%s1 / %s2
 
NEDERLANDS  |  ENGLISH
  • economy
  • iran
  • e-voting
  • 9/11
  • media
  • top stories
  • read
  • news archive
  • by deepjournal
25 August 2010  |     mail this article   |     print   |    |  Cryptome
Twin Threats: Coordinating Regime Change in Iran and Venezuela

Commentary by DeepJournal

What you will find below is a discussion with readers of Cryptome and John Young of Cryptome, a website with a good reputation of providing classified documents (long before WikiLeaks arrived on the scene). Subject of discussion is the document below. It looks like an official document requesting a discussion with Israel on a coordinated attack on Iran.
For a better understanding of the situation surrounding Iran also check out the DeepJournal series on Iran, my (Dutch) book on The Next War - De Volgende Oorlog and the short video I made.
-
A2 writes: Grammatical errors are a classic authenticator in communiques of a certain type, but the type and frequency is what gives authenticity. In other words just because it's a marker for authenticity doesn't mean it is authentic, thus compounding its provenance; which is precisely the intent.

Cryptome: Yes. And there are reports that digital fonts can be marked to persist through formats -- typographers as cryptographers. Which is why the Wikileaks doctoring of the Afghan War Diary files damages their provenance, although it cloaks the source to some extent. Arrangements of words and sentences and headers can indicate source, but Wikileaks claims to take that into account. What comes of the cloaking of source likely renders the material unreliable, except -- always an exception -- the aggregation of files can be used to trace their source, but that too Wikileaks claims to obscure. And there's more yet to be tested. Digital fabrication is so easy and so easily marked that paper trails had to disappear so the new means and methods of marking and tracking could prevail. It is safe to assume there is no digital sanitization possible, only degrees of illusion. The motto of security wizards is to always expect failure, most often self-caused or by your most trusted associate. Thus the essential need to have a culprit ready to be blamed -- initiatives like Wikileaks had to be invented to advance cyberwar strategems and ploys, and, most of all, funding -- hence the synchronicity of WL and similar online formulations with the push for cyberwar funds, hackers, white-gray-black, premier beneficiaries. BTW, Top Secret is no longer top, merely a subterfuge to inspire low-level secret leakers to seed the information flow.

A writes: Question: Do you have confidence in this document? I noticed that it contains several grammar and spelling errors. Not what I would expect of an official document. Just an observation.

Cryptome: We do not vet material. Readers make the call. I saw the errors and know that they are common in the official documents, especially cables and spy reports. I'm told a deft forger always includes errors for credibility.

25 August 2010

 


Twin Threats: Coordinating Regime Change in Iran and Venezuela

*** BEGIN PGP DECRYPTED/VERIFIED MESSAGE ***
P R 081621Z AUG 10
FM SECSTATE WASHDC
TO AMEMBASSY TEL AVIV IMMEDIATE 9798

T O P S E C R E T WASHDC 

NODIS

E.O. 12958: DECL: 08/08/2020

TAGS: MARR, MASS, MCAP, MNUC, MOPS, PBTS, PGOV, PHUM, PINR, PINS, PNAT, PREF, 
PREL, PROP US IS IR CO CS VE
SUBJECT: TWIN THREATS: COODINATING REGIME CHANGE IN IRAN AND VENEZUELA

Classified By: SECSTATE HILLARY R. CLINTON FOR REASONS 1.4 (B) (C) AND (D)

1. (TS) THIS IS AN ACTION CABLE. PLEASE SEE PARAGRAPH 6.

2. (TS) THERE IS SOLID BIPARTISAN CONSENSUS THAT THE IT IS UNACCEPTABLE
THAT IRAN BUILD AND DEPLOY NUCLEAR WEAPONS, THAT IRAN IS SEEKING
THE CAPABILITY TO DEVELOP NUCLEAR WEAPONS AND THE MEANS TO USE THEM,
THAT THE PRESENT REGIME IN IRAN POSES AN EXISTENTIAL THREAT TO ISRAEL, 
AND THEREFORE THAT ISRAEL WOULD BE JUSTIFIED IN MILITARILY PREEMPTING
THE ACQUISITION AND DEPLOYMENT OF NUCLEAR WEAPONS BY IRAN.

