CIA Areas of Interest

From Cryptome.

Spooks, Squid, and the Shat: we certainly have taken a detour through the Twilight Zone recently, haven't we?

Hayden...doesn't he look like Tweetybird? I think it's a chickenhawk commentEvery time I publish something like this and read something like Sec. 158.13 (i) I wonder how long it'll be before some nicely-suited yet jackbooted team in Mormon haircuts beats down my door…but then I realize I live on the Downtown EastSide and if the security here can keep the home-grown junkies out, it can certainly keep the CIA at bay for a few days at least, long enough for the email to get through. Unless they, like the burglar of two years ago, climb into the parking garage and up the chimney of the incinerator to the roof, from whence they lower themselves on ropes. Yeah, they could get in that way. If they were fireproof. Patrick hooked the incinerator back up, just for protective purposes. We shall see how well it works.

20 May 2006

Source: http://www.gpoaccess.gov/cfr/index.html

———————————————————————–
[Code of Federal Regulations]
[Title 32, Volume 1]
[Revised as of July 1, 2003]
From the U.S. Government Printing Office via GPO Access
[CITE: 32CFR158.13]

[Page 629-631]
 
                       TITLE 32–NATIONAL DEFENSE
 
              CHAPTER I–OFFICE OF THE SECRETARY OF DEFENSE
 
PART 158–GUIDELINES FOR SYSTEMATIC DECLASSIFICATION REVIEW OF CLASSIFIED
INFORMATION IN PERMANENTLY VALUABLE DoD RECORDS–Table of Contents
 
Sec. 158.13  Central Intelligence Agency areas of interest.

    (a) Cryptologic, cryptographic, or SIGINT. (Information in this
category shall continue to be forwarded to the NSA/CSS in accordance
with Sec. 158.11(d). The NSA/CSS shall arrange for necessary
coordination.)
    (b) Counterintelligence.
    (c) Special access programs
    (d) Information that identifies clandestine organizations, agents, sources, or methods.
    (e) Information on personnel under official or nonofficial cover or revelation of a cover arrangement.
    (f) Covertly obtained intelligence reports and the derivative information that would divulge intelligence sources or methods.
    (g) Methods or procedures used to acquire, produce, or support intelligence activities.
    (h) CIA structure, size, installations, security, objectives, and budget.
    (i) Information that would divulge intelligence interests, value, or extent of knowledge on a subject. (you mean like this?)
    (j) Training provided to or by the CIA that would indicate its capability or identify personnel.
    (k) Personnel recruiting, hiring, training, assignment, and evaluation policies.(then you need to take your help wanted ads offline)
    (l) Information that could lead to foreign political, economic, or military action against the United States or its allies.
    (m) Events leading to international tension that would affect U.S. foreign policy.(this could be all of the news, every damn day)
    (n) Diplomatic or economic activities affecting national security or international security negotiations.
    (o) Information affecting U.S. plans to meet diplomatic contingencies affecting national security.
    (p) Nonattributable activities conducted abroad in support of U.S. foreign policy.
    (q) U.S. surreptitious collection in a foreign nation that would affect relations with the country.
    (r) Covert relationships with international organizations or foreign governments.
    (s) Information related to political or economic instabilities in a foreign country threatening American lives and installations therein.
    (t) Information divulging U.S. intelligence collection and assessment capabilities.
    (u) U.S. and allies' defense plans and capabilities that enable a foreign entity to develop countermeasures.
    (v) Information disclosing U.S. systems and weapons capabilities or deployment.
    (w) Information on research, development, and engineering that enables the United States to maintain an advantage of value to national security.
    (x) Information on technical systems for collection and production of intelligence, and their use.
    (y) U.S. nuclear programs and facilities.
    (z) Foreign nuclear programs, facilities, and intentions.
    (aa) Contractual relationships that reveal the specific interest and expertise of the CIA.
    (bb) Information that could result in action placing an individual in jeopardy.
    (cc) Information on secret writing when it relates to specific chemicals, reagents, developers, and microdots.
    (dd) Reports of the Foreign Broadcast Information Service (FBIS) (– Branch, –Division) between July 31, 1946, and December 31, 1950, marked CONFIDENTIAL or above.
    (ee) Reports of the Foreign Documents Division between 1946 and 1950 marked RESTRICTED or above.
    (ff) Q information reports.
    (gg) FDD translations.
    (hh) U reports.

