SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Foreign Policy Discussion Thread

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: ChinuSFO who wrote (6014)11/15/2003 3:30:33 PM
From: DavesM  Read Replies (1) of 15987
 
Calling Saddam a "Bully" is like calling Pol Pot merely a "bully".

An article about cooperation between terrorist and bully...

weeklystandard.com

"... memo, dated October 27, 2003, was sent from Undersecretary of Defense for Policy Douglas J. Feith to Senators Pat Roberts and Jay Rockefeller, the chairman and vice chairman of the Senate Intelligence Committee. It was written in response to a request from the committee as part of its investigation into prewar intelligence claims made by the administration. Intelligence reporting included in the 16-page memo comes from a variety of domestic and foreign agencies, including the FBI, the Defense Intelligence Agency, the Central Intelligence Agency, and the National Security Agency. Much of the evidence is detailed, conclusive, and corroborated by multiple sources. Some of it is new information obtained in custodial interviews with high-level al Qaeda terrorists and Iraqi officials, and some of it is more than a decade old. The picture that emerges is one of a history of collaboration between two of America's most determined and dangerous enemies.

According to the memo--which lays out the intelligence in 50 numbered points--Iraq-al Qaeda contacts began in 1990 and continued through mid-March 2003, days before the Iraq War began. Most of the numbered passages contain straight, fact-based intelligence reporting, which in
some cases includes an evaluation of the credibility of the source. This reporting is often followed by commentary and analysis"
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext