Wednesday, November 26, 2014

New Cyber-Weapon Belies Spy Agencies’ National Security Claims

Nov 26, 2014 by
Cyber-Spies’ New Toy. Courtesy Symantec.
Cyber-Spies’ New Toy. Courtesy Symantec.
Washington’s cyber spies haven’t been resting on their laurels since unleashing the infamous Stuxnet computer worm in 2009.
Now, researchers at antivirus firm Symantec have discovered another advanced cyber-weapon called Regin, which British and American intelligence agencies used to hack into computer systems at the European Union, along with other high-level targets around the world.
The global Regin “hit list” belies the intelligence agencies’ claims that their spying is limited to missions of national security. Nearly half of those targeted were private individuals and small businesses, according to Symantec. The other half included telecom providers, energy companies, airlines, research institutes and the hospitality industry.
Sectors targeted by Regin, according to Symantec.
Sectors targeted by Regin, according to Symantec.
The discovery of the program, which takes over entire networks, came just days before the United Nations adopted a major resolution condemning unlawful and arbitrary government surveillance. The document calls on states to align their surveillance practices with international human rights law, make the frameworks under which they operate publicly accessible and provide victims with opportunities for redress.
And who lobbied hard and unsuccessfully to weaken the resolution’s language? The United States and its “Five Eyes” spying alliance, which includes the U.K., Canada, Australia and New Zealand. Demonstrating just how resistant those nations are to limits on cyber-spying, the Five Eyes argued against provisions in the U.N. statement that called for an end to indiscriminate electronic surveillance.
It’s little wonder, when you understand how powerful the Regin malware is. It is so sophisticated that researchers concluded it could only have been created by nation states. It disguises itself as common Microsoft software while stealing data from infected computers.
Built for Spying
Symantec’s researchers call it a “top tier espionage tool” on par with Stuxnet, the U.S.-Israeli virus responsible for sabotaging nuclear centrifuges at Iran’s Natanz facility in 2009. That malware exploited unpublished vulnerabilities, called “0days,” in Microsoft’s Windows operating system, which allowed it to infect thousands of machines in over 100 countries around the world over.
But upon dissecting its code, researchers found Stuxnet’s’ mission was narrowly targeted at industrial control systems like the kind running inside Iran’s nuclear facility. Even then, the virus reportedly had to be physically implanted via USB sticks by Israeli double agents, believed to have been recruited from the Iranian dissident group Mujahedeen-e-Khalq (MEK).
But while Stuxnet was a tool of sabotage, Regin was explicitly designed for spying.
Last year, documents obtained from Snowden revealed “Operation Socialist,” a top-secret hacking mission undertaken in 2010 by NSA’s British partner GCHQ. The agency successfully infiltrated the computer networks of the Belgian phone and Internet provider Belgacom by tricking its engineers into clicking on a fake LinkedIn page. That gave British spies access to the company’s data, as well as the ability to spy on Belgian Internet customers, which include the European Commission, the European Parliament, and the European Council.[1]  In a separate report, it was revealed that the NSA was also targeting the communications of EU officials.
Antivirus vendors aren’t pointing fingers, but industry sources familiar with the investigations are convinced Regin was the malware found on Belgacom and EU computers following the attacks, linking it back to U.S. and U.K. intelligence agencies.
The giveaway — according to Ronald Prins of Fox IT, the company hired to investigate the Belgacom hack — is UNITEDRAKE and STRAITBIZARRE, tools previously disclosed as part of the NSA’s computer hacking arsenal that match the functionality of components found in Regin. Both are described in top secret documents as tools for installing and managing “implants,” which are essentially bugs that allow spies to remotely monitor and control the machines they’re placed on.
Symantec’s report says that Regin has probably been active since at least 2008, but researchers say some components have timestamps dating as far back as 2003. More than half of the malware’s victims appear to reside inside Russia and Saudi Arabia, but it has also been aimed at Mexico, Ireland, Belgium, Austria, India, Pakistan, and others. Notably absent from the list: the United States and its Five Eyes surveillance allies.
Countries infected by Regin. Courtesy Symantec.
Countries infected by Regin. Courtesy Symantec.
Even security researchers are targets. The security firm Kaspersky Lab identified one victim as cryptography professor Jean-Jacques Quisquater, who, just like Belgacom and the EU, was previously reported as one of the individuals targeted and compromised in the U.S. and U.K. attacks.
Of course, this is not the first time the U.S. and U.K. have been linked to economic and political espionage. Early Snowden files revealed that the NSA had targeted Petrobras, a state-owned oil company in Brazil. Other revelations showed the agencies eavesdropping on German Chancellor Angela Merkel, former Israeli Prime Minister Ehud Olmert, and even charities such as UNICEF.http://whowhatwhy.com/2014/11/26/new-cyber-weapon-belies-spy-agencies-national-security-claims/

Why Is Russia Banning GMOs While the US Keeps Approving Them?

Russia sees GMOs as threat

gmo_no_sign_735_350
There have been marches, vocal demonstrations, petitions, and laws banning GMOs, but the US is still lagging in the ‘democratic’ freedoms it has promised its people. Russia, on the other hand, has completely banned GMOs, placing a moratorium on their imports for 10 years. The nation rejects GMOs due to numerous dangers, while the US continues to allow Monsanto, Dow, Bayer, Syngenta, and their bullying kind to contrive a cold war on the American people.
The VP of Russia’s National Association for Genetic Safety, Irina Ermakova, has said:
“It is necessary to ban GMOs, to impose moratorium (on) it for 10 years. While GMOs will be prohibited, we can plan experiments, tests, or maybe even new methods of research could be developed. It has been proven that not only in Russia, but also in many other countries in the world, GMOs are dangerous. Methods of obtaining the GMOs are not perfect, therefore, at this stage,all GMOs are dangerous. Consumption and use of GMOs obtained in such way can lead to tumors, cancers and obesity among animals. Bio-technologies certainly should be developed, but GMOs should be stopped. We should stop it from spreading. ”
Conversely, the ‘amber waves of grain’ are toxic. They are loaded with more GMO chemicals than ever before, and our government supports this act of tyranny.
The US State Department and executive branch have been acting as marketing agents for the companies who are patenting the most basic seeds necessary for human survival. Hilary Clinton has been caught doing a one-woman campaign to support GMOs like some sort of despotic middle-aged whirligig.
Our elected officials plan to implement DARK (Deny Americans the Right to Know) Act, a bill introduced in Congress earlier this year, which if passed, will preempt state GMO labeling laws. What’s more, president Obama signed the Monsanto Protection Act in 2013 after promising GMO labeling.
The seed industry has a global agenda, and it works its dark plan through the US.
Food and Water Watch recently found out just how deep and reaching the State Department’s agenda to promote biotech goes.
Russian Television (RT) corroborates it:
“After US diplomatic cables released by WikiLeaks showed that the State Department was lobbying worldwide for Monsanto and other similar corporations, a new report based on the cables shows Washington’s shilling for the biotech industry in distinct detail. The August 2011WikiLeaks revelations showed that American diplomats had requested funding to send lobbyists for the biotech industry to hold talks with politicians and agricultural officials in “target countries” in areas like Africa and Latin America, where genetically-modified crops were not yet a mainstay, as well as some European countries that have resisted the controversial agricultural practice.”
Even our universities are in the back pocket of these biotech corporations.
“The annual $500 million budget of Stanford University’s Department of Biological Engineering alone supports dozens of research projects for myriad commercial applications.”
Meanwhile, Vladimir Putin says, “Russia must protect its citizens from GMOs.
Fareed Zakaria once said that, “the Berlin Wall wasn’t the only barrier to fall after the collapse of the Soviet Union and the end of the Cold War. Traditional barriers to the flow of money, trade, people and ideas also fell.”
It seems ironic that in the ‘land of the free’ we cannot democratically oust GMOs, and that our own leaders are now putting up their own walls that would deny us the right to know what is in our food.

CIA Reactions to JFK Assassination Included “Suspicions of Soviet or Cuban Involvement”; Desire to “Bond” with LBJ


Kryptos close-up
“Kryptos” (1990), by James Sanborn, a sculpture containing a message encoded with frequency tables, located at the CIA’s New Headquarters Building. (Photo credit: CIA)
Washington, D.C.  The CIA’s reactions to the November 22, 1963, assassination of President John F. Kennedy — 51 years ago this week — went from initial shock to suspicions of Soviet or Cuban involvement, to increasingly bureaucratic concerns such as the desire to establish a positive “bond” with incoming President Lyndon Johnson, according to a newly declassified internal CIA article published for the first time today by the National Security Archive (www.nsarchive.org).
Fears that Moscow might have masterminded the president’s killing rose sharply when the CIA was unable to locate Soviet Premier Nikita Khrushchev for 24-48 hours afterwards.  Agency officials worried  that he was “either hunkering down for an American reprisal, or possibly preparing to strike the United States.”
This article is one of several from the CIA’s Studies in Intelligence in-house journal that the agency released as a result of litigation by a former CIA official against his former employer.  It appears today as part of an update to a compilation of similar articles the National Security Archive posted in June 2013.
The documents, both those from the original posting as well as the more recent ones, provide insider perspective and accounts of a variety of topics, including:
  • The Presidential ban against CIA assassinations of foreign leaders, first enacted in 1976, which reflected both moral and practical reasons but never spelled out the exact scope of the prohibition
  • A proposal for a far more draconian version of the Intelligence Identities Protection Act – including secret courts for intelligence officers accused of violating that law and criminalizing any revelation or purported revelation of a covert intelligence officer’s identity. (Document 10)
  • A description of how President Kennedy ordered Director of Central Intelligence John McCone to halt his effort to launch a second investigation of the actions of U-2 pilot Francis Gary Powers — who had been shot down during a May 1, 1960 overflight of the Soviet Union. (Document 14)
  • An account of how CIA and Army intelligence analyses in the late 1970s indicated that the U.S. had significantly underestimated North Korean military strength — and derailed President Carter’s plan to withdraw U.S. ground forces from South Korea. (Document 5)
  • A description of the evolution of the CIA’s role in counterterrorism — with the Directorate of Operations initially being the primary component dealing with terrorist issues, and the Directorate of Intelligence eventually emerging in a leading role. (Document 23)
  • A 2004 interview with current Director of the Central Intelligence Agency, John Brennan. (Document 20)
  • An account of the origins of the CIA’s first human intelligence organization — the Office of Special Operations (Document 16).
  • The recollections of Michael J. Morell, who would go on to become Deputy Director of the Central Intelligence Agency, of September 11, 2001, which he spent with President Bush. (Document 22).
  • A description of the origins and applications of U.S. nuclear intelligence by Henry Lowenhaput, whose career in the field lasted for six decades. (Document 18).
The CIA began publishing Studies in Intelligence in 1955 to help build an understanding within the agency of the intelligence profession based on the insights and recollections of practitioners. The items in today’s updated posting fall into a number of categories — legal issues, intelligence analysis, CIA-NSA relations, counterintelligence, interviews, intelligence support and liaison, ‘denied in their entirety,’ the Kennedy assassination, and odds & ends.
New Revelations from Studies in Intelligence Articles
By Dr. Jeffrey T. Richelson
Image, right: Sherman Kent, the “father of intelligence analysis,” with the inaugural issue of Studies in Intelligence. (Photo credit: CIA)
In 1955, at the suggestion of Sherman Kent, the head of the Board of National Estimates, the CIA launched a classified journal, titled Studies in Intelligence, “to promote a sense of professional identity, enhance proficiency, and build knowledge of intelligence cumulatively from the shared insights of its practitioners.”1 The journal soon evolved into a quarterly containing articles whose classification, with rare exceptions, ranged from Unclassified to Secret. While the articles are not official statements of CIA or federal government views or policy, they do represent the thinking and recollections of an assortment of intelligence professionals.
Eventually, the CIA began declassifying some of the articles and releasing them to the National Archives and Records Administration (NARA). In 1992, the agency also published its first unclassified edition of Studies — available to anyone interested. In 2002, the CIA began posting on its website unclassified articles from classified issues of Studies — a practice that continues to this day.
Today, information about and copies of Studies articles can be found on the CIA website – in addition to the 1992 and beyond material. They appear in an index of declassified articles (which apparently only lists articles declassified by the CIA at its initiative); other indices which allow direct access to some of the declassified articles; and the CREST/Electronic Reading Room collection. Apparently not available electronically are articles that have been declassified in response to FOIA/Mandatory Declassification Requests or litigation.
FOIA/MDR and Litigation
Over the last decade, the author filed a series of FOIA requests, starting with a 2002 request for tables of contents of 1997-2002 issues of Studies as well as any unclassified articles that appeared in those issues. (As noted above, the CIA did not post unclassified articles from classified issues until sometime in 2002). Subsequent requests covered tables of contents for 1985-1996, and years subsequent to 2003. Tables of contents for those and other years were also obtained via litigation by the National Security Counselors organization.2
Classified articles of interest whose titles appeared in the declassified tables of contents were then requested under the FOIA. Today’s collection consists of articles obtained from those requests as well as some of the unclassified articles obtained from the 2002 request.
The first posting would have been more extensive had the CIA not denied, over a period of two years, requests (in their entirety) for 17 of 20 articles.3 Four of those articles have since been released as the result of lawsuit on behalf of Jeffrey Scudder a former CIA employee who had filed a FOIA request for hundreds of articles — an act that apparently cost him his job.
The Posted Articles
The 26 posted articles in this briefing book can be grouped into a number of categories — legal issues, intelligence analysis, CIA-NSA relations, counterintelligence, interviews, intelligence support and liaison, ‘denied in their entirety,’ the Kennedy assassination, and odds & ends.
LEGAL
John Brennan, currently CIA director, previously served as director of the Terrorist Threat Integration Center. (Photo credit: CIA)
Legal issues covered in these Studies articles include prepublication review, the protection of the identities of U.S. intelligence officers, and assassination. The prepublication review process is treated (Document 24) by a former Directorate of Intelligence representative to the Publications Review Board, who offers an anodyne view of the process and an extensive list of “myths and realities.”4
The protection of intelligence officer identities is the subject of two articles. One (Document 11) provides a history of the Intelligence Identities Protection Act (IIPA) — from initial proposals, through opposition and revisions, to final passage. Another (Document 10) suggests that the legislation did not go nearly far enough. Thus, the author, who served as a law clerk in the CIA’s Office of General Counsel, asks: “if an intelligence officer may sign away his First Amendment right to free speech, then cannot the same officer also contract away his Sixth Amendment right to a public court?”
With respect to journalists, the author also suggests removing the limitations of the IIPA in prosecuting those who reveal the identity of a covert intelligence officer. While numerous newspapers and books have stated that the IIPA prohibits such disclosure, it actually only prohibits the disclosure by those who have had authorized access to such an identity (e.g. John Kiriakou) or who engage in a “pattern of activities” which seek to undermine/expose the U.S. intelligence effort.5The author suggests criminalizing not only any disclosure but any purported disclosure – so that even an erroneous disclosure would be a criminal offense. Further, his suggested wording for amended legislation would seem to leave open the possibility of prosecution for disclosing information that might lead to such identification even if it was not explicit.
A 1996 article (Document 3) is a significant contrast to post-9/11 legal issues concerning targeted killings. Its focus is on the implications of the prohibition on assassination that appeared in President Gerald Ford’s 1976 executive order and subsequent executive orders on intelligence.6 The article addresses the implications with regard to support for paramilitary operations, coup preparations (addressing the specific case of Panama and Gen. Manual Noriega), counterproliferation operations, and even deception operations directed at individuals — which might result in their imprisonment, torture, or execution by their own government. This is in sharp contrast to the discussion of legal issues in the Justice Department’s white paper on targeted killings, which focuses on the legal justification for a targeted killing of a U.S. citizen.
INTELLIGENCE ANALYSIS
Four articles deal with various aspects of intelligence analysis. In one case (Document 12), the article focuses on a subject of concern to many intelligence analysts during the Cold War – the cost of Soviet defense programs and the burden they imposed on the Soviet economy. Another (Document 17) examines intelligence analysis related to the Strategic Defense Initiative and successor missile defense programs.