Keep on Bloggin'!

Operation Global Media Domination: Life and Times

TIAThank god for the Internet, I say. Not only does it ensure that we need never go Shatnerless, but it also guarantees that, no matter how pathetic, meaningless and ultimately debased our own situations, we can always rely on a fresh supply of inbreds to whom to condescend. I speak as one who adored working retail for a decade because working with the public gave me so many people to whom to feel superior.

Now, having broken the top 170,000 of 40 million on Technorati, I am practically impossible to talk to, even though I've stayed in my pjs, blowing my nose, blogging, snarfing reheated pizza and reading Fark all damn day; call my agent, baby!

Particularly if you are responsible for the following.

Behold a ten-thousand word Wikipedia entry on the seven forms of jedi lightsaber fighting, the eight OTHER forms of jedi lightsaber fighting, and the horrible realization that the author hasn't exchanged physical affection with anyone other than his cats since The Empire Strikes Back.

Just kidding about that last part.

Die Muppet! Geek Rage

Each Jedi chooses the style of lightsaber combat that best suits him or her. For example, Master Yoda uses the Ataru form to compensate for his lack of reach and height, as well as to take advantage of his nearly limitless amount of Force power; Mace Windu uses Vaapad to tap into his anger and employ it constructively (without giving himself over to the dark side); Count Dooku's practice of the Makashi form fits his intention to frequently engage in lightsaber-to-lightsaber combat as well as his emphasis on class, elegance and precision. The Jedi Exile from Star Wars: Knights of the Old Republic II was an expert in many of these forms but never relied on just one. In the game, the Masters remark that he masters their forms very quickly, as if he had studied them for years. While not always, Lightsaber styles are generally taught to the students by the Jedi Battlemasters.

And, lest we forget, the Shat has, as always, some words of wisdom for us. (Sorry Metro, it's just a Shatner kinda day, and damn the loading time!) a side note: has The Shat replaced The Giant Squid as the muse of raincoaster? Better than Blair!

Now I know why Metro won’t answer my emails

From Gawker, which spotted it in Metro NYC:

Homeless and Artists...different?

We suppose we should be glad at least there’s still a distinction.

Blog o’ the Day: ‘Tomlinson v MI6’

This is what a spy looks like, peopleAnd why isn’t a blog by a disgruntled ex-MI6 employee, Russian defector and, evidently, completely vengence-obsessed, egomaniacal asshole bigger news? Because it is unfuckinggoogleable, that is why. Try it: google “Richard Tomlinson,” “blog” and any possible other combination. For a bog-standard Typepad blog, it’s pretty well invisible. I got to it only via googling ‘Richard Tomlinson v MI6’ which is what the Observer says it is called, which it is not btw, which led to a Romanian mirror site archive of Cryptome, which led to the blog. This is, like, way more cloak-and-dagger than most internet searches and, given the way Google works, cannot be accidental. Either Google is experiencing a significant failure or Google is overriding its searches even for people who don’t live in China…and with that, an internet icon falls. The reason people used Google in the first place was you couldn’t buy your way to the front of the line; that you can bully your way there, or bully another person off it, completely negates any advantage Google had. 

According to Cryptome, his first site got shut down when it posted a list of currently active MI6 agents. It’s too bad he doesn’t work for the White House; Rove didn’t even have to use vacation time to testify.

ADVISORY, not for publication:

We have been asked by the secretary of the Defence, Press and Broadcasting Advisory Committee to publish the following:

FOR THE ATTENTION OF ALL EDITORS FROM SECRETARY DEFENCE, PRESS & BROADCASTING ADVISORY COMMITTEE

I understand that a US-based website has today published on the internet a list which identifies a large number of SIS (MI6) officers.

Defence Advisory Notice No 6 asks editors and programme makers to seek advice before publishing such details unless they have been widely disclosed or discussed as such action could put lives at risk.

