Become a Patron!
True Information is the most valuable resource and we ask you to give back.
Become a Patron!
Become a Patron!
True Information is the most valuable resource and we ask you to give back.
A Russian television journalist who had reported from the turbulent North Caucasus region was found strangled in his Moscow apartment on Friday, prosecutors said.
Police said the body of Ilyas Shurpayev, 32, was found by firefighters when they arrived to put out a fire in his apartment. They said it appeared Shurpayev was strangled with a belt and his attackers set his apartment on fire before leaving.
Shurpayev had moved to Moscow from Dagestan, a crime-ridden southern province neighboring Chechnya where he worked for several years as a reporter with state-controlled Channel One television.
Shurpayev reported from many conflict zones in the former Soviet Union including Chechnya and Georgia’s breakaway regions of Abkhazia and South Ossetia.
A spokesman for the investigations committee of the Prosecutor-General’s office said several theories for Shurpayev’s murder were being checked, including those related to his personal life and his work.
“Apparently the journalist knew his murderer because he opened the door for him and let him in,” the spokesman said.
Russian media reported that a concierge in the apartment block where Shurpayev lived had seen the last person to visit him.
More than a dozen journalists have been slain in contract-style killings in Russia since 2000. Many journalists appear to have been targeted for beatings and killings because of their attempts to dig into allegations of corruption.
Shurpayev was not known as an investigative reporter.
Several hours before his death he posted an entry on his personal Internet blog, http://www.shurpaev.livejournal.com, saying he had been included in a black list of journalists barred from contributing to an unnamed Dagestani newspaper.
“Now I am a dissident! What nonsense!”, wrote Shurpayev, who said he had published only travel reports in the paper.
“I have not participated in the political life of my republic or even my district because I am too lazy and have no time,” he wrote.
Become a Patron!
True Information is the most valuable resource and we ask you to give back.
Watch #TheNurse 1997 Thriller movie. Starring Lisa Zane, John Stockwell, John Stockwell, Nancy Dussault and Sherrie Rose. Directed by Robert Malenfant. Music by Richard Bowers Produced by Richard Brandes #ActionThrillerMovie #HollywoodActionMovie #HollywoodThrillerMovie Synopsis A traumatized nurse plots revenge against a catatonic businessman, whom she blames for the death of her father. She integrates herself in to his family as his personal nurse and plots revenge by killing off his family members one by one.
Become a Patron!
True Information is the most valuable resource and we ask you to give back.
Watch #HowtoMurderYourWife 1965 Romantic Comedy movie.
Starring Jack Lemmon, Virna Lisi, Terry-Thomas, Claire Trevor, Sidney Blackmer and Max Showalter. Directed by Richard Quine Music by Neal Hefti Produced by George Axelrod
Become a Patron!
True Information is the most valuable resource and we ask you to give back.
An aspiring filmmaker narrates a highly complex story to a producer. As his story unfolds, we will find out if the narrator is successful in getting his story approved.
Starring Suhas & Sridhar
Directed by Filmian
Produced by Anurag & Sharath
Music by Karthik Rodriguez
Cinematography by Shreekar Khajandar
Editing by Pavan Kalyan
Become a Patron!
True Information is the most valuable resource and we ask you to give back.
Become a Patron!
True Information is the most valuable resource and we ask you to give back.
Great vision from a great leader
Become a Patron!
True Information is the most valuable resource and we ask you to give back.
Become a Patron!
True Information is the most valuable resource and we ask you to give back.
My favourite Politician
wir haben eine Umfrage gestartet:
Würden Sie dem mutmasslichen Auftraggeber von Internet-Verbrechern, Otmar Knoll, “Fairvesta”, der diese Taten selbst per E-Mail ankündigt, Ihr Geld anvertrauen ?
Und zu welchen Taten halten Sie so jemanden noch für fähig ?
Wir freuen uns auf Ihre Reaktionen !
Hier die Belege für die monatelangen Internet-Attacken der Internet-Kriminellen, die Graphiken zeigen die DDos-Attacken auf über 20 Webseiten:
Hier die Rechtslage:
Hier die Bekenner-E-Mail des dubiosen “Otmar Knoll” von der dubiosen “fairvesta”:
(U//FOUO) The Ohio State Highway Patrol Criminal Intelligence Unit recently partnered with the Ohio Strategic Analysis and Information Center (SAIC) and gathered information regarding bath salts via a survey. The objective of the study was to assist Law Enforcement by creating an officer safety awareness product relating to the dangers of encountering people on bath salts.
(U//FOUO) A survey was distributed to law enforcement and 5 agencies responded back with pertinent information regarding the use and possession of bath salts. The agencies which contributed to this analysis are as follows:
Barberton Police Department, OH; Ohio State Highway Patrol; Powell Police Department, OH; Reynoldsburg Division of Police; and West Virginia State Police – Wheeling Division (Parcel Interdiction).
(U//FOUO) Information was obtained on 161 incidents involving bath salts.
(U//FOUO) OVERVIEW AND ANALYSIS OF RESULTS:
- Out of the 161 incidents reported, officers made 77 arrests involving bath salt use/possession. Many of the incidents occurred before legislation was passed; therefore mere possession was not criminal at the time of many of these reports.
- There were 27 use of force reports involving bath salts.
- There were 3 incidents that involved fleeing of suspects.
- 7 suspects were taken to hospital associated with bath salt use.
- 7 offenders were pinked slipped and taken to mental health facilities.
- There were 4 reports of deaths associated with bath salt use (Note: cause of death results did NOT find that bath salts use was the sole contributor in any of these deaths).
- There was 1 report of suicide; 2 suicide attempts; and 1 suicide threat involving bath salt use.
- Suspects reported paying approximately $20-$25 for bath salts.
- The offenders reported multiple ways of using bath salts including: snorting, injection with a needle syringe, and drinking the bath salts by mixing it with fluid.
- Many offenders admitted to combining bath salts with other drugs.
- When reported, most people said they got the bath salts from independently owned convenient stores and drive-thrus, gas stations or markets. A WV State Police (parcel narcotics interdiction) Officer reported that a prominent internet company is: Southern Burn LLC from South Carolina.
(U//FOUO) OFFICER SAFETY CONCERNS
- Use of force incidents included: use of Taser (3 incidents), hands on, escorts, restrained by medical professionals, and bean bag use.
- One “officer in trouble” call was reported, involving an officer fighting with a person on bath salts.
- Both officers in a Reynoldsburg Police case were surprised after a Taser was used on a suspect. They explained that the Taser was shot and the probes penetrated in the torso of the suspect, however it had minimal effects; the suspect fought through the electric current and rose to his feet.
- Injuries sustained to suspects included: bruises, cuts, Taser punctures, and minimal injuries from bean bag rounds.
- Officers sustained injuries including: injury to knee, injury to back, injury to groin, ankles, scrapes and bruises, and multiple injuries from strikes to the face.
- 2 officers and 7 offenders were taken to the hospital resulting from physical force.
- One incident involved the use of the SWAT team and another involved escalated use of force involving bean bag rounds.
(U//FOUO) PHYSIOLOGICAL REACTIONS FROM BATH SALT USE
- Suspects showed the following physical reactions to bath salts: Hyperventilation, cramps, dehydration, vomiting, shaking, loss of memory, pale, emaciated, jittery, lethargy, incoherent speech, rambling, rapid movement, rapid speech, disoriented, itchy skin, and several suspect admitted to a lack of sleep for multiple days.
- An offender described bath salts as giving him a “cocaine rush” and it being a very “intense” high.
- Witnesses described bath salt users as:
- Hostile, violent, unpredictable, out of control, paranoid, and reckless.
- Additional reports by Law Enforcement involving people on bath salts:
- Officer described one suspect as having unusual superhuman strength.
- Officer described suspect as shooting off the ground like a “flash of light.”
- One suspect bent the hinged handcuffs during the arrest.
- The following hallucinations were reported:
- A hit-skip offender said he saw a brick wall, which in turn caused a crash.
- A male, using bath salts, reported raccoons setting fire inside his home. As a result, he proceeded to destroy his home and used a hatchet to cut up his deck, while attempting to locate the fire-setting raccoons. He also believed the raccoons stole his cell phone.
- A male, using bath salts, believed he was being followed by police helicopters and police officers were using mirrors, snipers and different types of scopes to look through his walls. He called police requesting to negotiate with them, however there were no police at the residence when the call was made.
- During the course of speaking to an offender and officer reported, he yelled, “AT&T calling, may I help you, AT&T is calling, a million dollars, two black guys……it’s not a racial thing, it’s not a racial thing.”
- A bath salt user reported he hears voices; one voice was going to beat him with a ball bat.
- The domestic violence offender using bath salts reported his mother was practicing demonology & witchcraft and she was poisoning his food. He was arrested for choking her.
- DOWNLOAD THE ORIGINAL DOCUMENT HERE:
WASHINGTON—Barclays Bank PLC, a financial institution headquartered in London, has entered into an agreement with the Department of Justice to pay a $160 million penalty to resolve violations arising from Barclays’ submissions for the London InterBank Offered Rate (LIBOR) and the Euro Interbank Offered Rate (EURIBOR), which are benchmark interest rates used in financial markets around the world, announced Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division and Assistant Director in Charge James W. McJunkin of the FBI’s Washington Field Office.
As part of the agreement with the Department of Justice, Barclays has admitted and accepted responsibility for its misconduct set forth in a statement of facts that is incorporated into the agreement. According to the agreement, Barclays provided LIBOR and EURIBOR submissions that, at various times, were false because they improperly took into account the trading positions of its derivative traders, or reputational concerns about negative media attention relating to its LIBOR submissions. The Justice Department’s criminal investigation into the manipulation of LIBOR and EURIBOR by other financial institutions and individuals is ongoing. The agreement requires Barclays to continue cooperating with the department in its ongoing investigation.
“LIBOR and EURIBOR are critically important benchmark interest rates,” said Assistant Attorney General Breuer. “Because mortgages, student loans, financial derivatives, and other financial products rely on LIBOR and EURIBOR as reference rates, the manipulation of submissions used to calculate those rates can have significant negative effects on consumers and financial markets worldwide. For years, traders at Barclays encouraged the manipulation of LIBOR and EURIBOR submissions in order to benefit their financial positions; and, in the midst of the financial crisis, Barclays management directed that U.S. Dollar LIBOR submissions be artificially lowered. For this illegal conduct, Barclays is paying a significant price. To the bank’s credit, Barclays also took a significant step toward accepting responsibility for its conduct by being the first institution to provide extensive and meaningful cooperation to the government. Its efforts have substantially assisted the Criminal Division in our ongoing investigation of individuals and other financial institutions in this matter.”
“Barclays Bank’s illegal activity involved manipulating its submissions for benchmark interest rates in order to benefit its trading positions and the media’s perception of the bank’s financial health,” said Assistant Director in Charge McJunkin. “Today’s announcement is the result of the hard work of the FBI special agents, financial analysts, and forensic accountants as well as the prosecutors who dedicated significant time and resources to investigating this case.”
Barclays was one of the financial institutions that contributed rates used in the calculation of LIBOR and EURIBOR. The contributed rates are generally meant to reflect each bank’s assessment of the rates at which it could borrow unsecured interbank funds. For LIBOR, the highest and lowest 25 percent of contributed rates are excluded from the calculation and the remaining rates are averaged to calculate the fixed rates. For EURIBOR, the highest and lowest 15 percent are excluded, and the remaining 70 percent are averaged to calculate the fixed rates.
Futures, options, swaps, and other derivative financial instruments traded in the over-the-counter market and on exchanges worldwide are settled based on LIBOR. Further, mortgages, credit cards, student loans, and other consumer lending products often use LIBOR as a reference rate. According to the agreement, an individual bank’s LIBOR or EURIBOR submission cannot appropriately be influenced by the financial positions of its derivatives traders or the bank’s concerns about public perception of its financial health due to its LIBOR submissions.
According to the agreement, between 2005 and 2007, and then occasionally thereafter through 2009, certain Barclays traders requested that the Barclays LIBOR and EURIBOR submitters contribute rates that would benefit the financial positions held by those traders. The requests were made by traders in New York and London, via electronic messages, telephone conversations, and in-person conversations. The employees responsible for the LIBOR and EURIBOR submissions accommodated those requests on numerous occasions in submitting the bank’s contributions. On some occasions, Barclays’s submissions affected the fixed rates.
In addition, between August 2005 and May 2008, certain Barclays traders communicated with traders at other financial institutions, including other banks on the LIBOR and EURIBOR panels, to request LIBOR and EURIBOR submissions that would be favorable to their or their counterparts’ trading positions, according to the agreement.
