Showing posts with label Pentagon. Show all posts
Showing posts with label Pentagon. Show all posts

Wednesday, October 2, 2013

US Cyber Command: Documents Reveal Pentagon Launching Covert Cyber Attacks



In 2008, the Armed Forces Journal published a prescient piece by Colonel Charles W. Williamson III, a staff judge advocate with the Air Force Intelligence, Surveillance and Reconnaissance Agency at Lackland Air Force Base in Texas, the National Security Agency listening post focused on intercepting communications from Latin America, the Middle East and Europe.

Titled "Carpet bombing in cyberspace," Col. Williamson wrote that "America needs a network that can project power by building an af.mil robot network (botnet) that can direct such massive amounts of traffic to target computers that they can no longer communicate and become no more useful to our adversaries than hunks of metal and plastic. America needs the ability to carpet bomb in cyberspace to create the deterrent we lack."

While Williamson's treatise was fanciful (a DDoS attack can't bring down an opponent's military forces, or for that matter a society's infrastructure), he had hit upon a theme which Air Force researchers had been working towards since the 1980s: the development of software-based weapons that can be "fired" at an adversary, potentially as lethal as a bomb dropped from 30,000 feet.

Two years later, evidence emerged that US and Israeli code warriors did something far more damaging.

Rather than deploying an "af.mil" botnet against Iran's civilian nuclear infrastructure at Natanz, they unleashed a destructive digital worm, Stuxnet. In the largest and most sophisticated attack to date, more than 1,000 centrifuges were sent spinning out of control, "no more useful" to Iranian physicists "than hunks of metal and plastic."

A line had been crossed, and by the time security experts sorted things out, they learned that Stuxnet and its cousins, Duqu, Flame and Gauss, were the most complex pieces of malware ever designed, the opening salvo in the cyberwar that has long-guided the fevered dreams of Pentagon planners.

'Plan X'

Today, that destructive capability exists under the umbrella of US Cyber Command (USCYBERCOM), one which has the potential of holding the world hostage.

Last year the Pentagon allocated $80 million dollars to defense giant Lockheed Martin for ongoing work on the National Cyber Range (NCR), a top secret facility that designs and tests attack tools for the government.

Under terms of the five year contract, Lockheed Martin and niche malware developers have completed work on a test-bed housed in a "specially architected sensitive compartmented information facility with appropriate security protocols" that "emulates the public internet and other networks, and provides for the modeling of cyber attacks."

Originally developed by the Defense Advanced Research Projects Agency (DARPA), the Pentagon's geek squad, NCR has gone live and was transitioned last year to the Office of the Secretary of Defense, federal contracts uncovered by NextGov revealed.

As Antifascist Calling reported back in 2009, "NCR will potentially serve as a new and improved means to bring America's rivals to their knees. Imagine the capacity for death and destruction implicit in a tool that can . . . cause an adversary's chemical plant to suddenly release methyl isocynate (the Bhopal effect) on a sleeping city, or a nuclear power plant to go supercritical, releasing tens of billions of curies of radioactive death into the atmosphere?"

NextGov also reported that the "Pentagon is seeking technology to coordinate and bolster cyberattack capabilities through a funding experiment called 'Plan X,' contract documents indicate."

A notice from DARPA's Information Innovation Office (I2O) informs us that "Plan X is a foundational cyberwarfare program to develop platforms for the Department of Defense to plan for, conduct, and assess cyberwarfare in a manner similar to kinetic warfare. Towards this end the program will bridge cyber communities of interest from academe, to the defense industrial base, to the commercial tech industry, to user-experience experts." (emphasis added)

Although DARPA claims "Plan X will not develop cyber offensive technologies or effects," the program's Broad Agency Announcement, DARPA-BAA-13-02: Foundational Cyberwarfare (Plan X), explicitly states: "Plan X will conduct novel research into the nature of cyberwarfare and support development of fundamental strategies needed to dominate the cyber battlespace. Proposed research should investigate innovative approaches that enable revolutionary advances in science, devices, or systems."

The document also gives notice that DARPA will build "an end-to-end system that enables the military to understand, plan, and manage cyberwarfare in real-time" as an "open platform architecture for integration with government and industry technologies."

The Military & Aerospace Electronics web site reported that DARPA has "chosen six companies so far to define ways of understanding, planning, and managing military cyber warfare operations in real-time, large-scale, and dynamic networks."

Collectively worth some $74 million, beneficiaries of taxpayer largesse include "Data Tactics Corp. in McLean, Va.; Intific Inc. in Peckville Pa.; Raytheon SI Government Solutions in Arlington, Va.; Aptima Inc. in Woburn Mass.; Apogee Research LLC in McLean, Va.; and the Northrop Grumman Corp. Information Systems segment in McLean, Va."

Additional confirmation of US government plans to militarize the internet were revealed in top secret documents provided by former NSA contractor-turned-whistleblower Edward Snowden. Those documents show that the Pentagon's goal of "dominating cyberspace" are one step closer to reality; a nightmare for privacy rights and global peace.

Such capabilities, long suspected by security experts in the wake of Stuxnet, are useful not only for blanket domestic surveillance and political espionage but can also reveal the deepest secrets held by commercial rivals or geostrategic opponents, opening them up to covert cyber attacks which will kill civilians if and when the US decides that critical infrastructure should be been switched off.

Before a cyber attack attack can be launched however, US military specialists must have the means to tunnel through or around security features built into commercial software sold to the public, corporations and other governments.

Such efforts would be all the easier if military specialists held the keys that could open the most secure electronic locks guarding global communications. According to Snowden, NSA, along with their corporate partners and private military contractors embarked on a multiyear, multibillion dollar project to defeat encryption through the subversion of the secure coding process.

Media reports published by Bloomberg Businessweek, The Wall Street Journal and The Washington Post, also revealed that US intelligence agencies are employing "elite teams of hackers" and have sparked "a new arms race" for cyberweapons where the "most enticing targets in this war are civilian--electrical grids, food distribution systems, any essential infrastructure that runs on computers," Businessweek noted.

