Journal: Zionists & Neocons Ramp for War on Iran

04 Inter-State Conflict, 05 Iran, 07 Other Atrocities, 08 Wild Cards, 10 Security, 11 Society
Chuck Spinney Recommends

Neocon Nutballs Ramp Up Campaign

Bomb Iran?

By GARETH PORTER

Reuel Marc Gerecht’s screed in the Weekly Standard seeking to justify an Israeli bombing attack on Iran coincides with the opening of the new Israel lobby campaign marked by the introduction of  House Resolution 1553 expressing full support for such an Israeli attack.

What is important to understand about this campaign is that the aim of Gerecht and of the right-wing government of Benjamin Netanyahu is to support an attack by Israel so that the United States can be drawn into direct, full-scale war with Iran.

FULL STORY AT COUNTERPUNCH

Phi Beta Iota: Daniel Elsberg had it right lecturing to Henry Kissinger, our second most important war criminal after Dick Cheney: these people have become like morons, totally disconnected from reality or the public interest.  For their total game plan, in which they thought they could “roll up” the Middle East, see Review: Endgame–The Blueprint for Victory in the War on Terror.  Gerecht used to be a fairly sensible accomplished Case Officer (C/O).  We speculate they’ve given him dual citizenship as part of an offer he just could not refuse.  His piece is world-class idiocy.

See Also:

Continue reading “Journal: Zionists & Neocons Ramp for War on Iran”

Journal: What Al Qaeda Et Al Can and Cannot Do

08 Wild Cards, 09 Terrorism, Cultural Intelligence, Government, Military, Peace Intelligence

[gerecht]The Meaning Of Al Qaeda’s Double Agent:  The jihadists are showing impressive counterintelligence ability that the CIA seems to have underestimated.

Wall Street Journal Reuel Marc Gerecht January 8, 2010  [safety copy of entire piece below the fold]

Amid the Hysteria, A Look at What al-Qaeda Can’t Do

TIME Magazine By Peter Beinart Monday, Jan. 18, 2010

Wanted: Dead’: With little public debate or notice, the Obama administration has significantly stepped up its targeted assassinations.

National Journal By James Kitfield Saturday, Jan. 9, 2010 [Subscription]

Hidden behind walls of top-secret classification, senior U.S. government officials meet in what is essentially a star chamber to decide which enemies of the state to target for assassination. There is no single master list, but all names pass through an elaborate, multi-agency vetting process that ends at the level of the National Security Council and ultimately requires presidential approval.

Overwhelm. Divide. Spread. Bankrupt. Diversify: Al Qaeda’s new grand strategy

Washington Post By Bruce Hoffman  January 10, 2010

Human Rights Gagged MI5 Over Abdulmutallab: Intelligence on Muslim radicals cannot be passed to the US because of privacy fears

London Sunday Times By David Leppard and Hala Jaber January 10, 2010

Continue reading “Journal: What Al Qaeda Et Al Can and Cannot Do”

Process Archives on Public Intelligence (1992-2006)

Methods & Process

2006

US

ProcessCRSData Mining and Homeland Security

2006

US

ProcessTurnbullGSA Collaborative Workshop on Information Sharing

2005

US

ProcessClapperInterview

2005

US

ProcessDNIPress Release on Appointment of ADDNI/OS

2005

US

ProcessDNIOffice of the DNI Organization Charts

2005

US

ProcessGerechtNeed for New Clandestine Service

2005

US

ProcessHarrisABLE DANGER Summary

2005

US

ProcessJHU-APLAsymmetric Information

2005

US

ProcessKamien et allNeeds Analysis for Information Sharing

2005

US

ProcessLiszkiewiezReconfiguring the Global System through Mobile Democracy

2005

US

ProcessPetersOn the Soul of Intelligence

2005

US

ProcessRushkoffOpen Source Democracy

2004

US

ProcessSteeleOSS Proprietary Listing of Capabilities Needed by Open Source Agency

2001

US

ProcessChesterThe Atlantic Command’s Open Source Intelligence Approach & Future

2001

US

ProcessDziedzic & WoodInformation Technology as Catalyst for Civil-Military Unity of Effort

1999

US

ProcessApplebyFeedback: The Missing Link in Information Superiority

1997

US

ProcessGupta & PabianTricks of the Trade: Analytic Tools and Techniques

1997

US

ProcessPinchotBeyond Bureaucracy: Intrapreurship

1993

US

ProcessBermudezLetter from a Source

1993

FR

ProcessBonthousCulture: The Missing Intelligence Variable

1993

US

ProcessBrodwin & BernardiInformation Overload

1993

US

ProcessChristianArea Information Servers (WAIS) and Global Change Research

1993

US

ProcessHalberstadtPower and Communication in the Information Age

1993

US

ProcessHerringThe Role of Intelligence in Formulating Strategy

1993

US

ProcessHorowitzUnderstanding Sources: The Real Challenge

1993

JP

ProcessIshiiCross-Cultural Communication & Computer-Supported Collaboration

1993

US

ProcessMageeThe Age of Imagination: Coming Soon to a Civilization Near You

1993

US

ProcessPedtkePutting Functionality in the Open Source Network

1992

US

ProcessAndrioleIT Support for OSINT Analysis & Production (Slides)

1992

US

ProcessAndrioleIT Support for OSINT Analysis & Production (Text)

1992

US

ProcessBodansky & ForestGOP Terrorism Task Force: Research Techniques & Philosophy

1992

US

ProcessFedanzoImplementing OSINT Through a Distributed Collection Model

1992

US

ProcessKeesAdvanced Information Processing and Analysis

1992

US

ProcessMcIntyreCompetitive Advantage: The Power of Online Systems

1992

US

ProcessOgdinWords Are Not Enough

1992

US

ProcessSacksUsing the Telephone as a Research Tool

1992

US

ProcessShepardAnalysis in the Year 2002: A Concept of Operations

1992

US

ProcessSibbetCommercial Remote Sensing: Open Source Imagery Intelligence

1992

US

ProcessTennyGovernment Information Wants to be Free

1992

US

ProcessThompsonRanked Retrieval and Extraction of Open Source Intelligence

1992

US

ProcessTowPainting the Future: Some Remarks from INTERVAL

1992

US

ProcessWhitney-SmithInformation Revolutions and the End of History

2003

US

ProcessDoDDefense Intelligence Meta-Tagging