When the requests of traders for favorable LIBOR and EURIBOR submissions were taken into account by the rate submitters, Barclays’ rate submissions were false and misleading.
Further, according to the agreement, between approximately August 2007 and January 2009, in response to initial and ongoing press speculation that Barclays’ high U.S. Dollar LIBOR submissions at the time might reflect liquidity problems at Barclays, members of Barclays management directed that Barclays’ dollar LIBOR submissions be lowered. This management instruction often resulted in Barclays’ submission of false rates that did not reflect its perceived cost of obtaining interbank funds. While the purpose of this particular conduct was to influence Barclays’ rate submissions, as opposed to the resulting fixes, there were some occasions when Barclays’ submissions affected the fixed rates.
The agreement and monetary penalty recognize Barclays’ extraordinary cooperation. Barclays made timely, voluntary, and complete disclosure of its misconduct. After government authorities began investigating allegations that banks had engaged in manipulation of benchmark interest rates, Barclays was the first bank to cooperate in a meaningful way in disclosing its conduct relating to LIBOR and EURIBOR. Barclays’ disclosure included relevant facts that at the time were not known to the government. Barclays’s cooperation has been extensive, in terms of the quality and type of information and assistance provided, and has been of substantial value in furthering the department’s ongoing criminal investigation. Barclays has made a commitment to future cooperation with the department and other government authorities in the United States and the United Kingdom.
Assistant Attorney General Breuer further stated, “As today’s agreement reflects, we are committed to holding companies accountable for their misconduct while, at the same time, giving meaningful credit to companies that provide full and valuable cooperation in our investigations.”
In addition, Barclays has implemented a series of compliance measures and will implement additional internal controls regarding its submission of LIBOR and EURIBOR contributions, as required by the Commodity Futures Trading Commission (CFTC). Barclays will also continue to be supervised and monitored by the FSA.
The agreement and monetary penalty further recognize certain mitigating factors to Barclays’ misconduct. At times, Barclays employees raised concerns with the British Bankers’ Association, the United Kingdom Financial Services Authority (FSA), the Bank of England, and the Federal Reserve Bank of New York in late 2007 and in 2008 that the Dollar LIBOR rates submitted by contributing banks, including Barclays, were too low and did not accurately reflect the market. Further, during this time, notwithstanding Barclays’s improperly low dollar LIBOR submissions, those submissions were often higher than the contributions used in the calculation of the fixed rates.
As a result of Barclays’s admission of its misconduct, its extraordinary cooperation, its remediation efforts and certain mitigating and other factors, the department agreed not to prosecute Barclays for providing false LIBOR and EURIBOR contributions, provided that Barclays satisfies its ongoing obligations under the agreement for a period of two years. The non-prosecution agreement applies only to Barclays and not to any employees or officers of Barclays or any other individuals.
In a related matter, the CFTC brought attempted manipulation and false reporting charges against Barclays, which the bank agreed to settle. The CFTC imposed a $200 million penalty and required Barclays to implement detailed measures designed to ensure the integrity and reliability of its benchmark interest rate submissions.
The FSA issued a final notice regarding its enforcement action against Barclays and has imposed a penalty of £59.5 million against it.
The case is being handled by Deputy Chief Daniel Braun, Assistant Chiefs Rebecca Rohr and Robertson Park, Trial Attorney Alexander Berlin, and Special Trial Attorney Luke Marsh of the Criminal Division’s Fraud Section. The investigation is being conducted by the FBI’s Washington Field Office, jointly with the Antitrust Division of the Department of Justice.
The Department acknowledges and expresses its appreciation for the significant assistance provided by the CFTC’s Division of Enforcement, which referred the conduct to the department, as well as the FSA’s Enforcement and Financial Crime Division.
This agreement is part of efforts underway by President Barack Obama’s Financial Fraud Enforcement Task Force. President Obama established the interagency Financial Fraud Enforcement Task Force to wage an aggressive, coordinated, and proactive effort to investigate and prosecute financial crimes. The task force includes representatives from a broad range of federal agencies, regulatory authorities, inspectors general and state and local law enforcement who, working together, bring to bear a powerful array of criminal and civil enforcement resources. The task force is working to improve efforts across the federal executive branch and, with state and local partners, to investigate and prosecute significant financial crimes, ensure just and effective punishment for those who perpetrate financial crimes, combat discrimination in the lending and financial markets, and recover proceeds for victims of financial crimes. For more information about the task force visit: http://www.stopfraud.gov.
AMARILLO, TX—Khalid Ali-M Aldawsari, 22, a citizen of Saudi Arabia and resident of Lubbock, Texas, was convicted by a federal jury today on an indictment charging one count of attempted use of a weapon of mass destruction in connection with his purchase of chemicals and equipment necessary to make an improvised explosive device (IED) and his research of potential U.S. targets, including persons and infrastructure.
The verdict, which was reached in the Northern District of Texas, was announced by Sarah R. Saldaña, U.S. Attorney for the Northern District of Texas; Lisa Monaco, Assistant Attorney General for National Security; and Diego G. Rodriguez, Special Agent in Charge of the FBI Dallas Field Division.
Sentencing has been scheduled for October 9, 2012, in Amarillo. Aldawsari, who was lawfully admitted into the United States in 2008 on a student visa and was enrolled at South Plains College near Lubbock, faces a maximum sentence of life in prison and a $250,000 fine. He was arrested on February 23, 2011 on a criminal complaint and later charged in a March 9, 2011 federal indictment with attempting to use a weapon of mass destruction.
According to court documents and evidence presented during trial, at the time of his arrest last year, Aldawsari had been researching online how to construct an IED using several chemicals as ingredients. He had also acquired or taken a substantial step toward acquiring most of the ingredients and equipment necessary to construct an IED, and he had conducted online research of several potential U.S. targets, the affidavit alleges. In addition, he had allegedly described his desire for violent jihad and martyrdom in blog postings and a personal journal.
“While many people are responsible for thwarting Aldawsari’s threat and bringing him to justice, we owe a debt of gratitude to all the members of the North Texas Joint Terrorism Task Force, and especially to the hundreds of hardworking and dedicated FBI agents, analysts, linguists, and others,” said U.S. Attorney Saldaña. “Their efforts, coupled with the hard work and excellent cooperation from the Lubbock Police Department and the Texas Tech Police Department, are the reason we were able to stop this defendant from carrying out a catastrophic act of terrorism.”
“As this trial demonstrated, Aldawsari purchased ingredients to construct an explosive device and was actively researching potential targets in the United States. Thanks to the efforts of many agents, analysts, and prosecutors, this plot was thwarted before it could advance further,” said Assistant Attorney General Monaco. “This case serves as another reminder of the need for continued vigilance both at home and abroad.”
“Today’s guilty verdict shows how individuals in the United States with the intent to do harm can acquire the knowledge and materials necessary to carry out an attack,” said SAC Rodriguez. “Our success in locating and preventing Mr. Aldawsari from carrying out an attack is a result of cooperation within the law enforcement and intelligence communities, particularly, the North Texas Joint Terrorism Task Force, the Texas Tech Police Department, the Lubbock Police Department, and the Lubbock County Sheriff’s Office, but also a demonstration of information sharing across FBI divisions, as well as assistance from the community. I want to thank the dedicated agents, officers, and analysts; the computer forensics team; and linguists that worked diligently on this investigation, as well as prosecutors serving in the U.S. Attorney’s Office in the Northern District.”
The government presented evidence that on February 1, 2011, a chemical supplier reported to the FBI a suspicious attempted purchase of concentrated phenol by a man identifying himself as Khalid Aldawsari. Phenol is a toxic chemical with legitimate uses, but it can also be used to make the explosive trinitrophenol, also known as T.N.P., or picric acid. Ingredients typically used with phenol to make picric acid, or T.N.P., are concentrated sulfuric and nitric acids.
Aldawsari attempted to have the phenol order shipped to a freight company so it could be held for him there, but the freight company told Aldawsari that the order had been returned to the supplier and called the police. Later, Aldawsari falsely told the supplier he was associated with a university and wanted the phenol for “off-campus, personal research.” Frustrated by questions being asked over his phenol order, Aldawsari cancelled his order, placed an order with another company, and later e-mailed himself instructions for producing phenol. In December 2010, he had successfully purchased concentrated nitric and sulfuric acids.
Aldawsari used various e-mail accounts in researching explosives and targets and often sent e-mails to himself as part of this process. He e-mailed himself a recipe for picric acid, which was described in the e-mail as a “military explosive” and also e-mailed himself instructions on how to convert a cell phone into a remote detonator and how to prepare a booby-trapped vehicle using household items. Aldawsari also purchased many other items, including a Hazmat suit, a soldering iron kit, glass beakers and flasks, a stun gun, clocks, and a battery tester.
Excerpts from a journal found at Aldawsari’s residence indicated that he had been planning to commit a terrorist attack in the United States for years. One entry describes how Aldawsari sought and obtained a particular scholarship because it allowed him to come directly to the United States and helped him financially, which he said “will help tremendously in providing me with the support I need for Jihad.” The entry continues, “And now, after mastering the English language, learning how to build explosives and continuous planning to target the infidel Americans, it is time for Jihad.”
In another entry, Aldawsari wrote that he was near to reaching his goal and near to getting weapons to use against infidels and their helpers. He also listed a “synopsis of important steps” that included obtaining a forged U.S. birth certificate; renting a car; using different driver’s licenses for each car rented; putting bombs in cars and taking them to different places during rush hour; and leaving the city for a safe place.
Aldawsari conducted research on various targets and e-mailed himself information on these locations and people. One of the documents he sent himself, with the subject line listed as “Targets,” contained the names and home addresses of three American citizens who had previously served in the U.S. military and had been stationed for a time at Abu Ghraib prison in Iraq. In others, Aldawsari sent himself the names of 12 reservoir dams in Colorado and California and listed two categories of targets: hydroelectric dams and nuclear power plants. He also sent himself an e-mail titled “Tyrant’s House,” in which he listed the Dallas address for former President George W. Bush. Aldawsari also conducted research that indicated he considered using infant dolls to conceal explosives and the possible targeting of a nightclub with an explosive concealed in a backpack.
This case was investigated by the FBI’s Dallas Joint Terrorism Task Force, with assistance from the Lubbock Police Department and the Texas Tech Police Department. The prosecution is being handled by Assistant U.S. Attorneys Jeffrey R. Haag, Denise Williams, James T. Jacks, and Matthew J. Kacsmaryk and Trial Attorney David Cora from the Counterterrorism Section of the Justice Department’s National Security Division.
In September 1992 the Department of Defense acknowledged the existence of the National Reconnaissance Office (NRO), an agency established in 1961 to manage the development and operation of the nation’s reconnaissance satellite systems. The creation of the NRO was the result of a number of factors.
On May 1, 1960 Francis Gary Powers took off from Peshawar, Pakistan on the U-2 mission designated Operation GRAND SLAM. The flight was planned to take him over the heart of the Soviet Union and terminate at Bodo, Norway. The main target was Plesetsk, which communications intercepts had indicated might be the site of an ICBM facility.1 When the Soviet Union shot down his plane and captured him alive, they also forced President Dwight Eisenhower to halt aerial overflights of Soviet territory.
At that time the U.S. had two ongoing programs to produce satellite vehicles that could photograph Soviet territory. Such vehicles would allow far more frequent coverage than possible with manned aircraft. In addition, they would avoid placing the lives of pilots at risk and eliminate the risks of international incidents resulting from overflights.
The Air Force program, designated SAMOS, sought to develop a number of different satellite systems–including one that would radio its imagery back to earth and another that would return film capsules. The CIA program, CORONA, focused solely on developing a film return satellite.
However, both the CIA and Air Force programs were in trouble. Launch after launch in the CORONA program, eleven in all by May 1, 1960, eight of which carried cameras, had resulted in failure–the only variation was in the cause. Meanwhile, the SAMOS program was also experiencing difficulties, both with regard to hardware and program definition.2
Concerns over SAMOS led President Eisenhower to direct two groups to study both the technical aspects of the program as well as how the resulting system would be employed. The ultimate result was a joint report presented to the President and NSC on August 25, 1960.3
As a result of that meeting Eisenhower approved a first SAMOS launch in September, as well as reorientation of the program, with the development of high-resolution film-return systems being assigned highest priority while the electronic readout system would be pursued as a research project. With regard to SAMOS management, he ordered that the Air Force institute special management arrangements, which would involve a direct line of authority between the SAMOS project office and the Office of the Air Force Secretary, bypassing the Air Staff and any other intermediate layers of bureaucracy.4
Secretary of the Air Force Dudley C. Sharp wasted little time creating the recommended new structure and procedures. On August 31st Sharp signed Secretary of the Air Force Order 115.1, establishing the Office of Missile and Satellite Systems within his own office to help him manage the SAMOS project. With Order 116.1, Sharp created a SAMOS project office at the Los Angeles headquarters of the Air Force Ballistic Missile Division (AFBMD) as a field extension of the Office of the Secretary of the Air Force to carry out development of the satellite.5
The impact of the orders, in practice, was that the director of the SAMOS project would report directly to Under Secretary of the Air Force Joseph V. Charyk, who would manage it in the Secretary’s name. In turn, Charyk would report directly to the Secretary of Defense.6
The changes would not stop there. The urgency attached to developing a successful reconnaissance satellite led, ultimately, to the creation of a top secret program and organization to coordinate the entire national reconnaissance effort.
Several of the documents listed below also appear in either of two National Security Archive microfiche collections on U.S. intelligence. The U.S. Intelligence Community: Organization, Operations and Management: 1947-1989 (1990) and U.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996 (1997) publish together for the first time recently declassified documents pertaining to the organizational structure, operations and management of the U.S. Intelligence Community over the last fifty years, cross-indexed for maximum accessibility. Together, these two sets reproduce on microfiche over 2,000 organizational histories, memoranda, manuals, regulations, directives, reports, and studies, totaling more than 50,000 pages of documents from the Office of the Director of Central Intelligence, the Central Intelligence Agency, National Reconnaissance Office, National Security Agency, Defense Intelligence Agency, military service intelligence organizations, National Security Council, and other official government agencies and organizations.
Joseph Charyk, Memorandum for the Secretary of Defense
Management of the National Reconnaissance Program
24 July 1961
The organizational changes resulting from the decisions of August 25, 1960 and their implementation left some unsatisfied. In particular, James Killian and Edwin Land, influential members of the President’s intelligence advisory board pushed for permanent and institutionalized collaboration between the CIA and Air Force. After the Kennedy administration took office the push to establish a permanent reconnaissance organization took on additional life. There was a strong feeling in the new administration, particularly by Secretary of Defense Robert McNamara and his deputy, Roswell Gilpatric, that a better, more formalized relationship was required.7
On July 24, 1961, Air Force Undersecretary Joseph Charyk sent a memorandum to McNamara attaching two possible memoranda of agreement for creation of a National Reconnaissance Program, along with some additional material.
Memorandum of Understanding
Management of the National Reconnaissance Program (Draft)
20 July 1961
This memo specified establishment of a National Reconnaissance Program (NRP) consisting of “all satellite and overflight reconnaissance projects whether overt or covert,” and including “all photographic projects for intelligence, geodesy and mapping purposes, and electronic signal collection projects for electronic signal intelligence and communications intelligence.”
To manage the NRP, a National Reconnaissance Office (NRO) would be established on a covert basis. The NRO director (DNRO) would be the Deputy Director for Plans, CIA (at the time, Richard Bissell) while the Under Secretary of the Air Force would serve as Deputy Director (DDNRO). The DNRO would be responsible for the management of CIA activities, the DDNRO and the Air Force for Defense Department activities. The DoD, specifically the Air Force acting as executive agent, would be primarily responsible for technical program management, scheduling, vehicle operations, financial management and overt contract administration, while the CIA would be primarily responsible for targeting each satellite. The office would operate under streamlined management procedures similar to those established in August 1960 for SAMOS.
Memorandum of Understanding
Management of the National Reconnaissance Program (Draft)
21 July 1961
This secondary memorandum was prepared at the suggestion of Defense Department General Counsel Cyrus Vance. It offered a quite different solution to the problem. As with the primary memo, it established a NRP covering both satellite and aerial reconnaissance operations. But rather than a jointly run program, it placed responsibility for management solely in the hands of a covertly appointed Special Assistant for Reconnaissance, to be selected by the Secretary of Defense. The office of the Special Assistant would handle the responsibilities assigned to the NRO in the other MOU. The CIA would “assist the Department of Defense by providing support as required in areas of program security, communications, and covert contract administration.”
Pros and Cons of Each Solution
The assessment of pros and cons favored the July 20 memorandum, listing five pros for the first solution and only two for the second. The first solution would consolidate responsibilities into a single program with relatively little disruption of established management, represented a proven solution, would require no overt organizational changes, would allow both agencies to retain authoritative voices in their areas of expertise, and provided a simplified management structure. The two cons noted were the division of program responsibility between two people, and that “successful program management depends upon mutual understanding and trust of the two people in charge of the NRO.” It would not be too long before that later observation would take on great significance.
In contrast, there were more cons than pros specified for the second solution. The only two points in its favor were the consolidation of reconnaissance activities into a single program managed by a single individual and the assignment of complete responsibility to the agency (DoD) with the most resources. Foremost of the six cons was the need for DoD to control and conduct large-scale covert operations, in as much as it was an entity “whose normal methods are completely foreign to this task.”
Roswell Gilpatric, Letter to Allen Dulles
Management of the National Reconnaissance Program
6 September 1961
On July 28, 1961, four days after receiving Charyk’s memorandum and draft memoranda of understanding, McNamara instructed Air Force Undersecretary Joseph Charyk to continue discussions with the key officials and advisers in order to resolve any organizational difficulties that threatened to impede the satellite reconnaissance effort. The ultimate result was this letter from Deputy Secretary of Defense Roswell Gilpatric to Dulles, which confirmed “our agreement with respect to the setting up of the National Reconnaissance Program.”
The letter specified the creation of a NRP. It also established the NRO, a uniform security control system, and specified that the NRO would be directly responsive to the intelligence requirements and priorities specified by the United States Intelligence Board. It specified implementation of NRP programs assigned to the CIA through the Deputy Director for Plans. It designated the Undersecretary of the Air Force as the Defense Secretary’s Special Assistant for Reconnaissance, with full authority in DoD reconnaissance matters.
The letter contained no specific assignment of responsibilities to either the CIA or Defense Department, stating only that “The Directors of the National Reconnaissance Office will … insure that the particular talents, experience and capabilities within the Department of Defense and the Central Intelligence Agency are fully and most effectively utilized in this program.”
The letter provided for the NRO to be managed jointly by the Under Secretary of the Air Force and the CIA Deputy Director for Plans (at the time, still Richard Bissell). A May 1962 agreement between the CIA and Defense Department established a single NRO director. Joseph Charyk was named to the directorship shortly afterward.
Memorandum for NRO Program Directors/Director, NRO Staff
Organization and Functions of the NRO
23 July 1962
This memorandum represents the fundamental directive on the organization and functions of the NRO. In addition to the Director (there was no provision for a deputy director), there were four major elements to the NRO–the NRO staff and three program elements, designated A, B, and C. The staff’s functions included assisting the director in dealing with the USIB and the principal consumers of the intelligence collected.
The Air Force Office of Special Projects (the successor to the SAMOS project office) became NRO’s Program A. The CIA reconnaissance effort was designated Program B, while the Navy’s space reconnaissance effort, at the time consisting of the Galactic Radiation and Background (GRAB) satellite, whose radar ferret mission involved the collection of Soviet radar signals, became Program C. Although the GRAB effort was carried out by the Naval Research Laboratory, the director of the Office of Naval Intelligence would serve as Program C director until 1971.8
Agreement between the Secretary of Defense and the Director of Central Intelligence on Management of the National Reconnaissance Program
13 March 1963
In December 1962, Joseph Charyk decided to leave government to become president of the COMSAT Corporation. By that time a number of disputes between the CIA and NRO had contributed to Charyk’s view that the position of the NRO and its director should be strengthened. During the last week of February 1963, his last week in office, he completed a revision of a CIA draft of a new reconnaissance agreement to replace the May 1962 agreement (which had replaced the September 6, 1961 agreement). Charyk took the revision to Deputy Secretary of Defense Roswell Gilpatric. It appears that some CIA-suggested changes were incorporated sometime after Charyk left office. On March 13, Gilpatric signed the slightly modified version on behalf of DoD. It was sent to the CIA that day and immediately approved by DCI John McCone, who had replaced Allen Dulles in November 1961.9
The new agreement, while it did not include all the elements Charyk considered important, did substantially strengthen the authority of the NRO and its director. It named the Secretary of Defense as the Executive Agent for the NRP. The program would be “developed, managed, and conducted in accordance with policies and guidance jointly agreed to by the Secretary of Defense and the Director of Central Intelligence.”
The NRO would manage the NRP “under the direction, authority, and control of the Secretary of Defense.” The NRO’s director would be selected by the Defense Secretary with the concurrence of the DCI, and report to the Defense Secretary. The NRO director was charged with presenting to the Secretary of Defense “all projects” for intelligence collection and mapping and geodetic information via overflights and the associated budgets, scheduling all overflight missions in the NRP, as well as engineering analysis to correct problems with collection systems. With regard to technical management, the DNRO was to “assign all project tasks such as technical management, contracting etc., to appropriate elements of the DoD and CIA, changing such assignments, and taking any such steps he may determine necessary to the efficient management of the NRP.”
Department of Defense Directive Number TS 5105.23
Subject: National Reconnaissance Office
27 March 1964
This directive replaced the original June 1962 DoD Directive on the NRO, and remains in force today. The directive specifies the role of the Director of the NRO, the relationships between the NRO and other organizations, the director’s authorities, and security. It specified that documents or other material concerning National Reconnaissance Program matters would be handled within a special security system (known as the BYEMAN Control System).
President’s Foreign Intelligence Advisory Board
Memorandum for the President
Subject: National Reconnaissance Program
2 May 1964
The 1963 CIA-DoD agreement on the NRP did not end the battles between the CIA and NRO–as some key CIA officials, including ultimately DCI John McCone, sought to reestablish a major role for the CIA in the satellite reconnaissance effort. The continuing conflict was examined by the PFIAB.
The board concluded that “the National Reconnaissance Program despite its achievements, has not yet reached its full potential.” The fundamental cause for the NRP’s shortcomings was “inadequacies in organizational structure.” In addition, there was no clear division of responsibilities and roles between the Defense Department, CIA, and the DCI.
The recommendations of the board represented a clear victory for the NRO and its director. The DCI should have a “large and important role” in establishing intelligence collection requirements and in ensuring that the data collected was effectively exploited, according to the board. In addition, his leadership would be a key factor in the work of the United States Intelligence Board relating to the scheduling of space and airborne reconnaissance missions.
But the board also recommended that President Johnson sign a directive which would assign to NRO’s Air Force component (the Air Force Office of Special Projects) systems engineering, procurement, and operation of all satellite reconnaissance systems.
Agreement for Reorganization of the National Reconnaissance Program
13 August 1965
Despite the recommendations of the May 2, 1964 PFIAB report, which were challenged by DCI John McCone, no action was taken to solidify the position of the NRO and its director. Instead prolonged discussions over a new agreement continued into the summer of 1965. During this period the CIA continued work on what would become two key satellite programs–the HEXAGON/KH-9 imaging and RHYOLITE signals intelligence satellites.
In early August, Deputy Secretary of Defense Cyrus Vance and CIA official John Bross reached an understanding on a new agreement, and it was signed by Vice Adm. William F. Raborn (McCone’s successor) and Vance on August 13, 1965. It represented a significant victory for the CIA, assigning key decision-making authority to an executive committee, authority that was previously the prerogative of the NRO director as the agent of the Secretary of Defense.
The Secretary of Defense was to have “the ultimate responsibility for the management and operation of the NRO and the NRP,” and have the final power to approve the NRP budget. The Secretary also was empowered to make decisions when the executive committee could not reach agreement.
The DCI was to establish collection priorities and requirements for targeting NRP operations, as well as establish frequency of coverage, review the results obtained by the NRP and recommend steps for improving its results if necessary, serve on the executive committee, review and approve the NRP budget, and provide security policy guidance.
The NRP Executive Committee established by the agreement would consist of the DCI, Deputy Secretary of Defense, and Special Assistant to the President for Science and Technology. The committee was to recommend to the Secretary of Defense the “appropriate level of effort for the NRP,” approve or modify the consolidated NRP and its budget, approve the allocation of responsibility and the corresponding funds for research and exploratory development for new systems. It was instructed to insure that funds would be adequate to pursue a vigorous research and development program, involving both CIA and DoD. The executive committee was to assign development of sensors to the agency best equipped to handle the task.
The Director of the NRO would manage the NRO and execute the NRP “subject to the direction and control of the Secretary of Defense and the guidance of the Executive Committee.” His authority to initiate, improve, modify, redirect or terminate all research and development programs in the NRP, would be subject to review by the executive committee. He could demand that all agencies keep him informed about all programs undertaken as part of the NRP.