Confirming earlier reporting, The Washington Post disclosed that the US government "carried out 231 offensive cyber-operations in 2011, the leading edge of a clandestine campaign that embraces the Internet as a theater of spying, sabotage and war, according to top-secret documents" provided by Snowden to the Post.

Since its 2009 stand-up as a "subordinate unified command" under US Strategic Command (USSTRATCOM), whose brief includes space operations (military satellites), information warfare (white, gray and black propaganda), missile defense, global command and control, intelligence, surveillance and reconnaissance (ISR), as well as global strike and strategic deterrence (America's first-strike nuclear arsenal), Cyber Command has grown from 900 personnel to a force that will soon expand to more than "4,900 troops and civilians," The Washington Post reported earlier this year.

Under the USSTRATCOM umbrella, the organization is comprised of "Army Cyber Command (ARCYBER); Air Forces Cyber (AFCYBER); Fleet Cyber Command (FLTCYBERCOM); and Marine Forces Cyber Command (MARFORCYBER)."

"The Command," according to a 2009 Defense Department Fact Sheet, "is also standing up dedicated Cyber Mission Teams" that "conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."

The Defense Department Memorandum authorizing it's launch specified that the Command "must be capable of synchronizing warfighting effects across the global security environment as well as providing support to civil authorities and international partners."

In written testimony to the Senate Armed Services Committee during 2010 confirmation hearings, NSA head General Keith Alexander agreed, and The New York Times reported that Cyber Command's target list would "include civilian institutions and municipal infrastructure that are essential to state sovereignty and stability, including power grids, banks and financial networks, transportation and telecommunications."

But what various "newspapers of record" still fail to report is that the deliberate targeting of civilian infrastructure are war crimes that cause catastrophic loss of life and incalculable suffering, as US attacks on the former Yugoslavia, Iraq and more recently, Libya, starkly demonstrate.

In a portrait of Alexander published earlier this summer by Wired, James Bamford noted that for years the US military has "been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary's equipment and infrastructure, and potentially even to kill."

While the specter of a temporary "interruption of service" haunt modern cities with blackout or gridlock, a directed cyberattack focused on bringing down the entire system by inducing widespread technical malfunction would transform "the vast edifices of infrastructure" into "so much useless junk," according to urban geographer Stephen Graham.

In Cities Under Siege, Graham discussed the effects of post-Cold War US/NATO air bombing campaigns and concluded that attacks on civilian infrastructure were not accidental; in fact, such "collateral damage" was consciously designed to inflict maximum damage on civilian populations.

"The effects of urban de-electrification," Graham wrote, "are both more ghastly and more prosaic: the mass death of the young, the weak, the ill, and the old, over protracted periods of time and extended geographies, as water systems and sanitation collapse and water-borne diseases run rampant. No wonder such a strategy has been called a 'war on public health,' an assault which amounts to 'bomb now, die later'."

A further turn in US Cyber Command's brief to plan for and wage aggressive war, was telegraphed in a 2012 Defense Department Directive mandating that autonomous weapons systems and platforms be built and tested so that humans won't lose control once they're deployed.

There was one small catch, however.

According to Deputy Secretary of Defense Ashton Carter, a former member of the Board of Trustees at the spook-connected MITRE Corporation, the Directive explicitly states it "does not apply to autonomous or semi-autonomous cyberspace systems for cyberspace operations."

Presidential Policy Directive 20: Authorizing 'Cyber-Kinetic' War Crimes

We now know, based on documents provided by Edward Snowden, that President Barack Obama "has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks," according to the 18-page top secret Presidential Policy Directive 20 published by The Guardian.

Though little commented upon at the time due to the avalanche of revelations surrounding dragnet domestic surveillance carried out by NSA, in light of recent disclosures by The Washington Post on America's bloated $52.6 billion 2013 intelligence budget, PPD-20 deserves close scrutiny.

With Syria now in Washington's crosshairs, PPD-20 offers a glimpse into Executive Branch deliberations before the military is ordered to "put steel to target."

The directive averred that Offensive Cyber Effects Operations (OCEO) "can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging."

These are described in the document as "cyber effects," the "manipulation, disruption, denial, degradation, or destruction of computers, information or communications systems, networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon."

To facilitate attacks, the directive gives notice that "cyber collection" will entail "Operations and related programs or activities conducted by or on behalf of the United States Government, in or through cyberspace, for the primary purpose of collecting intelligence--including information that can be used for future operations--from computers, information or communications systems, or networks with the intent to remain undetected."

Such clandestine exercises will involve "accessing a computer, information system, or network without authorization from the owner or operator of that computer, information system, or network or from a party to a communication or by exceeding authorized access."

In fact, PPD-20 authorizes US Cyber Command to "identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power."

Indeed, the "directive pertains to cyber operations, including those that support or enable kinetic, information, or other types of operations . . . that are reasonably likely to result in 'significant consequences'" to an adversary.

We are informed that "malicious cyber activity" is comprised of "Activities, other than those authorized by or in accordance with US law, that seek to compromise or impair the confidentiality, integrity, or availability of computers, information or communications systems, networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon."

In other words, if such activities are authorized by the President acting as Commander-in-Chief under the dubious "Unitary Executive" doctrine, like Richard Nixon, Obama now claims that "when the President does it that means that it is not illegal," a novel reading of the US Constitution and the separation of powers as it pertains to declaring and waging war!

"Military actions approved by the President and ordered by the Secretary of Defense authorize nonconsensual DCEO [Defensive Cyber Effects Operations] or OCEO, with provisions made for using existing processes to conduct appropriate interagency coordination on targets, geographic areas, levels of effect, and degrees of risk for the operations."

