Journal: Zionists & Neocons Ramp for War on Iran

04 Inter-State Conflict, 05 Iran, 07 Other Atrocities, 08 Wild Cards, 10 Security, 11 Society
Chuck Spinney Recommends

Neocon Nutballs Ramp Up Campaign

Bomb Iran?

By GARETH PORTER

Reuel Marc Gerecht’s screed in the Weekly Standard seeking to justify an Israeli bombing attack on Iran coincides with the opening of the new Israel lobby campaign marked by the introduction of  House Resolution 1553 expressing full support for such an Israeli attack.

What is important to understand about this campaign is that the aim of Gerecht and of the right-wing government of Benjamin Netanyahu is to support an attack by Israel so that the United States can be drawn into direct, full-scale war with Iran.

FULL STORY AT COUNTERPUNCH

Phi Beta Iota: Daniel Elsberg had it right lecturing to Henry Kissinger, our second most important war criminal after Dick Cheney: these people have become like morons, totally disconnected from reality or the public interest.  For their total game plan, in which they thought they could “roll up” the Middle East, see Review: Endgame–The Blueprint for Victory in the War on Terror.  Gerecht used to be a fairly sensible accomplished Case Officer (C/O).  We speculate they've given him dual citizenship as part of an offer he just could not refuse.  His piece is world-class idiocy.

See Also:

Continue reading “Journal: Zionists & Neocons Ramp for War on Iran”

Journal: What Al Qaeda Et Al Can and Cannot Do

08 Wild Cards, 09 Terrorism, Cultural Intelligence, Government, Military, Peace Intelligence

[gerecht]The Meaning Of Al Qaeda's Double Agent:  The jihadists are showing impressive counterintelligence ability that the CIA seems to have underestimated.

Wall Street Journal Reuel Marc Gerecht January 8, 2010  [safety copy of entire piece below the fold]

Amid the Hysteria, A Look at What al-Qaeda Can't Do

TIME Magazine By Peter Beinart Monday, Jan. 18, 2010

Wanted: Dead': With little public debate or notice, the Obama administration has significantly stepped up its targeted assassinations.

National Journal By James Kitfield Saturday, Jan. 9, 2010 [Subscription]

Hidden behind walls of top-secret classification, senior U.S. government officials meet in what is essentially a star chamber to decide which enemies of the state to target for assassination. There is no single master list, but all names pass through an elaborate, multi-agency vetting process that ends at the level of the National Security Council and ultimately requires presidential approval.

Overwhelm. Divide. Spread. Bankrupt. Diversify: Al Qaeda's new grand strategy

Washington Post By Bruce Hoffman  January 10, 2010

Human Rights Gagged MI5 Over Abdulmutallab: Intelligence on Muslim radicals cannot be passed to the US because of privacy fears

London Sunday Times By David Leppard and Hala Jaber January 10, 2010

Continue reading “Journal: What Al Qaeda Et Al Can and Cannot Do”

Process Archives on Public Intelligence (1992-2006)

Methods & Process

2006

US

Process CRS Data Mining and Homeland Security

2006

US

Process Turnbull GSA Collaborative Workshop on Information Sharing

2005

US

Process Clapper Interview

2005

US

Process DNI Press Release on Appointment of ADDNI/OS

2005

US

Process DNI Office of the DNI Organization Charts

2005

US

Process Gerecht Need for New Clandestine Service

2005

US

Process Harris ABLE DANGER Summary

2005

US

Process JHU-APL Asymmetric Information

2005

US

Process Kamien et all Needs Analysis for Information Sharing

2005

US

Process Liszkiewiez Reconfiguring the Global System through Mobile Democracy

2005

US

Process Peters On the Soul of Intelligence

2005

US

Process Rushkoff Open Source Democracy

2004

US

Process Steele OSS Proprietary Listing of Capabilities Needed by Open Source Agency

2001

US

Process Chester The Atlantic Command’s Open Source Intelligence Approach & Future

2001

US

Process Dziedzic & Wood Information Technology as Catalyst for Civil-Military Unity of Effort

1999

US

Process Appleby Feedback: The Missing Link in Information Superiority

1997

US

Process Gupta & Pabian Tricks of the Trade: Analytic Tools and Techniques

1997

US

Process Pinchot Beyond Bureaucracy: Intrapreurship

1993

US

Process Bermudez Letter from a Source

1993

FR

Process Bonthous Culture: The Missing Intelligence Variable

1993

US

Process Brodwin & Bernardi Information Overload

1993

US

Process Christian Area Information Servers (WAIS) and Global Change Research

1993

US

Process Halberstadt Power and Communication in the Information Age

1993

US

Process Herring The Role of Intelligence in Formulating Strategy

1993

US

Process Horowitz Understanding Sources: The Real Challenge

1993

JP

Process Ishii Cross-Cultural Communication & Computer-Supported Collaboration

1993

US

Process Magee The Age of Imagination: Coming Soon to a Civilization Near You

1993

US

Process Pedtke Putting Functionality in the Open Source Network

1992

US

Process Andriole IT Support for OSINT Analysis & Production (Slides)

1992

US

Process Andriole IT Support for OSINT Analysis & Production (Text)

1992

US

Process Bodansky & Forest GOP Terrorism Task Force: Research Techniques & Philosophy

1992

US

Process Fedanzo Implementing OSINT Through a Distributed Collection Model

1992

US

Process Kees Advanced Information Processing and Analysis

1992

US

Process McIntyre Competitive Advantage: The Power of Online Systems

1992

US

Process Ogdin Words Are Not Enough

1992

US

Process Sacks Using the Telephone as a Research Tool

1992

US

Process Shepard Analysis in the Year 2002: A Concept of Operations

1992

US

Process Sibbet Commercial Remote Sensing: Open Source Imagery Intelligence

1992

US

Process Tenny Government Information Wants to be Free

1992

US

Process Thompson Ranked Retrieval and Extraction of Open Source Intelligence

1992

US

Process Tow Painting the Future: Some Remarks from INTERVAL

1992

US

Process Whitney-Smith Information Revolutions and the End of History

2003

US

Process DoD Defense Intelligence Meta-Tagging