Your Source for Leaks Around the World!

Archive for the ‘False Flag’ Category

CSE’s Cyberwarfare Toolbox: False Flag Ops/Deception Techniques/Destroying Infrastructure Among 32 Tactics Revealed

In Archive, Canada, CSEC, False Flag, Hacking, NSA, NSA Files, PSYOP, Surveillance on April 2, 2015 at 11:07 AM

cse-cyber-activity-spectrum

03/23/2015

CBC/Ryan Gallagher/TheIntercept:

Top-secret documents obtained by the CBC show Canada’s electronic spy agency Communication Security Establishment (CSE) has developed a vast arsenal of cyberwarfare tools alongside its U.S. and British counterparts to hack into computers and phones in many parts of the world, including in friendly trade countries like Mexico and hotspots like the Middle East.

Details of the CSE’s capabilities are revealed in several top-secret documents analyzed by CBC News in collaboration with The Intercept.

The latest top-secret documents illustrate the development of a large stockpile of Canadian cyber-spy capabilities that go beyond hacking for intelligence, including:

  • destroying infrastructure, which could include electricity, transportation or banking systems
  •  “false flag” operations to “create unrest” — ie. carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker
  • “effects” operations to “alter adversary perception” – ie. sending out propaganda across social media or disrupting communications services with such techniques as deleting emails, freezing internet connections, blocking websites and redirecting wire money transfers
  • “honeypots” – ie. some sort of bait posted online that lures in targets so that they can be hacked or monitored

It’s unclear which of the 32 cyber tactics listed in the 2011 document are actively used or in development. CSE wanted to become more aggressive by 2015, the documents also said.

Document: CSEC Cyber Threat Capabilities – SIGINT and ITS: An End-to-End Approach (2011)

Previous Snowden leaks have disclosed that the CSE uses the highly sophisticated WARRIORPRIDE malware to target cellphones, and maintains a network of infected private computers — what’s called a botnet ​— that it uses to disguise itself when hacking targets.

Other leaked documents revealed back in 2013 that the CSE spied on computers or smartphones connected to Brazil’s mining and energy ministry to get economic intelligence.

Canada’s electronic spy agency and the U.S. National Security Agency “cooperate closely” in “computer network access and exploitation” of certain targets, according to an April 2013 briefing note for the NSA.

Document: NSA Intelligence Relationship with CSEC (April 2013)

Their targets are located in the Middle East, North Africa, Europe and Mexico, plus other unnamed countries connected to the two agencies’ counterterrorism goals, the documents say. Specific techniques used against the targets are not revealed.

Some of the capabilities mirror what CSE’s U.S. counterpart, the NSA, can do under a powerful hacking program called QUANTUM, which was created by the NSA’s elite cyberwarfare unit, Tailored Access Operations.

The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, documents from Snowden revealed that JTRIG uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.

According to the documents, the CSE wanted more aggressive powers for use both at home and abroad.

In 2011, the Canadian agency presented its vision for 2015 to the Five Eyes allies at a conference.

“We will seek the authority to conduct a wide spectrum of Effects operations in support of our mandates,” the top-secret presentation says.

Document: CASCADE: Joint Cyber Sensor Architecture (2011)

Effects operations refer to manipulating and disrupting computers or devices.

In an increasingly hostile cyberspace, Canada has also turned its attention to figuring out ways to better protect itself against such attacks.

Documents: CSEC Cyber Threat Detection (November 2009)
                          CSEC SIGINT Cyber Discovery (November 2010)

See Also: EONBLUE: CSE’s Cyber Threat Detection Platform; Access Internet Core Infrastructure with 200 Sensors Across Globe

Back in 2011, CSE envisioned creating a “perimeter around Canada” to better defend the country’s interests from potential threats from other countries and criminals, raising the prospect the agency was preparing a broad surveillance program to target Canadians’ online traffic.

At the time, “full visibility of our national infrastructure” was among its goals, according to a planning document for 2015. Security analysts wanted the means to detect an attack before it hit a target like a government website.

“If we wish to enable defence, we must have intelligence to know when attacks enter our national infrastructure,” the 2011 top-secret CSE presentation says.

The agency would not answer how far it got with the 2015 plan.

Document: CSE Response to CBC Re: Cyberwarfare Revelations

Experts say the Anti-Terrorism Act, Bill C-51, currently being debated, could legalize use of some of the capabilities outlined in these classified documents.

Though the act would give CSIS, Canada’s domestic intelligence agency, the power to disrupt threats to the security of Canada both at home and abroad, the Canadian Security Intelligence Service relies on its sister service, the CSE, for technical help with surveillance and infiltration of cellphones and computers.