This has long been spelled out in US warfighting doctrine and is fully consistent with the Pentagon's goal of transforming cyberspace into an offensive military domain. In an Air Force planning document since removed from the web, theorists averred:

Cyberspace favors offensive operations. These operations will deny, degrade, disrupt, destroy, or deceive an adversary. Cyberspace offensive operations ensure friendly freedom of action in cyberspace while denying that same freedom to our adversaries. We will enhance our capabilities to conduct electronic systems attack, electromagnetic systems interdiction and attack, network attack, and infrastructure attack operations. Targets include the adversary's terrestrial, airborne, and space networks, electronic attack and network attack systems, and the adversary itself. As an adversary becomes more dependent on cyberspace, cyberspace offensive operations have the potential to produce greater effects. (Air Force Cyber Command, "Strategic Vision," no date)

Those plans were made explicit in 2008, when the Air Force Research Lab issued a Broad Agency Announcement entitled Dominant Cyber Offensive Engagement and Supporting Technology, BAA-08-04-RIKA.

Predating current research under "Plan X" to build "an end-to-end system that enables the military to understand, plan, and manage cyberwarfare in real-time," the earlier notification solicited bids from private military contractors to build cyberweapons.

We learned that the Air Force, now US Cyber Command, the superseding authority in the realm of cyberweapons development, a mandate made explicit in PPD-20, was "interested in technology to provide the capability to maintain an active presence within the adversaries information infrastructure completely undetected. Of interest are any and all techniques to enable stealth and persistence capabilities on an adversaries infrastructure."

"This could be a combination of hardware and/or software focused development efforts."

"Following this," the solicitation read, "it is desired to have the capability to stealthily exfiltrate information from any remotely-located open or closed computer information systems with the possibility to discover information with previously unknown existence."

While the United States has accused China of carrying out widespread espionage on US networks, we know from information Snowden provided the South China Morning Post, that NSA and US Cyber Command have conducted "extensive hacking of major telecommunication companies in China to access text messages"; carried out "sustained attacks on network backbones at Tsinghua University, China's premier seat of learning"; and have hacked the "computers at the Hong Kong headquarters of Pacnet, which owns one of the most extensive fibre optic submarine cable networks in the region."

China isn't the only target of US industrial espionage.

Earlier this month, O Globo disclosed that "one of the prime targets of American spies in Brazil is far away from the center of power--out at sea, deep beneath the waves. Brazilian oil. The internal computer network of Petrobras, the Brazilian oil giant partly owned by the state, has been under surveillance by the NSA, the National Security Agency of the United States."

Top secret documents mined from the Snowden cache revealed that NSA employees are trained "step-by-step how to access and spy upon private computer networks--the internal networks of companies, governments, financial institutions--networks designed precisely to protect information."

In addition to Petrobras, "other targets" included "French diplomats--with access to the private network of the Ministry of Foreign Affairs of France--and the SWIFT network, the cooperative that unites over ten thousand banks in 212 countries and provides communications that enable international financial transactions. All transfers of money between banks across national borders goes through SWIFT," O Globo disclosed.

The 2008 Air Force solicitation stressed that the service was interested in "any and all techniques to enable exfiltration techniques on both fixed and mobile computing platforms are of interest. Consideration should be given to maintaining a 'low and slow' gathering paradigm in these development efforts to enable stealthy operation."

The Air Force however, was not solely interested in defense or industrial spying on commercial rivals; building offensive capabilities were viewed as a top priority. "Finally," the solicitation reads, "this BAA's objective includes the capability to provide a variety of techniques and technologies to be able to affect computer information systems through Deceive, Deny, Disrupt, Degrade, Destroy (D5) effects."

As Bloomberg Businessweek reported in 2011, recipients of that Broad Agency Announcement may have included any number of "boutique arms dealers that trade in offensive cyber weapons. Most of these are 'black' companies that camouflage their government funding and work on classified projects."

"Offensive Cyber Effects Operations" will be enhanced through the development and deployment of software-based weapons; the Obama administration's intent in PPD-20 is clear.

The US government "shall identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power, establish and maintain OCEO capabilities integrated as appropriate with other US offensive capabilities, and execute those capabilities in a manner consistent with the provisions of this directive."

Evidence has since emerged these programs are now fully operational.

On the Attack: Economic, Political and Military 'Exploits'

Despite diplomatic posturing and much handwringing from the "humanitarian intervention" crowd, the Obama administration's itchy trigger finger is still poised above the attack Syria button.

The conservative Washington Free Beacon web site reported recently that US forces "are expected to roll out new cyber warfare capabilities during the anticipated military strike on Syria," and that the targets of "cyber attacks likely will include electronic command and control systems used by the Syrian military forces, air defense computers, and other military communications networks."

Whether or not that attack takes place, NSA and US Cyber Command are ramping-up their formidable resources and would not hesitate to use them if given the go-ahead.

This raises the question: what capabilities have already been rolled out?

"Under an extensive effort code-named GENIE, The Washington Post disclosed, "US computer specialists break into foreign networks so that they can be put under surreptitious US control."

According to top secret budget documents provided by Snowden, the Post revealed the "$652 million project has placed 'covert implants,' sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions."

"Of the 231 offensive operations conducted in 2011," the Post reported, "nearly three-quarters were against top-priority targets, which former officials say includes adversaries such as Iran, Russia, China and North Korea and activities such as nuclear proliferation. The document provided few other details about the operations."

As other media outlets previously reported, the Post noted that US secret state agencies "are making routine use around the world of government-built malware that differs little in function from the 'advanced persistent threats' that US officials attribute to China."

One firm featured in Bloomberg Businessweek's cyberwar exposé is Endgame Systems, which first gained notoriety as a result of the 2011 HBGary Federal hack by Anonymous.

The shadowy firm has received extensive funding from venture capitalists such as Bessemer Venture Partners, Columbia Capital, Kleiner Perkins Caufield & Byers and the intelligence-connected Paladin Capital Group.

