Tuesday, February 8, 2011

Was Julian Assange Turned by U.S. Intelligence?


February 7-8, 2011 -- Wikileaks founder worked on U.S. intelligence computer espionage system in 1990s

By Wayne Madsen of The Wayne Madsen Report

Wikileaks founder Julian Assange was not always considered a pariah by the U.S. intelligence community. In fact, according to a knowledgeable source who once worked on sophisticated computer security programs for the U.S. intelligence community at Oak Ridge National Laboratory, Assange helped develop, at the time, a state-of-the-art computer surveillance tool for use by the U.S. intelligence community, one that ended up being used by the National Security Agency and CIA.

Assange, according to our source, performed his technical work at Sandia National Laboratories in New Mexico, where the Defense Information Systems Agency (DISA) conducted computer surveillance work in a relatively unclassified setting as compared to the NSA.

Assange's "deal" with the U.S. government at Sandia reportedly occurred in the early 1990s after his arrest by Australian police for breaking into U.S. Defense Department computers.

Hackers as spies


Assange first came to the attention of western intelligence agencies in 1990, when, during Operation Desert Shield, the forerunner to war with Iraq over its invasion of Kuwait, the Hamburg-based Chaos Computer Club, along with computer hackers in the Netherlands and Australia, were caught hacking into U.S. Defense Department computer systems via MILNET links to the ubiquitous ARPANET, a network that linked government research and development agencies to various universities around the world.

In 1987, Assange, at the age of 16, began his hacking career in Australia. He and two colleagues established an underground hacking group called "International Subversives" Assange used the hacker handle of "Mendax," which is Latin for "untruthful." The late 1980s represented a time period when intelligence agencies and law enforcement were playing a catch-up game with hackers -- young people who, in most cases, knew more than even the NSA about how to crack into computer systems. Eventually, in 1991, the Australian Federal Police nabbed Assange as part of "Operation Weather," a law enforcement operation being carried out against hackers. One of Assange's targeted computers was one operated by the U.S. Air Force in the Pentagon. And the hacking took place during Desert Shield/Storm at a time when the Defense Intelligence Agency (DIA) and the CIA began to take the issue of computer hacking more seriously.

It was in 1989 that some computer hackers were suspected of working with foreign intelligence agencies, including the Soviet KGB, to break into western defense computers. Through a link provided by the Chaos Computer Club, a group of German hackers -- Karl Koch, aka "Hagbard;" Markus Hess, aka "Urmel;" Hans Heinrich Hubner, aka "Pengo;" and Dirk-Otto Brezinski, aka "DOB" -- teamed up with hackers at Utrecht University in the Netherlands and in Melbourne, Australia to penetrate U.S. military computers. It was Lawrence Berkeley Laboratory system administrator Clifford Stoll who first discovered the hackers portal into military computers -- at the University of Bremen via the German DATEX-P network into Lawrence Berkeley via Tymnet and out into some 400 military computers from the Ramstein Airbase in Germany to Fort Buckner, Okinawa and the OPTIMIS database at the Pentagon. Koch, or "Hagbard," was found burned to death with gasoline in a forest near Celle, West Germany in 1989. Police ruled the death a suicide.

In October 1998, another Chaos hacker, Boris Floriciz, aka "Tron," was found hanging in a Berlin park. After treating the death as a suicide, police began to treat the death as a homicide after Stern magazine reported that Floriciz had been working for unsavory elements. Floriciz's father reported that his son had been approached by intelligence agents who wanted the hacker to work for them.

In August 2001, Herwart Holland-Moritz, aka "Wau Holland," one of the founders of Chaos, died at age 49 in Hamburg. Holland died after suffering a stroke. In 1987, Holland claimed that Chaos had obtained sensitive data on U.S. weapons systems from NASA VAX 11/785 computers linked to the Space Physics Analysis Network or SPAN.

In 1995, Jean-Bernard Condat, founder of the Chaos Computer Club of France, was discovered to be working for the French domestic intelligence agency, the Direction de la Surveillance du Territoire(DST). According to French investigative journalist Jean Guisnel, Condat began working for DST in 1989. Condat's DST handler went by the cover name "Jean-Luc Delacour."

In his book, "Guerres dans le Cyberespace, Internet et les Services Secrets," Guisnel revealed: "Internet is controlled to the bone by such measures as turning around hackers, systematically bugging computer networks and manipulating newsgroups."

In 2000, Internet Corporation for Assigned Names and Numbers (ICANN), the international organization that assigns Internet domain names, elected Chaos's Andy Mueller-Maguhn as a European regional director.

In 1998, Israeli Prime Minister Binyamin Netanyahu praised an 18 year-old Israeli hacker named Ehud Tenebaum, aka "The Analyzer," who had hacked into Pentagon and NASA computer systems from Tel Aviv via a university modem in Sde Boker in southern Israel. Netanyahu said Tenebaum was "damn good." The leader of the ViRii group, Tenebaum was detained by Israeli police along with two other Israeli hackers and an American, Calidan Levi Coffman of Carson, Washington. The FBI raided the homes of two teen ViRii members in Cloverdale, California but the Justice Department only sought probation in their criminal cases. Federal prosecutors went easy on the Israeli hacker ring even after Attorney General Janet Reno said the United States wouldl treat computer intrusions as "serious crimes".

Deputy Defense Secretary John Hamre said the ViRii attacks on the Pentagon were "the most organized and systematic attack" to date. Targeted by the Israelis were Pentagon personnel and payroll files. As with Assange's deal with Australian intelligence, it was later reported that Tenebaum's plea deal with Israeli authorities involved having him go to work for Israeli intelligence. Israel's apologists in the corporate press likened ViRii's hacking to tossing "electronic spitballs." The hacking attack on the Pentagon as Secretary of State Madeleine Albright was demanding a freeze on Israeli settlements on the West Bank and east Jerusalem and as U.S. forces were preparing for military action against Iraq. The recent Wikileaks disclosures of State Department cables, which includes the selective release of cables on Israeli-Palestinian negotiations, comes amid similar U.S. demands on a freeze on Israeli settlements.

In an indication that Tenebaum's continued his hacking for Israeli intelligence, in 2003, a New Zealand known as "VeNoMouS" was accused of maintaining links with Tenebaum and breaking into the India's Bhabha Atomic Research Center in Mumbai. The hacking attack purged data and stole emails. There were reports that VeNoMouS and hackers linked to him were involved in hacking of Pakistan's nuclear program computer systems. The Pentagon's cyber-security program, as previously reported by WMR, has been thoroughly penetrated at high-levels by Israeli agents-of-influence. John P. Wheeler III, who, as assistant to the Secretary of the Air Force in the Bush administration and later at MITRE Corporation, was involved heavily in the Pentagon's cyber-warfare program, was found dead in a Wilmington, Delaware landfill on December 30 last year.

The Enigmatic Assange

Some in the corporate media similarly praised Assange and Wikileaks for the release of the State Department cables but New York Times managing editor Bill Keller recently expressed regret over his paper's dealings with Assange. Keller said that when relations between the Times and Assange grew frosty, three Times staffers experienced hacking into their email accounts. Keller is obviously unaware of Assange's past work for the U.S. intelligence community and journalistic due diligence by him and his paper would have uncovered what WMR has discovered about Assange and his hacker colleagues before entering into a relationship with Wikileaks and its founder, described by Keller as dressed like a bag-lady and needing a bath.

About the only thing law enforcement and intelligence could do faced with such a new and technologically-advanced hacking threat was to cut deals with hackers who were arrested. The choice for the Australian police was simple: either face prison and a huge fine or come work for law enforcement and intelligence in new computer security divisions and branches. For Assange, the choice was also simple. Sometime between his arrest in 1991 and his being charged in 1994 with 31 criminal charges, six of which were dropped, Assange, according to our source, reported for duty to the Sandia National Laboratory in New Mexico, where under DISA unclassified cover, Assange worked on a system that would permit U.S. intelligence to hack into computer systems through a security hole in fax modems. The program DISA developed for the intelligence community allowed intelligence operators to covertly switch from fax mode to data mode modems connected to computers, permitting computer files to be surreptitiously downloaded. It was via modems that Assange, from Australia, had been able to penetrate Defense Department computers and it was via the fax modem security hole -- the use of fax modems that were on-line and waiting to receive faxes -- that certain U.S. intelligence agencies wanted to be able to accomplish the same task against their intelligence targets.

Upon completion of his task and his return to Australia for his trial, Assange was fined a mere A$2100 and released on bond with the following statement from the judge: "there is just no evidence that there was anything other than sort of intelligent inquisitiveness and the pleasure of being able to—what's the expression—surf --through these various computers."

