The Intercept today is releasing the first three months of SIDtoday, March 31 through the end of June 2003, using files provided by NSA whistleblower Edward Snowden. In addition, we are releasing any subsequent 2003 installments of SIDtoday series that began during this period. The files are available for download here.
We combed through these files with help from other writers and editors with an eye toward finding the most interesting stories, among other concerns.
SIDtoday was launched just 11 days into the U.S. invasion of Iraq by a team within the NSA’s Signals Intelligence Directorate. SID is arguably the NSA’s most important division, responsible for spying on the agency’s targets, and SIDtoday became, as Peter Maass documents in an accompanying article, an invaluable primer on how the NSA breaks into and monitors communications systems around the world.
At the outset, SIDtoday declared that its mission was to “bring together communications from across the SIGINT Directorate in a single webpage” and that one of its key areas of focus would be providing “information on the Iraq Campaign and Campaign Against Terrorism.” And, indeed, the first issues of SIDtoday document how the agency paved the way for the Iraq War with diplomatic intelligence, supported the targeting of specific enemies in Iraq, and continued servicing existing “customers” like the Department of the Interior and the Department of Agriculture, whose appetite for signals intelligence grew sharply after the Sept. 11 attacks.
While the agency was helping in Iraq, NSA personnel were also involved in interrogations at Guantánamo Bay, SIDtoday articles show, working alongside the military and CIA at a time when prisoners there were treated brutally. The Intercept’s Cora Currier describes the NSA’s involvement with the interrogations in a separate story, one that also documents how the agency helped with the capture and rendition to Guantánamo of a group of Algerian men in Bosnia.
Other highlights from this set of documents follow below, alongside links to the relevant originals.
In the first months of the Iraq War, SIDtoday articles bragged about the NSA’s part in the run-up to the invasion and reflected the Bush administration’s confidence that Saddam Hussein had hidden weapons of mass destruction.
At the United Nations, readers were told, “timely SIGINT played a critical role” in winning adoption of resolutions related to Iraq, including by providing “insights into the nuances of internal divisions among the five permanent members of the U.N. Security Council.”
When the military deployed to Iraq, SIGINT came too. Maj. Gen. Richard J. Quirk III, then a deputy director of SID, put out an “urgent” call for additional SIGINT analysts to volunteer for 90- to 120-day field deployment, stressing that “SIGINT is wired into our military operations as never before.” NSA’s Iraq War tasks would include “researching possible locations of stockpiled WMD material.” The Geospatial Exploitation Office, placed on 24/7 watch, provided “near-real-time tipping of communications associated with Iraqi leadership and other high-value targets.”
Just three days into the campaign, on March 23, 2003, Pfc. Jessica Lynch and five others were taken prisoner after their convoy from the 507th Maintenance Company went off course near Nasiriyah, Iraq, and lost 11 soldiers in the ensuing attack. On April 1, Special Operations commandos rescued Lynch from her bed at the Saddam Hussein General Hospital in Nasiriyah, swooping down in Black Hawk helicopters and firing explosive charges. (It later emerged that Iraqi forces had previously left the hospital.)
In “SID Support to POW Rescue,” Chief of Staff Charles Berlin revealed that the Lynch rescue was aided by blueprints from the Japanese construction firm that originally built the hospital, blueprints rounded up as the rescue was being planned and sent “as digital files” to the commandos “literally minutes before the aircraft departed with the strike team” on April 1. Information about the hospital had been collected by a dedicated Underground Facility Support Cell created by the NSA in 2002 as part of an interagency effort to assess “the infrastructure and vulnerabilities of underground facilities used by hostile governments or military forces.”
Even before President Bush declared an end to major combat operations in Iraq on May 1, 2003, NSA was preparing its history of the war. Record management officers were given guidance on how to preserve records from the operation, and the general staff was told how to preserve even “seemingly mundane things.”
Soon after the president’s “Mission Accomplished” victory speech, some NSA staff returned from deployment. But the role of signals intelligence in Iraq was not over. The NSA provided “time-sensitive SIGINT” support, including a “summary of contacts,” to aid the May 22, 2003, capture of a top Baathist official, Aziz Sajih Al-Numan, “king of diamonds” in the deck of playing cards that featured U.S. Central Command’s wanted Iraqis. Al-Numan was caught within 25 hours after the Army contacted NSA to request support. “Well done to all involved in his capture!” a SIDtoday article declared.
In June, the “ace of diamonds,” Saddam’s secretary Abid Hamid Mahmud al-Tikriti, was captured thanks to “near-real-time tipping [of geospatial intelligence] to the Special Operations Forces engaged in the hunt,” along with rapid translation of intercepted conversations, SIDtoday bragged.
As the end of the quarter approached, SIDtoday reported on portents of continued resistance and warned, “The scope of hostilities is greater than many may realize,” and, separately, that “Iraq is still a troubled environment and much work needs to be done.”
Additional SIDtoday articles about Iraq are available here.
In an example of highly targeted intelligence gathering, the NSA spent “many months” acquiring the phone number of a Russian organized crime figure and began intercepting his calls, according to a May 2003 article. The intelligence work was sparked by the State Department, which in 2002 requested information on the leader of the Tambov crime syndicate in Russia, referred to only as “Mr. Kumarin,” and about any links between the syndicate and Russian President Vladimir Putin.
In 2009, the Russian authorities tried and convicted Vladimir Kumarin, who had changed his name to Vladimir Barsukov, for fraud and money laundering. The New York Times compared him to a “Russian John Gotti.” He was sentenced to 14 years in prison.
As previously shown, NSA signals intelligence was used to inform negotiations over U.N. resolutions against Iraq in early 2003. But that wasn’t the only time the agency influenced diplomacy: In 2002, signals intelligence ignited a confrontation between North Korea and the U.S., according to a SIDtoday article from April 2003. NSA eavesdroppers discovered that North Korea was developing a uranium enrichment capability in violation of an agreement with the U.S. When the State Department presented the evidence at a meeting in Pyongyang that October, the North Koreans admitted it was true, the article said, setting off the clash.
“The ONLY source of information on this treaty violation was SIGINT derived from North Korean external communications,” an NSA manager wrote in SIDtoday. “This is both a SIGINT success story and an example of how cross-organizational collaboration can produce key intelligence. Hats off to everyone involved!”
For more than 30 years, one SIDtoday article from June 2003 explained, the NSA had tapped into communications from foreign satellites. Though the program associated with this monitoring, FORNSAT, has been previously disclosed, this document adds important context. For example, it made FORNSAT sound like an intelligence gold mine, having “consistently provided … over 25 percent of end product reporting.” It also explained what sorts of information the NSA gleaned from satellites — “intelligence derived from diplomatic communications … airline reservations and billing data … traffic about terrorists, international crime, weapons of mass destruction … international finance and trade.”
The problem, at the time the article was written, was that FORNSAT was in “dire need of upgrade” because it was “primarily engineered for voice” communications and needed to shift to intercepting more digital communications, including digital video. It also needed to be expanded to tap into mobile satellite phone systems, which “use hundreds of spot beams. Our 13 fixed FORNSAT sites cannot provide the necessary access.”
Ten years before Edward Snowden gave a trove of NSA documents to journalists Glenn Greenwald and Laura Poitras, a “chief” within SID’s Communications and Support Operations organization described in SIDtoday the great lengths the agency went to in order to track leaks. In a profile of the Intelligence Security Issues office within CSO, this person said that ISI scanned 350 press items daily for “cryptologic insecurities” and maintained a database called FIRSTFRUIT with “over 5,000 insecurity-related records” ranging from “espionage damage assessments” to “liaison exchanges.” This ISI profile ran as part of a broader SIDtoday series on the CSO organization.
One theme that emerges from early 2003 SIDtoday installments is that the NSA was grappling with how to handle advances in information technology, particularly the proliferation of mobile devices and online networks.
One article in the “Customer Relations” series described several “dynamic dissemination products” to help SID “change with … our customers,” including an initiative to distribute “secret-level information” to wireless devices, a technique for disseminating “NSA product” to tablet computers, and a system to view secret documents on unclassified computers over the internet, bypassing the need for a high-security enclosed area known as a SCIF. These efforts foreshadowed Hillary Clinton’s controversial use, as secretary of state, of a BlackBerry device to traffic in sensitive government information after the NSA reportedly rebuffed her request for a special secure device from the agency.
Another article highlighted that the NSA was a heavy user of mobile devices even four years before the release of the first iPhone, calling on staffers to help catalogue all computers, including “laptops, palmtops/PDAs, etc.,” for an annual inventory.
The document also stated that $27 million worth of equipment remained “unaccounted for” after the prior year’s audit, which ended just two months earlier.
In addition to making secret information accessible to more people, SID was developing new systems to solve long-standing problems. The JOURNEYMAN program, described in another article, aimed to develop a system for distributing SIGINT reports to many different recipients at once across different networks with different formatting requirements. Another system, PATENTHAMMER, collected cellular, fax, and pager signals for the Special Operations Command and also allowed users to access information collected in the past.
SID was also still exploring the rapidly evolving internet. One article described how the NSA was improving its integration with the public internet via a program called OUTPARKS. Another touted the NSA’s annual SIGDEV conference, a major event in which analysts from the “five eyes” intelligence agencies in Australia, Canada, New Zealand, the United Kingdom, and the United States share techniques for developing new SIGINT. The article noted that the 2003 SIGDEV would include workshops on “social network analysis,” “internet research,” and “wireless LANs,” that is, wifi networks.
Other NSA staff apparently required more basic forms of training. “Do you know you can make SIDtoday your browser homepage?” asked a June 2003 article, with instructions on changing the default homepage in the web browsers popular at the time: Netscape and Internet Explorer.
The Signals Intelligence Directorate is full of expert spies, but they don’t choose who to spy on themselves. In the corporate lingo of SID, the “customer” decides, customers “including all departments of the executive branch,” according to the agency’s website. And the demand from customers exploded in 2003, judging from a series of SIDtoday articles about the Customer Relationships Directorate, an office focused on ensuring that NSA’s customers get what they need.
One driver of this demand was the war on terror; inbound SIGINT requests to the NSA’s National Security Operations Center went from 300 in the two weeks after the Sept. 11 attacks to 1,700 by the end of the year, according to one SIDtoday article. Existing customers like the Department of the Interior and the Department of Agriculture “suddenly became voracious consumers” of signals intelligence, as one article from April 2003 put it, and brand new customers appeared on the scene, such as the newly created Department of Homeland Security. SID also increased its interaction with domestic law enforcement agencies like the FBI and the Bureau of Alcohol, Tobacco, Firearms, and Explosives.
Another driver of heightened SIGINT demand was the war in Iraq. According to the document describing the NSA’s role in war-related U.N. Security Council resolutions, “The number of timely SIGINT tippers delivered to [the U.S. Mission to the United Nations] during key points in the negotiations increased by a factor of four.”
Amid strong demand for intelligence, the NSA sometimes needed to alter sensitive information so it could be shared more widely. As part of SIDtoday’s explainer series “ConSIDer This,” one unknown author from the SIGINT communications team explained how to lower the classification level of intercepted communications, or COMINT, a process known as “downgrading.” The process could involve some subterfuge. “In order to downgrade COMINT, a plausible cover (i.e., collection from a less sensitive source) must exist,” the article stated.
As SIDtoday launched in 2003, the Signals Intelligence Directorate was in the midst of a leadership change as Director Maureen Baginski moved to a new position as the FBI’s head of intelligence and Maj. Gen. Quirk replaced her. Several other new managers and technical directors introduced themselves in the online newsletter’s series “Getting to Know the SID Leadership Team.” Also in that series: A senior technical leader complained that “voice dominates our reporting today, yet [digital information] is much more prolific in the global net” and explored reasons for this shortcoming.
Throughout the second half of 2003, employees of the Signals Intelligence Directorate contributed articles to the series “SID Around the World,” a sort of collective travelogue on their tours outside the Fort Meade, Maryland, headquarters of the NSA. SID staffers seemed to most enjoy local cuisine: beer, strawberries, chocolates, and ramen, although one touted the possibility of “less than a four-hour drive” from the NSA’s U.K. Menwith Hill site for a “Taco Bell or Cinnabon fix.” Interspersed with recommendations for Rhineland wineries, Japanese communal hot baths, and winter sports in Colorado were some interesting facts about NSA’s global reach in 2003. The majority of signals processed at the Kunia operations center in Hawaii were collected on Okinawa. Some of the NSA’s representatives in Mons, Belgium, worked in an underground bunker. The Misawa base in Japan had just 25 civilian NSA personnel, while Menwith Hill had several hundred.
SIDtoday’s “Around the World” to Guantánamo Bay is part of a larger story on the NSA’s role in interrogations.
SIDtoday’s “A Day in the Life” series provided first-person accounts of the various jobs within the Signals Intelligence Directorate. For example, one “Day in the Life” described the work of a mathematician in the field of “diagnosis,” that is, studying encryption systems in order to understand their weaknesses. “During the course of a normal day,” the mathematician wrote, “I run cryptanalytic routines on UNIX desktop workstations, supercomputers, and special-purpose devices using available software tools. The routines employ standard cryptanalytic tests which search for patterns and non-random properties in data.”
The series also included an article written by Maj. Gen. Quirk’s executive assistant — the “conscience” of a “senior leader” — and another by a senior operations officer whose work involved entertaining Fox News personality Tony Snow before he became White House press secretary.
For an academic, there is no better way to improve your career than to get published in prestigious journals and to win prestigious awards. But what if your research is classified and you can’t ever get the public recognition you deserve without betraying state secrets? If you work for the NSA, you look to one of the agency’s Learned Organizations to receive your academic accolades.
SIDtoday included a series of articles that shines a spotlight on NSA’s Learned Organizations, including the cryptanalysis-focused KRYPTOS Society; the Crypto-Linguistic Association, focused on language analysis, with events that in 2002 included a luncheon with the director of the Klingon Institute; the Collection Association, whose membership evolved from spies gathering intelligence via antennas to also include the monitoring of satellites and internet sleuthing; the Crypto-Mathematics Institute, NSA’s oldest Learned Organization, founded in 1957, whose activities included an essay contest; and the International Affairs Institute.
Related Stories:
Snowden, in today’s Guardian, lede:
http://www.theguardian.com/us-news/2016/may/22/snowden-whistleblower-protections-john-crane
The SPYMASTERS didn’t mention any overhaul of US whistleblower protections … much less “wrongdoing” (sneek peek)
https://www.youtube.com/watch?v=Ppq14WBXMXg
*the entire film is a masterclass in the tautology of noblezze oblige imo, coram. Our old friend, Jose Rodrigous (CIA Chief of Torture or whatever), from 60 Minutes frame, is featured prominently and explains his destruction of the CIA ‘torture’ tapes (he was under Court order to preserve) this way; ‘I destroyed the tapes because if people saw them they might think we are psychopaths. We didn’t want to look like psychopaths.’ .. cocky about, too.
I watch stuff like this and wonder why some of these people are not arrested before they leave the studio, coram?
If The Intercept released the real secrets of the NSA, they would be laughed at, called Tin Foil Hatters and ruin their professional careers..as former NSA Whistleblower Russell Tice Pointed out, Snowden did not have access to Black Ops level secrets..he wasn’t cleared. Just GOOGLE: Akwei vs NSA to get the real scoop..
That being said, some of us appreciate the effort. At least someone is trying to do something….
USA ≠ Freedom
NSA ≠ Security
“One article in the “Customer Relations” series described several “dynamic dissemination products” to help SID “change with … our customers,” including an initiative to distribute “secret-level information” to wireless devices, a technique for disseminating “NSA product” to tablet computers, and a system to view secret documents on unclassified computers over the internet, bypassing the need for a high-security enclosed area known as a SCIF. ”
Wow
I’m very intrigued about seeing just how the 2003 collection programs and especially that “SOC customer” mission morph or expand over the 9 years of documents to be released. Perhaps some of your choices for “most intriguing” in fact rely upon specific SID evolution over time, and if not then maybe you could keep this column alive for at least some or all of the new releases in this series. I don’t know if the docs’ll eventually reveal it but I suspect programs like FIRSTFRUIT and PATENTHAMMER of huge growth over those intervening years because of being used against ever-growing target lists.
Thank you M&M, yum!
We definitely plan to keep this column alive with every new release of documents.
This is a miserable chronicle of how employees of the USG morph to apparatchiks of an evil regime i.e; the USG. Now we have the story that makes one’s skin creep. Bravo Snowden for setting us free to know. Now we must act to contain the monster and decontaminate the country,
With your access to all the stolen National Secrets that were first taken to China and held there for a period of time and with China’s ability and reputation for Ciber pilfering, then to RUSSIA where you and a few couriers loosely exchanged parts of the National Secrets until I assumed you would eventually came to possess all of the theft. You being an expert in Protecting the Secrets of our Country, do you think that RUSSIA and their capabilities could have obtained what You are carefully releasing that You by now are Carefully releasing SECOND HAND INFORMATION THAT YOU ARE ONLY IN POSSESSION OF WHAT CHINA AND RUSSIA ALLOWED YOU TO GET?
You are totally wrong. Neither China nor Russia would give a rat’s tale for these materials. There are no secrets there for spy agencies: they have all been doing this for ages. That’s why neither Russia nor China was interested in Snowden: it is only when the US suspended Snowden’s passport, Russia was basically forced to give him asylum: they didn’t want him and he didn’t want Russia. There is also no reason whatsoever to believe that Snowden gave any of the documents to Russia or China.
Another story is this whole deal with giving documents to Greenwald et all, who then ended up being financed by Omidyar, who shut down Wikileaks and Manning’s defense fund (through Paypal). A collaborating with all 3-letter-agencies oligarch all of a sudden turned into a privacy and “adversarial journalism” supporter and financier.
You should read this article by a Japanese journalist based in Hong Kong:
https://wikispooks.com/wiki/Document:Saving_Agent_Snowden_From_His_Handlers_Greenwald_%26_Omidyar
Larry…you are consistently…wrong. You have absolutely no proof whatsoever that secrets were compromised by Snowden, Greenwald, nor Poitras.
I’m sure, though, that you know where Iraq hid the WMDs…you were told in a vision.
What’s the news here or in the entire release. Name anything we hadn’t know before. Feel free to go to pre-2013.
Uh, this article is a list of things we hadn’t known before. I’ll pick one for you: After 9/11, ‘Department of the Interior and the Department of Agriculture “suddenly became voracious consumers” of signals intelligence.’
Ok, so do you mind explaining the significance of that then. I mean, so what?
Q. What is the significance of domestic agencies (Like the Department of Interior, the Department of Agriculture and the Department of Justice) subject to the US Constitution, Bill of Rights and Posse Comitatus Act using US military signals intelligence collected on US persons in clear violation of their 1st, 4th and 5th amendment protections?
