‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