A third article (Document 5), is the result of a CIA-funded study at the John F. Kennedy School of Government at Harvard — and illustrates the decades-long difficulty of producing reliable studies and estimates concerning North Korea. It examines the intelligence estimates produced by the CIA and Army concerning North Korean military strength — which significantly altered previous conclusions – and how they ultimately derailed President Carter’s plan to withdraw U.S. ground forces from South Korea.
Also, of contemporary relevance is the article (Document 23) on the inception and evolution of terrorism analysis in the CIA. The author notes that there was little pressure on the agency to produce terrorism analysis during its first quarter-century, and products such as the 1968 special national intelligence estimate, Terrorism and Internal Security in Israel and Jordan “were relative rarities.” The article goes on to describe increasing policy maker interest subsequent to the 1972 murder of Israeli Olympic athletes, and resulting Intelligence Community focus on the issue. He also describes how initially the Directorate of Operations’ clandestine collection activities were the principal element of the CIA’s counterterrorism activities — before the emergence of the Directorate of Intelligence as a key player in that effort.
CIA & NSA
Image, right: James Jesus Angleton, head of counterintelligence and “CIA’s answer to the Delphic Oracle” from 1954-1974. (Photo credit: CIA)
Various works on intelligence have noted both the past competition and present cooperation between the CIA and National Security Agency.7 In “A Brave, New World” (Document 19), the author states that the CIA and NSA “are moving their strategic partnership beyond the optional cooperation of the past into a new era of collaboration,” and notes that the Director of Central Intelligence – George J. Tenet at the time – had viewed much of the success against al-Qaeda and its allies as the “direct result of CIA and NSA working together.”
He goes on to examine the origins of CIA-NSA discomfort in World War II and beyond, barriers to partnership, hints of change, the impact of the September 11, 2001 attacks, tangible results, asks if the partnership would last, and addresses the challenges ahead. Among the challenges identified are the development of joint strategic planning forums, increasing the pace and scope of efforts to find joint solutions to technical problems, and the incorporation of the concerns of line officers.
COUNTERINTELLIGENCE
Two articles address counterintelligence issues during very different portions of the CIA’s history. One (Document 23) addresses the roles of CIA counterintelligence chief (1954-1974) James J. Angleton and KGB defector Anatoliy Golitsyn in promulgating the thesis of widespread and successful Soviet deception against the West (the “Monster Plot”) and their impact on CIA operations and personnel. Among those whose lives or careers suffered were former KGB officer Alexandr Cherepanov (who was executed after the U.S. embassy returned materials he had provided), Yuri Nosenko (who was incarcerated by the CIA), and CIA officers Richard Kovich and David Murphy, who would each come under suspicion of being a Soviet mole. 8
Another treatment of counterintelligence (Document 21), by former chief of the National Clandestine Service Michael J. Sulick, focuses on counterintelligence in the counterterrorist effort. He argues that, because of how history played out, while counterintelligence failures during the Cold War were never exploited by the Soviet Union to launch attacks, similar failures against terrorist groups could result in “catastrophic” damage. Sulick goes on to discuss several topics: how terrorist groups operate like intelligence services; terrorist attempts to infiltrate their targets; the fact that there are now “more employees to worry about” because “personnel and facilities must also be defended from individuals with minimal or no clearance;” terrorist denial and deception; intelligence sharing; and further steps to be taken.
INTERVIEWS
Image of Document 8 (“Passing the Intelligence Identities Protection Act,” 1982)
Numerous issues of Studies have contained interviews with former or current senior intelligence personnel. In 1999, Studies published an extensive interview with John M. McMahon (Document 14), who joined the CIA in 1951, and eventually became Deputy Director for Operations, Deputy Director for Intelligence, and finally Deputy Director of Central Intelligence before retiring in 1986.
The interview covers his first years with the CIA in Germany, the U-2 program, the battle during the 1960s with the National Reconnaissance Office over satellite reconnaissance systems, a number of his senior positions (including DDO, DDI, and DDCI), relations with Congress, and covert action with regard to Iran and Afghanistan. With regard to U-2 pilot Francis Gary Powers (who was shot down in May 1960 over the Soviet Union, captured, and subsequently exchanged), he “did exactly what he was told,” McMahon noted. He went on to state that DCI John McCone was not convinced and planned to have Powers investigated for a second time – by the Air Force Office of Special Investigations – until President John F. Kennedy called McCone and ordered him not to pursue the matter.
The following year, Studies published an interview with then NSA director Lt. Gen. Michael V. Hayden (Document 15). Hayden spoke, inter alia, about his attempts to bring significant change to NSA, the impact of telecommunications change on NSA ( “our technological adversary is not a nation state but the global telecommunications industry”), the relationship between NSA and CIA, signals intelligence requirements, and limitations on NSA support to military commanders.
In 2004, current Director of the Central Intelligence Agency and then-director of the Terrorist Threat Integration Center (the predecessor of the National Counterterrorism Center) John Brennan was interviewed by Studies (Document 20) — an interview which focused on terrorism analysis. Brennan noted the TTIC had access to 26 unclassified and classified networks, and discussed whether “counterterrorism analysis” would represent a distinct career track; TTIC organization and practices as a model for the Intelligence Community; the need to break down the distinction between foreign and domestic intelligence; the distribution of terrorism analysis in the Intelligence Community; and information sharing.
Two additional interviews were conducted with former NSA Director and Deputy Director of Central Intelligence William O. Studeman (Document 2) and former NSA Deputy Director William Crowell (Document 1). The interviews focus on both internal Intelligence Community issues as well as public and Congressional attitudes concerning the Intelligence Community.
INTELLIGENCE SUPPORT & LIAISON
Three articles deal with three aspects of intelligence support and liaison. One focuses on intelligence support to Congress, another on support to policymakers, and the third on support to military commanders. In “CIA’s Intelligence Sharing with Congress” (Document 6), the author describes “the phenomenon of the President’s own finished intelligence being used by Congress to question and attack the President’s foreign policy initiatives.” Specific examples include Indochina (during the Nixon administration), the Persian Gulf, and Haiti.
CIA support to executive branch policymakers is the subject of a 1998 article (Document 9), written by a CIA official who spent two years as the agency’s liaison to the State Department’s Ambassador-at-Large for the New Independent States — a position established “to improve the CIA’s ability to understand the policy priorities and concerns of the bureau.” Half of the four-page article is devoted to the author’s specification of six ways in which CIA support for senior policymakers could be improved — which include “living with the customer” and “early bird service.”
Intelligence support to military forces, in the form of National Intelligence Support Teams (NISTs) is the subject of an article (Document 8) in a 1998 issue of Studies. The author reviews the background and operation of NISTs, which combined personnel and provided support from key national and defense intelligence agencies (including CIA, the Defense Intelligence Agency, the National Security Agency, and the National Imagery and Mapping Agency) and provide support to commanders of joint task forces such as those involved with Operations UPHOLD DEMOCRACY (Haiti) and JOINT ENDEAVOR (Bosnia). In addition, the author makes a number of suggestions for improvements.
THE KENNEDY ASSASSINATION AND THE DCI
The posted article (Document 26) was drawn from a classified history of John McCone’s tenure as Director of Central Intelligence (1961-1965). One part focuses on the initial investigation of a possible conspiracy — domestic or foreign — and McCone’s role. It notes that the CIA’s “inability to locate Nikita Khrushchev right after the assassination especially alarmed McCone and his deputies. The Soviet premier’s apparent absence from Moscow could have meant that he was in a secret command center, either hunkering down for an American reprisal, or possibly preparing to strike the United States.”
‘DENIED IN THEIR ENTIRETY’
What is particularly notable about four of the articles is that they were denied in their entirety by the CIA between 2010 and 2012 in response to FOIA requests — with the agency claiming that there were no releaseable portions either because information was classified or revealed sources and methods. The denied articles concerned a diverse set of topics — intelligence support to the U.S. Transportation Command (Document 4), the founding of the CIA’s human intelligence unit (Document 16), the origins and applications of nuclear intelligence (Document 18), and the recollections of a CIA officer (Document 22) of spending September 11, 2001 with President George W. Bush. An appeal of the denial ofDocument 4 was also denied.
The articles are notable in two ways. One is that they illustrate serious problems with the way the CIA responds to FOIA requests — often denying requests in their entirety based on no objective standard, and often seemingly on factors (such as convenience) other than legitimate FOIA exemptions. An examination of these articles released due to the Scudder lawsuit reveal a multitude of paragraphs that clearly should have been released, many clearly marked as unclassified.