The judge also mentioned Assange's tough childhood, one in which he was raised in a religious cult, the Santiniketan Park Association, also known as "The Family" and "The Great White Brotherhood" and led by yoga guru Anne-Hamilton Byrne. The Family, in addition to meting out corporal punishment and sleep and food deprivation, subjected the children of cult members to psychotropic drugs, including psychiatric drugs Anatensol, Diazepam, Haloperidol, Largactil, Mogadon, Serepax, Stelazine, Tegretol or Tofranil. Children were also subjected to LSD. WMR has learned that the cult had links to mind control operations run jointly by the CIA and its partner, the Australian Security Intelligence Organization (ASIO). In 1978, the Victoria Police shut down the cult. Thus, Assange's apparent first, albeit involuntary, interaction with an intelligence agency came when he was a child being abused by the Santiniketan cult. The Family of Australia bears striking similarities to another child abuse cult in the United States linked to the CIA: "The Finders."

In October 1990, as more and more U.S. government departments became cognizant of the threat posed by the Chaos hackers and their associates, a meeting of computer security officials from various agencies dealing with classified computer systems was held in a secure room at CIA headquarters in Langley, Virginia. This editor took part in the meeting, representing the State Department's Information System Security Division within the Bureau of Diplomatic Security. Present were representatives from the CIA, FBI, Commerce Department, Defense Department, DIA, and NSA.

The CIA was concerned about the KGB angle to the German Chaos gang and their hacker friends in the Netherlands and Australia. However, after about an hour back-and-forth, the lead FBI representative stood up, his brass belt buckle very prominent along with his gaudy double-knit suit, and assured all attendees that as a lead agent with the FBI's Soviet counter-intelligence branch, he had "everything under control." The name of the FBI agent was Robert Hanssen, arrested on February 18, 2001, for spying for 22 years for the Soviets and Russians.

The media had been reporting on the Chaos-linked hackers since 1987. From ABC News World News Tonight on September 15, 1987, Peter Jennings reported: "There's been another case of computer hackers electronically prying their way into some very secret files. Two West Germans apparently got into a worldwide computer network used by NASA to link space research centers in Europe and Asia. NASA confirms the system was entered, denies the hackersgot any classified information." But on April 25, 1991, the story of thr hacking into military systems during Desert Shield was reported in full by ABC:

"PETER JENNINGS: Once again electronic thieves have managed to break into some of the giant computer systems at American military installations and universities. An ABC News investigation has found that for at least a year now, computer hackers, electronic intruders based in the Netherlands have been cracking the security of American computer systems where they can read sensitive information about military plans and operations. Here's ABC's John Martin.

JOHN MARTIN: [CU DOCUMENTS/GRAPHICS] Documents obtained by ABC News show the hackers got so much information on the Patriot missile, they had to break into several computers just to find a place to store the data. [SOLDIERS] At one point the intruders shut down computers in Wisconsin and Virginia which were later used to mobilize troops for Operation Desert Storm. [BLDG EXT] The CIA considered the theft so serious it convened a special meeting.


FORMER GOVERNMENT OFFICIAL: [SILHOUETTE] There was information gathered from systems, on the Patriot rocket launching system, the Navy's Tomahawk cruise missile, the call up of the military reserves. [TROOPS BOARDING JET] The words they were particularly interested in were 'military', 'nuclear', 'missile'; and 'Desert Storm' or 'Desert Shield'.


JOHN MARTIN: Sources say many of the computer penetrations originated in Geldrop, Holland. [BLDG EXT] Investigators believe the thieves were freelance spies looking for information to sell KGB or Iraqi intelligence. [HACKER ON COMPUTER] One Dutch hacker demonstrated how easy it was. [MAP/GRAPHICS] Using local telephones, the hackerselectronically entered a nearby university computer, then crossed the Atlantic through campus lines to American universities. [VARIOUS BLDGS] From computers here at Bowling Green in Ohio and other campuses, they broke into at least 22 networks: [VARIOUS INSTALLATIONS] The Naval Sea Systems Command, the Army's readiness system at Fort Belvoir, Virginia, the missile research lab at Aberdeen, Maryland. None of the information they got was classified, but the government is worried.


GERALD BURKE: Some of the great achievements in modern espionage that resulted from the collation of seemingly innocuous, unclassified data.


JOHN MARTIN: The government alerted its computer emergency response team.


LARRY DRUFFEL PhD / RESPONSE TEAM LEADER: Anytime that someone is penetrating a system used for military purposes, then you have to assume that they're trying to get information they shouldn't and that's espionage.


JOHN MARTIN: One reason hackers were able to penetrate the computers, poor passwords.


WAYNE MADSEN: All these computer crackers out there know what those passwords are and they know how to basically use them to break into systems.


JOHN MARTIN: [SU] The FBI is on the case, but has run into difficulties. Dutch law does not permit the prosecution of computer hackers unless the information they steal is classified. John Martin, ABC News, Crystal City, Virginia.


PETER JENNINGS: Actually some Dutch think there's nothing wrong with this kind of computer hacking. The Director of Economics at Utrecht University says most Dutch schools actually encourage students to break into other computer systems as part of their training. He says security is the responsibility of the systems' owners."


But what ABC News and no one else knew was that some intelligence agencies, including ASIO in Australia and NSA had decided to co-opt the services of some hackers in order to penetrate their groups and determine the technology they were using to hack into systems. The project with Cornell student Robert Morris, Jr., who was able to launch a disruptive Internet computer worm program in 1988 that brought down a number of computer systems, was one example. Morris's father happened to be Robert Morris, Sr., NSA's chief scientist at the time. The young Morris's "punishment" included working on cracking cryptographic codes used by drug dealers and other hackers. Morris's punishment was similar to the sweetheart deal worked out with Assange in return for his services at Sandia.

Assange continues to play his part in being a "limited hangout" operative for the U.S.intelligence community. The selective leak of over-classified State Department cables from the maximum Secret SIPRNET, cables that report on gossip and open source information gathered from U.S. diplomats and their contacts abroad, have been used to influence events around the world. It is a classic "cognitive infiltration" operation as advocated by White House Office of Information Regulatory Affairs chief Dr.Cass Sunstein, a promoter of Wikipedia and Wikileaks, both used by the intelligence agencies for information and psychological warfare operations.

Perhaps it was no coincidence that in December 2010, the international Pirate Party, which has its beginnings in Sweden, where Assange is wanted on sex charges, and its Austrian branch, offered to host Wikileaks's cache of over 250,000 State Department cables. The Pirate Party, with branches also in Germany, Switzerland, and Luxembourg, has close contacts with the Chaos Computer Club.

Thursday, February 3, 2011

Thieves of the Revolution; Why the U.S. Wants to Elevate Omar Suleiman, Former Head of the Egyptian General Intelligence Directorate


There is no provision in the Egyptian constitution for the vice president to replace a president who is stepping down.  That doesn't bother the United States national security state, the deep state-within-the-state that controls American foreign policy.  They only require the appearance of legitimacy even if they have to create the office itself by imposing an American model that doesn't fully exist in Egypt.  
President Obama himself seems convinced as well that a rapid clean-up of old business is necessary before the usual shell game is put into play to transfer presidential power to yet another puppet, a shell game involving American machinations designed to placate the people of Egypt (if that's even possible), yet untrack any real Egyptian revolution, while it reinforces the pro-Zionist status quo in the immediate aura of Israel.
For that task, American President Barack Obama is reaching out to some strange bedfellows. One might even call them thieves.