Endgame is currently led by CEO Nathaniel Flick, previously the CEO of the "nonpartisan" Center for a New American Security (CNAS), a warmongering Washington think tank focused on "terrorism" and "irregular warfare."

Flick replaced Christopher Rouland, Endgame's founder and CEO in December 2012. A former hacker, Rouland was "turned" by the Air Force during the course of a 1990 investigation where he was suspected of breaking into Pentagon systems, Businessweek reported.

The Board of Directors is currently led by Christopher Darby, the President and CEO of the CIA's venture capital arm, In-Q-Tel. Earlier this year, the firm announced that Kenneth Minihan, a former NSA Director and managing partner at Paladin Capital had joined the Board.

According to Businessweek, Endgame specializes in militarizing zero-day exploits, software vulnerabilities which take months, or even years for vendors to patch; a valuable commodity for criminals or spooks.

"People who have seen the company pitch its technology," Businessweek averred, "say Endgame executives will bring up maps of airports, parliament buildings, and corporate offices. The executives then create a list of the computers running inside the facilities, including what software the computers run, and a menu of attacks that could work against those particular systems."

While the United States has accused the Technical Reconnaissance Bureau of China's People's Liberation Army of launching attacks and stealing economic secrets from US networks, American cyberoperations involve "what one budget document calls 'field operations' abroad, commonly with the help of CIA operatives or clandestine military forces, 'to physically place hardware implants or software modifications,'" according to The Washington Post.

"Endgame weaponry comes customized by region--the Middle East, Russia, Latin America, and China--with manuals, testing software, and 'demo instructions.'"

"There are even target packs for democratic countries in Europe and other US allies," Businessweek noted.

Readers will recall that Snowden documents have exposed how NSA has carried out widespread economic and political espionage against erstwhile "friends and allies" such as Brazil, France, Germany, India, the European Union and the United Nations.

Add to that list, Endgame exploits which are solely military in nature; in all probability these have been incorporated into NSA and US Cyber Command's repertoire of dirty tricks.

"Maui (product names tend toward alluring warm-weather locales) is a package of 25 zero-day exploits that runs clients $2.5 million a year," Businessweek reported. "The Cayman botnet-analytics package gets you access to a database of Internet addresses, organization names, and worm types for hundreds of millions of infected computers, and costs $1.5 million."

"A government or other entity could launch sophisticated attacks against just about any adversary anywhere in the world for a grand total of $6 million. Ease of use is a premium. It's cyber warfare in a box."

Sound familiar?

"An implant is coded entirely in software by an NSA group called Tailored Access Operations (TAO)," Snowden documents revealed. "As its name suggests, TAO builds attack tools that are custom-fitted to their targets," according to The Washington Post.

"The implants that TAO creates are intended to persist through software and equipment upgrades, to copy stored data, 'harvest' communications and tunnel into other connected networks" the Post disclosed.

"This year TAO is working on implants that 'can identify select voice conversations of interest within a target network and exfiltrate select cuts,' or excerpts, according to one budget document. In some cases, a single compromised device opens the door to hundreds or thousands of others."

This does much to explain why NSA's parallel, $800 million SIGINT Enabling Project stresses the importance of obtaining total global access and "full operating capacity" that can "leverage commercial capabilities to remotely deliver or receive information."

With "boutique arms dealers" and others from more traditional defense giants along for the ride, NSA and US Cyber Command hope their investment will help "shape the global network to benefit other collection accesses and allow the continuation of partnering with commercial Managed Security Service Providers and threat researchers, doing threat/vulnerability analysis."

"By the end of this year," the Post noted, "GENIE is projected to control at least 85,000 implants in strategically chosen machines around the world. That is quadruple the number--21,252--available in 2008, according to the US intelligence budget."

The agencies are now poised to expand the number of machines already compromised. "For GENIE's next phase, according to an authoritative reference document," the Post disclosed, "the NSA has brought online an automated system, code-named TURBINE, that is capable of managing 'potentially millions of implants' for intelligence gathering 'and active attack'."

It should be clear, given what we have learned from Edward Snowden and other sources, that the US government views the internet, indeed the entire planet, as a battlespace.

In congressional testimony earlier this year, General Alexander told the House Armed Services Committee that "Cyber offense requires a deep, persistent and pervasive presence on adversary networks in order to precisely deliver effects."

"We maintain that access, gain deep understanding of the adversary, and develop offensive capabilities through the advanced skills and tradecraft of our analysts, operators and developers."

With US Cyber Command fully funded and mobilized, those "offensive capabilities" are only a mouse click away.

Monday, May 28, 2012

In Bad Company: Mexico Arrests Three Army Generals, U.S. War for Drugs Continues











Earlier this month, the Mexican government arrested three high-ranking Army generals "including a former second in command at the Defense Ministry," The New York Times reported.

According to multiple press reports, Tomás Ángeles Dauahare, who retired in 2008, was an under secretary at the Defense Ministry during the first two years of President Felipe Calderón's "war" against some narcotrafficking cartels and had even been mentioned as a "possible choice for the top job."

The Times disclosed that in the early 1990s Ángeles "served as the defense attaché at the Mexican Embassy in Washington," a plum position with plenty of perks awarded to someone thought by his Pentagon brethren to have impeccable credentials; that is, if smoothing the way the for drugs to flow can be viewed as a bright spot on one's résumé.

The other top military men detained in Mexico City were "Brig. Gen. Roberto Dawe González, assigned to a base in Colima State, and Gen. Ricardo Escorcia Vargas, who is retired."

Reuters reported that "Dawe headed an army division in the Pacific state of Colima, which lies on a key smuggling route for drugs heading to the United States, and had also served in the violent border state of Chihuahua."

When queried at a May 18 press conference in Washington, "whether and to what extent" these officers participated in the $1.6 billion taxpayer-financed boondoggle known as the Mérida Initiative or had received American training, Pentagon spokesperson Lt. Col. Robert L. Ditchey II tersely told reporters, "We are not going to get into those specifics."