The four articles also provide yet another illustration of the differences between Freedom of Information Act requests and litigation. The prospect of  the CIA having to justify its refusal to release documents, in whole or in part, before a judge often produces a more reasonable response with regard to the release of information.
ODDS & ENDS
Ribbon-cutting ceremony at the Terrorist Threat Integration Center, May 1, 2003. (Photo credit: FBI)
Two additional articles concern events separated by over two hundred years. One (Document 7), focuses on Britain’s penetration of the United States diplomatic mission to France during the Revolutionary War. Penetration involved British recruiting of agents with access to mission members, theft of a mission member’s journal and Britain’s control of agents ostensibly operating on behalf of the United States.
In November 1990, at its Langley headquarters, the CIA dedicated an encrypted sculpture named ‘Kryptos’ – a structure with several messages carved into its surface, but messages whose content was concealed through encryption. [Since that time three of the four messages contained in the sculpture have been solved.9 One of the individuals, from the Directorate of Intelligence, in a 1999 article (Document 13) a member of the Directorate of Intelligence describes his work in decrypting the message.
For more information contact:
Jeffrey T. Richelson 202/994-7000 or nsarchiv@gwu.edu
Updated – November 20, 2014 (Originally Posted – June 4, 2013)

THE DOCUMENTS
Document 1: William Nolte, "An Interview with William P. Crowell, Deputy Director, NSA, Studies in Intelligence 39, 3 (1996). Secret.
Source: Scudder Litigation Release.
This interview with the Deputy Director of NSA, discusses, inter alia, key issues facing the Intelligence Community (which Crowell identifies as including information systems and the volume of NSA collection), the interaction between different intelligence collection techniques, and the declassification of VENONA material (concerning the decryption of Soviet diplomatic communications from the 1940s that identified a large number of U.S. citizens spying for the Soviet Union).
Document 2: William Nolte, "An Interview with Adm. William O. Studeman, Studies in Intelligence, 40, 1 (1996). Secret.
Source: Scudder Litigation Release.
This interview with Studeman, who served as Director of the National Security Agency (1988-1992) and Deputy Director of Central Intelligence (1992-1995), covers his early career  and a number of issues — including the problems of interaction with other intelligence agencies, the problem of the Intelligence Community's transition to the post-Soviet world, public and Congressional attitudes toward NSA, and Congressional oversight.
Document 3[Deleted], “Covert Action, Loss of Life and the Prohibition on Assassination, 1976-1996,” Studies in Intelligence, 40, 2 (1996). Classification Not Available.
Source: CIA Freedom of Information Act Release.
In this article, the author examines the effect of the decision no longer to employ assassination as an instrument of U.S. policy, and the issues the prohibition raised with respect to other CIA activities that might result in the loss of life. These include lethal operations that directly risk the loss of life, lethal operations indirectly risking loss of life (e.g. demolition of a facility when it is believed to be unoccupied), and nonlethal operations (e.g. deception) directed at identifiable persons.
Document 4: [Author Name Deleted], “National Intelligence Support to the US Transportation Command,” Studies in Intelligence 40, 2 (1996). Secret.
Source: Scudder Litigation Release.
The U.S. Transportation Command (TRANSCOM) was established in 1987 to centralize the Defense Department’s strategic airlift resources. The article explores operations in Somalia, the command’s information requirements, the command’s evolution, Intelligence Community support, connectivity between the Intelligence Community and TRANSCOM’s intelligence component.
Document 5: Joe Wood, “Persuading a President: Jimmy Carter and American Troops in Korea,” Studies in Intelligence, 40, 4 (1996). Classification Not Available.
Source: CIA Freedom of Information Act Release.
During his 1976 presidential campaign, Jimmy Carter promised to withdraw U.S. ground forces from South Korea. This article is the result of a case study prepared at Harvard’s John F. Kennedy School of Government, and funded by the CIA. It reports on the intelligence estimates and studies on North Korean military strength produced early in Carter’s administration, and how those estimates resulted in U.S. forces remaining in South Korea.
Document 6: [Deleted], “CIA’s Intelligence Sharing With Congress,” Studies in Intelligence, 41, 3 (1997). Classification Not Available.
Source: CIA Freedom of Information Act Release.
This short article focuses on “the phenomenon of the President’s own intelligence being used to question and attack the President’s foreign policy initiatives.” Specific cases discussed concern Indochina, the Persian Gulf, and Haiti.
Document 7: [Deleted], “British Penetration of America’s First Diplomatic Mission,” Studies in Intelligence, 41, 4 (1997). Classification Not Available.
Source: CIA Freedom of Information Act Release.
The focus of this article is Britain’s penetration of the U.S. diplomatic mission in Paris during the Revolutionary War. Successes included recruiting several access agents to provide intelligence on mission activities as well as the theft of the journal of mission member Arthur Lee, and the mission’s “recruiting” agents who were actually under British control.
Document 8: Capt. James M. Lose, “The National Intelligence Support Team,” Studies in Intelligence, 42, 1 (1998) . Unclassified.
Source: CIA Freedom of Information Act Release.
The author reviews the background and operation of National Intelligence Support Teams (NISTs) — combining personnel from key national and defense intelligence agencies (including CIA, the Defense Intelligence Agency, the National Security Agency, and the National Imagery and Mapping Agency) — which provided support to commanders of joint task forces such as those involved with Operations UPHOLD DEMOCRACY (Haiti) and JOINT ENDEAVOR (Bosnia). In addition, the author makes a number of suggestions for improvements.
Document 9: [Deleted], “Increasing CIA’s Value Added to the Senior Policymaker,” Studies in Intelligence, 42, 2 (1998). Unclassified
Source: CIA Freedom of Information Act Release.
This article is based on the author’s two years serving as the CIA’s liaison to a State Department component and focuses on his suggestions for increasing the CIA’s value to policymakers — including “living with the customer,” better service for “second tier” officials, one-stop shopping for “the facts,” stronger community partnerships, and “early bird” service.
Document 10: [Deleted], “Legislative and Judicial Safeguards for US Intelligence Personnel,” Studies in Intelligence, 42, 2 (1998). Unclassified.
Source: CIA Freedom of Information Act Release.
The author, who served as a law clerk with the CIA’s Office of the General Counsel, examines the history and enforcement of the Intelligence Identities Protection Act (IIPA), as well as exploring a number of options to enhance the protection of US intelligence personnel — including secret trials, and amending the IIPA to allow criminal penalties for any individual who reveals or purports to reveal the identity of covert intelligence personnel.
Document 11: [Deleted], “Passing the Intelligence Identities Protection Act of 1982,” Studies in Intelligence, 42, 3 (1998). Unclassified
Source: CIA Freedom of Information Act Release.
This article provides a short history of the background behind the IIPA, the initial proposals for a law criminalizing the revelation of the identify of covert intelligence personnel, the various attempts to pass such legislation, opposition to some proposed provisions, and the ultimate passage of the IIPA.
Document 12: [Deleted], “Analyzing Soviet Defense Program, 1951-1990,” Studies in Intelligence, 42, 3 (1998). Unclassified
Source: CIA Freedom of Information Act Release.
This article focuses on what was a major concern of some intelligence analysts during the Cold War — determining the actual cost of Soviet defense programs and the burden they placed on the Soviet economy. Among the author’s assertions was that “in every case, the [Intelligence Community] concluded that Soviet economic difficulties would impinge only marginally, if at all, on Soviet defense plans” and that “Only when Gorbachev’s perestroika was foundering was the idea of economic constraints on the defense budget gain a foothold in the national estimates arena, and even then the majority opinion rejected the notion that the USSR would unilaterally reduce its defense spending as it did in 1989.”
Document 13: [Deleted], “Cracking the Courtyard Crypto,” Studies in Intelligence, 43, 1 (1999). Unclassified.
Source: CIA Freedom of Information Act Release.
In 1990, the CIA unveiled a sculpture name “Kryptos” in the agency’s courtyard — a sculpture whose surface was covered with an encrypted message. This article, by a member of the Directorate of Intelligence, describes the process by which he deciphered most of the message.
Document 14: [Deleted], “An Interview with Former DDCI John N. McMahon,” Studies in Intelligence, 43, 1 (1999). Classification Not Available.
Source: CIA Freedom of Information Act Release.
This interview, with John N. McMahon, who joined the CIA in 1951 and served in a variety of positions before he retired in 1986, covers his early days in the agency, the U-2 program, battles over satellite reconnaissance systems, as well as his tours as head of the clandestine service, the intelligence directorate, and as Deputy Director for Central Intelligence. In addition, he discusses the CIA-Congressional relationship as well as covert action with regard to Iran and Afghanistan.
Document 15: [Deleted], “An Interview with NSA Director Lt. Gen. Michael V. Hayden,” Studies in Intelligence , 44, 1 (2000). Secret/[Deleted]
Source: CIA Freedom of Information Act Release.
In this interview, Michael Hayden, then the director of the National Security Agency, discusses his attempt to bring significant change to NSA, his belief that “our technological adversary is not a nation state but the global telecommunications industry,” the relationship between NSA and the CIA (also discussed in Document 19), and other topics.
Document 16: Michael Warner and Kevin Ruffner, “The Founding of the Office of Special Operations,” Studies in Intelligence 44, 2 (2000). Secret/Noforn.
Source: Scudder Litigation Release.
This article, written by two CIA historians, focuses on the CIA’s first human intelligence organization — which would be merged in 1952 with the Office of Policy Coordination to form the Directorate of Plans (subsequently the Directorate of Operations and today the National Clandestine Service). It discussed  the early post-World War II development of U.S.  espionage activities, foreign liaison dilemmas, observations by foreign services, and moving from theory to practice. Despite the decades that have passed since the events described, the article has been heavily redacated before release.
Document 17: [Deleted], “Intelligence and US Missile Defense Planning,” Studies in Intelligence, 45, 2 (2001). Classification Not Available.
Source: CIA Freedom of Information Act Release.
After providing a brief introduction to the early origins of missile defense, this article addresses the establishment of the Strategic Defense Initiative, the post-Cold War shift in U.S. missile defense emphasis and the challenges of providing intelligence on threats, technical issues, and foreign reactions.
Document 18: Henry S. Lowenhaupt, “Origins and Applications of Nuclear Intelligence,” 47, 3 (2003). Secret.
Source: Scudder Litigation Release.
This article, written by one of the CIA’s long-time experts on nuclear intelligence, particularly the intelligence on the Soviet nuclear program, explores the early years on the U.S. nuclear intelligence effort. Lowenhaupt discusses nuclear intelligence collection in World War II, the detection of nuclear detonations, tracking airborne radioactivity, seismic technology, acoustic and EMP measurement, measuring plutonium production, environmental collection, as well as the contribution of U-2 and infrared imagery. A number of the sections are heavily redacted and the section on nuclear detection satellites is deleted in its entirety (despite the substantial amount of declassified information on the subject).
Document 19: [Deleted], “A Brave, New World,” Studies in Intelligence, 48, 2 (2004). Classification Not Available .
Source: CIA Freedom of Information Act Release.
This article addresses the relationship between the CIA and National Security Agency in the aftermath of the September 11, 2001 terrorist attacks. It notes the origins of CIA-NSA enmity going back to World War II, barriers that have existed to a partnership between the two agencies, hints of change in the late 1990s, and the impact of 9/11. Its final sections focus on tangible results, the likelihood that the partnership will last, and the challenges ahead.
Document 20: [Deleted], “An Interview with TTIC Director John Brennan,” Studies in Intelligence, 48. 4 (2004). Secret.
Source: CIA Freedom of Information Act Release.
This interview with John Brennan, currently the Director of the Central Intelligence Agency, was conducted in 2003 — when he was the director of the Terrorist Threat Integration Center (which was subsequently absorbed by the National Counterterrorism Center). Questions include those about the center’s access to intelligence data, counterterrorism analysis as a specialty, the different components of the Intelligence Community involved in counterterrorism analysis, and the division of responsibilities for different aspects of counterterrorism analysis.
Document 21: Michael J. Sulick, “Counterintelligence in the War Against Terrorism,” Studies in Intelligence, 48, 4 (2004). Secret/[Deleted].
Source: CIA Freedom of Information Act Release.
The author, who served as CIA Associate Deputy Director for Operations and became chief of the National Clandestine Service in 2007, notes that whereas U.S. counterintelligence defeats during the Cold War were never exploited by the Soviet Union in an actual war, terrorists “can immediately exploit information gained through espionage to launch attacks.” He goes on to explore the subjects of “terrorists as intelligence operatives;” “exposing terrorist spies;” “more employees to worry about;” terrorist denial and deception; intelligence sharing; and further actions.
Document 22: Michael J. Morell, “11 September 2001: With President,” Studies in Intelligence, 50, 3 (2006) Secret/Noforn.
Source: Scudder Litigation Release.
This article recounts the author’s experience with President Bush on the day of the al-Qaeda attacks on New York and Washington. Morell, who subsequently served as Deputy Director of the CIA (2010-2013) begins in the hours before the attack and continues until Morell arrived back in Washington. It focuses less on intelligence and more on the movements and reactions of Bush and others.
Document 23: [Deleted], “Terrorism Analysis in the CIA: The Gradual Awakening (1972-80),” Studies in Intelligence, 51, 1 (2007). Secret.
Source: CIA Freedom of Information Act Release.
This article, after discussing the emergence of terrorism as an international issue, traces the development of terrorism analysis in the CIA from the Truman to Nixon administrations. It covers increased policymaker interest in the subject (particularly following the murder of Israeli Olympic athletes by Palestinian terrorists in 1972), and the resulting increased Intelligence Community interest; the initially ascendant role of the Directorate of Operations; the Directorate of Intelligence’s subsequent larger role in terrorism analysis; and early analytical challenges.
Document 24: [Deleted], “CIA Prepublication Review in the Information Age,” Studies in Intelligence, 55, 3 (September 2011).Confidential.
Source: CIA Freedom of Information Act Release.
The author, who served as the first senior representative of the Directorate of Intelligence on the CIA Publication Review Board (PRB) offers an anodyne view of the publication review process. Topics covered include the origins and evolution of the PRB and review process, the impact of a vast increase in the number of submitted manuscripts, the meaning of the ‘appropriateness’ requirement, and “myths and realities of the process.” Asserted myths included that “the prepublication review process is unfair, arbitrary, capricious” and that “the PRB often doesn’t know what has already been released.”
Document 25: [Deleted], “James J. Angleton, Anatoliy Golitsyn, and the ‘Monster Plot’: Their Impact on CIA Personnel and Operations,” Studies in Intelligence, 55, 4 (December 2011). Secret.
Source: CIA Freedom of Information Act Release.
This article examines the roles of CIA counterintelligence chief James J. Angleton and KGB defector Anatoliy Golitsyn in the formulation of the “Monster Plot” — which asserted that the Soviet Union had conducted decades-long, massive and successful deception operations against the West, including the use of false defectors and volunteers. It then examines the impact of Angleton and Golitsyn’s thinking on a number of cases and individuals — including Yuriy Nosenko, Lee Harvey Oswald, and several CIA officers who were alleged to be possible Soviet moles.
Document 26: David Robarge, “DCI John McCone and the Assassination of John F. Kennedy,” Studies in Intelligence 57, 3 (September 2013). Secret.
Source: CIA Freedom of Information Act Release.
Director of Central Intelligence John McCone’s actions in the aftermath of the assassination of President Kennedy is the subject of this article, drawn from a classified book on the Mc Cone’s tenure as DCI. It notes that McCone’s first action after hearing that the president had been shot was to visit Robert Kennedy at his home. The remainder of the article discusses  McCone’s oversight of the investigation of a possible conspiracy, his interaction with the Warren Commission, the impact of detection of KGB officer Yuri Nosenko, and his participation in what the author describes as a ‘benign conspiracy.’
NOTES
1. H, Bradford Westerfield, Inside CIA’s Private World: Declassified Articles from the Agency’s Internal Journal, 1955-1992 (New Haven: Yale University Press, 1995), pp. vii, xii-xiv.