February 3, 2011 -- SPECIAL REPORT. 
Obama's gambit: Holding Egypt for Holder
By Wayne Madsen of  The Wayne Madsen Report
WMR has learned from a well-informed political insider that President Obama and Secretary of State Hillary Clinton have waffled on support for Egypt's pro-democracy revolution in order to safeguard a covert U.S.-Egyptian rendition and torture program that dates back to the Clinton administration. In fact, Clinton's Deputy Attorney General, Eric Holder, now Obama's Attorney General, was the first Department of Justice official to write a legal brief authorizing the rendition of alleged terrorists from third countries by the CIA to Egypt for purposes of interrogation and torture.
Holder, who served as Deputy Attorney General under Janet Reno from 1997 to 2001, authorized the first CIA rendition to a third country. In 1995, Talaat Fuad Qassim, a member of al-Gamaa Islamiya, an Islamist group linked to "Al Qaeda's" number two, Egyptian Ayman al Zawahiri, was kidnapped by CIA agents in Croatia and flown to the United States. In 1997, after Holder became Deputy Attorney General, Justice Department prosecutors realized they had no legal right to hold Qassim. Holder, according to our source, went to see President Clinton and told him about the problem with holding Qassim in the United States, stressing that the United States was legally bound to release Qassim. Clinton told Holder to send Qassim to someone else. Holder arranged to have Qassim flown to Egypt where he was put into a small crate, tortured, and eventually executed by Egyptian authorities.
Holder has long been a coddler of torturous regimes. In 2004, while a partner with Covington and Burling, Holder worked out a plea agreement for his client, Chiquita Brands International, in which the firm agreed to pay a fine of $25 million for making cash payments to the Colombian right-wing death squad paramilitary force, the United Self-Defense Forces of Colombia. The AUC carried out systamatic assassinations of trade union activists, peasants, politicians, and leftist guerrillas in Colombia.
In July 1998, Holder signed off on the transport of two members of the Egyptian Jihad, captured by Albanian security forces in Albania, to Cairo by the CIA on a chartered extraordinary rendition aircraft. The Egyptians were tortured and executed.
Egyptian torture methods included hanging prisoners by all four limbs and placing electric nodules on their genitals, nipples, and feet. The CIA paid Egypt handsomely to carry out the torture program.
Holder and White House chief of staff Leon Panetta had signed off on the CIA's pre-9/11 rendition program with Egypt. During his confirmation hearings for Attorney General in May 2009, Holder was asked by Senators Lamar Alexander (R-TN) and Richard Shelby (R-AL)about his role in renditions as Deputy Attorney General for Clinton. Holder admitted that extraordinary renditions occurred during the Clinton administration. However, neither Alexander nor Shelby asked Holder how many individuals were renditioned during his time as Deputy Attorney General. Holder was also not asked what torture countries received the kidnapped prisoners from the United States.
WMR has learned that George W. Bush's chief policy adviser, Karl Rove, restrained Republican senators from delving into too many details with Holder at his confirmation hearing. Rove was aware that the Bush administration also used Egypt as a renditioned prisoner recipient country. But Rove was also concerned about secrets being revealed about his own deals with Sweden to turn terrorist suspects over to the CIA for subsequent torture in Egypt. In December 2001, Sweden arrested Ahmed Agiza and Muhammad al-Zery, two Egyptian asylum seekers who lived in Sweden.
Delivered to CIA agents at Bromma airport outside of Stockholm, the two Egyptians were handcuffed and chained after having suppositories containing drugs inserted into their anuses. The two Egyptians were then flown to Cairo where they were imprisoned and tortured. The rendition plane used was a Gulfstream V, owned by Premier Executive Transport Services, a CIA front company located in Dedham, Massachusetts. The tail number is N379P. The Swedish parliament and the UN later determined that Sweden violatedSwedish and international law, respectively, by transferring the two Egyptians to the CIA and, ultimately to Egypt. Al Zery received $500,000 in compensation from the Swedish government.
Rove has known Holder since President Reagan appointed him as a judge on the Superior Court of the District of Columbia in 1988. All of Reagan's judicial appointments were subject to vetting by Rove and his friends in the right-wing Federalist Society.
CIA's rendition program: started under President Clinton and with Eric Holder's approval.