Inquiring minds can't help but wonder what does the Pentagon, or certain three-lettered secret state agencies, have to hide?

CIA-Pentagon Death Squads

Although little explored by corporate media, the CIA and Defense Department's role in escalating violence across Mexico is part of a long-standing strategy by American policy planners to deploy what the late Col. L. Fletcher Prouty called The Secret Team, "skilled professionals under the direct control of someone higher up." According to Prouty, "Team members are like lawyers and agents, they work for someone. They generally do not plan their work. They do what their client tells them to do."

In the context of the misbegotten "War on Drugs," that "client" is the U.S. government and the nexus of bent banks, crooked cops, shady airplane brokers, chemical manufacturers, and spooky defense and surveillance firms who all profit from the chaos they help sustain.

As Narco News disclosed last summer, "A small but growing proxy war is underway in Mexico pitting US-assisted assassin teams composed of elite Mexican special operations soldiers against the leadership of an emerging cadre of independent drug organizations that are far more ruthless than the old-guard Mexican 'cartels' that gave birth to them."

"These Mexican assassin teams now in the field for at least half a year, sources tell Narco News, are supported by a sophisticated US intelligence network composed of CIA and civilian US military operatives as well as covert special-forces soldiers under Pentagon command--which are helping to identify targets for the Mexican hit teams."

"So it should be no surprise," Bill Conroy wrote, "that information is now surfacing from reliable sources indicating that the US government is once again employing a long-running counter-insurgency strategy that has been pulled off the shelf and deployed in conflicts dating back to Vietnam in the 1960s, in Latin America in the 1980s and 1990s, and beyond, and in more recent conflicts, such as in Iraq."

That strategy, as numerous journalists and researchers have reported, provides specialized training and heavy-weapons to neocolonial clients that the imperial Godfather believes will do their bidding. More often than not however, there are serious consequences for doing so.

As The Brownsville Herald revealed nearly a decade ago, the Zetas were the former enforcement arm of Juan García Ábrego's Gulf Cartel; then Mexico's richest and most powerful drug trafficking organization.

During the 1980s, the Gulf group negotiated an alliance with Colombia's Cali Cartel, amongst the CIA's staunchest drug-trafficking allies during the Iran-Contra period. By the 1990s, the Mexican Attorney General's Office estimated that the organization handled as much as "one-third of all cocaine shipments" into the United States from their suppliers and were worth an estimated $10 billion.

But as the Herald disclosed, the Zetas, now considered by the U.S. government to be the "most technologically advanced, sophisticated, and dangerous cartel operating in Mexico" were "once part of an elite division of the Mexican Army, the Special Air Mobile Force Group. At least one-third of this battalion's deserters was trained at the School of the Americas in Fort Benning, Ga., according to documents from the Mexican secretary of defense."

By 2010, the Zetas had broken with their former Gulf partners to become one of the most formidable, and brutal, DTOs in the area. According to published reports, the organization's core operatives include corrupt former federal, state and local police officers, renegade soldiers and ex-Kabiles, the CIA and Pentagon-trained Special Forces of the Guatemalan military, responsible for horrendous atrocities during that country's U.S.-sponsored "scorched earth" campaign against leftist guerrillas; a war which killed an estimated 250,000 people, largely at the hands of the military and right-wing death squads.

Perhaps this is one reason why the Pentagon "won't get into" the "specifics" behind the generals' recent arrests, nor will the Justice Department come clean about the "quid-pro-quo immunity deal with the US government in which they [the Sinaloa Cartel] were guaranteed protection from prosecution in exchange for providing US law enforcers and intelligence agencies with information that could be used to compromise rival Mexican cartels and their operations," as Narco News reported.

While the implications of these policies may be scandalous to the average citizen, they're part of a recurring pattern, one might even say a modus operandi reproduced ad nauseam.

More than three decades ago we learned from Danish journalist Henrik Krüger in The Great Heroin Coup, that the CIA was at the center of the "remarkable shift from Marseilles (Corsican) to Southeast Asian and Mexican (Mafia) heroin in the United States," and that the legendary take-down of the "French Connection" actually represented "a deliberate move to reconstruct and redirect the heroin trade... not to eliminate it." (emphasis added)

A similar process is underway in Mexico today as drug distribution networks battle it out for control over the multibillion dollar market flooding Europe and North America with processed cocaine from South America's fabled Crystal Triangle. In fact, the illicit trade would be nigh impossible without official complicity and corruption, on both sides of the border, and at the highest levels of what sociologist C. Wright Mills called the Power Elite.

Without batting an eye however, the Times told us that the arrest of Mexico's top "drug fighting" generals "is sure to rattle American law enforcement and military officers, who in the best of times often work warily with their Mexican counterparts, typically subjecting them to screening for any criminal ties."

Really?

Not if a U.S. Army Special Operations Forces Field Manual (FM 3-05.130), titled Unconventional Warfare, serves as a guide for the Pentagon's current strategic thinking on the conflict in Mexico. Published in 2008 by WikiLeaks, the anonymous authors informed us that:

Irregulars, or irregular forces, are individuals or groups of individuals who are not members of a regular armed force, police, or other internal security force. They are usually nonstate-sponsored and unconstrained by sovereign nation legalities and boundaries. These forces may include, but are not limited to, specific paramilitary forces, contractors, individuals, businesses, foreign political organizations, resistance or insurgent organizations, expatriates, transnational terrorism adversaries, disillusioned transnational terrorism members, black marketers, and other social or political "undesirables." (Unconventional Warfare, p. 1-3)


From this perspective such "irregular forces" sound suspiciously like today's army of professional contract killers or sicarios, who act as mercenaries for the cartels and as political enforcers for local elites.

According to carefully-crafted media fairy tales, we're to believe that unlike corrupt Federal and local police, the Army, which has deployed nearly 50,000 troops across Mexico are somehow magically immune to the global tide of corruption associated with an illicit trade worth hundreds of billions of dollars annually.

However, ubiquitous facts on the ground tell a different tale. Like their U.S. counterparts in Afghanistan and Iraq, the Mexican Army stands accused of serious human rights violations. And, like marauding U.S. imperial invaders, Mexico's Army regularly carry out illegal detentions, extortion, extrajudicial killings, torture along with the "disappearance" of indigenous and left-wing activists.

Indeed, like their American and NATO counterparts in Afghanistan today, some elements within the Mexican Army have forged highly-profitable alliances with drug traffickers, especially among organized crime groups afforded "cover" by the CIA. But unlike the global godfathers in Washington however, Mexican authorities have brought criminal charges against corrupt officials.

In the Times' report we're informed that "a retired general, Juan Manuel Barragán Espinosa, was detained in February, accused of having leaked information to a drug gang. Another general, Manuel Moreno Avina, and several soldiers he commanded are on charges of murder, torture and drug trafficking in a border town in northern Mexico."

The Houston Chronicle disclosed that the "investigation of the generals reportedly was spurred by informants' testimony linked to the August 2010 arrest of Edgar Valdez Villarreal, the Laredo native known as La Barbie who served as the Beltran Leyva's top enforcer."

According to the Chronicle, "accusations of political motivation--by the generals' wives, lawyers and others--have been raised because of prosecutors' nearly two-year delay in acting on the informant's testimony and because the arrests come less than six weeks ahead of Mexico's presidential elections."

In fact, just days before being taken into custody, Ángeles "participated in a national security conference organized by supporters of presidential front-runner Enrique Peña Nieto, candidate of the Institutional Revolutionary Party, or PRI."

But Ángeles' inconvenient arrest just weeks before contentious national elections isn't the only problem that PRI front-runner Peña Nieto has to worry about.

The Associated Press reported that Peña Nieto's one-time ally, the former governor of the violence-plagued state of Tamaulipas, Tomás Yarrington Ruvalcaba, has been accused in a civil action filed by federal prosecutors in Texas that he "'acquired millions of dollars in payments' while in public office from drug cartels 'and from various extortion or bribery schemes'."

"Yarrington," AP disclosed, "then used various front men and businesses 'to become a major real estate investor through various money laundering mechanisms,' according to documents filed in Corpus Christi."

The former governor "was also named earlier this year in the federal indictment of Antonio Peña Arguelles, who was also charged with money laundering in San Antonio. That indictment alleged that leaders of the Gulf and Zetas cartels paid millions to Institutional Revolutionary Party members, including Yarrington," AP reported.

Curiously enough however, that AP report failed to mention Yarrington's close political ties to politicians on this side of the border. Indeed, according to Digital Journal writer Lynn Herrmann, "Yarrington was at Texas Governor Rick Perry's swearing into office for his first full term in 2003. Prior to that, the Tamaulipas governor was a recipient of a Texas Senate resolution honoring him."

"Even closer was the relationship between Yarrington and President George W. Bush," Herrmann wrote, "a relationship apparently developed when junior was governor of Texas. In 2000, the Los Angeles Times quoted Bush as saying, 'Tomás is terrific, worked with him a lot'."

Now why wouldn't the AP report that?!

While one cannot dismiss that political motivations may lie behind the arrests, salient facts coloring these latest examples of drug war shenanigans again betray that this phony war is being waged not to stamp-out the grim trade but over who controls it.

Another Day, Another Bent General

The arrests were hardly precedent setting if truth be told. Indeed, the best known case of collaboration between the Army and the Cartels was that of Gen. José de Jesús Gutiérrez Rebollo.

After having risen in the ranks to become a Three-Star Divisional Commander in the 1990s, Gutiérrez was appointed by the Attorney General of Mexico during the reign of President Ernesto Zedillo, currently a director of the drug-tainted financial black hole Citigroup, accused of laundering tens of millions of dollars in drug money for Raúl Salinas de Gortari, the brother of Carlos Salinas, the former president of Mexico. With powerful connections, the general became that country's top-ranking drug interdiction officer as head of the Instituto Nacional para el Combate a las Drogas (INCD).

From his perch, Gutiérrez had access to intelligence provided to the government by Mexican and U.S. secret state agencies. The treasure trove of data available to the general and his patrons included files on antidrug investigations, wiretaps on cartel leaders and informant identities.

There was just one small problem.

After receiving a tip that Gutiérrez had moved into an upscale Mexico City neighborhood in an apartment "whose rent could not be paid for with the wage received by a public servant," the Attorney General's Office opened an investigation.

It turned out that Gutiérrez had moved into palatial digs owned by a confederate of Amado Carrillo Fuentes, the legendary head of the Juárez Cartel and "Lord of the Heavens." The drug lord earned that moniker because he moved vast quantities of cocaine into the U.S. aboard a fleet of airplanes purchased from bent brokers on the American side of the border. This too is a recurring pattern, as Daniel Hopsicker revealed during his investigation into the secret history of a fleet of fifty drug planes bought with hot money laundered through U.S. banks.

During the course of their investigation, Mexican authorities obtained a recording of Gutiérrez and Carrillo Fuentes which discussed payments to the General; remuneration for his role in leaving the Juárez Cartel alone, then Mexico's largest drug corporation.

In a 1997 interview with The Boston Globe, Francisco Molina, the former head of the anti-narcotics unit, said that during the change of command, "he personally handed over to Gutiérrez all of Mexico's 'most delicate' drug-fighting information."

"The files included thousands of documents on open investigations," the Globe reported, "pending operations, wire taps and voluminous material on Amado Carrillo Fuentes, the trafficker to whom Gutiérrez was linked."

That information, Molina said, "places many people at risk, and it throws into the garbage the huge amount of resources, money, and time that were spent" on operations. "It's like letting the enemy in to dig around in the files."

