How Intel for Hire is Making US Intelligence a Threat to the World Part 2
We looked at the top level of the privatized Intel community showing both that companies and actors aren’t working in the public’s interest inside the new privatized Intelligence. Inherently governmental work way beyond spying is contracted out to companies and people who only serve their own self- interest.
Next we need to understand the next level down which is the smaller companies, specialty companies, and practitioners that service the top level. We’ll look at how they fit in and how they work in real life. Then we’ll see how good their MOJO really is. Since the Unmasking Propornot article, I took the time to ask a couple of them about their business relationships. Some of the most damning things will have to wait for part 4 including what should be a slam dunk for one particular company.
I asked Bellingcat’s principals if they are working for and with Ukrainian Intelligence? I asked if they worked with groups that celebrated the lever pullers and torturers of the Holocaust?
I asked them to give their answer with the understanding that ALL of their credibility was resting on their integrity. Their answer shows clearly if anything they have reported should be taken seriously or is part of an Intelligence game. We’ll look at that in part 3 with all the proofs.
In 2016, Tim Shorrock wrote an article describing the 5 Intel giants that control domestic policy, foreign policy, military, and civilian leaders with the products they sell. They create the information. They analyze the information. They decide who to tell the President of the United States is an enemy. They decide and provide products that provide what the pass for proof.
The smaller companies provide the resources for them to work with and base their reports on. In the digital age Intel has become a buyer’s market. If the larger company profits more finding Russian influence at work at a grammar school Christmas play, then that’s where the money is. If you can’t prove it, someone else will.
To tie in how this works, showing how smaller companies function and misbehave, you’ll see real time examples of it.
The top level will be tied in to the lower through the Chertoff Group. We are going to show through a verbal flow chart how the Chertoff Group’s ->The Alliance for Securing Democracy->the German Marshall Fund of the United States -> the Hamilton 68 (Ruskie finding) Dashboard->relates down to the mid level players.
As you read, keep in mind that Michael Chertoff was the Secretary of Homeland Security from 2005–2009. He should be one of the few people in the US that always has their game on when it comes to US Threats and Intel.
Private sector services mirror what they do for government including Intel for hire, espionage, Information Operations, direct action, and state sized propaganda operations. This is work that the government stated on many occasions needs to remain with the agencies that can be held responsible and not companies that aren’t.
The contractors and companies work in and out of US government circles. They work for foreign governments. When they are in the private sector, they have no problem attacking and harassing US citizens as well as the rest of the global community. Wherever their clients point, they fire.
This is the part some of the worst offenders take very seriously. In their own stunted world, they are James Bond and destroying the lives and reputations of innocent people is a service to their country, and keeps their bank accounts flush with money. In their minds, they are this generation’s super-patriots, when in fact, as soon as what they do is opened to inspection, they are common criminals. Part 3 will deal with that aspect.
People with no security clearances and radical political agendas have state sized cyber tools at their disposal and can use them for their own political agendas, private business, and personal vendettas the same way they use Vault 7 for state projects. And this has been going on for over a decade.
In a Sept. 2013 Reuters article,” Jameel Jaffer, deputy legal director at the American Civil Liberties Union, said the reported incidents of NSA employees’ violations of the law are likely “the tip of the iceberg” of lax data safeguards, but that the laws guiding the NSA’s spying authority in the first place are a bigger issue.“If you only focus on instances in which the NSA violated those laws, you’re missing the forest for the trees,” he said. “The bigger concern is not with willful violations of the law but rather with what the law itself allows.”
The companies and individual actors sell information. For some, it’s how they sell their services. They spy on other companies, on regular people, commit espionage against other companies and run information operations against civilians and other things that people in their positions within agencies would spend years in prison for.
Because of the work they do for both the US government and private corporations, no restrictions are put on them. None. Zippo. Zilch. Where they are supposed to be supervised by DNI agencies, in some cases they are supervising themselves and other companies and training DNI agencies to act like them.
Anything marked as “intelligence” is also designated top secret by the all of the DNI agencies. So all Open Source Intelligence products become “top secret” once it is earmarked for an agency.
Here’s the riddle me this concept that will twist your head- What if I was an enterprising young man trying to make my way in the world of spying and after I researched “intelligence,” I sold the Open Source Intelligence I found, or gave it away to my beloved chat group, then re-titled it, and sent a report containing the same “Open Source Intelligence” to the alphabet agency of my choice. What if I was given a commendation as well as a pat on the back? Atta-boy!! is my call sign after all!
In this case no one broke any laws because the information was Open Source and shifted hands before it was earmarked, sent to an agency and classified. This is being done on a regular basis at different levels. It needs to be stopped.
Even though the laws are already there prohibiting these activities, there is literally a gray area of policy and law that these Intel players skirt around and operate in when committing acts against the American people. They identified it and made sure Congress keeps a gap in any laws they testify for as expert witnesses.
What is a gray area? How can you get hurt by something gray?
On September 21st, 2015, Harding posted this advertisement to scale up the war against you.
“Ladies, Gentlemen, and everyone in between.
I am building a database of planners, operators, logisticians, hackers, and anyone wanting to be involved with special activities I will call ‘inform and influence activities’.
I have received a few different suggestions to help organize operations — of all sorts — against anti-Western elements. No government approval, assistance or funding. This skirts legalities. This is not explicitly illegal and it may not even be legal, at this point. That grey area extends a long way.
I am only trying to assess the availability of people willing to participate in such efforts. Technology, equipment and facility offers are also appreciated. If you would like to be included in my database, please send a tailored resume to joel_harding at yahoo.com. In your resume, I am more interested in actual skills and experience. If you have hands on experience of a less than legal nature, you might not want to admit illegal work. If need be, I will contact you for clarification of your skills.”- Joel Harding
This man designed Ukraine’s Information Policy in 2015 and 2016. He is helping to develop what is shaping up to be policy in the US today. Propornot pulled from his list to develop their own. The first industry hotshot that jumped up to help was Aaron Weisburd.
What’s special about these three?
Weisburd, Clint Watts, and JM Berger testify for Congress as Intel and security industry experts. The three of them are responsible for a lot of harm the Intel community is causing to US citizens as well as innocent people across the world. They are widening those gray areas so they can make more money off of you.
In view of that, over 12 years after this was first reported by RJ Hillhouse’s and Tim Shorrock’s articles, we have a problem inside the Intel community where companies and individual parties like Weisburd, Watts, Berger, or Bellingcat’s Aric Toler, or Eliot Higgins train the FBI, CIA, NSA, DIA, NATO, and various other foreign state agencies. They are attacking US and foreign citizens while pursuing their own interests, their company’s bottom line, or for their client’s interest. These attacks have nothing to do with national security or intelligence.
Yet, the information they pass along is included in the President’s Daily Briefing? People with no Intel backgrounds help decide who is an enemy of the state? That’s the reality we are left with even though it sounds like a surreal grade-b movie.
After 15 years in the Intel game, sporty here can’t get a security clearance? Weisburd’s claim to fame was destroying American web properties post 9/11 using illegal hack and threats as the tools of choice.
People with no security clearances are training CIA/FBI/DNI spies, analysts, etc, etc how to do their job. Can someone explain to me how that can possibly work? It makes as much sense as a video game hero trying to tell Seal Team 6 how to operate.
How does someone who doesn’t have a clearance teach someone whose job depends on his clearance how to operate? The reason Intel started getting outsourced in the first place is that the CIA wasn’t going to compromise itself with a vulnerability it didn’t understand (possibly spam emails) at the time. The FBI had absolutely no interest in spying on the American people and refused to do this.
Through the beneficent and deliberate patriotic actions of then Terrorism Czar Richard Clarke, the United States government OUTSOURCED terror Intel to a gift shop cashier who along with her partner took up the slack. It is no exaggeration. One day before she became a world renowned terrorism Intel expert, she was still working her job at the gift shop. Her reports made it unfiltered into the POTUS Daily Briefing (PDB). She hated Iraqis for what they did to her family and wanted to escalate the war.
She was actually the smart one of the bunch. Her partner made headlines in recent years for reasons that show the level of acuity one can expect from people guiding national policies, foreign policy, Intelligence, the Department of Defense, the War on Terror, and the FBI. Both of these people had companies and clients that were pushing the “War on Terror.”
According to a 2015 Guardian article David Cameron called Terrorism expert Steven Emerson and idiot because he claimed on Fox News that non-Muslims do not go to Birmingham, which he said had become a “totally Muslim” city.