Departmental officers are examining how the damage of this disclosure can be minimised. While this is in progress, I would ask that editors do not
interpret the information in the website as being widely disclosed and do not, therefore, publish the address or the content of the website without
first contacting the D Notice Secretary, Rear Admiral David Pulvertaft

And here is the inevitable Wired story: File not found. Quel suprise. But, fortunately, archived on Cryptome again:

Secret service eliminates ex-spy’s Web site

A former James Bond wannabe had his Web site shut down by MI6 last week after threatening to expose some of Britain’s top secrets.

Richard Tomlinson’s site aimed to shake up and stir MI6 by identifying its officers and site locations around the world, according to a report in The Mail on Sunday. Tomlinson also warned that he would publish a book synopsis of his own MI6 career –- an act he was jailed for last year.

Top government law officer Anthony Hammond, got the injunction banning the site, which is based in Switzerland, where Tomlinson now lives.

The site, run by Lausanne ISP IPWorldcom, stated: “The objective of MI6 is to steal the secrets of other countries. Most of the secrets are stolen by MI6 officers working abroad under cover as British diplomats.”

The map of MI6 office sites was said to be “coming soon”.

Another page showed Tomlinson wearing a silly hat and grinning in front of the MI6 headquarters at Vauxhall Cross in London.

When the site was opened up it played the theme tune to Monty Python’s Flying Circus.

Last week, Tomlinson said he would appeal against the injunction.

Meanwhile, the cheeky Web wizard had switched the pages to a site run by California-based Geocities.com. Again he was closed down after the Swiss injunction was pointed out to Geocities.

According to Tomlinson, MI6 was breaking the law around the globe by its activities, as well as playing with his liberty.

“They are trying to obstruct my freedom to travel and I have already been banned from entering France, the USA and Australia,” he told the MoS.

“There would be no need to put up this Web site if they stopped messing me about. I have already lost one job by being prevented from entering France.” ®

And here is the story in the Observer that got my attention in the first place. Handing Polly Toynbee her ass is just gonna have to wait for now…

Britain’s Secret Intelligence Service is bracing itself for a fresh series of security leaks about its operations on an internet blog launched by a former top-ranking MI6 officer.

Richard Tomlinson who was jailed in 1998 for breaching the Official Secrets Act, has been quiet since fleeing to Russia in 2001 to publish a book about covert MI6 activities. He is back now and seems intent on taking revenge on the secret service which sacked him in 1995.

Tomlinson, who claims he now lives in the South of France and works as a yacht broker, began the blog last month with a warning: ‘Let the game begin…’

Note, as well, that none of the stories contain links to his actual blog. Which we here at raincoaster global HQ, of course, do.

UPDATE: Blog go bye-bye. Quel Suprise. Still, there’s always Google Cache, isn’t there.

UPDATE UPDATED: Cryptome is reporting that the blog has been shut “by request of HMG which bluffed craven US-based Typepad.com.” No source given for that information; I haven’t had any replies to my emails to Typepad, although on a long weekend I’d be surprised if I see anything at all before Monday. The latest upload of the MI6 spreadsheet that is extant is on Cryptome, from July 31st of this year.

Secret Identity Revealed!!!

NOT mine, fools! Mr. Defamer’s!
Photobucket - Video and Image Hosting
That’s Mr. Defamer, mascot of Gawker Media’s famed Defamer. I thought for the longest time that it was Bob Evans, now-geriatric poster boy for Hollywood excess, workoholism, and assoholism. Then one day Defamer got a makeover and suddenly (as happens so often in these cases) I saw it in a different light. I realized that this man, whoever he was, was no more Bob Evans than he was Bob Roberts.

So I conducted an investigation, involving gruelling seconds of emailing the editor at Defamer and asking, “so who’s that guy, Mr. Defamer Guy?” After many a long minute of uncertainty, I had my answer.

from Mark Lisanti to me

Mr Defamer is Charles Boyer. God, I wish we’d used Evans. Maybe we’ll
switch him in one day.

And there you have it.