And with the U.S. State Department poised to expand the Mexican secret state's access to the latest in communications' intercept technologies as Antifascist Calling recently reported, the Cartels may soon have even more information at their disposal and the wherewithal to strike their adversaries with ruthless efficiency.

'Dirty Warrior' and 'Lord of the Heavens' United in the Great Beyond

It remains to be seen whether the accused military men will suffer the fate of another narco-linked Army commander, retired Gen. Mario Acosta Chaparro.

The Latin American Herald Tribune reported last month that Acosta, "who was convicted of drug-gang ties a decade ago but subsequently exonerated, has died of wounds suffered in a gunshot attack, sources with the capital's district attorney's office said."

According to McClatchy's "Mexico Unmasked" blog, the general was killed "as he descended from his chauffeured vehicle to pick up his Mercedes Benz (how many generals can afford to buy MBs?) in a suburban area of Mexico City. A guy in a motorcycle fired 3 rounds from a 9mm handgun into Acosta's head."

As Antifascist Calling reported in 2010, this was the same general who was shot and wounded in Mexico City during an alleged "robbery attempt." At the time, El Universal reported that police claimed a thief wanted to "steal the general's watch" and shot him several times in the abdomen when he resisted.

It must have been a nice watch.

But with last month's murder it appears that Acosta's past caught up with him. "In 2007," Antifascist Calling reported, "after a six-year imprisonment on charges of providing protection to late drug trafficking kingpin Amado Carrillo Fuentes ... Acosta Chaparro was released from custody after his conviction was overturned on appeal."

Freed on technicalities despite testimony by witnesses under the protection of the Mexican government, documents published by WikiLeaks revealed that the Swiss Bank Julius Baer's Cayman Islands unit hid "several million dollars" of funds controlled by Acosta and his wife, Silvia, through a firm known as Symac Investments.

WikiLeaks wondered whether Mexican authorities would "want to know whether the several millions of USD had anything to do with the allegations that Mr Chaparro, a former police chief from the Mexican state of Guerrero, stopped chasing his local drug dealers and joined them in business."

The secret-spilling web site averred: "With the assistance of Julius Baer, Mr Chaparro was able to invest several millions of USD in Symac with all the secrecy which the Caymans allowed and to draw out some $12,000 a month until he suddenly stopped it in July 1998. The following year, a particularly notorious colleague from the Mexican police became an FBI informer and offered new evidence against him."

During his 2002 trial on drug trafficking and corruption charges one of the witnesses, Gustavo Tarín Chávez testified that Acosta answered a phone call and a voice on the other end of the line said: "Son! How are you? Son!" Tarín Chávez told the court that the only person who called the general "son" was none other then Amado Carrillo Fuentes.

During that call, the late drug lord told Acosta that he had spoken with Rubén Figueroa Alcocer, the former governor of Guerrero, and that "everything was settled."

Multiple reports in the Mexican press subsequently revealed that the general had been given orders to pick up fifty AK-47 assault rifles, thirty semiautomatic pistols, twenty two-way radios and a SUV from Carrillo Fuentes and deliver them to the governor.

Talk about a high-priced errand boy!

Tarín Chávez also testified that Acosta did all the technical planning for the Juárez group and made arrangements for the arrival of Colombian aircraft loaded with cocaine and that this logistics work involved the delivery of vehicles, cash and communications' equipment to other military officers who worked for the drug lord.

Though his case was tossed out by the Mexican Supreme Court due to a "lack of evidence" (perhaps one or all of those witnesses lost their "protection" and "vanished," into an unmarked grave perhaps?), like other close U.S. allies in the "War on Drugs," Acosta had been linked to Mexico's "dirty war" against the left during the 1970s under the administration of President Luis Echeverría.

Echeverría was Interior Minister during President Gustavo Díaz Ordaz's corrupt, repressive regime. Díaz, with much encouragement from the Pentagon, State Department and the CIA, ordered the murders of hundreds of student protesters in the now-infamous Tlatelolco Plaza massacre a few days before the start of the 1968 Summer Olympics.

In 2006, investigative journalist Jefferson Morley and The National Security Archive obtained previously classified documents which revealed "CIA recruitment of agents within the upper echelons of the Mexican government between 1956 and 1969. The informants used in this secret program included President Gustavo Díaz Ordaz and future President Luis Echeverría."

Those documents detailed "the relationships cultivated between senior CIA officers, such as chief of station Winston Scott, and Mexican government officials through a secret spy network code-named 'LITEMPO.' Operating out of the U.S. Embassy in Mexico City, Scott used the LITEMPO project to provide 'an unofficial channel for the exchange of selected sensitive political information which each government wanted the other to receive but not through public protocol exchanges'."

Scott, a strident anticommunist who saw Moscow's "hidden hand" everywhere, suspected that student protests were "a communist controlled rebellion," and argued that the movement represented "a classic example of the Communists' ability to divert a peaceful demonstration into a major riot." Never mind that radical students despised the Stalinist Communist Party of Mexico and viewed them as conservative sell-outs; for Scott and his CIA masters, the fable of an International Communist Conspiracy directed by the Kremlin had to be maintained at all costs.

"As the student protests grew larger," Morley wrote, "Scott's information from the LITEMPO agents informed Ambassador Freeman's increasingly dire cables to Washington, which noted that Díaz Ordaz and the people around him were talking tougher. The government 'implicitly accepts consequence that this will produce casualties,' the ambassador wrote. 'Leaders of student agitation have been and are being taken into custody....In other words, the [government] offensive against student disorder has opened on physical and psychological fronts'."

The rest, as they say, is history. Army units stationed around the perimeter of Tlatelolco Plaza and in the windows of adjoining buildings began to open fire on the protesters; hundreds were killed and more than fifteen hundred people were arrested, many of whom were subsequently tortured and then "disappeared."

Heroin Coups and Iran-Contra Connections

Díaz and Echeverría did more than just ignore crimes perpetrated by the drug and CIA-linked intelligence agency, the Direcciòn Federal de Seguridad, or DFS; in the wake of the massacre, they handed DFS and the Army a blank check to carry out an anti-leftist purge which claimed thousands of lives.