When you go through their pronouncements, they were timed and primed to get the most impact and contract work in that time frame.
If Weisburd or his partner Clint Watts sound familiar it’s because it is their work testifying in front of Congress in the spring of 2017 on Russian influence on the 2016 election and in social media that is pushing policy.
Without a security clearance Weisburd, Watts, and company and company have created the narrative every other player is following and passing into media. — Putin did it! All of it! Doesn’t matter what it actually is, Putin did it anyway!
Weisburd and Watts created a lot of the groundwork on which every other Russia attacking Ukraine, Russian hacking, Russian influence meme exists on. Their idea of attacking Russian influence has been to take out American, Canadian, and European English language websites owned by citizens of those countries.
Here’s how the parts tie together.
The special thing about these three experts is that they are the “small players” that developed the ->Hamilton 68 (Ruskie finding) Dashboard for->the German Marshall Fund of the USA that is part of->The Alliance for Securing Democracy->that Michael Chertoff advises.
“From Politico- The dashboard is the product of a research collaboration that includes me, Clint Watts, Aaron Weisburd, Jonathon Morgan and the German Marshall Fund.”
So now we have Michael Chertoff advising and supporting the work of Aaron Weisburd, Clint Watts, JM Berger, and possibly Weisburd partner Joel Harding.
How Good is Their Collective Intelligence Mojo?
It’s just a fact of life at some point, somehow, somewhere, someone is going to take a look at the quality of work you do and decide if it was worth hiring you or if you are just another scam story trying to stay on the federal dole.
This is that day for the Hamilton 68 Dashboard crew of Aaron Weisburd->Clint Watts-> JM Berger-> The German Marshall Plan of the United States->the Alliance for Securing Democracy and the Michael Chertoff and associated Oligarch group.
With this many security pros involved, one of them had to be the designated driver on this baby and they all failed anyway. It should have occurred to at least one of them that their reputation would be entirely shot once their great media product was shown to be a fraud.
Bellingcat, although allied by the narrative and employers seems to be trying to clear the decks for larger contracts. Aric Toler and Eliot Higgins “googled” their way through the logical conclusion that the people called “Russian Trolls” that are destroying American democracy aren’t Russian or on Russian payrolls at all. They are Americans expressing political views and sharing articles.
The sampling that former DHS Secretary Chertoff ‘s Clint Watt’s and Aaron Weisburd’s failed Hamilton 68 Dashboard uses is tiny. If a handful of people can generate the 2nd highest hash tag position, it’s a scam waiting to be busted. This marks the first thing the team of Toler and Higgins have uncovered successfully and provably, without controversy.
So much for being Jedi knights boys. The force is definitely not with you.
In the last few years more and more of them have even taken their actions offline by working with direct action units in other countries that are committing murder. The citable cases include intelligence community actors attacking (online/offline) US citizens on behalf of foreign governments and Intelligence services they work for. Part 4 will detail this. At the same time they work for the US government and the private sector. If their interests are starting to look conflicted, it’s because they are.
How are these people allowed to function and do these things?
From a 2007 Wired article, How Congress Fueled the Rise of Private Spies “You see, contracting companies can do a lot of things federal agencies and their heads cannot; lobby lawmakers (MZM-Foggo-Wilkes-Cunningham style, not simply schmoozing in Hill hearing rooms), fund and operate PACs, build facilities and hire legions of people in strategic legislative districts. I know, I know, you’re shocked, shocked to find gambling going on here . . .’
In return for legitimatizing this multi-billion dollar industry, Congress acting in the best interests of their own pockets and electability, give them what they want every time. The industry players are heavy donors in partisan politics.
There is another quid pro quo that the average Congressman can get. Did you know that the only Congressional Reps or Senators that get to see classified information are their respective Intelligence Committees?
Congress cannot legally look at classified Intelligence if they are not on the Intelligence committee. That makes sense, right? I mean, what’s the sense of calling something top secret if someone like me can get my tiny hands on it?
Today, Congress brags about their private Intel sources that comes from early before-its-had-a-chance-to-be-classified versions of classified reports.
The only thing that is needed to get this back in order is to follow already established laws and or/ for congress to just say no more.
There is so much to the story that what I hoped would end in 3 parts might now become 4. Next up we’ll see real world damage that the Intel for hire is doing in real time and how threatening they can be.