Analysis of “A $1.5 Billion Secret in Sky” Washington Post, December 9, 1973
Throughout the 1960s, the United States operation of reconnaissance satellites was officially classified, but well known among specialists and the press. However, it was not until January 1971 that the NRO’s existence was first disclosed by the media, when it was briefly mentioned in a New York Times article on intelligence and foreign policy.
A much more extensive discussion of the NRO appeared in the December 9, 1973 Washington Post as a result of the inadvertent mention of the reconnaissance office in a Congressional report. The NRO prepared this set of classified responses to the article, clearly intended for those in Congress who might be concerned about the article’s purported revelations about the NRO’s cost overruns and avoidance of Congressional oversight.
E.C. Aldridge, Jr. (Director, NRO)
Letter to David L. Boren, Chairman,
Senate Select Committee on Intelligence
21 November 1988
The late 1980s saw the beginning of what eventually would be a wide-ranging restructuring of the NRO. In November 1988 NRO director Edward “Pete” Aldridge wrote to Senator David Boren, Chairman of the Senate Select Committee on Intelligence, concerning the findings of an extensive study (the NRO Restructure Study) of the organizational structure of the NRO.
Aldridge proceeded to report that, after having discussed the study’s recommendations with Secretary of Defense Frank Carlucci and Director of Central Intelligence William Webster, he was directing the development of plans to implement the recommendations. Specific changes would include the creation of a centralized systems analysis function “to conduct cross-system trades and simulations within the NRO,” creation of a “User Support” function to improve NRO support to intelligence community users as well as to the growing number of operational military users, and the dispersal of the NRO Staff to the new units, with the staff being replaced by a group of policy advisers. In addition, Aldridge foresaw the establishment of an interim facility “to house the buildup of the new functions and senior management.” The ultimate goal, projected for the 1991-92 period, would be the “collocation of all NRO elements [including the Los Angeles-based Air Force Office of Special Projects] . . . in the Washington, D.C. area.”
Memorandum of Agreement
Subject: Organizational Restructure of the National Reconnaissance Office
15 December 1988
This memorandum of agreement, signed by the Director of the NRO and the directors of the NRO’s three programs commits them to the restructuring discussed in Edward Aldridge’s November 21 letter to Senator Boren.
Many changes recommended by Aldridge, who left office at the end of 1988, were considered by a 1989 NRO-sponsored review group and subsequently adopted.
Report to the Director of Central Intelligence
DCI Task Force on The National Reconnaissance Office, Final Report
This report was produced by a panel chaired by former Lockheed Corporation CEO Robert Fuhrman, whose members included both former and serving intelligence officials. It focused on a variety of issues other than current and possible future NRO reconnaissance systems. Among the issues it examined were mission, organizational structure, security and classification.
One of its most significant conclusions was that the Program A,B,C structure that had been instituted in 1962 (see Document 6) “does not enhance mission effectiveness” but “leads to counterproductive competition and makes it more difficult to foster loyalty and to maintain focus on the NRO mission.” As a result, the panel recommended that the NRO be restructured along functional lines with imagery and SIGINT directorates. This change was made even before the final version of the report was issued.
The report also noted that while the NRO’s existence was officially classified it was an “open secret” and that seeking to attempt to maintain such “open secrets … weakens the case for preserving ‘real’ secrets.” In addition, such secrecy limited the NRO’s ability to interact with customers and users. The group recommended declassifying the “fact of” the NRO, as well as providing information about the NRO’s mission, the identities of senior officials, headquarters locations, and the NRO as a joint Intelligence Community-Defense Department activity.
National Security Directive 67
Subject: Intelligence Capabilities: 1992-2005
30 March 1992
NSD 67 directed a number of changes in U.S. intelligence organization and operations. Among those was implementation of the plan to restructure the NRO along functional lines–eliminating the decades old Program A (Air Force), B (CIA), and C (Navy) structure and replacing it with directorates for imaging, signals intelligence, and communication systems acquisition and operations–as recommended by the Fuhrman panel. As a result, Air Force, CIA, and Navy personnel involved in such activities would now work together rather than as part of distinct NRO components.
27 July 1992
In addition to the internal restructuring of the NRO, 1992 saw the declassification of the organization, as recommended by the Fuhrman report (Document 14), for a number of reasons–to facilitate interaction with other parts of the government, to make it easier for the NRO to support military operations, and in response to Congressional pressure to acknowledge the obvious. As part of the process of considering declassification NRO consulted Richard Curl, head of the Office of Intelligence Resources of the State Department’s Bureau of Intelligence and Research–the office which provides INR with expertise and support concerning technical collection systems. Curl recommended a low-key approach to declassification.
Memorandum for Secretary of Defense, Director of Central Intelligence
Subject: Changing the National Reconnaissance Office (NRO) to an Overt Organization
30 July 1992
Document 17a: Mission of the NRO, 1 p.
These memos, from Director of the NRO Martin Faga, represent key documents in the declassification of the NRO. The memo noted Congressional pressure for declassification and that Presidential certification that declassification would result in “grave damage to the nation … would be difficult in this case.”
Faga reported that as a result of an NRO review he recommended declassifying the fact of NRO’s existence, issuing a brief mission statement, acknowledging the NRO as a joint DCI-Secretary of Defense endeavor, and identifying top level NRO officials. He also noted that his recommendations attempted to balance concerns about classifying information that realistically could not be protected, while maintaining an ability to protect matters believed to require continued protection.
Secretary of Defense Richard Cheney, DCI Robert Gates, and President Bush approved the recommendations in September and a three-paragraph memorandum to correspondents acknowledging the NRO and NRP was issued on September 18, 1992.
Document 17b comes in two versions, representing different security reviews. Material redacted from the first version includes provisions of National Security Directive 30 on space policy, expression of concern over “derived disclosures,” and the assessment that the “high degree of foreign acceptance of satellite reconnaissance, and the fact that we are not disclosing significant new data,” would not lead to any significant foreign reaction. Another redacted statement stated that “legislation . . . exempting all NRO operational files from [Freedom of Information Act] searches” was required.
Final Report: National Reconnaissance Program Task Force for the Director of Central Intelligence
The end of the Cold War and collapse of the Soviet Union required the U.S. intelligence community and NRO to reconsider how U.S. overhead reconnaissance systems were employed and what capabilities future systems should possess. To consider these questions DCI Robert Gates appointed a task force, chaired by his eventual successor, R. James Woolsey.
The final report considers future needs and collection methods, industrial base considerations, procurement policy considerations, international industrial issues, and transition considerations. Its recommendations included elimination of both some collection tasks as well as some entire types of present and planned collection systems.
NRO Protection Review, “What is [BYEMAN]?”
6 November 1992
Traditionally, the designations of Sensitive Compartmented Information (SCI) compartments–such as UMBRA to indicate particularly sensitive communications intelligence and RUFF to intelligence based on satellite imagery–have themselves been classified. In recent years, however, the NSA and CIA have declassified a number of such terms and their meaning. One exception has been the term “BYEMAN”– the BYEMAN Control System being the security system used to protect information related to NRO collection systems (in contrast to their products) and other aspects of NRO activities, including budget and structure. Thus, the term BYEMAN has been deleted in the title of the document and throughout the study–although the term and its meaning has become known by specialists and conveys no information beyond the text of any particular document.
This study addresses the use of the BYEMAN classification within the NRO, its impact on contractors and other government personnel, and the consequences of the current application of the BYEMAN system. The study concludes that placing information in the highly restrictive BYEMAN channels (in contrast to classifying the information at a lower level) may unduly restrict its dissemination to individuals who have a legitimate need to know.
NRO Strategic Plan
18 January 1993
A study headed by James Woolsey (Document 18), President Clinton’s first DCI, heavily influenced the contents of this early 1993 document. The plan’s introduction notes that while some collection tasks will no longer be handled by overhead reconnaissance the “uncertain nature of the world that is emerging from the end of the ‘cold war’ places a heavy premium on overhead reconnaissance.” At the same time, “this overhead reconnaissance challenge must be met in an era of a likely reduced national security budget.”
The strategic plan is described in the introduction, as “the ‘game plan’ to transition current overhead collection architectures into a more integrated, end-to-end architecture for improved global access and tasking flexibility.”
The document goes on to examine the strategic context for future NRO operations, NRO strategy, strategic objectives, and approaches to implementation. Strategic objectives include improving the responsiveness of NRO systems by developing an architecture that spans the entire collection and dissemination process, from the identification of requirements to dissemination of the data collected.
National Reconnaissance Office: Collocation Construction Project, Joint DOD and CIA Review Report
In an August 8, 1994 press conference, Senators Dennis DeConcini (D-Az.) and John Warner (R-Va.), the chairman and vice chairman of the Senate Select Committee on Intelligence accused the NRO of concealing from Congress the cost involved in building a new headquarters to house government and contractor employees. Previously NRO activities in the Washington area were conducted from the Pentagon and rented space in the Washington metropolitan area. The collocation and restructuring decisions of the late 1980s and early 1990s had resulted in a requirement for a new headquarters facility.10
The accusations were followed by hearings before both the Senate and House intelligence oversight committees–with House committee members defending the NRO and criticizing their Senate colleagues. While they noted that some of the documents presented by the NRO covering total costs were not presented with desirable clarity, the House members were more critical of the Senate committee for inattention to their committee work.11
This joint DoD and CIA review of the project, found “no intent to mislead Congress” but that “the NRO failed to follow Intelligence Community budgeting guidelines, applicable to all the intelligence agencies,” that would have caused the project to be presented as a “New Initiative,” and that the cost data provided by the NRO “were not presented in a consistent fashion and did not include a level of detail comparable to submissions for . . . intelligence community construction.”
Memorandum for Director of Central Intelligence
Subject: Small Satellite Review Panel
The concept of employing significantly smaller satellites for imagery collection was strongly advocated by Rep. Larry Combest during his tenure (1995-97) as chairman of the House Permanent Select Committee on Intelligence. As a result the DCI was instructed to appoint a panel of experts to review the issue.12
Panel members included former NRO directors Robert Hermann and Martin Faga; former NRO official and NSA director Lew Allen; scientist Sidney Drell and four others. The panel’s report supported a radical reduction in the size of most U.S. imagery satellites. The panel concluded that “now is an appropriate time to make a qualitative change in the systems architecture of the nation’s reconnaissance assets,” in part because “the technology and industrial capabilities of the country permit the creation of effective space systems that are substantially smaller and less costly than current systems.” Thus, the panel saw “the opportunity to move towards an operational capability for . . . imagery systems, that consists of an array of smaller, cheaper spacecraft in larger number with a total capacity which is at least as useful as those currently planned and to transport them to space with substantially smaller and less costly launch vehicles.”13
The extent to which those recommendations have influenced NRO’s Future Imagery Architecture plan is uncertain–although plans for large constellations of small satellites have not usually survived the budgetary process.
Defining the Future of the NRO for the 21st Century, Final Report, Executive Summary
August 26, 1996
This report was apparently the first major outside review of the NRO conducted during the Clinton administration, and the first conducted after the NRO’s transformation to an overt institution and its restructuring were firmly in place.
Among those conducting the review were former Vice Chairman of the Joint Chiefs of Staff, Adm. David E. Jeremiah, former NRO director Martin Faga, and former Deputy Director of Central Intelligence John McMahon. Issues studied by the panel included, inter alia, the existence of a possible alternative to the NRO, NRO’s mission in the 21st Century, support to military operations, security, internal organization, and the relationship with NRO’s customers.
After reviewing a number of alternatives, the panel concluded that no other arrangement was superior for carrying out the NRO mission. It did, however, recommend, changes with regards to NRO’s mission and internal organization. The panel concluded that where the NRO’s current mission is “worldwide intelligence,” its future mission should be “global information superiority,” which “demands intelligence capabilities unimaginable just a few years ago.” The panel also recommended creation of a fourth NRO directorate, which was subsequently established, to focus solely on the development of advanced systems, in order to “increase the visibility and stature of technology innovation in the NRO.”
1. Michael R. Beschloss, Mayday: Eisenhower, Khrushchev and the U-2 Affair (New York: Harper & Row, 1986), pp.241-42; John Ranelagh, The Agency: The Rise and Decline of the CIA, From Wild Bill Donovan to William Casey (New York: Simon & Schuster, 1986), p. 319; Gregory W. Pedlow and Donald Welzenbach, The Central Intelligence Agency and Overhead Reconnaissance: The U-2 and OXCART Programs, 1954-1974 (Washington, D.C.: CIA, 1992), pp. 170-93.2. Kenneth Greer, “Corona,” Studies in Intelligence, Supplement 17, Spring 1973 in Kevin C. Ruffner (Ed.), CORONA: America’s First Satellite Program (Washington, D.C.: Central Intelligence Agency, 1995), pp. 3-40; Gen. Thomas D. White, Air Force Chief of Staff to General Thomas S. Power, Commander in Chief, Strategic Air Command, June 29, 1960, Thomas D. White Papers, Library of Congress, Box 34, Folder “2-15 SAC.”
3. “Special Meeting of the National Security Council to be held in the Conference Room of the White House from 8:30 a.m. to 10 a.m., Thursday, August 25, 1960, undated, National Security Council Staff Papers, 1948-61, Executive Secretary’s Subject File Series, Box 15, Reconnaissance Satellites , DDEL.
4. “Reconnaissance Satellite Program,” Action No.1-b at Special NSC Meeting on August 25, 1960, transmitted to the Secretary of Defense by Memo of September 1, 1960; G.B. Kistiakowsky to Allen Dulles, August 25, 1960, Special Assistant for Science and Technology, Box No. 15, Space [July-Dec 1960], DDEL.
5. Carl Berger, The Air Force in Space Fiscal Year 1961, (Washington, D.C.: Air Force Historical Liaison Office, 1966), pp.41-42; Secretary of the Air Force Order 115.1, “Organization and Functions of the Office of Missile and Satellite Systems,” August 31, 1960; Robert Perry, A History of Satellite Reconnaissance, Volume 5: Management of the National Reconnaissance Program, 1960-1965, (Washington, D.C., NRO, 1969), p. 20; Secretary of the Air Force Order 116.1, “The Director of the SAMOS Project,” August 31, 1960.
8. Ibid.; GRAB: Galactic Radiation and Background (Washington, D.C.: NRL, 1997); Dwayne A. Day, “Listening from Above: The First Signals Intelligence Satellite,” Spaceflight, August 1999, pp. 339-347; NRO, Program Directors of the NRO: ABC&D, 1999.
11. Walter Pincus, “Spy Agency Defended by House Panel,” Washington Post, August 12, 1994, p. A21; U.S. Congress, House Permanent Select Committee on Intelligence, NRO Headquarters Project (Washington, D.C.: U.S. Government Printing Office, 1995), pp. 3-4.
12. Walter Pincus, “Congress Debates Adding Smaller Spy Satellites to NRO’s Menu,” Washington Post, October 5, 1995, p. A14; Joseph C. Anselmo, “House, Senate at Odds Over Intel Small Sats,” Aviation Week & Space Technology, January 1, 1996, p. 19.
Former CIA officer John Kiriakou, who is charged with unauthorized disclosure of a covert officer’s identity and other classified information, says that the case against him is driven by government animosity, and that he is a target of selective prosecution.
“When White House aides leaked stories about the heroes who killed Osama Bin Laden, they were not prosecuted. When the Washington Post was granted access to the covert director of the CTC for a profile of those directing America’s ‘war on terror,’ no one was prosecuted,” his attorneys wrote in a newly disclosed motion for dismissal.
“But when John Kiriakou gave an interview where he admitted the United States used waterboarding and when he further opined that waterboarding was ineffective, the government went after him,” the motion stated.
“The United States has improperly selected him for prosecution based on his exercise of his constitutional rights and on the animus the United States holds toward him” while “the government has tolerated other disclosures because they resulted in press favorable to the government.”
A copy of the June 12 defense motion was cleared for public release yesterday.
In a separate motion for dismissal, Mr. Kiriakou’s attorneys challenged the constitutionality of the statutes under which he is being prosecuted, including the Intelligence Identities Protection Act and section 793(d) of the Espionage Act, which they argued are “unconstitutionally vague and overbroad.”
Furthermore, because overclassification is rampant, they said, the classification status of any particular information is not a reliable index of its sensitivity.
“The government’s acknowledged practice of over-classification means that not all classified information actually has the potential to damage national security if released…. The fact that information is classified does not actually clarify whether its disclosure… could cause any injury to the United States.”
A government response to the defense motions is due by July 2.
click for full sizeFirst trip with Gorbachev. Chernyaev in Belgium, October 1972.
|Translated and edited by Anna Melyakova and Svetlana Savranskaya “Anatoly Chernyaev’s diary is one of the great internal records of the Gorbachev years, a trove of irreplaceable observations about a turning point in history. There is nothing else quite like it, allowing the reader to sit at Gorbachev’s elbow at the time of perestroika and glasnost, experiencing the breakthroughs and setbacks. It is a major contribution to our understanding of this momentous period.”
— David E. Hoffman, Pulitzer Prize-winning author of The Dead Hand
“Remarkable diary …”
Washington, D.C., May 25, 2012 – Today the National Security Archive publishes excerpts from Anatoly S. Chernyaev’s diary of 1972 for the first time in English translation with edits and postscript by the author. While the diary for the Gorbachev years, 1985-1991, published before and widely used in scholarly work on the end of the Cold War provided a major source on the Gorbachev reforms, the earlier years of the diary give the reader a very rare window into the workings of the Brezhnev inner circle in the 1970s.
The portrait of the Soviet leader Leonid Brezhnev, whom most Americans remember from his later years as frail and incomprehensible, emerges very differently from the earliest in the series of diaries donated by Anatoly Sergeyevich Chernyaev to the National Security Archive. In 1972, Chernyaev, deputy head of the International Department of the Central Committee, started keeping a systematic diary, recording his attendance at Politburo meetings, his participation in meetings at the state dacha in Zavidovo (where the experts and speechwriters met to draft speeches and reports for the General Secretary), visits abroad, and the daily life of a high-level Soviet apparatchik.
In 1972, Brezhnev is a skillful negotiator, who prepares seriously for Richard Nixon’s first visit to Moscow, who discusses texts of his speeches with leading Moscow intellectuals whom he brought into his inner circle as speechwriters and consultants, who is essentially non-ideological in his dealings with foreign leaders-negotiating arms control and economic agreements with Nixon while the U.S. forces are bombing the Soviet communist ally Vietnam, preferring Georges Pompidou to the leader of French communists Georges Marchais, and”brainwashing” Pakistani leader Bhutto. The two most striking differences between the aging Brezhnev of the late 1970s-early 1980s and the Brezhnev of this diary are that the General Secretary is clearly in charge of the Politburo sessions and that he actively consults with leading experts and intellectuals, such as Georgy Arbatov, Nikolai Inozemtsev, Alexander Bovin and Chernyaev himself.
Chernyaev’s daily duties are centered around the international communist movement, interactions with representatives from European communist parties. The reader sees Chernyaev’s emerging disillusionment with his work, which in comparison to real foreign policy, like preparation for Nixon’s visit, feels meaningless. Chernyaev comes to believe that “the Communist Movement right now is nothing more than an ideological addendum to our foreign policy,” and that the Soviet authority in the progressive movements in the world is shrinking: “nobody believes us anymore, no matter how we portray the Chinese and try to explain our Marxist-Leninist purity.”
He sees the future in a different direction. After Nixon’s visit, Chernyaev is asked to draft Brezhnev’s speech on Soviet-American relations and thus is allowed to see all the materials from the meeting, including all transcripts of conversation. Impressed with the quality of interaction and the non-ideological spirit of it, Chernyaev anticipates a new era: “Be that as it may, but we’ve crossed the Rubicon. The great Rubicon of world history. These weeks of May 1972 will go down in history as the beginning of an era of convergence.”
But the new era will only come thirteen years later. In 1972, he sees the first almost imperceptible sign from the future. In October 1972, he is asked to accompany first secretary of the Stavropol region on a trip to Belgium. This is where Chernyaev meets and spends time with Mikhail Gorbachev for the first time. Astonishingly, as Chernyaev later admits, he did not record this meeting in the diary at the time. Only photographs documented this auspicious meeting where Chernyaev sits on the left hand of the future Soviet leader, whose right hand he was destined to become in the late 1980s.
“GoMoPa” hat mit immer neuen WordPress-Blogs zwei Dinge vor:
– von negativen Meldungen abzulenken
– themenspezifische Angriffe zu starten.
Früher bediente sich die dubiose selbsternannte “Finanznachrichtenagentur” eines Blog-Netzwerkes aus teilweise fremden Blogs.
Scheinbar sind wohl diese Blogger auf Distanz zu der laut Eigenaussage “Financial Intelligence” gegangen.
Im Übrigen bedeutet Intelligence im Englischen Sprachgebrauch “Geheimdienst”.
Wohl kein Zufall – sieht man sich das STASI-Netzwerk um den STASI-Obersten Ehrenfried Stelzer, den “Ersten Kriminologen der DDR” an.
Wie schreibt “GoMoPa” so schön und ich darf die dubiosen Genossen hier – als Sohn eines Landwirtes, der auf dem Bauernhof groß geworden ist, – mit besonderer Freude zitieren: “Der Bauer erkennt seine Schweine am Gang !”
Magister der Publizistik, Germanistik und Komparatistik
ALEXANDRIA, VA—Justin Strom, aka “Jae,” “Jae Dee,” or “J-Dirt,” 26, of Lorton, Virginia, pleaded guilty today to recruiting at least eight juvenile girls to engage in commercial sex for his street gang’s prostitution business.
Neil H. MacBride, U.S. Attorney for the Eastern District of Virginia; Kenneth T. Cuccinelli, II, Attorney General of Virginia; Colonel David Rohrer, Fairfax County, Virginia Chief of Police; and Ronald T. Hosko, Special Agent in Charge of the FBI’s Washington Field Office Criminal Division, made the announcement after the plea was accepted by U.S. District Judge James C. Cacheris.
“For six years, Justin Strom profited from preying on teenage girls and others he recruited as prostitutes in a commercial sex ring,” said U.S. Attorney MacBride. “Strom is the fifth and final Underground Gangster Crips gang member to plead guilty to sex trafficking a juvenile—a very serious crime that carries a potential life sentence.”
“Justin Strom robbed these girls of their childhoods, their innocence, and their trust, and he did that in the most base, vile, and despicable way possible,” said Attorney General Cuccinelli. “Nothing can ever repair the damages Strom inflicted on his victims, but it’s our hope that today’s guilty plea will help them begin a path towards healing and moving forward.”
“Today, a fifth member of the Underground Gangster Crips pleaded guilty to strong-arming and pimping underage girls in the illegal sex trade—a trade that is taking place here in some of the most affluent neighborhoods in our nation,” said Special Agent in Charge Hosko. “These gang members admitted that they beat and intimidated young girls they met on the Internet or in Metro stops in our area. They preyed on some of the most vulnerable in our society, and today Justin Strom admitted to these crimes.”
“This gang-driven prostitution ring was a direct threat to the safety and welfare of young women,” said Chief Rohrer. “With the help of our federal partners, we will continue to work aggressively and consistently to rid Fairfax County of gang violence and criminal operations wherever and whenever we find it.”
Strom pleaded guilty to sex trafficking of a child, which carries a mandatory minimum of 10 years in prison and maximum penalty of life in prison. Sentencing is scheduled for September 14, 2012.
According to a statement of facts filed with his plea agreement and other court records, Strom is a member of the Underground Gangster Crips (UGC) set based in Fairfax County. From 2006 through March 2012, Strom misrepresented his identity online to recruit females—including juveniles—through online social networking sites such as Facebook, MySpace, and Datehookup and enticed the girls to use their good looks to earn money through prostitution. He and others posted numerous advertisements on Backpage, Craigslist, and other websites to solicit customers to pay to have sex with juvenile and adult prostitutes.
Strom admitted that he knowingly enticed at least eight juvenile girls to engage in prostitution for his business and that he received proceeds from this illicit conduct for approximately six years.
On March 28, 2012, Strom was among five members and associates of the UGC set based in Fairfax County charged with running a prostitution business that recruited and trafficked high school girls. Four previously pleaded guilty, and Strom’s guilty plea today marks the fifth and final conviction in this case.
Donyel Pier Dove, aka “Bleek,” 27, of Alexandria, Virginia, pleaded guilty on May 17, 2012 to sex trafficking of a juvenile. He also pleaded guilty to use of a firearm during a crime of violence in relation to two armed robberies of 7-11 stores in Manassas, Virginia, in March 2012 and to possession of a firearm by a convicted felon in Fairfax, which also occurred in March 2012. Dove faces a mandatory minimum penalty of five years and a maximum of life on the use of a firearm charge and a maximum of 10 years in prison on the possession of a firearm charge. He is scheduled to be sentenced on August 10, 2012 by U.S. District Judge Anthony J. Trenga.