Analyzing the CIA's role in global drug trafficking networks, researcher Peter Dale Scott wrote: "One of the most crime-ridden CIA assets we know of is the Mexican DFS, which the US helped to create. From its foundation in the 1940s, the DFS, like other similar kryptocracies in Latin America, was deeply involved with international drug-traffickers. By the 1980s possession of a DFS card was recognized by DEA agents as a 'license to traffic'."

According to Scott, "DFS agents rode security for drug truck convoys, and used their police radios to check of signs of American police surveillance. Eventually the DFS became so identified with the criminal drug-trafficking organizations it managed and protected, that in the 1980s the DFS was (at least officially) closed down."

Though 90 at the time of this writing, Echeverría, until recently, was considered the éminence grise of Mexican politics. He continued to wield considerable power long after his presidential term ended, mostly through his influence over the "old guard" of the Partido Revolucionario Institucional, or PRI, the special police and army forces stood up under his watch, along with his alleged ties to the drug cartels.

As Scott and Jonathan Marshall disclosed in Cocaine Politics, the "failure" of various anti-trafficking programs such as Operation Condor "were inevitable given the records of the two Mexican presidents" who oversaw the operation.

"Luis Echeverría, under whom the program began," Scott and Marshall wrote, "appears to have been linked to [drug trafficker and CIA asset Alberto] Sicilia Falcón through his wife, whose family members had suspected ties to the European heroin trade." And when José López Portillo "took charge in 1976," Scott and Marshall averred, he "reportedly amassed hundreds of millions of dollars in criminal profits and bought large estates in Spain with the proceeds."

As Henrik Krüger related in The Great Heroin Coup, when he was arrested in 1975, Sicilia Falcón "claimed to be an agent of the CIA, and that his drug ring had been set up on orders and with the support of the agency."

"Part of his profits," Krüger wrote, "were to go towards the purchase of weapons and ammunition for distribution throughout Central America for the destabilization of 'undesirable' governments. If true, U.S. heroin addicts were again footing the bill for clandestine paramilitary operations and anti-Communist terror campaigns."

But the former president's shady connections didn't stop there. Indeed, Echeverría's brother-in-law, Rubén Zuno Arce, was convicted in U.S. Federal District Court in California in 1992 and sentenced to life in prison for his role as a top-tier leader of Miguel Ángel Félix Gallardo's Guadalajara drug cartel and for the torture-murder of U.S. DEA agent Enrique "Kiki" Camarena in 1985.

Camarena had amassed evidence that the CIA and U.S. State Department considered Gallardo "untouchable" because of the "special relationship" forged by the Agency amongst drug traffickers and the Nicaraguan Contras. Scott and Marshall disclosed that "Mexico's biggest smuggler, Miguel Ángel Félix Gallardo, responsible for moving four tons of cocaine a month into the United States, was also 'a big supporter' of the Contras, according to his pilot Werner Lotz. Lotz told the DEA that his boss advanced him more than $150,000 to pass on to the Contras."

In an 1996 PBS interview with former DEA deep-cover specialist turned whistleblower, Michael Levine, the co-host of The Expert Witness Radio Show, Levine related that "Camarena was a DEA agent working on high level drug investigations. He was stationed in Guadalajara, Mexico and his investigations were taking him right into the Contra resupply lines, that is, the Contras trafficking in drugs with the support of the Hondurans, the Mexicans, and everybody else and Enrique was down there working this case with an informer and suddenly he's arrested in broad daylight by Mexican police. He's taken to a ranch of a top Mexican criminal and slowly tortured to death over a 24 hour period."

"And later what is... what's found is Enrique was investigating [Honduran drug lord Juan Ramón] Matta-Ballesteros and Matta-Ballesteros' partner Gallardo and Matta-Ballesteros, by the way, was on the State Department payroll... in spite of being a documented heavy drug trafficker. His airline that we knew was used to traffic drugs, was used on the US government payroll to fly these Contra resupply mission. So here's this murderer who was later convicted of murdering... or conspiring to murder Kiki Camarena and he was on the US government payroll in spite of the fact that the DEA called him a drug trafficker, in spite of the fact that Kiki Camarena was investigating him. Now here's Kiki Camarena investigating the Oliver North supply line and he's tortured to death."

As investigative journalist Robert Parry revealed two years later on the Consortium News web site, Matta-Ballesteros' airline, SETCO, "emerged as the principal company for ferrying supplies to the contras in Honduras."

"During congressional Iran-contra hearings, FDN political leader Adolfo Calero testified that SETCO was paid from bank accounts controlled by Oliver North. SETCO also received $185,924 from the State Department for ferrying supplies to the contras in 1986."

Let's get this straight: Ollie North, a convicted felon who turned a blind eye to drug trafficking Contra networks he helped stand up runs for the U.S. Senate, hosts a "national defense" program on Fox News and earns millions of dollars. "Kiki" Camarena, who's investigating North's criminal assets is brutally murdered by those same "resistance" fighters.

Curiously enough, when Sinaloa Cartel head Joaquín "El Chapo" Guzmán escaped in 2001 from a maximum-security prison during the "reform" administration of Vicente Fox, then the leader of the neoliberal Partido Acción Nacional, or PAN, and whose Federal Police chief was recommended by Luis Echeverría, it emerged that Guzmán once worked for Matta-Ballesteros, Gallardo and Zuno Acre's Guadalajara Cartel.

Small world.

But then again, with the CIA suppressing evidence that they negotiated a quid-pro-quo with the Sinaloa Cartel and can't talk about it because of "national security," or that an FBI drug-trafficking informant was at the center of the Justice Department's gun-walking "Fast and Furious" fiasco and can't be prosecuted, perhaps controlled chaos is just what the Global Godfather wants.

A bent general or two is the least of our problems.