2. The tables of contents, starting with the initial issue of Studies, can be found at www.nationalsecuritylaw.org. A significant disparity existed between the CIA’s response to the 2010 FOIA request for 1985-1996 tables of contents and their response to National Security Counselors litigation. Approximately 130 more titles were released in response to litigation than to the author’s FOIA request. Some of the titles not released in response to the FOIA request but produced under litigation include: “Psychology of Treason,” “The Decline and Fall of the Shah,” “On Analytic Success and Failure,” “The DI’s Organizational Culture,” and “Observation Balloons and Reconnaissance Satellites.” “Psychology of Treason” actually appeared in the Westerfield collection (pp. 70-82) while “Observation Balloons and Reconnaissance Satellite” had been released in its entirety and could be found on the CIA’s website.
3. Articles denied in their entirety included “Overhead Imagery during the Yom Kippur War,” “Sifting the Evidence on Vitaly Yurchenko,” “Iraq’s Nuclear Weapons Program,” and “The Need for Improved Strategic Counterintelligence Analysis.” On Scudder’s background, actions, and the results, see Greg Miller, “CIA employee quest to release information ‘destroyed my entire career’,” www.washingtonpost.com,  July 4, 2014.
4. Various authors have found the PRB process less than reasonable. For example, see David H.Sharp, The CIA’s Greatest Covert Operation: Inside the Daring Mission to Recover a Nuclear-Armed Soviet Sub (Lawrence, Ks.: University Press of Kansas, 2012), pp. xi-xii; Robert Wallace and H. Keith Melton, Spycraft: The Secret History of the CIA’s Spytechs from Communism to Al-Qaeda (New York: Dutton, 2008), pp. xx-xxi.
5. Thus, the new head of the National Clandestine Service, who is still officially undercover, as well as the temporary head (also undercover) have been named without a violation of the law. See “CIA’s New Chief Spy Outed on Twitter,” www.gawker.com, accessed May 9, 2013.
6. Although it is often assumed that the first prohibition of assassination was Gerald Ford’s 1976 executive order, DCI’s Richard Helms and successor William Colby had issued internal directives prohibiting such action – Richard Helms, “Allegations of Assassinations,” March 6, 1972; William E. Colby, Subject: Policy Against Assassination,, August 29, 1973.
7. For example, see James R. Taylor, Deputy Director of Operations, National Security Agency, Subject: Thoughts on Strategic Issues for the Institution, April 9, 1999, Document 21 in Jeffrey T. Richelson (ed.), NSA Electronic Briefing Book #24, The NSA Declassified , March 11,2005,www.gwu.edu/~nsarchive/NSAEBB/NSAEBB24.
8. Two major accounts of Angleton and the Molehunt are: Tom Mangold, Cold Warrior – James Jesus Angleton: The CIA’s Master Spy Hunter(New York: Simon & Schuster, 1991), and David Wise, Molehunt: The Secret Search for Traitors that Shattered the CIA (New York: Random House, 1992).
9. On Kryptos, see “Flash Movie Text,” www.ciagov, accessed May 6, 2013; “Kryptos,” http://en.wikipedia.org/wiki/Kryptos.

The Ninth Gate (1999) – Dante’s Esoteric Inferno

Film poster. Image: Wikipedia.
to the riddleFilm poster. Image: Wikipedia.
By: Jay
Roman Polanksi’s 1999 The Ninth Gate is not his best film, but it does contain a high level of esoteric symbology and twilight references pertinent to researchers. Based on the novel The Club Dumas by Arturo Perez-Reverte, the film follows an antiquarian book dealer named Dean Corso (Johnny Depp) who is hired by a wealthy collector to track down the authentic copy of The Nine Gates which legend holds the Devil himself penned. An obscure 17th century Spanish mystic, Aristide Torchia, authored the 1666 copy of Lucifer’s original, which properly decoded grants adventurers the ability to ritually summon Satan. I’ve viewed it several times and the devil didn’t appear, but as I wandered about online I decided my notes contained the great esoteric secret! (I am joking.) What other analyses often missed is the film’s similarity to Eyes Wide Shut, both of which give clues and revelations concerning the nefarious practices of many of our real world “elite.” Littered with masonic and alchemical imagery, The Ninth Gate is a film about occult initiation as much as (I argued) Kubrick’s Eyes Wide Shut is.
It is worth mentioning that Polanski’s fleeing the United States due to his decades-old rape accusation was also surrounded by accusations of the practice of witchcraft in the same Hollywood circles connected to the Manson killings. I am of the opinion these rituals and killings were actually the work of a higher network of dark forces, and not primarily that of the actors and directors commonly named. Author Peter Levenda provides evidence of this contention in his volume of Sinister Forces on The Nine, which invites legitimate speculation surrounding synchromistic associations of “9,” as nine is also the Ennead, as well as the 9 major gods of Egypt. It is also important to consider the date Polanski released the film, 1999, as “999” is an upside down “666,” and Eyes Wide Shut was released the same year.  Such triplicities also factor into witchcraft and Satanism, as witchcraft holds to a “law of threefold return,” where good or evil intentions are returned threefold in a kind of karmic way, and in Satanism, where tripling things is seen as a way of inverting the Trinity. Nine is therefore a tripled triple, and holds heavy significance for esotericism.
With the principle of the Ennead in mind, as derived from the nine gods worshipped in the Heliopolis of ancient Egypt, we can extrapolate the process of Corso’s awakening, as he opens the “gates” as the film progresses (though the Egyptian pedigree of the Ennead is up for debate). The gates are not literal gates, of course, but symbolic synchronistic events that occur, leading Corso down a specific path. Like an actor in play, Corso is led, step by step, through each of the pictured engravings in the book, and it is to these images we will now turn. Croso’s rapacious aptitude for scamming clients out of valuable, rare works catches the attention of the wealthy collector, Boris Balkan. Balkan takes an interest in Corso’s reputation, as he scams an unwitting couple out of a priceless copy of Don Quixote, which ironically presages his own coming adventure. In Cervantes’ work, Don Quixote is driven mad by reading endless works of chivalry, erecting in his mind a fantastical world where he is a knight sent forth on a deluded crusade. The film’s usage of the novel serves as a warning to those who embark on a perilous quest for power through occult means, leading ultimately to the demise of all involved (but one in this case).
Don Quixotically.
Don Quixotically.
Balkan recruits Corso to hunt down the other two copies of the Nine Gates after his presentation on witchcraft, wherein he offers to show him his private collection of ancient books on the Devil and the occult. As the reluctant Corso accepts Balkan’s invite, we notice the elevator code to reach Balkan’s secret floor atop the skyscraper is (of course) “666.” The next clue that emerges is the painting on Balkan’s wall of the castle that figures later in the film. A symbolic foreshadowing, the castle is the locale of the final ritual in the film, as will be elaborated below, but here it is important to point out that background and symbolic imagery play throughout the film, leading the viewer down Corso’s path.  Balkan explains the legend of the mythical Devil’s book, The Nine Gates of the Kingdom of Shadows which he claims to possess.  Balkan shows his copy to Corso and the first engraving we see is that a knight on a quest (recalling Quixote) heading toward a castle with the inscription, “Silence is Golden.” As Corso agrees to hunt down the other two copies for a hefty price to compare them, we can see that twice the castle has appeared with the knight giving the Sign of Harpocrates. Thus, the first step is that of seeking gnosis, or hidden knowledge – the esoteric.
"Hush yo mouf!" -Shaft
“Hush yo mouf!” -Shaft
As Corso embarks on his quest, he encounters femme fatale Liana Telfer (Lena Olin), the wife of “suicided” collector, Andrew Telfer who opened the film’s beginning. Liana seduces Corso with intention of exchanging sex for the return of her copy Balkan obtained, and in the midst of sex and scuffle, Corso notices a entwined serpent tattoo on Liana’s thigh. Liana is unsuccessful in obtaining the copy, but the following day in the library as Corso researches the gates deeper, he spots an engraving of a serpent around a tree, biting its own tail, which matches Liana’s tattoo. The inscription is “Sic Luceat Lux,” meaning let the light shine, and we are given another clue regarding film’s meaning. The ourobouros is symbolic of several things, but principally it is the Platonic and Egyptian symbol of the universe as a whole. The light is that of Lucifer, and the tree is the tree of knowledge of good and evil from Genesis 1-3. St. Paul comes to mind, who wrote: “…Satan himself is transformed into an angel of light” (2 Cor. 11:4). In other words, the gnosis of the serpent, known for his wisdom, is the chief meaning the film is going to convey, but this gnosis comes at a great price, as we shall see.