3. (TS) IT IS OUR BEST ESTIMATE THAT SUCH A MILITARY STRIKE WOULD SET A CHAIN
OF EVENTS IN MOTION THAT WOULD CUMULATE IN A CHANGE OF REGIME IN IRAN TO 
ONE THAT WOULD NOT BE A THREAT TO ISRAEL, THE UNITED STATES, OR TO US INTERESTS: 
THIS WOULD DEEPEN AND STRENGHTEN THE PROCESS OF BUILDING DEMOCRACY IN THE MIDDLE EAST 
AND SOUTH ASIA, VOUCHSAFING THE NATIONAL SECURITY OF THE UNITED STATES AND OF ISRAEL, 
AND SECURING THE SUPPLY OF OIL TO THE WORLD.

4. (TS) THERE IS ALSO AN EQUALLY SOLID BIPARTISAN CONSENSUS THAT THE REGIME OF
VENEZUELAN PRESIDENT HUGO CHAVEZ POSES A THREAT TO THE NATIONAL SECURITY OF
COLOMBIA AND THE UNITED STATES, AS WELL AS TO PEACE, STABILITY, AND DEMOCRACY IN
THE WESTERN HEMISPHERE, ESPECIALLY AS CHAVEZ MOVES CLOSER TO THE IRANIAN REGIME, 
OFFERS IT A PLATFORM FOR THE EXPORT OF TERRORISM, AND ADDS ITS OWN SUPPORT OF
COLOMBIAN TERRORISTS, AS WELL AS OF THE MAKING AND TRAFFICKING OF ILLICIT DRUGS.

5. (TS) THE UNITED STATES IS DOING ALL THAT IT CAN TO FACILITATE THE RETURN OF DEMOCRACY
TO VENEZUELA VIA THE NATIONAL ASSEMBLY ELECTIONS IN SEPTEMBER; HOWEVER, IF THE
VENEZUELAN REGIME SUCCEEDS IN FRUSTRATING THE RETURN TO DEMOCRACY, THE UNITED STATES
IS PREPARED TO ACT IN CONCERT WITH THE GOVERNMENTS OF COLOMBIA AND COSTA RICA, AS WELL AS WITH
PRO-DEMOCRACY ACTIVISTS IN VENEZUELA AND ELSEWHERE, TO PUT AN END TO THE THREAT THAT THE REGIME
OF HUGO CHAVEZ POSES TO PEACE, STABILITY, AND DEMOCRACY IN THE WESTERN HEMISPHERE.

ACTION REQUEST
--------------

6. (TS) ACTION REQUESTED. POST IS REQUESTED TO COMMUNICATE TO APPROPRIATE HIGH LEVEL
ISRAELI OFFICIALS OUR REQUEST TO COORDINATE OUR EFFORTS TO EFFECT POSITIVE
REGIME CHANGE IN IRAN AND VENEZUELA.  POST IS REQUESTED TO INFORM THE DEPARTMENT OF THE
DATE OF THE REQUEST, THE DATE OF DELIVERY, AND ANY REACTION THERETO. IN DELIVERING THE 
REQUEST POST MAY DRAW UPON THE FOREGOING, AND INDICATE THE WILLINGNESS OF UNITED STATES
OFFICIALS, IF NECESSARY, TO DISCUSS THE MATTER IN PERSON.

THE UNITED STATES WOULD APPRECIATE A COMMUNICATION IN REPLY CONFIRMING THAT ISRAEL AGREES 
WITH THESE UNDERSTANDINGS.

THE UNITED STATES WOULD APPRECIATE AN EARLY REPLY SO THAT IT MAY PROVIDE APPROPRIATE GUIDANCE 
TO ITS FORCES PRIOR TO THE IMPLEMENTATION OF ITS PROGRAM TO BUILD SUPPORT FOR REGIME CHANGE
IN IRAN AND VENEZUELA.

THE UNITED STATES IS PREPARED TO ENGAGE IN ANY NECESSARY CONSULTATION WITH ISRAELI OFFICIALS 
AS MAY BE NECESSARY TO REACH A MUTUALLY SATISFACTORY CLARIFICATION OF THESE POINTS.

CLINTON

NNNN

*** END PGP DECRYPTED/VERIFIED MESSAGE ***

Related: http://www.state.gov/documents/organization/89254.pdf

 

U.S. Department of State Foreign Affairs Handbook Volume 5 Handbook 3 – TAGS/Terms Handbook
5 FAH-3 H-700
E.O. 12958, AS AMENDED, TELEGRAM CLASSIFICATION MARKING

 

[Excerpts]

STEP 1: Classification Level

The overall classification level is determined by the highest classification level of any of the telegram portions: C for Confidential, S for Secret, and TS for Top Secret. Place the overall telegram classification on the E.O. 12958 Line and on all subsequent pages, preferably at the top and bottom of each page. Remember to portion mark all portions of a classified telegram. Unclassified portions of a classified telegram must be marked (U). A portion is ordinarily defined as a paragraph but also includes subject lines, titles, subheadings, tables, or graphs.

STEP 3: Reason for Classification

Information may not be considered for classification unless it concerns one or more of the classification categories set forth in Section 1.4 of E.O. 12958, as amended. The reason(s) for classification must be shown with the “Classified by” information for originally classified documents only. Mark the number “1.4” plus the letter(s) that correspond to the pertinent classification category(ies) below:

1.4(a) military plans, weapons systems, or operations;
1.4(b) foreign government information*;
1.4(c ) intelligence activities, sources, or methods, or cryptology;
1.4(d) foreign relations or foreign activities of the United States, including confidential sources;
1.4(e) scientific, technological or economic matters relating to national security; which includes defense against transnational terrorism;
1.4(f) USG programs for safeguarding nuclear materials or facilities;
1.4(g) vulnerabilities or capabilities of systems, installations, infrastructures, projects or plans, or protection services relating to the national security, which includes defense against transnational terrorism; and
1.4(h) weapons of mass destruction.

* Telegrams containing foreign government information (FGI) shall be marked to indicate the source government and classification level. Example (UK-Secret). If the identity of the source government must be protected, the pertinent portions of the document should be marked “FGI” together with the classification. If the fact that information is foreign government information must be concealed, the markings described shall not be used and the document shall be marked as if it were wholly of U.S. origin.       

____________________________________________________________________________

DeepJournal
Sign up for the free mailing list.
12 September 2013  |  
Why is Syria under attack? - Part 4
When you peek below the surface, it becomes clear that Syria is under attack due to the interests of the parties involved. ‘Syria’ is about power, money, influence and energy.
10 September 2013  |  
Why is Syria under attack? - 3
8 September 2013  |  
Why is Syria under attack? - Part 2
In the event of major military conflicts that risk considerable humanitarian and economic consequences, it is useful to examine the interests of all parties involved as well as the role that the media plays in reporting the events.
7 September 2013  |  
Why is Syria under attack? - Part 1
On the surface it’s straightforward: the U.S. wants to liberate Syria from a brutal dictator who is attacking his own people with poison gas. But beneath the surface there is something very different going on.
28 August 2012
Daan de Wit (DeepJournal) interviewt Webster Tarpley op het Magneetfestival
Het Magneetfestival gaat de diepte in met vier interviews. Daan de Wit interviewt Webster Tarpley, Albert Spits, en Mike Donkers.
Contact - About - Donate - RSS Feeds - Copyright © 2006 DeepJournal, All rights reserved