On May 14, 2012, Henock Ghile, aka “Knots,” 23, of Springfield, Virginia, pleaded guilty to sex trafficking of a juvenile. In court, Ghile admitted that he was a UGC gang associate and that from May 2011 through September 2011, he transported two 17-year-old girls to work as prostitutes. Sentencing has been scheduled for August 3, 2012, before U.S. District Judge Claude M. Hilton.
On April 14, 2012, two others associated with the UGC prostitution operation—Michael Tavon Jefferies, aka “Loc,” 21, of Woodbridge, Virginia; and Christopher Sylvia, 23, of Springfield, Virginia—pleaded guilty to sex trafficking of a juvenile. Jefferies is scheduled to be sentenced on July 6, 2012 before U.S. District Judge Leonie M. Brinkema. Sylvia is scheduled for sentencing on July 20, 2012 before U.S. District Judge Gerald Bruce Lee.
This case was investigated by the Fairfax County Police Department and the FBI’s Washington Field Office, with assistance from the Northern Virginia Human Trafficking Task Force. Virginia Assistant Attorney General and Special Assistant U.S. Attorney Marc Birnbaum and Assistant U.S. Attorney Inayat Delawala are prosecuting the case on behalf of the United States.
Founded in 2004, the Northern Virginia Human Trafficking Task Force is a collaboration of federal, state, and local law enforcement agencies—along with non-governmental organizations—dedicated to combating human trafficking and related crimes.
Watch this exclusive Rihanna Esquire video set to “We Found Love,” then pick up the November issue of Esquire for more.
Criminals and terrorists have long used official vehicles, “cloned” vehicles (those painted/decorated to appear official), or seemingly legitimate vehicles (e.g. livery, maintenance or delivery) to circumvent security measures at targets of interest.
There have been numerous terrorist attacks overseas wherein operatives used police vehicles or ambulances (or vehicles painted to resemble same) to conceal improvised explosive devices. Within the US Homeland, the most common use of cloned official vehicles by criminals is for drug smuggling; however, at least one terrorist targeting New York envisioned misusing vehicles that would appear to be legitimate, in order to conduct an attack. Dhiren Barot, an al Qaeda operative involved in the 2004 Financial Centers Plot, allegedly plotted to detonate three limousines packed with explosives and gas cylinders in underground parking lots in Manhattan. While the limousines would not have masqueraded as “official vehicles” per se they would have appeared to be legitimately entering those parking structures.
Law enforcement officials and the general public should remain alert to potential fake or cloned official vehicles, with special attention near high-profile targets and mass gatherings at special events, such as upcoming Memorial Day and 4th of July holiday parades and celebrations, or large sporting events scheduled this summer across the State. These events provide the opportunity for terrorists to inflict mass casualties and evade detection by blending into large crowds.
Officials should also be mindful of locations where official vehicles may gain exclusive access, such as parking garages or loading docks proximate to potential targets of interest. Officials at such locations should know how to verify markings on any official vehicles likely to be present. Law enforcement outreach to security staff at these locations during routine patrols is encouraged.
DOWNLOAD THE ORIGINAL DOCUMENT HERE
Preet Bharara, the United States Attorney for the Southern District of New York, and Janice K. Fedarcyk, the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (FBI), announced today the largest coordinated international law enforcement action in history directed at “carding” crimes—offenses in which the Internet is used to traffic in and exploit the stolen credit card, bank account, and other personal identification information of hundreds of thousands of victims globally. Today’s coordinated action—involving 13 countries, including the United States—resulted in 24 arrests, including the domestic arrests of 11 individuals by federal and local authorities in the United States, and the arrests of 13 individuals abroad by foreign law enforcement in seven countries. In addition, the federal and local authorities and authorities overseas today conducted more than 30 subject interviews and executed more than 30 search warrants. Today’s coordinated actions result from a two-year undercover operation led by the FBI that was designed to locate cybercriminals, investigate and expose them, and disrupt their activities.
Eleven individuals were arrested today, and one last night, in the United States: Christian Cangeopol, a/k/a “404myth,” was arrested today in Lawrenceville, Georgia; Mark Caparelli, a/k/a “Cubby,” was arrested in San Diego, California; Sean Harper, a/k/a “Kabraxis314,” was arrested in Albuquerque, New Mexico; Alex Hatala, a/k/a “kool+kake,” was arrested in Jacksonville, Florida; Joshua Hicks, a/k/a “OxideDox,” was arrested in Bronx, New York; Michael Hogue, a/k/a “xVisceral,” was arrested in Tucson, Arizona; Mir Islam, a/k/a “JoshTheGod,” was arrested in Manhattan, New York; Peter Ketchum, a/k/a “IwearaMAGNUM,” was arrested in Pittsfield, Massachusetts; Steven Hansen, a/k/a “theboner1,” was arrested in Wisconsin, where he is currently serving a prison sentence on state charges. In addition, two minors, whose names will not be made public, were arrested by local authorities in Long Beach and Sacramento, California. Hicks and Islam will be presented later today before a magistrate judge in the Southern District of New York. The other federally arrested defendants will be presented before magistrate judges in the corresponding federal districts of arrest.
Another 13 individuals were arrested today in seven foreign countries. Eleven of those individuals were arrested as a result of investigations commenced in foreign jurisdictions based in part on information arising out of the undercover operation and provided by the FBI to foreign law enforcement. Those 11 arrests occurred in the United Kingdom (6 arrests), Bosnia (2), Bulgaria (1), Norway (1), and Germany (1). Two additional defendants were arrested today in foreign countries based on provisional arrest warrants obtained by the United States in connection with complaints unsealed today in the Southern District of New York. Those two individuals are Ali Hassan, a/k/a/ “Badoo,” who was arrested in Italy; and Lee Jason Juesheng, a/k/a “iAlert,” a/k/a “Jason Kato,” who was arrested in Japan. Australia, Canada, Denmark, and Macedonia conducted interviews, executed search warrants, or took other coordinated action in connection with today’s takedown.
Charges were also unsealed in the Southern District of New York against four additional defendants who remain at large.
Manhattan U.S. Attorney Preet Bharara said, “As the cyber threat grows more international, the response must be increasingly global and forceful. The coordinated law enforcement actions taken by an unprecedented number of countries around the world today demonstrate that hackers and fraudsters cannot count on being able to prowl the Internet in anonymity and with impunity, even across national boundaries. Clever computer criminals operating behind the supposed veil of the Internet are still subject to the long arm of the law.
The allegations unsealed today chronicle a breathtaking spectrum of cyber schemes and scams. As described in the charging documents, individuals sold credit cards by the thousands and took the private information of untold numbers of people. As alleged, the defendants casually offered every stripe of malware and virus to fellow fraudsters, even including software-enabling cyber voyeurs to hijack an unsuspecting consumer’s personal computer camera. To expose and prosecute individuals like the alleged cyber criminals charged today will continue to require exactly the kind of coordinated response and international cooperation that made today’s arrests possible.”
FBI Assistant Director in Charge Janice K. Fedarcyk said, “From New York to Norway and Japan to Australia, Operation Card Shop targeted sophisticated, highly organized cyber criminals involved in buying and selling stolen identities, exploited credit cards, counterfeit documents, and sophisticated hacking tools. Spanning four continents, the two-year undercover FBI investigation is the latest example of our commitment to rooting out rampant criminal behavior on the Internet.
Cyber crooks trade contraband and advance their schemes online with impunity, and they will only be stopped by law enforcement’s continued vigilance and cooperation. Today’s arrests cause significant disruption to the underground economy and are a stark reminder that masked IP addresses and private forums are no sanctuary for criminals and are not beyond the reach of the FBI.”
The following allegations are based on the Complaints unsealed today in Manhattan federal court:
Background on Carding Crimes
“Carding” refers to various criminal activities associated with stealing personal identification information and financial information belonging to other individuals—including the account information associated with credit cards, bank cards, debit cards, or other access devices—and using that information to obtain money, goods, or services without the victims’ authorization or consent. For example, a criminal might gain unauthorized access to (or “hack”) a database maintained on a computer server and steal credit card numbers and other personal information stored in that database. The criminal can then use the stolen information to, among other things, buy goods or services online; manufacture counterfeit credit cards by encoding them with the stolen account information; manufacture false identification documents (which can be used in turn to facilitate fraudulent purchases); or sell the stolen information to others who intend to use it for criminal purposes. Carding refers to the foregoing criminal activity generally and encompasses a variety of federal offenses, including, but not limited to, identification document fraud, aggravated identity theft, access device fraud, computer hacking, and wire fraud.
“Carding forums” are websites used by criminals engaged in carding (“carders”) to facilitate their criminal activity. Carders use carding forums to, among other things, exchange information related to carding, such as information concerning hacking methods or computer-security vulnerabilities that could be used to obtain personal identification information; and to buy and sell goods and services related to carding—for example, stolen credit or debit card account numbers, hardware for creating counterfeit credit or debit cards, or goods bought with compromised credit card or debit card accounts. Carding forums often permit users to post public messages—postings that can be viewed by all users of the site—sometimes referred to as threads. For example, a user who has stolen credit card numbers may post a public thread offering to sell the numbers. Carding forums also often permit users to communicate one-to-one through so-called private messages. Because carding forums are, in essence, marketplaces for illegal activities, access is typically restricted to avoid law enforcement surveillance. Typically, a prospective user seeking to join a carding forum can only do so if other, already established users vouch for him or her, or if he or she pays a sum of money to the operators of the carding forum. User accounts are typically identified by a username and access is restricted by password. Users of carding forums typically identify themselves on such forums using aliases or online nicknames (“nics”).
Individuals who use stolen credit card information to purchase goods on the Internet are typically reluctant to ship the goods to their own home addresses, for fear that law enforcement could easily trace the purchases. Accordingly, carders often seek out “drop addresses”—addresses with which they have no association, such as vacant houses or apartments—where carded goods can be shipped and retrieved without leaving evidence of their involvement in the shipment. Some individuals used carding forums to sell “drop services” to other forum members, usually in exchange for some form of compensation. One frequently used form of compensation is a “1-to-1” arrangement in which the carder wishing to ship to the drop must ship two of whatever items he has carded—one for the provider of the drop to forward to the carder and the other for the provider of the drop to keep as payment in kind for the carder’s use of the drop. Another frequently used compensation arrangement is for the carder and the drop provider to agree to resell the carded items shipped to the drop and to split the proceeds between them.
Background on the Undercover Operation
In June 2010, the FBI established an undercover carding forum called “Carder Profit” (the “UC Site”), enabling users to discuss various topics related to carding and to communicate offers to buy, sell, and exchange goods and services related to carding, among other things. Since individuals engaged in these unlawful activities on one of many other carding websites on the Internet, the FBI established the UC Site in an effort to identify these cybercriminals, investigate their crimes, and prevent harm to innocent victims. The UC Site was configured to allow the FBI to monitor and to record the discussion threads posted to the site, as well as private messages sent through the site between registered users. The UC Site also allowed the FBI to record the Internet protocol (IP) addresses of users’ computers when they accessed the site. The IP address is the unique number that identifies a computer on the Internet and allows information to be routed properly between computers.
Access to the UC Site, which was taken offline in May 2012, was limited to registered members and required a username and password to gain entry. Various membership requirements were imposed from time to time to restrict site membership to individuals with established knowledge of carding techniques or interest in criminal activity. For example, at times, new users were prevented from joining the site unless they were recommended by two existing users who had registered with the site or unless they paid a registration fee.
New users registering with the UC Site were required to provide a valid e-mail address as part of the registration process. The e-mail addresses entered by registered members of the site were collected by the FBI.
Harm Prevented by the Undercover Operation
In the course of the undercover operation, the FBI contacted multiple affected institutions and/or individuals to advise them of discovered breaches in order to enable them to take appropriate responsive and protective measures. In doing so, the FBI has prevented estimated potential economic losses of more than $205 million, notified credit card providers of over 411,000 compromised credit and debit cards, and notified 47 companies, government entities, and educational institutions of the breach of their networks.
The Charged Conduct
As alleged in the complaints unsealed today in the Southern District of New York, the defendants are charged with engaging in a variety of online carding offenses in which they sought to profit through, among other means, the sale of hacked victim account information, personal identification information, hacking tools, drop services, and other services that could facilitate carding activity.
Michael Hogue, a/k/a “xVisceral,” offered malware for sale, including remote access tools (RATs) that allowed the user to take over and remotely control the operations of an infected victim-computer. Hogue’s RAT, for example, enabled the user to turn on the web camera on victims’ computers to spy on them and to record every keystroke of the victim-computer’s user. If the victim visited a banking website and entered his or her user name and password, the key logging program could record that information, which could then be used to access the victim’s bank account. Hogue sold his RAT widely over the Internet, usually for $50 per copy and boasted that he had personally infected “50-100” computers with his RAT and that he’d sold it to others who had infected “thousands” of computers with malware. Hogue’s RAT infected computers in the United States, Canada, Germany, Denmark, Poland, and possibly other countries.