Secret Transcripts Reveal How FBI Turned “Retarded Fool” Into a Terrorist with “Hollywood Ending” – Sami Osmakac Sting

In Archive, False Flag, FBI, Terrorism on March 20, 2015 at 6:06 PM

03/16/2015

Trevor Aaronson/TheIntercept:

In the video, Sami Osmakac is tall and gaunt, with jutting cheekbones and a scraggly beard. He sits cross-legged on the maroon carpet of the hotel room, wearing white cotton socks and pants that rise up his legs to reveal his thin, pale ankles. An AK-47 leans against the closet door behind him. What appears to be a suicide vest is strapped to his body. In his right hand is a pistol. 

“Recording,” says an unseen man behind the camera.

“This video is to all the Muslim youth and to all the Muslims worldwide,” Osmakac says, looking straight into the lens. “This is a call to the truth. It is the call to help and aid in the party of Allah … and pay him back for every sister that has been raped and every brother that has been tortured and raped.”

The recording goes on for about eight minutes. Osmakac says he’ll avenge the deaths of Muslims in Afghanistan, Iraq, Pakistan and elsewhere. He refers to Americans as kuffar, an Arabic term for nonbelievers. “Eye for an eye, tooth for a tooth,” he says. “Woman for a woman, child for a child.”

Osmakac was 25 years old on January 7, 2012, when he filmed what the FBI and the U.S. Department of Justice would later call a “martyrdom video.” He was also broke and struggling with mental illness.

After recording this video in a rundown Days Inn in Tampa, Florida, Osmakac prepared to deliver what he thought was a car bomb to a popular Irish bar. According to the government, Osmakac was a dangerous, lone-wolf terrorist who would have bombed the Tampa bar, then headed to a local casino where he would have taken hostages, before finally detonating his suicide vest once police arrived.

But if Osmakac was a terrorist, he was only one in his troubled mind and in the minds of ambitious federal agents. The government could not provide any evidence that he had connections to international terrorists. He didn’t have his own weapons. He didn’t even have enough money to replace the dead battery in his beat-up, green 1994 Honda Accord.

Osmakac was the target of an elaborately orchestrated FBI sting that involved a paid informant, as well as FBI agents and support staff working on the setup for more than three months. The FBI provided all of the weapons seen in Osmakac’s martyrdom video. The bureau also gave Osmakac the car bomb he allegedly planned to detonate, and even money for a taxi so he could get to where the FBI needed him to go. Osmakac was a deeply disturbed young man, according to several of the psychiatrists and psychologists who examined him before trial. He became a “terrorist” only after the FBI provided the means, opportunity and final prodding necessary to make him one.

Informant-led sting operations are central to the FBI’s counterterrorism program. Of 508 defendants prosecuted in federal terrorism-related cases in the decade after 9/11, 243 were involved with an FBI informant, while 158 were the targets of sting operations. Of those cases, an informant or FBI undercover operative led 49 defendants in their terrorism plots, similar to the way Osmakac was led in his.

In these cases, the FBI says paid informants and undercover agents are foiling attacks before they occur. But the evidence suggests — and a recent Human Rights Watch report on the subject illustrates — that the FBI isn’t always nabbing would-be terrorists so much as setting up mentally ill or economically desperate people to commit crimes they could never have accomplished on their own.

At least in Osmakac’s case, FBI agents seem to agree with that criticism, though they never intended for that admission to become public. In the Osmakac sting, the undercover FBI agent went by the pseudonym “Amir Jones.” He’s the guy behind the camera in Osmakac’s martyrdom video. Amir, posing as a dealer who could provide weapons, wore a hidden recording device throughout the sting.

The device picked up conversations, including, apparently, back at the FBI’s Tampa Field Office, a gated compound beneath the flight path of Tampa International Airport, among agents and employees who assumed their words were private and protected. These unintentional recordings offer an exclusive look inside an FBI counterterrorism sting, and suggest that, even in the eyes of the FBI agents involved, these sting targets aren’t always the threatening figures they are made out to be.

On January 7, 2012, after the martyrdom video was recorded, Amir and others poked fun at Osmakac and the little movie the FBI had helped him produce.

“When he was putting stuff on, he acted like he was nervous,” one of the speakers tells Amir. “He kept backing away …”

“Yeah,” Amir agrees.

“He looked nervous on the camera,” someone else adds.

“Yeah, he got excited. I think he got excited when he saw the stuff,” Amir says, referring to the weapons that were laid out on the hotel bed.

“Oh, yeah, you could tell,” yet another person chimes in. “He was all like, like a, like a six-year-old in a toy store.”