A. Because it establishes these domestic agencies are complicit in the US militarys ongoing wholesale violation of US Citizens constitutional rights in Peace Time. It also confirms that those Cabinet Level Department Heads who swore to preserve protect and defend your constitutional rights against all enemies foreign AND domestic have not only broken their oath but in doing so given a green light to every departmental employee to do the same for the last 15 years and counting…
I don’t want to repeat myself. So, read here:
https://theintercept.com/2016/05/16/the-intercept-is-broadening-access-to-the-snowden-archive-heres-why/?comments=1#comment-231693
He’s kind of right. I mean, you guys are acting like this is ‘the big Snowden files release’, but many of the cables are of casual import or significance: how does it benefit us to know that NSA staff had a newsletter that helped staff stationed abroad at Gitmo or Japan find fun stuff to do during their time off? You act like this is newsworthy? No. Not worthwhile reading. Maybe you guys are running out of material?
If you find any of this entertaining, you have joined the insect colony.
The US is spending ungodly sums not for human development, but for the paranoia associated with creating enemies in a competitive environment to enrich their wealthy owners to the demise of everyone else.
Presumptively, the declared initiative to repeat the entire social development process would be..
If you find that to be good, stop beating your wife.
https://theintercept.com/snowden-sidtoday/2830120-sid-around-the-world-a-tdy-to-guantanamo-bay/
Yes…the unbelievable beauty belies you to the opportunities of “fun” and extracurricular activities after a long day of hard work. Water sports of any and every kind awaits to take the stress of your day away. And if that’s not your cup of tea all kinds of sports and crafts are just a short walking distance all for free! (thanks tax payers!)
Then by all means consider this:https://theintercept.com/2016/04/18/trapped-guantanamo-letters-mohammed-al-hamiri/
13 years without charge enduring daily torture, humiliation, despair, and losing the life of a friend to suicide Mohammed al Hamiri hung onto letters to and from his mother that gave him strength to hope for a day of freedom. [“His writings from Guantánamo offer a glimpse into what the prospect of freedom meant to him during his long imprisonment. “I do not know why I am writing these words, and I do not know if my letters and my words are going to be read by eyes that know the meaning of justice,” he reflected recently, writing that prison had given him “no voice other than this pen with which to write a painful memory from the pages of my life.”]
How shameful it is to be American…
In case anyone hasn’t seen this…the all to familiar secret activities of the US Government and their humanitarian quest for liberation of populations.
https://www.youtube.com/watch?v=0zhGvId4fcc
John Pilger – Stealing a Nation [2004]
https://www.youtube.com/watch?v=xUW5-LlLQ1Q
John Pilger – A World War Has Begun: Break The Silence
Disclaimer of above speech by John Pilger – A World War Has Begun…
I do not endorse any politician mentioned nor do I believe any of their rhetoric. But I listen to the facts that he has obtained and freely exposes of the MSM and their mind controlling tactics. Just like TI here. To listen to facts and line them up with the this NSA info here makes a witness to the rogue actions taken by the US Government all in the name of its citizens and all in the name of its extorted taxpayers. It is putting the GUILT of the USA on the heads of its citizens.
You know they are coming. I hear them gathering steam. The paranoids who want to believe Snowden and his documents are an NSA double-agent operation.
That what all these releases are intended to accomplish is putting a face on the NSA that makes them more human, their mission more understandable, and thus authoritarian state-side data collection and controls more accepted by the American public, journalists, and especially congressional customers that foot the bill – all via this tricky new “semi-disinformation”. Oh yeah.
I don’t believe that, but you KNOW the NSA men and women reading the pre-publication submissions by The Intercept must have been secretly excited that their covert world is being published and finally being more recognized – by their own internal marketing department no less.
They, fighting off tinges of masochistic excitement of it all happening to them. Another game afoot. Another dimensional facet to the ongoing information war. They don’t quite. They adapt.
“We are operating on many levels here.” – Ken Kesey (MK Ultra [LSD] collateral damage?)
Watch the movie Mirage Men (2013) to see how the NSA and other U.S. agencies ruthlessly deploy disinformation via “perception management campaigns” … on American citizen.
Ha! You can sleep safely tonight. The NSA will be awake to protect your digital security.
Is there truth behind stories & dvds relating close relationship between Petraeus & man named John Steele, supposedly involved in torture techs in Central America esp Guatamala & then on to Abu graeb? (spelling)
Not sure how close the relationship may have been, but James (not John) Steele worked in Iraq with a guy named Coffman, who reported directly to Petraeus.
The Dirty War Crew has more interconnections than we can count.
Very revealing of the bureaucratic mentality inside the NSA, and the role it plays in serving dishonest and corrupt government leaders, for example this on Iraq, 4/11/2003:
“Our team has already established contact with officials who will lead the transition efforts in phase IV. Developing an early understanding of the customer requirements for Phase IV and establishing a relationship with those customers will allow us to affect the necessary planning to optimize our posture and meet demands as they emerge.”
The agenda behind the Iraq invasion and occupation was primarily economic; the goal was to install a puppet regime that would hand over control of Iraqi oil production to US and British oil corporations, while doing the same with Iraqi agriculture, telecommunications, etc. Everything was to be privatized and placed under external control – the largest neocolonial project of the 21st century.
It was all based on a slew of lies produced by the Bush administration and promoted by the corporate media – first, Saddam was supposed to have links to 9/11, but when the CIA couldn’t get such admissions from captured Al Qaeda suspects, even after extensive torture, the story of Iraqi nuclear, chemical and biological weapons was floated – all with extensive media cooperation, via outlets like the New York Times, FOX News, CNN, etc.
It’s highly likely that the NSA had infiltrated Saddam’s communications for years before the invasion, and they probably knew very well that Iraq had destroyed all components of the 1980’s era WMD program that was supported by the U.S., Britain, France, Germany, the Saudis, Egypt, etc., as part of their support for Saddam’s attempted annexation of Iranian oilfields in the First Gulf War (c.1980-1988).
When the Iraq population, at first relieved to be rid of Saddam, realized that the Bush plan was to turn Iraq into a puppet state under foreign control, in late 2003, they began their insurgency (initially a joint Shia-Sunni uprising against the colonial administration of Paul Bremer). Isn’t this when the ‘collect it all’ strategy of NSA chief Keith Alexander began? He didn’t like it that the military intelligence was only focusing on militant groups; he wanted complete monitoring of the entire Iraq population. Then, the program expanded to monitor all American citizens as well, a theme that Obama continued with.
It was also in late 2003 that the torture-all-the-prisoners notion, put forth by Donald Rumsfeld, began. The torture in Abu Ghraib was never about obtaining information, the idea was to terrify the Iraqi population into submission to their new foreign rulers – and no, it didn’t work. Similarly, the torture of Al Qaeda operatives in 2001-2002 by the CIA in black sites was all about obtaining links between Saddam and 9/11 – which the NSA likely also knew did not exist. Torture is useless for obtaining information; it is only used to terrify occupied populations and to prepare prisoners for Soviet-style show trials by extracting false confessions.
At least the CIA had people inside it like Valerie Plame who were willing to point out that the WMD claims were lies that various CIA bureaucrats promoted to please the Bush Administration and so advance their own career prospects; the NSA just went along with the lies at the time.
Real patriots expose the criminality and corruption of government leaders to the general public, they don’t go along with the program in order to advance their own careers.
According to the documents just released by Snowden the NSA believed WMD’s would be found, or was this a ruse also, another part of the genius plot to spend 100’s of billions of US money in order to reap 10’s of billions in profit
Yes,100s of billions in public money was well worth 10s of billions of private profit.I think you undervalue both as the war in Iraq has cost trillions,at least long term.
I guess the NSA clowns thought Saddam wouldn’t give up the WMD we gave him.
Question: On the North Korea bit, the article reads:
What clash?
“What clash?”
I deleted the link in the sentence that tripped you up. Hope that helps …
Thanks