Rove, who has had a long relationship with Sweden, reportedly phoned then-Swedish Prime Minister Goran Persson and told him that Sweden must hand Agiza and al-Zehy over to the United States. WMR has learned from our source that Swedish Foreign Minister Anna Lindh also received a personal phone call and e-mail from Rove in which it was demanded that the two Egyptians be turned over to the Americans. Lindh was apparently opposed to the request but was overruled by Persson, who was a friend of Bill Clinton and a champion of Clinton's and British Prime Minister Tony Blair's "Third Way' globalist movement. Lindh was stabbed by an assailant in Stockholm on September 10, 2003 and she died from her wounds on September 11. A Serbian-Swede was found guilty of the murder but his conviction was later overturned after he was pronounced mentally ill. There are suspicions that Lindh, an outspoken critic of America's invasion of Iraq and Israel's treatment of the Palestinians, was assassinated by CIA or Egyptian agents who were worried about her knowledge of the CIA's Egyptian and other rendition programs.
The man who ran Egypt's torture program on behalf of the CIA was Omar Suleiman, the feared head of the Egyptian General Intelligence Directorate (EGID), who was named by President Hosni Mubarak as Vice President after the popular rebellion against Mubarak's regime swept Egypt. Suleiman was a recipient of large cash payments from the CIA for EGID's torture of prisoners delivered to Egypt by the CIA under both the Clinton and George W. Bush administrations. Suleiman also maintained close contacts with Mossad on issues dealing with Palestine and Syria. Suleiman also served as a member of a CIA-sponsored group of Arab intelligence service chiefs working against Iran. The group included Suleiman, CIA director Michael Hayden, Jordanian chief Mohamed Dahabi, Saudi intelligence head Prince Moqrin bin Abdulaziz, and United Arab Emirates national security council head Sheikh Hazaa bin Zayed al Nahyan. In 2001, Suleiman personally witnessed the torture of Mamdouh Habib, an Australian citizen renditioned by the CIA from Pakistan to Egypt. Habib was given repeated electric shocks, beaten, and waterboarded as Suleiman looked on. Habib was eventually renditioned again by the CIA from Egypt to Guantanamo, his "confession," obtained under Suleiman's torture techniques, used against him by the United States.
In December 2009, Suleiman traveled to Israel to meet with Netanyahu, Israeli President Shimon Peres, Mossad chief Meir Dagan, Defense Minister Ehud Barak, and Foreign Minister Avigdor Lieberman. Israel had extended an open door to Suleiman and he made several trips to Israel during his tenure as Egypt's to spy. It was Suleiman who tightended Egypt's border controls on Gaza, furthering the misery of the people of the world's largest engineered ghetto.
In 1993, Suleiman ordered his intelligence service to conduct a "census" of all "Arab-Afghans" living in Peshawar, Pakistan, and surrounding areas. They were all veterans of the CIA mujaheddin war against the Soviets in Afghanistan -- Egyptians, Libyans, Yemenis, Jordanians, Palestinians, Algerians, Sudanese, Bahrainis, Tunisians. The census database soon contained thousands of names and Suleiman and his colleague, Saudi intelligence chief Prince Turki bin Faisal, added additional names of Pakistani and Afghan supporters of such Islamist groups as Harkatul Ansar and Ahl al -Hadith, all of whom came under the operational control of CIA and British MI-6 Afghanistan field operative, Osama Bin Laden.  British Foreign Secretary Robin Cook wrote about the census database in The Guardianon July 8, 2005, "Al-Qaida, literally 'the database,' was originally the computer file of the thousands of mujahideen who were recruited and trained with help from the CIA to defeat the Russians." In fact, by conducting the census of the "Arab-Afghans" in Pakistan, the actual founder of "Al Qaeda" is the new Vice President of Egypt, Israel's closest Egyptian friend, Omar Suleiman. No wonder, Mubarak had to cover his tracks by revealing in June 2002, that Suleiman warned his CIA counterparts a week before 9/11 that Bin Laden was in the final stages of launching a major attack on the United States but that no one realized that the plan included the use of passenger planes to attack buildings. Mubarak's and Suleiman's "plausible deniability" protected themselves and the Israelis, especially important since "lead hijacker" Mohammad Atta, was supposedly an Egyptian.
≈≈≈≈
Regardless of the statements from President Obama that Mubarak must leave office "now," it is clear that the waffling by the Obama administration is intended to buy time for the CIA to appropriate the Egyptian government's torture and rendition files that date back to Holder's original authorization of the program. Secretary of State Hillary Clinton's major goal is to limit the damage  to her husband from any disclosure of documents by a new Egyptian reform government about her husband's role in the CIA's use of Egypt to detain and torture prisoners. CIA director Leon Panetta is also trying to avoid the torture rap from his time as President Clinton's chief of staff.
The CIA has embarked on a policy of suppressing the Egyptian revolution until all potentially embarrassing documents and computer files held by Suleiman's EGID and other Egyptian government agencies can be successfully removed from Egypt to the United States.
The CIA recalls how partially shredded and un-shredded classified CIA documents at the U.S. embassy in Tehran were obtained by students who took over the embassy and, unlike the suspiciously-redacted Wikileaks cables, were soon published for the world to see, CIA agents names and all. In fact, the long-cut shredders used to destroy the documents were a blessing for the Iranians who handed the spaghetti-like shreds to Iran's best carpet weavers to reconstruct them in practically their original form. The EGID and other Egyptian intelligence and security agencies have likely amassed tons of files on CIA activities over the past several decades and the potential for the release of documents concerning all the CIA operations that involved Egypt -- the 1980 October Surprise, Iran-contra, CIA arms smuggler Edwin Wilson's operations in Libya, repeated covert efforts against Saddam Hussein in Iraq, arms smuggling by the CIA to other African nations through the warehouse at Cairo West airport, and the CIA's nurturing of "Al Qaeda" for the mujaheddin war in Afghanistan and 9/11 -- has Langley shaking over the possibility that a reform government will reveal the dirty little secrets of the CIA and successive American presidents going back to Ronald Reagan.
The CIA has been behind the scenes in Egypt advising the security forces and army on suppressing the popular uprising in order to delay the clock for Mubarak and his regime. The International Network for Rights and Development reported that three Israeli cargo planes arrived at Cairo's Mina International Airport on January 28 carrying large amounts of gas used for dispersing large crowds. There were also reports of U.S. and Israeli counter-insurgency personnel being dispatched to Egypt to assist the regime in suppressing the rebellion. Other reports emanating from Egypt claimed that Israeli professional provocateurs were among the pro-Mubarak "demonstrators" who attacked peaceful demonstrators in Tahrir Square, resulting in an outbreak of deadly violence on February 3. Israel has a long history of such activities in Egypt, including the infamous 1954 Lavon affair that, if successful, would have seen "false flag" Israeli terrorist attacks on U.S. targets in Cairo that would later be blamed on Egypt, eliciting a military response by the United States on Egypt.
The CIA has a special procurement program that is used to buy sensitive items from foreign governments. "Sterility codes" are used by the CIA to designate the "degree of traceability" that is used for the procurement of off-shore purchases of foreign items, such as crowd control gas from Israel for use by Egypt. The records of the purchases are likely to be found in "Local Procurement" records maintained by the CIA stations in Cairo and Tel Aviv.
The CIA's last-ditch support for the Mubarak regime is strikingly similar to its support for the Shah of Iran in his final days in power. As with the revolt against Mubarak in Egypt, the uprising against Shah Mohammed Reza Pahlavi in 1978 came as a shock to the CIA. On December 2, 1978, two million people filled Tehran's Shahyad (now Azadi) Square demanding that the Shah step down. Almost two million people similarly filled Cairo's Tahrir Square demanding that Mubarak step down. In the months preceding the mass demonstration in Tehran, Iranian security forces massacred thousands of people. Iranian opposition forces claimed that Israel's Mossad provided assistance for the massacres to Iran's feared SAVAK security agency.
The CIA, to the very end, also provided assistance to the Shah's government. Some 75 CIA agents were dispatched to Iran along with more than a hundred private contractor operatives, all retired U.S. military and intelligence operatives. These agents worked closely with members of the Iranian military and SAVAK, many of whom had received training in the United States. Similarly, a number of Egyptian officers and non-commissioned officers, as well as EGID agents, received training in the United States. Just as President Obama dispatched  Frank G. Wisner, Jr., former U.S. ambassador to Egypt and reputed CIA agent-of-influence, to talk to Mubarak, a close friend of Wisner, President Jimmy Carter, in November 1978, asked former U.S. ambassador to Iran and former CIA director Richard Helms, a personal friend of the Shah, to conduct liaison between the White House and the Shah. During his time as CIA director, Helms authorized the training of SAVAK officials in torture techniques. The CIA and Mossad coordinated their pro-Shah efforts in Iran.
As the Shah's position weakened, the Pentagon sent crowd control vehicles to Iran that were equipped with water cannons. Contingency plans were drawn up by the Pentagon and the National Security Council for the U.S. to dispatch troops to Iran to put down the popular rebellion and save the Shah and his Peacock Throne. SAVAK agents were also trained by the CIA to infiltrate anti-Shah groups and report on their plans. Other CIA provocateurs were believed to have infiltrated Iranian student groups that later took over the U.S. embassy in Tehran. There is a belief by many intelligence agents at the time that the most egregious incidents carried out by the students after they took over the embassy and held U.S. personnel hostage were committed by CIA and Mossad infiltrators bent on bringing about a swift U.S. military move against Iran and prevent Ayatollah Khomeini from taking power.
In the world of the CIA, the playbook never seems to change.
Along with the calls for Mubarak to step down now, there should be similar calls across the United States for Eric Holder to pack his bags and leave town.