In other recorded conservations, Richard Worms, the FBI squad supervisor, describes Osmakac as a “retarded fool” who doesn’t have “a pot to piss in.” The agents talk about the prosecutors’ eagerness for a “Hollywood ending” for their sting. They refer to Osmakac’s targets as “wishy-washy,” and his terrorist ambitions as a “pipe-dream scenario.” The transcripts show FBI agents struggled to put $500 in Osmakac’s hands so he could make a down payment on the weapons — something the Justice Department insisted on to demonstrate Osmakac’s capacity for and commitment to terrorism.

“The money represents he’s willing to do it, because if we can’t show him killing, we can show him giving money,” FBI Special Agent Taylor Reed explains in one conversation.

These transcripts were never supposed to be revealed in their entirety. The government argued that their release could harm the U.S. government by revealing “law enforcement investigative strategy and methods.” U.S. Magistrate Judge Anthony E. Porcelli not only sealed the transcripts, but also placed them under a protective order.

The files, provided by a confidential source to The Intercept in partnership with the Investigative Fund, provide a rare behind-the-scenes account of an FBI counterterrorism sting, revealing how federal agents leveraged their relationship with a paid informant and plotted for months to turn the hapless Sami Osmakac into a terrorist. Neither the FBI Tampa Field Office nor FBI headquarters in Washington, D.C. responded to requests from The Intercept for comment on the Osmakac case or the remarks made by FBI agents and employees about the sting.

Read More…

Related Link: The Newburgh Sting

Islamic State Propaganda – Bad Fake – Media Pwned

In Activism, Al Jazeera NEWSHOUR, Archive, Australia, Bahrain, Censorship, CIA, Conspiracy, Egypt, False Flag, FBI, Indonesia, INTERPOL, Iran, Iraq, ISIS, Islamic State, Jordan, Kuwait, leaksource, Lebanon, Libya, SPIN, Syria on September 23, 2014 at 7:48 AM

via digitalfolklore

The headline below appeared on 15th September 2014 across the internet like a heat rash.

Headlline

Below we see flag waving men climbing over an upturned MiG 21, with the caption “Islamic State fighters celebrate after taking down a Syrian fighter jet.

….really.

ererge

The popular news blog New York Post ran the story with the picture. The same story headline was run by nydailynews.com who omitted the picture, dailynewsen also ran the story with the picture as did a myriad of linked media news outlets and blogs, which can be discovered by simply using the headline in an internet search engine.

However if you take a closer look you can notice the weathering and the lack of any obvious damage. Generally when a jet aeroplane is shot down it does n’t remain in such pristine condition.

It was by a chance searching near Raqqah that I found where that MiG actually was. A static display, the concrete pylons can still be seen.

The picture below shows the area and the google maps upload image. The road number 4 runs along the south side of the Euphrates River, the intersection can be easily found near Al Tabqah.

FakeISISpIC

Below is another picture of the MiG

SyryMig

Below is a Sabre “plane on a stick” in Abu Kamal which was recently gaining the attention of the US Central Command.

Abu Kamal - 3

And the bombing of the ISIL Storage Facility.

AlBukamal

.

Utah OKC Bombing Trial: Missing Videos, FBI/ATF Prior Knowledge, Undercover Gov’t Operative Threatened to Not Testify

In Archive, ATF, False Flag, FBI, OKC Bombing on August 3, 2014 at 3:57 AM

07/31/2014

Barry Donegan/BenSwann:

At the US District Court in Salt Lake City, almost twenty years after the Oklahoma City bombing, a trial is underway pitting Utah lawyer Jesse Trentadue against the Federal Bureau of Investigation in a dispute over alleged missing videos from the case’s evidence log.

Trentadue believes that the FBI is hiding videos that will help prove that his brother, Kenneth Trentadue, was killed by guards in an interrogation-gone-wrong after he was mistaken for a “John Doe Number Two” that was allegedly being investigated as an Oklahoma City bombing suspect. Authorities eventually abandoned the theory that such a suspect participated in the bombing.

Kenneth Trentadue bore an uncanny resemblance, including similar tattoos, to both the police sketch of John Doe Number Two and suspect Richard Lee Guthrie Jr., an Aryan Republican Army member and bank robber who some believe to have been a co-conspirator in the 1995 attack on the Alfred P. Murrah Federal Building. Kenneth Trentadue allegedly committed suicide while in federal custody in August of ’95, but Oklahoma City’s top medical examiner stated, based on the condition of Trentadue’s severely wounded and beaten corpse, that it was likely that he had been murdered. Trentadue’s family also believes foul play took place and that the government might be covering up its involvement.

In this week’s trial, Jesse Trentadue is suing (lawsuit/pdf) to force the FBI to allow him to look through the government’s massive Oklahoma City bombing evidence lockers to find missing videos that have been mentioned in official documents and press reports, allegedly showing Timothy McVeigh carrying out the attack with the help of a co-conspirator bearing a resemblance to John Doe Number Two. Trentadue previously filed a Freedom of Information Act request and was given copies of 30 videos related to the case, but he believes that the FBI is hiding additional videos that support his theory as to what happened to his brother. The FBI claims to have given Trentadue everything he has requested.