Jarand Moen Romtveit, a/k/a “zer0,” used hacking tools to steal information from the internal databases of a bank, a hotel, and various online retailers, and then sold the information to others. In February 2012, in return for a laptop computer, Romtveit sold credit card information to an individual he believed to be a fellow carder, but who, in fact, was an undercover FBI agent.
Mir Islam, a/k/a “JoshTheGod,” trafficked in stolen credit card information and possessed information for more than 50,000 credit cards. Islam also held himself out as a member of “UGNazi,” a hacking group that has claimed credit for numerous recent online hacks, and as a founder of “Carders.Org,” a carding forum on the Internet. Last night, Islam met in Manhattan with an individual he believed to be a fellow carder—but who, in fact, was an undercover FBI agent—to accept delivery of what Islam believed were counterfeit credit cards encoded with stolen credit card information. Islam was placed under arrest after he attempted to withdraw illicit proceeds from an ATM using one of the cards. Today, the FBI seized the web server for UGNazi.com and seized the domain name of Carders.org, taking both sites offline.
Steven Hansen, a/k/a “theboner1,” and Alex Hatala, a/k/a, “kool+kake,” sold stolen CVVs, a term used by carders to refer to credit card data that includes the name, address, and zip code of the card holder, along with the card number, expiration date, and security code printed on the card. Hatala advertised to fellow carders that he got “fresh” CVVs on a “daily” basis from hacking into “DBs [databases] around the world.”
Ali Hassan, a/k/a “Badoo,” also sold “fulls,” a term used by carders to refer to full credit card data including cardholder name, address, Social Security number, birthdate, mother’s maiden name, and bank account information. Hassan claimed to have obtained at least some of them by having hacked into an online hotel booking site.
Joshua Hicks, a/k/a “OxideDox,” and Lee Jason Jeusheng, a/k/a “iAlert, a/k/a “Jason Kato,” each sold “dumps,” which is a term used by carders to refer to stolen credit card data in a form in which the data is stored on the magnetic strips on the backs of credit cards. Hicks sold 15 credit card dumps in return for a camera and $250 in cash to a fellow carder who, unbeknownst to Hicks, was an undercover FBI agent. Hicks met the undercover agent in downtown Manhattan to consummate the sale. Similarly, Jeusheng sold 119 credit card dumps in return for three iPad 2s to a carder who was an undercover FBI agent. Jeusheng provided his shipping address in Japan to the undercover agent, which in part led to his identification and arrest.
Mark Caparelli, a/k/a “Cubby,” engaged in a so-called “Apple call-in” scheme in which he used stolen credit cards and social engineering skills to fraudulently obtain replacement products from Apple Inc., which he then resold for profit.The scheme involved Caparelli obtaining serial numbers of Apple products he had not bought. He would then call Apple with the serial number, claim the product was defective, arrange for a replacement product to be sent to an address he designated, and give Apple a stolen credit card number to charge if he failed to return the purportedly defective product. Caparelli sold and shipped four iPhone 4 cell phones that he had stolen through the Apple call-in scheme to an individual whom he believed to be a fellow-carder, but who, in fact, was an undercover FBI agent.
Sean Harper, a/k/a “Kabraxis314,” and Peter Ketchum, a/k/a “iwearaMAGNUM,” each sold drop services to other carders in return for money or carded merchandise. Harper provided drop addresses in Albuquerque, New Mexico, to which co-conspirators sent expensive electronics, jewelry, and clothing, among other things. Ketchum advertised drop locations “spread across multiple cities” in the United States and allegedly received and shipped carded merchandise including sunglasses and air purifiers, as well as synthetic marijuana.
Christian Cangeopol CANGEOPOL, a/k/a “404myth,” engaged in illegal “instoring” at Walmart to obtain Apple electronic devices with stolen credit cards. Instoring is a term used by carders to refer to using stolen credit card accounts to make in-store, as opposed to online, purchases of items using stolen credit card information and matching fake identifications. As part of the alleged scheme, Cangeopol and a co-conspirator used stolen credit card data to order electronic devices on Walmart’s website; in selecting a delivery option, they opted to have items delivered to various Walmart stores in Georgia; Cangeopol then picked up the items using a fake identification; Cangeopol and the co-conspirator then resold the carded electronics and split the proceeds.
* * *
The attached chart reflects the name, age, residence of, and pending charges against each individual charged in the Southern District of New York.
Mr. Bharara praised the outstanding investigative work of the FBI and its New York Cyber Crime Task Force, which is a federal, state, and local law enforcement task force combating cybercrime. Mr. Bharara also commended the U.S. Attorney’s offices in the following districts: New Mexico, Arizona, Delaware, Massachusetts, California (Central and Southern districts), Florida (Middle district), Georgia (Northern), as well as the Manhattan District Attorney’s Office. He also thanked the following domestic law enforcement partners for their assistance: the New York City Police Department; the Essex, Vermont Police Department; the Eaton, Ohio Police Department; the Butler County, Ohio Sheriff’s Office; the Cedar Bluff, Alabama Police Department; the Modesto, California Police Department; the Louisiana State Police; the Suffolk County, New York Police Department; the Bakersfield, California Police Department; the Kern County, California District Attorney’s Office; the Long Beach, California Police Department; the Louisville, Kentucky Metro Police Department; and the Nelson County, Kentucky Sheriff’s Office.
Mr. Bharara acknowledged and thanked the following international law enforcement agencies: the United Kingdom’s Serious Organised Crime Agency, Royal Military Police, Thames Valley Police, Greater Manchester Police, Leicestershire Police, Hertfordshire Police, and Wiltshire Police; the Australian Federal Police; Bosnia’s Republika Srpska Ministry of Interior; the Bulgarian Ministry of Interior, General Directorate for Combating Organized Crime; the Danish National Police; the Royal Canadian Mounted Police; the French National High-Tech Crime Unit (OCLCTIC) of the Central Directorate of the Police Judiciaire; the German Bundeskriminalamt (BKA); the Italian Polizia di Stato, Compartimento Polizia Postale e delle Comunicazioni; the National Police Agency of Japan, Tokyo Metropolitan Police Department (Cyber Crimes Control Division), Ministry of Justice of Japan, Tokyo High Prosecutors Office, and the Ministry of Foreign Affairs of Japan; the Macedonian Ministry of Interior, Department Against Organized Crime; and the Norwegian National Police for their efforts. He also thanked the Computer Crime and Intellectual Property Section of the Department of Justice, as well as the Office of International Affairs at the Department of Justice.
This case is being handled by the Office’s Complex Frauds Unit. AUSAs James Pastore, Serrin Turner, Timothy Howard, Rosemary Nidiry, Alexander Wilson, and Sarah McCallum are in charge of the prosecution.
The relevant charging documents can be found on the SDNY website at: http://www.justice.gov/usao/nys/pressreleases/index.html.
List of Arrested Defendants Charged in SDNY Complaints
SDNY Complaint Numer
Charges and Maximum Penalties
|Christian Cangeopol, a/k/a “404myth”||12 Mag. 1667||Lawrenceville, Georgia||19||
|12 Mag. 1640||San Diego, California||20||
|Steven Hansen, a/k/a “theboner1”||12 Mag. 1641||Kentucky (in prison in Wisconsin)||23||
|Sean Harper, a/k/a “Kabraxis314”||12 Mag. 1638||Albuquerque, New Mexico||23||
|Ali Hassan, a/k/a “Mr Badoo,” a/k/a “Mr.Badoo,” a/k/a “Badoo”||12 Mag. 1565||Milan, Italy||22||
|Alex Hatala, a/k/a “kool+kake”||12 Mag. 1669||Jacksonville, Florida||19||
|Joshua Hicks, a/k/a “OxideDox”||12 Mag. 1639||Bronx, New York||19||
|Michael Hogue, a/k/a “xVisceral”||12 Mag. 1632||Tucson, Arizona||21||
|Lee Jason Juesheng, a/k/a “iAlert,” a/k/a “Jason Kato”||12 Mag. 1605||Tokyo, Japan||23||
|Peter Ketchum, Jr., a/k/a “iwearaMAGNUM”||12 Mag. 1651||Pittsfield, Massachusetts||21||
|Jarand Moen Romtveit, a/k/a “zer0,” a/k/a “zer0iq”||12 Mag. 1656||Porsgrunn, Norway||25||
|Mir Islam, a/k/a “JoshTheGod”||—||Bronx, New York||18||
Washington, DC, June 26, 2012 – More than year after the National Security Archive sued the CIA to declassify the full “Official History of the Bay of Pigs Operation,” a U.S. District Court judge today sided with the Agency’s efforts to keep the last volume of the report secret in perpetuity. In her ruling, Judge Gladys Kessler accepted the CIA’s legal arguments that, because Volume V was a “draft” and never officially approved for inclusion in the Agency’s official history, it was exempt from declassification under the “deliberative process privilege” despite having been written over 30 years ago.
The National Security Archive called the decision “a regrettable blow to the right-to-know” and vowed to press the Obama administration to force the CIA to adhere to the President’s Executive Order 13526 that “no information shall remain classified indefinitely.”
The volume, titled “CIA’s Internal Investigations of the Bay of Pigs Operations,” was written by CIA historian Jack Pfeiffer in 1981. It forcefully critiqued the scathing investigative report written in the immediate aftermath of the paramilitary attack – by the CIA’s own Inspector General, Lyman Kirkpatrick – which held CIA planners fully responsible for the worst debacle in the Agency’s covert history. In court papers, CIA officials described Pfeiffer’s critique as “a polemic of recriminations against CIA officers who later criticized the operation.”
“When it comes to protecting its own, the CIA appears to have a double-standard on history,” said Peter Kornbluh who directs the National Security Archive’s Cuba Documentation Project which brought the FOIA lawsuit. Kornbluh noted that the CIA had no problem declassifying Volume IV of the official history–also a draft– in which Pfeiffer attacked both President Kennedy for his role in setting restrictions on the overt elements of what was supposed to be a covert, and “plausibly deniable,” operation, as well as Attorney General Robert Kennedy for his role in the Presidential commission, led by Gen. Maxwell Taylor, that investigated the failed invasion.
“Apparently, the CIA sees no problem in the American public reading a ‘polemic of recriminations’ against the White House,” according to Kornbluh. “But the CIA claims ‘historical accuracy’ as a reason to withhold documents critical of its own officials.”
In her ruling, Judge Kessler stated that “disclosure of a draft history would risk public release of inaccurate historical information.” She also cited the arguments of CIA Chief Historian David Robarge that “disclosure of Volume V would have a chilling effect on CIA’s current historians who would henceforth be inhibited from trying out innovative, unorthodox or unpopular interpretations in a draft manuscript.”
But the Archive characterized the CIA’s effort to cast itself as guardian of accurate and honest history as an exercise in cynicism. “The idea that the CIA can advance the cause of accurate historical analysis by hiding history from the peer review of the public is preposterous,” Kornbluh stated. He noted that it was the Agency’s selective declassification of the Pfeiffer volumes that fostered inaccurate historical information. “The real chilling effect of the CIA’s selective cover up is on the public’s ability to access and analyze the complete historical record on the Bay of Pigs.”
The Archive’s lawsuit did yield the release of Volumes I, II, and IV. Volume III was previously released under the Kennedy Assassination Records Act in 1998. Those four volumes can be read here.
The following tables display the current Department of Defense unmanned aircraft systems (UAS) inventory levels (FY2012 budgeted inventory) and planned inventory through FY2017. The first table was taken from the recent Department of Defense Report to Congress on Future Unmanned Aircraft Systems Training, Operations, and Sustainability which was originally obtained and published by InsideDefense.com. The second table displays the total inventories by service.
UAS Inventory Levels (FY12 budgeted inventory with noted exception)
|Service Branch||UAS System Name||Current Inventory||FY12||FY13||FY14||FY15||FY16||FY17|
|Air Force||MQ-1B Predator||163||152||141||130||121||115||110|
|Air Force||MQ-9A Reaper||70||96||135||167||199||229||256|
|Air Force||RQ-4B Global Hawk*||23||23||15||15||15||15||15|
|Army||MQ-1C Gray Eagle||19||45||74||110||138||152||152|
|Navy||RQ-4A Global Hawk||5||5||0||0||0||0||0|
|Navy||RQ-21A Scan Eagle||122||122||122||122||122||122||122|
|Marine Corps||RQ-7B Shadow||52||52||52||52||52||52||52|
|Marine Corps||RQ-21A STUAS||8||8||8||23||48||73||100|
* Reflects RQ-4B Block 20/40 invent0ry remaining after FY 2012 (Block 30 cancelled in President’s 2013 Budget submission).
UAS Total Inventory by Service
|Service Branch||Current Inventory||FY12||FY13||FY14||FY15||FY16||FY17|
ALEXANDRIA, VA—Howard R. Shmuckler, 68, of Virginia Beach, Virginia, was sentenced today to 90 months in prison, followed by three years of supervised release, for running a fraudulent mortgage rescue business that received substantial fees but actually modified clients’ mortgages in only a few cases. The court ordered that this sentence be served consecutive to a 75-month federal sentence Shmuckler received on April 5, 2012 in the District of Columbia involving a counterfeit check scheme.
Neil H. MacBride, United States Attorney for the Eastern District of Virginia; James W. McJunkin, Assistant Director in Charge of the FBI’s Washington Field Office; Jon T. Rymer, Inspector General of the Federal Deposit Insurance Corporation (FDIC-OIG); and Christy Romero, Special Inspector General for the Troubled Asset Relief Program (SIGTARP); made the announcement after sentencing by United States District Judge Leonie M. Brinkema.
“Mr. Shmuckler is a cunning criminal who took advantage of distressed homeowners in desperate need of help,” said U.S. Attorney MacBride. “Today’s sentence should send a clear warning to other fraudsters of the heavy price they will pay for preying on vulnerable people looking for help to save their homes.”
“Mr. Schmuckler portrayed himself as a successful attorney and mortgage advisor who was able to rescue mortgages and provide relief to homeowners, but, in reality, he was a fraud,” said Assistance Director in Charge McJunkin. “The public should be wary of such individuals who offer a service or product that seems too good to be true. It probably is.”
“At a time when homeowners across the nation are struggling to keep their homes, Shmuckler actively targeted the most vulnerable of them with his mortgage modification scam,” said Special Inspector General Romero of SIGTARP. “Shmuckler exploited homeowners desperately seeking support through federal housing programs such as HAMP by essentially guaranteeing the homeowners mortgage modifications in exchange for an upfront fee. Shmuckler performed little, if any, service in return for the fees, and in many cases, the homeowners’ properties fell into foreclosure. SIGTARP and its partners in law enforcement will aggressively shut down these scams and hold their perpetrators accountable for their crimes.”
On April 10, 2012, Shmuckler pled guilty to six counts of wire fraud. According court records, Shmuckler, a convicted felon and disbarred attorney, owned and operated a Vienna, Virginia mortgage-rescue business known as The Shmuckler Group (TSG). From June 2008 through March 2009, TSG took in nearly $2.8 million from approximately 865 clients whose mortgages were in distress and who came to Shmuckler looking for relief. Shmuckler aggressively recruited new clients and pocketed their money while pretending he was successful, was an attorney, and that the business had restructured hundreds of mortgages, stopped hundreds of foreclosures, and negotiated hundreds of short sales. In reality, TSG was able to obtain relief for approximately 4.5 percent of its clients.
Court records indicate that Shmuckler instructed clients to terminate contact with their mortgage companies and to stop making payments to their lenders. TSG never facilitated a modification of the mortgages referenced in the statement of facts filed with his plea agreement.
This case was investigated by the FBI’s Washington Field Office, the FDIC-OIG, and SIGTARP. Assistant United States Attorneys Timothy D. Belevetz and Uzo Asonye are prosecuting the case on behalf of the United States.
A copy of this press release may be found on the website of the United States Attorney’s Office for the Eastern District of Virginia at http://www.justice.gov/usao/vae.
Obama Report on Global Deathcraft
Banal dissimulation. Not a word about the dead and maimed, societies destroyed, waste and ineptitude, withholding secrets from the public. No sympathy for victims, no regret, no apology, no shame for deathcraft commerce and politics.
Coordinated reports on USG political promotion of more financial return and jobs through global deathcraft:
0427.pdf State Promotes Specially Designed Deathcrafts June 15, 2012 0426.pdf BIS Promotes Specially Designed Deathcrafts 2 June 15, 2012 0425.pdf BIS Promotes Specially Designed Deathcrafts 1 June 15, 2012 0423.htm ok US Promotes Jobs by Deathcraft June 15, 2012
The White House
Office of the Press Secretary
For Immediate Release
June 15, 2012
Presidential Letter — 2012 War Powers Resolution 6-Month Report
Dear Mr. Speaker: (Dear Mr. President:)
I am providing this supplemental consolidated report, prepared by my Administration and consistent with the War Powers Resolution (Public Law 93-148), as part of my efforts to keep the Congress informed about deployments of U.S. Armed Forces equipped for combat.
MILITARY OPERATIONS AGAINST AL-QA’IDA, THE TALIBAN, AND ASSOCIATED FORCES AND IN SUPPORT OF RELATED U.S. COUNTERTERRORISM (CT) OBJECTIVES
Since October 7, 2001, the United States has conducted combat operations in Afghanistan against al-Qa’ida terrorists, their Taliban supporters, and associated forces. In support of these and other overseas operations, the United States has deployed combat equipped forces to a number of locations in the U.S. Central, Pacific, European, Southern, and Africa Command areas of operation. Previously such operations and deployments have been reported, consistent with Public Law 107-40 and the War Powers Resolution, and operations and deployments remain ongoing. These operations, which the United States has carried out with the assistance of numerous international partners, have degraded al-Qa’ida’s capabilities and brought an end to the Taliban’s leadership of Afghanistan.
United States Armed Forces are now actively pursuing and engaging remaining al-Qa’ida and Taliban fighters in Afghanistan. The total number of U.S. forces in Afghanistan is approximately 90,000, of which more than 70,000 are assigned to the North Atlantic Treaty Organization (NATO)-led International Security Assistance Force (ISAF) in Afghanistan. In accordance with June 2011 Presidential guidance, the Department of Defense remains on track to achieve a Force Management Level of 68,000 U.S. forces by the end of this summer. After that, reductions will continue at a steady pace.
The U.N. Security Council most recently reaffirmed its authorization of ISAF for a 12-month period until October 13, 2012, in U.N. Security Council Resolution 2011 (October 12, 2011). The mission of ISAF, under NATO command and in partnership with the Government of the Islamic Republic of Afghanistan, is to prevent Afghanistan from once again becoming a safe haven for international terrorists. Fifty nations, including the United States and all 28 NATO Allies, contribute forces to ISAF. These forces, including U.S. “surge” forces deployed in late 2009 and 2010, broke Taliban momentum and trained additional Afghan National Security Forces (ANSF). The ANSF are now increasingly assuming responsibility for security on the timeline committed to at the 2010 NATO Summit in Lisbon by the United States, our NATO allies, ISAF partners, and the Government of Afghanistan.
United States Armed Forces are detaining in Afghanistan approximately 2,748 individuals under the Authorization for the Use of Military Force (Public Law 107-40) as informed by the laws of war. On March 9, 2012, the United States signed a Memorandum of Understanding with the Afghan government under which the United States is to transfer Afghan nationals detained by U.S. forces in Afghanistan to the custody and control of the Afghan government within 6 months. Efforts are underway to accomplish such transfers in a safe and humane manner.
The combat-equipped forces, deployed since January 2002 to Naval Base, Guantanamo Bay, Cuba, continue to conduct secure detention operations for the approximately 169 detainees at Guantanamo Bay under Public Law 107-40 and consistent with principles of the law of war.
In furtherance of U.S. efforts against members of al-Qa’ida, the Taliban, and associated forces, the United States continues to work with partners around the globe, with a particular focus on the U.S. Central Command’s area of responsibility. In this context, the United States has deployed U.S. combat-equipped forces to assist in enhancing the CT capabilities of our friends and allies, including special operations and other forces for sensitive operations in various locations around the world.
In Somalia, the U.S. military has worked to counter the terrorist threat posed by al-Qa’ida and al-Qa’ida-associated elements of al-Shabaab. In a limited number of cases, the U.S. military has taken direct action in Somalia against members of al-Qa’ida, including those who are also members of al-Shabaab, who are engaged in efforts to carry out terrorist attacks against the United States and our interests.
The U.S. military has also been working closely with the Yemeni government to operationally dismantle and ultimately eliminate the terrorist threat posed by al-Qa’ida in the Arabian Peninsula (AQAP), the most active and dangerous affiliate of al-Qa’ida today. Our joint efforts have resulted in direct action against a limited number of AQAP operatives and senior leaders in that country who posed a terrorist threat to the United States and our interests.
The United States is committed to thwarting the efforts of al-Qa’ida and its associated forces to carry out future acts of international terrorism, and we have continued to work with our CT partners to disrupt and degrade the capabilities of al-Qa’ida and its associated forces. As necessary, in response to the terrorist threat, I will direct additional measures against al-Qa’ida, the Taliban, and associated forces to protect
U.S. citizens and interests. It is not possible to know at this time the precise scope or the duration of the deployments of U.S. Armed Forces necessary to counter this terrorist threat to the United States. A classified annex to this report provides further information.
MILITARY OPERATIONS IN IRAQ
The United States completed its responsible withdrawal of U.S. forces from Iraq in December 2011, in accordance with the 2008 Agreement Between the United States of America and the Republic of Iraq on the Withdrawal of United States Forces from Iraq and the Organization of Their Activities during Their Temporary Presence in Iraq.
MILITARY OPERATIONS IN CENTRAL AFRICA
In October and November 2011, U.S. military personnel with appropriate combat equipment deployed to Uganda to serve as advisors to regional forces that are working to apprehend or remove Joseph Kony and other senior Lord’s Resistance Army (LRA) leaders from the battlefield, and to protect local populations. The total number of U.S. military personnel deployed for this mission, including those providing logistical and support functions, is approximately 90. United States forces are working with select partner nation forces to enhance cooperation, information-sharing and synchronization, operational planning, and overall effectiveness. Elements of these U.S. forces have deployed to forward locations in the LRA-affected areas of the Republic of South Sudan, the Democratic Republic of the Congo, and the Central African Republic to enhance regional efforts against the LRA. These forces, however, will not engage LRA forces except in self-defense. It is in the U.S. national security interest to help our regional partners in Africa to develop their capability to address threats to regional peace and security, including the threat posed by the LRA. The United States is pursuing a comprehensive strategy to help the governments and people of this region in their efforts to end the threat posed by the LRA and to address the impacts of the LRA’s atrocities.
MARITIME INTERCEPTION OPERATIONS
As noted in previous reports, the United States remains prepared to conduct maritime interception operations on the high seas in the areas of responsibility of each of the geographic combatant commands. These maritime operations are aimed at stopping the movement, arming, and financing of certain international terrorist groups, and also include operations aimed at stopping proliferation by sea of weapons of mass destruction and related materials. Additional information is provided in the classified annex.
HOSTAGE RESCUE OPERATIONS
As noted to you in my report of January 26, 2012, at my direction, on January 24, 2012, U.S. Special Operations Forces conducted a successful operation in Somalia to rescue Ms. Jessica Buchanan, a U.S. citizen who had been kidnapped by individuals linked to Somali pirate groups and financiers.
MILITARY OPERATIONS IN EGYPT
Approximately 693 military personnel are assigned to the U.S. contingent of the Multinational Force and Observers, which have been present in Egypt since 1981.
U.S.-NATO OPERATIONS IN KOSOVO
The U.N. Security Council authorized Member States to establish a NATO-led Kosovo Force (KFOR) in Resolution 1244 on June 10, 1999. The original mission of KFOR was to monitor, verify, and, when necessary, enforce compliance with the Military Technical Agreement between NATO and the then-Federal Republic of Yugoslavia (now Serbia), while maintaining a safe and secure environment. Today, KFOR deters renewed hostilities in cooperation with local authorities, bilateral partners, and international institutions. The principal military tasks of KFOR forces are to help maintain a safe and secure environment and to ensure freedom of movement throughout Kosovo.
Currently, 23 NATO Allies contribute to KFOR. Seven non-NATO countries also participate. The United States contribution to KFOR is approximately 817 U.S. military personnel out of the total strength of approximately 6,401 personnel, which includes a temporarily deployed Operational Reserve Force.
I have directed the participation of U.S. Armed Forces in all of these operations pursuant to my constitutional and statutory authority as Commander in Chief (including the authority to carry out Public Law 107-40 and other statutes) and as Chief Executive, as well as my constitutional and statutory authority to conduct the foreign relations of the United States. Officials of my Administration and I communicate regularly with the leadership and other Members of Congress with regard to these deployments, and we will continue to do so.