The Tree of Gnosis with ouroboros.
The Tree of Gnosis with ouroboros.
After catching a glimpse of the mysterious “Girl” who is tailing him, Corso returns to the book to find the next engraving to be that of a woman riding the beast/dragon, with the aforementioned castle in flames. Somewhat shocked by this synchronicity, Corso put the homework on pause. The harlot riding the beast is well-known imagery from St. John’s Apocalypse, which reads as follows:
“So he carried me away in the Spirit into the wilderness. And I saw a woman sitting on a scarlet beast which was full of names of blasphemy, having seven heads and ten horns. The woman was arrayed in purple and scarlet, and adorned with gold and precious stones and pearls, having in her hand a golden cup full of abominations and the filthiness of her fornication. And on her forehead a name was written:
MYSTERY, BABYLON THE GREAT,
THE MOTHER OF HARLOTS
AND OF THE ABOMINATIONS
OF THE EARTH.
I saw the woman, drunk with the blood of the saints and with the blood of the martyrs of Jesus. And have when I saw her, I marveled with great amazement.” (Apoc. 17:3-6)
Hos ridin tha beast.
Hos ridin tha beast.
Since The Ninth Gate has a clearly Crowleyan/sex cultish element to it, it should be noted wizards, sorcerers and gnostics generally make terrible exegetes. Never allowing for any sensible historic principles of hermeneutics and exegesis, occultic interpreters find fertile ground for speculation and deception in prophetic biblical texts, with St. John’s Apocalypse occupying the choice place. Having nothing to do with anyone’s personal speculations and finding their principal fulfillment in the first century destruction of Jerusalem and in Roman paganism, cults for centuries have borrowed these texts for all manner of gibberish. In this case, the Crowleyan strands have tended to see the Apocalpyse as a gnostic means by which the “beast” and its attendant powers might be ritually conjured. For the purposes of analyzing the film, the references are instantiated in the cast of characters Corso encounters, with the “Girl” filling the role of the Harlot of Mystery Babalon. It’s also a reveal in that the woman in the engraving is holding the book – it’s her book, showing the Nine Gates book in the film is the Girl’s book.  It also brings to mind the “Babalon working” Kenneth Grant wrote about, as one of Crowley and rocket scientist Jack Parson’s attempts to bring about the birth of the “Antichrist.”  Grant’s book The Ninth Arch also may be what is referenced here.
As Corso returns to work after finding his apartment ransacked, a bust of Dante is visible, hearkening to the Inferno. Like a dark version of Dante, Corso’s Vergil will be the Girl, also functioning as an inverted Beatrice. Corso’s journey is actually a ritual and spiritual quest, all coalescing to a summation. As mentioned earlier, Liana seduces Corso, and knocks him unconscious. When Corso returns to his book store, he finds his partner Bernie ritually murdered. Hung upside down, the next engraving matches the “hanged man” image familiar to masonry and tarot. Sensing he’s in over his head, Corso tries to give up the quest, but Balkan insists he continue, coaxing him with more cash.
How's it hangin?
How’s it hangin?
The hanged man is a warning not to venture into mysteries presumptuously or with importunity. This is explained in the next scene, when the next engraving is also a warning about danger descending from above, the Ceniza bothers explain. The cherub in the picture even has a mustache like the Ceniza brothers, and the significance of them being twins also relates to Tarot, as the “Lovers” card is sometimes Gemini, or the twins. You can see here the resemblance between the two. The “lovers” symbology picks up the sex magick theme again, as Corso will attain concourse, intercourse and union, with his angelic partner, the whore of Babalon. Corso also discovers here the engravings differ, with LCF (Lucifer) signing some copies, and not others.
17th century version of the lovers or the twins.
17th century version of the lovers or the twins.
The fist copy compared is the Fargas manuscript, where Corso notices the image of the old man with keys knocking on a door. The old man in the engraving resembles Fargas himself. Corso sees LCF again, and turns the page to reveal a fool or jester entering a labyrinth (Corso). The old man is a reference to the Hermit in the tarot deck, which signifies withdrawal, philosophical reflection and wisdom, and in some cases gives the wisdom to overcome some obstacle or puzzle. For the film’s narrative, Corso stumbles upon the divergence in the manuscripts at this point, which is the key to decoding the message: Lucifer penned the original, and the engravings in each differ to reveal a specific clue. Corso also discovers his Girl guardian seems to possess supernatural powers, yet reluctantly followers her lead, while she appears and disappears as the situation dictates. At this juncture, it becomes evident the events as a whole are being organized by higher forces: Corso laments he is a pawn in a larger game.
Led Zeppelin ain't here, old man.
Led Zeppelin ain’t here, old man.
Another clue to the events being arranged is the recurring rings worn by the major characters, signifying membership in the Satanic cult at the heart of the film.  Corso next visits Baroness Kessler who reveals the existence of this cult, the Order of the Silver Serpent, whose membership rosters include old nobility, nuveaux riche, actors and musicians. The Order was created to “preserve the secret of the Devil,” she claims, but had fallen into mere hedonistic pleasure as an outlet for secret orgies. Eyes Wide Shut comes to mind, and strikingly, the mansion used for the orgy scene in both films is Mentmore Towers. Mentmore has long been home to strange activity, from the Beatles engaging in Transcendental Meditation, to it also being the site used for Bruce Wayne’s estate in Christopher Nolan’s Batman films. Passing from the hands of the Rothschild family to the Maharishi Yogi Foundation, it is now owned by the Rueben brothers. Like Bill Harford in Eyes Wide Shut, Corso is being led down an alchemical path that is opening “gates” in his psyche. Baroness Kessler opines that the members of the Order are deluded their belief power and wealth comes from the Order, when it is the Devil himself that grants the power – the very thing that will occur with Corso. [Correction: the estate is not Mentmore, but Chateau de Ferrieres, a French Rothschild estate built on the pattern of Mentmore. Thanks to a reader. -Jay] 
After rescuing Corso from Liana’s goon, the Girl marks Corso’s forehead with her blood like a reverse version of Ash Wednesday. Corso’s being harassed and followed, as well as his interactions with the concierge again bring to mind Eyes Wide Shut, as Balkan organizes another muder: this time, of Baroness Kessler through poison and immolation. Corso reveals to the Baroness the three variations in three manuscripts make 9, thus solving (he thinks) the Devil’s riddle. Nine is, in Western hermeticism, the number of initiation and judgment, and therefore entire thrust of the film is Corso’s initiation process (think of 9/11 as mass ritual as some researchers have posited). As Corso studies the next engraving, it details an initiate being flogged by another knight outside the castle, with others being impaled on a rack. Corso, like the initiate in the picture, is at that moment “flogged” and knocked unconscious, awakening to find the Baroness poisoned as the library catches fire, making her another sacrifice.
Faithful flagellant followers and fools.
Faithful flagellant followers and fools.
The Girl and Corso then tail Liana to her French hometown of St. Martin, where her family owns a palatial estate (Mentmore) discovered to be the site of elite Satanic rituals. The ritual features a bed-altar (for sex magick), with a large image of the serpent entwined around the tree, recalling again the gnosis of Eden’s Tree of Knowledge the serpent illicitly offered “to become like God” (Gen. 3:1-7). “St. Martin” also calls to mind the French mystic Louis Claude de-St. Martin, who participated in a revival of gnostic ideas during the time of the French Revolution. Martinism bears striking resemblances to Freemasonry, and probably borrowed its grades and ranks, as well as elements of cabalism and Jacob Bohme. Later adherents of Martinism would be involved in occult “revivals” elsewhere, such as reportedly Gerard Encausse, or “Papus.” Polanski may have had this in mind when including it in the script, drawing another connection to the occult.
As the ritual commences, Balkan arrives to kill Liana and steal the book, ousting the rest of the cult as cowards and frauds. Corso then follows Balkan to the mysterious castle in the wilderness we’ve seen throughout to find him engaged in his own personal ritual magick ceremony designed to grant him entrance to the ninth gate – apotheosis and immortality. Another potential reference to Dante, Corso falls through the floor as he descends into the bowels of the castle, stuck immobile with his head protruding. In the Inferno, Dante has certain sinners so transfixed.  Following this, Balkan immolates himself in the ritual after pronouncing it to be the path to “equality with God,” with the Inferno imagery coming to full fruition. Balkan becomes the final sacrifice while Corso escapes by falling even further and hurriedly collecting the manuscript it’s engulfed. Before leaving however, Corso is seduced by the Girl who has reappeared.  Outside the enflamed castle the “woman rides the beast,” and the final engracing is fulfilled as they copulate, leading to a union of fallen angel and man. In some far eastern occultic and ancient practices the goal of sexual union is precisely that of union with a “god,” and here the suggestion is definitely Tantric sex magick.
Other have noticed the parallels, with this image from Davidicke.com making my point.
Other have noticed the parallels, with this image from Davidicke.com making my point.
In the bedeviled afterglow the Girl reveals to Corso that the final engraving is a forgery and that the Ceniza brothers have the real final secret. When Corso returns to Spain to the brothers’ shop, he discovers they too have disappeared and a final page on a shelf is all that’s left, featuring the true engraving, which is an image of the Girl herself “riding” the beast. The final scene is Corso walking into an illuminated castle gate, as he has performed and undergone all the necessary ritual enactments. The explanation of this strange ending is what I have given above – the journey itself was the process of Corso opening the “gates” to gnostic illumination. The final “secret” was his own union with the whore of Babalon, allowing him entrance to immortality. Contrary to what most viewers would’ve suspected, the entire journey was about Corso himself as the initiate on the path to discovery, not the cult or the power-mad elites seeking apotheosis through impossible means. Ultimately, The Ninth Gate is a gnostic allegory of illumination through the union of opposites, where Corso “unites” with his celestial babe guardian (fallen) angel, like Dante with Vergil and Beatrice – a counter-initiatic trek into Dis. The “gates” were not opened through the working of cult rituals, but in the psyche of Corso as synchronistic ritual events were occurring all around him along the way, functioning as a reverse telling of Dante. For millennia, occultic con men have held out promises of immortality and self-salvation, all the way back to the original con of the serpent in the Garden – and all of these cons are built on appeals to man’s vanity and pride.  All along the way, that long historical path is littered with the skulls and damaged psyches of duped individuals who fell for the perennial scam, as Dante’s Inferno is littered with the skulls of sinners, priests and popes.
Stuck in a rut.
Stuck in a rut. Inferno engraving by Dore.

Jay’s Advice on How to Get Chicks

By: Jay
From the Mailbox an inquiring young mind asks: “Jay, your analyses rock my socks off. But my issues stem from not getting any attention from babes.  You seem to have that aspect of healthy living down to a damn science – could you divulge your secrets?” -Saeed Salami
Great question, and yes, you’re correct in your analysis of JaysAnalysis and the deep well of wisdom found herein.  A science it is! While I can’t spill all the beans on how to maximize on all aspects of vaginology, I can offer a variety of tips on the Venusian Arts.  These tried and true methods are time-tested and heavily science-based, so don your lab coat (but unbutton those top two buttons), get out your Lisa Frank notepad, and take notes.
Ask yourself - "Do I look like a greasy gay cocoon-emergent Liberace butterfly?" If the answer is yes, you're good.
Remember the Flair Principle: Ask yourself – “Do I look like a greasy spray-gay cocoon-emergent butterfly?” If the answer is yes, you’re good. What would Ric Flair Do? WOOOOOO!
1. Fist and foremost, the number one tip to remember is being fancy.  Chicks love fancy, so adorning yourself with all possible accouterments of fancy is the best way to establish your game.  While some may recommend classic styles of smoking jackets, my preferred style is based around the bathrobe.  Bathrobes of fine silks, laced fringe and ornate designs suggest you are an exotic adventurer who doesn’t take “yes” for an answer.  Perhaps you just returned from a Persian safari, or brokered an oil deal with an Arab Sheikh; in either case, glorious robes doused in fumes of Frankincense, myrrh and Hugo Boss arouse the female nostril tendrils.  Science in our day has proven the potent power of feralmoans and their magical ability to entrance your prey into doing basically anything you want.  The important factor to keep in mind is to be sure to use all three scents at once in abundance, as well as a dose of Drakkar Noir.  There is no limit to the nuclear potential of mastering the combination of fancy silken bathrobes and volatile, combustible sex fumes.  Simply dazzle!
"Extend your mind, extend your locks." -Confucius
“Extend your mind, extend your locks.” -Confucius
2.  Now that you’ve puffed and powdered that bodily exterior, you’ve likely missed the next most important factor - hair.  Hair is an ancient growth that scientists now know evolved to give humans the ability to look cool.  Primal man was not able to preen and look cool, so evolution stepped in and said, “Dude, some chicks dig bald, but you can get much further with gel, mousse and/or a flat top.”  However, all of this is dated advice from hack advice columnists.  The real secret to maximizing the potential of hair is to build on step 1 – fancy hair.  You probably mistakenly think I mean shaving lines, zigzags or your name on your head (all of which are great ideas), but for this secret, I’m reaching back to an afrodeziack known by 18th century magistrates, the powdered wig.  The powdered wig conveys the idea of power in a way the toupee never could: It seems to scream from the bench, “Give me what I want, date, or off with your head!”  Power is always at play in relationship dynamics, and with the threat of being placed in the stocks looming in your chick’s mind, you’ll not only be wearing the pants, but the fancy robe and headpiece, too! The basic rule here is the more, the better – there should be a sexy, smokey lock landslide. (Side note: carrying a gavel is optional).
Nothing says sophistication like the German classic, "Kenny."
Nothing says sophistication like the German classic, “Kenny.”
3.  Choosing the right date movie.  Common wisdom in this arena is far from the truth, as most newbies choose a horror flick thinking fear will somehow bring about the desired reaction.  On the contrary, films about people with disabilities have the best psychological effect on females.  The reasoning here is simple – when a girl sees how bad off some other unfortunate bastard is, the more awesomer you are.  I call it the principle of retarded ratios.  No ordinary disability tear-jerker like Radio or Rain Man will achieve the desired effect, either.  You need really, really bizarre disabilities to make you, the average joe look really, really badass for merely being able to walk or go potty.  I recommend the classic foreign film (bonus points for “foreign” sophistication!) Kenny.  Kenny is a delectable disability downer about a boy who has no torso.  After two hours of this tear-jerker, your babe will finally appreciate that you even have a lower half!  Forget lame date games like Dustin Hoffman’s speed toothpick tabulating, with Kenny in que, you’ll be counting your score in other ways.
Try seducing her with a fun activity!
Try seducing her with a fun activity!
4. Pickup Lines.  The line is a classic, but with advances in science like dating apps, the line has skyrocketed to a new level of importance.  Mastering the line is your golden Wonka ticket to Willy Wonderland.  Don’t google pickup lines, make up your own!  Chicks will appreciate your creativity and wordsmithery skills – allow me to share some of my “golden” examples of ice breakers sure to warm that ice queen.  The principle to keep in mind here is to boldly display honesty, sincerity, sadness and creeper factor (major turn ons):
Is your mom single?
Ready to curl up with a box of wine and a pack of Virginia slims and watch The View?
Are you coming home tonight? Dinner is ready.
Just got my welfare check. Which dollar menu item would you like on our date?
I talked to my psychic today and Miss Cleo said we must go out.
Mom says if I get my first date I might be able to move out of her basement. Could you help me out?
23rd level chaotic evil archmage seeks frivolous wench or skilled Elven queen to embark on new quest.
Did you fall from heaven? Cuz you’re hot from entering the atmosphere at such a rapid velocity.
Well endowed janitor seeking a mess to clean up
Booked with comic conventions all week. Free next weekend. Do you like sex?
I’ll cook breakfast. Boost or ensure?
Sharpest Knife Collector in the Tri-County.
Girls usually describe me as more of a Picard than a Kirk
Words cannot express how lonely I am. Can we meet now?
I cried last night for you.
What are your thoughts on UFOs?
How can I write you a poem if you won’t TELL me anything about you!
Do you like to pull things apart like I do?