On Monday, according to The Washington Post, US District Judge Clark Waddoups ordered the FBI to explain why it has failed to produce videos that are mentioned in case documents. One surveillance video in particular, mentioned in Secret Service logs, allegedly shows two suspects leaving the truck used in the attack, just minutes before the explosion. Waddoups also questioned why FBI agents failed to send Trentadue documents that mentioned additional videos that were not included among the 30 that were sent to him. The Judge also compelled agents to explain why they took no action when Trentadue sent a letter asking why one of the videos he received appeared to be incomplete.

FOX-13 Salt Lake City is reporting that, during the trial, Trentadue produced a document that allegedly shows that the ATF and FBI had prior knowledge of the attack but did not take it seriously.

okc-bombing-fbi-atf-prior-knowledge

According to ABC News, three witnesses pointed to videos that should have been available to investigators at the time of the incident. Don Browning, an Oklahoma City police officer who was on-scene the day of the attack, testified that he noticed FBI agents seizing cameras from the besieged building. Jannie Coverdale, grandmother to two bombing victims, testified that the FBI seized surveillance tapes from her apartment building that could have recorded the attack. Another witness, Joe Cooley, a contractor who examined the building prior to the bombing, claimed that he saw several cameras affixed to the outside of the structure.

The Star Tribune notes that FBI witness Richard Williams, the assistant building manager for General Services Administration at the time of the attack, testified that the cameras on the building were not operational and had not been since two years prior to the bombing. Also, a retired FBI agent named Stephen Brannan claimed that he investigated an incident where FBI agents allegedly attempted to sell videos of the attack to the media for $1 million and found it to be a hoax. Another FBI witness, Charles Hanger, then an Oklahoma highway patrolman, took the stand to explain what happened to the dash cam video of Timothy McVeigh’s arrest, which he claims was rendered useless by a recording error. 

The trial is expected to wrap up this week, though the Judge’s ruling is likely to come at a later date.

FOX13:

A trial over evidence and conspiracy theories from the Oklahoma City bombing wrapped up here, with a shocking twist.

As a trial over documents and videotape the FBI had from the 1995 bombing that killed 168 ended on Thursday, the man suing the federal government claimed one of his witnesses had been told not to show up — or else.

Jesse Trentadue said John Matthews, whom he claimed worked as an undercover government operative in the militia movement in the 1990s, had been contacted by an FBI agent and told “it would be best if he didn’t show up to testify.”

“He was told he should take a vacation and that if he did testify he should suffer from a case of the ‘I don’t remembers,’” Trentadue told U.S. District Court Judge Clark Waddoups.

Trentadue told FOX 13 that Matthews had known convicted bomber Timothy McVeigh and worked for the government in an operation targeting the patriot militia movement known as “PATCON.”

“He was part of an operation the FBI ran for a decade during the ’90s where they would infiltrate, and it’s questionable whether they incited the right wing,” he told FOX 13.

Lawyers for the FBI denied the allegation and said it was Matthews who had contacted them asking how he could get out of testifying. Matthews could not be located to testify, they told the judge.

“This is a serious accusation,” Judge Waddoups said.

He ordered the FBI agent who spoke with Matthews to appear before him next month in a hearing to ferret out the truth.

Related Link: A Noble Lie: Oklahoma City 1995

Architects and Engineers for 9/11 Truth Founder Richard Gage on CSPAN – 08/01/2014

In 9/11, Archive, False Flag on August 2, 2014 at 11:42 AM

08/01/2014

*After hundreds of callers over the years (see this, this, this, this, this, this, & this), CSPAN has finally put AE911Truth on the air.

Richard Gage talks about his group, Architects and Engineers for 9/11 Truth, which claims that the World Trade Center was brought down by explosive demolition on September 11, 2001. The group was founded in 2006 and said its mission was to “expose the official lies and cover-up surrounding the events of September 11, 2001 in a way that inspires the people to overcome denial and understand the truth.” Mr. Gage spoke via video link from San Francisco, California.

Related Links:

Seismic Evidence Implies Controlled Demolition on 9/11

Poll: 1 in 2 Surveyed Have Doubts About Government’s Account of 9/11

William Pepper, Attorney at Law, Pursuing NIST via OIG Re: Fraudulent WTC 7 Report & Attorney William Pepper to OIG: “The Pursuit of NIST’s Fraudulent Reports Will be Relentless”

CSPAN Caller Asks NYTimes’ David Sanger Why Paper is Ignoring Evidence of Building 7 Demolition on 9/11

%d bloggers like this: