Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged blacks

Rss Feed Group items tagged

Paul Merrell

Israel accused of being 'apartheid state' by US black rights group | Middle East Eye - 0 views

  • The US-based Black Lives Matter movement has called Israel an "apartheid state" and said it is joining the Boycott, Divestment and Sanctions (BDS) campaign over acts of "genocide against the Palestinian people".The Platform of the Movement for Black Lives, which speaks for the wider campaign and calls for the “end to the war against Black people”, on Monday issued the campaign's first comprehensive document setting out positions on US federal policies.Platform document addresses mostly American foreign policy, but singled out Israel in light of the billions of dollars military aid given to Israel by the United StatesThe charter states: “Israel is an apartheid state with over 50 laws on the book that sanction discrimination against the Palestinian people”, and added that the US, through its relations with the country, was “complicit in the genocide taking place against the Palestinian people”.
  • Pro-Israel and pro-Jewish groups were however quick to condemn the BLM statement.The Jewish Community Relations council based in Boston said it planned to disassociate from any group aligned with Black Lives Matter.
  • BLM was set up in 2012 after George Zimmerman was acquitted of the murder of 17-year old Trayvon Martin in Sanford, Florida, and to fight for what is says is the "virulent anti-black racism that permeates" American society.Palestinian activists famously used social media to give Black Lives Matter activists tips on how to deal with the inhalation of tear gas, after the police violently cracked down on protests in 2014 that erupted in Ferguson, Missouri following the death by the police of an unarmed black teenager, Michael Brown.  Activists aligned with Black Lives Matter have also frequently visited the occupied West Bank as part of “solidarity tours” aimed at learning about the situation on the ground.Prominent Black artists and actors, including Danny Glover and Lauryn Hill, released a video last year to highlight the connection between African-Americans and Palestinians living under occupation, following the Israeli assault on Gaza in 2014 that coincided with the protests in Ferguson, Missouri. Under the moniker "Black-Palestinian solidarity", the group said it was founded "in the course of resilience against the merciless edge of state-violence, protesters in Ferguson held up signs declaring solidarity with the people of Palestine".Numerous solidarity protests have also been held in London following the recent outburst of protests against police and state violence towards blacks in the US.Activists this morning shut down routes to key transport hubs in Britain, including London's Heathrow airport and a motorway in Birmingham, in protest at deaths in police custody and the deaths of black asylum seekers in immigration detention centres.
  •  
    This is a coalition that has been in the brew for some time, very influential particularly on college campuses.
Paul Merrell

US Military Uses IMF and World Bank to Launder 85% of Its Black Budget | Global Researc... - 1 views

  • hough transparency was a cause he championed when campaigning for the presidency, President Obama has largely avoided making certain defense costs known to the public. However, when it comes to military appropriations for government spy agencies, we know from Freedom of Information Act requests that the so-called “black budget” is an increasingly massive expenditure subsidized by American taxpayers. The CIA and and NSA alone garnered $52.6 billion in funding in 2013 while the Department of Defense black ops budget for secret military projects exceeds this number. It is estimated to be $58.7 billion for the fiscal year 2015. What is the black budget? Officially, it is the military’s appropriations for “spy satellites, stealth bombers, next-missile-spotting radars, next-gen drones, and ultra-powerful eavesdropping gear.” However, of greater interest to some may be the clandestine nature and full scope of the black budget, which, according to analyst Catherine Austin Fitts, goes far beyond classified appropriations. Based on her research, some of which can be found in her piece “What’s Up With the Black Budget?,” Fitts concludes that the during the last decade, global financial elites have configured an elaborate system that makes most of the military budget unauditable. This is because the real black budget includes money acquired by intelligence groups via narcotics trafficking, predatory lending, and various kinds of other financial fraud.
  • The result of this vast, geopolitically-sanctioned money laundering scheme is that Housing and Urban Devopment and other agencies are used for drug trafficking and securities fraud. According to Fitts, the scheme allows for at least 85 percent of the U.S. federal budget to remain unaudited. Fitts has been researching this issue since 2001, when she began to believe that a financial coup d’etat was underway. Specifically, she suspected that the banks, corporations, and investors acting in each global region were part of a “global heist,” whereby capital was being sucked out of each country. She was right.
  • As Fitts asserts, “[She] served as Assistant Secretary of Housing at the US Department of Housing and Urban Development (HUD) in the United States where I oversaw billions of government investment in US communities…..I later found out that the government contractor leading the War on Drugs strategy for U.S. aid to Peru, Colombia and Bolivia was the same contractor in charge of knowledge management for HUD enforcement. This Washington-Wall Street game was a global game. The peasant women of Latin America were up against the same financial pirates and business model as the people in South Central Los Angeles, West Philadelphia, Baltimore and the South Bronx.” This is part of an even larger financial scheme. It is fairly well-established by now that international financial institutions like the World Trade Organization, the World Bank, and the International Monetary Fund operate primarily as instruments of corporate power and nation-controlling infrastructure investment mechanisms. For example, the primary purpose of the World Bank is to bully developing countries into borrowing money for infrastructure investments that will fleece trillions of dollars while permanently indebting these “debtor” nations to West. But how exactly does the World Bank go about doing this? John Perkins wrote about this paradigm in his book, Confessions of an Economic Hitman. During the 1970s, Perkins worked for the international engineering consulting firm, Chas T. Main, as an “economic hitman.” He says the operations of the World Bank are nothing less than “pure economic colonization on behalf of powerful corporations and banks that use the United States government as their tool.”
  • ...1 more annotation...
  • In his book, Perkins discusses Joseph Stiglitz, the Chief Economist for the World Bank from 1997-2000, at length. Stiglitz described the four-step plan for bamboozling developing countries into becoming debtor nations: Step One, according to Stiglitz, is to convince a nation to privatize its state industries. Step Two utilizes “capital market liberalization,” which refers to the sudden influx of speculative investment money that depletes national reserves and property values while triggering a large interest bump by the IMF. Step Three, Stiglitz says, is “Market-Based Pricing,” which means raising the prices on food, water and cooking gas. This leads to “Step Three and a Half: The IMF Riot.” Examples of this can be seen in Indonesia, Bolivia, Ecuador and many other countries where the IMF’s actions have caused financial turmoil and social strife. Step 4, of course, is “free trade,” where all barriers to the exploitation of local produce are eliminated. There is a connection between the U.S. black budget and the trillion dollar international investment fraud scheme. Our government and the banking cartels and corporatocracy running it have configured a complex screen to block our ability to audit their budget and the funds they use for various black op projects. However, they can not block our ability to uncover their actions and raise awareness.
Gary Edwards

Google News - 0 views

  •  
    "http://www.pjtv.com/s/GEZDSMRS" The only video anyone needs to watch concerning the George Zimmerman - Trayvon Martin Circus. Awesome presentation by Bill Whittle sets straight the facts, including photos and evidence from the scene of the fight. Incredibly, the Obama - Holder "race hustling poverty pimp" show is trying to blame white-on-black racial violence and the "Stand your ground" laws as the problem. Funny but George Zimmerman is about as "white" as Obama is. If Obama, whose mother was white, attacked a black man, would that be considered "white-on-black"? How is it any different with Zimmerman, whose father is white, and mother Latino? And the "Stand your ground" law was never a factor in this case. Zimmerman's defense was 100% based on basic self defense. Nor did the prosecution bring up "Stand your ground" or otherwise reference the law. So how is that an issue with race hustling poverty pimps? Well, the pimps out to destroy the Second Amendment rights of 310 million Americans. In spite of the fact that guns are the weapon of choice that millions of black families, living in the urban lawlessness of socialist American cities, use to defend themselves and their families. Wherever the gun control nazis succeed, the black-on-black crime rates soar. Bill Whittle continues to be my favorite commentator.
Paul Merrell

Gov't Amasses Riot Police, Military Gear, And Opens Makeshift Prisons To Prepare For RNC - 0 views

  • Authorities in Cleveland, Ohio, are adding fuel to an already “combustible” atmosphere, some activists say, as the city readies extra jail space and courtrooms and shuts down a local university to house 1,700 riot police and their weapons in preparation for demonstrations at next week’s Republican Party convention. Democracy Now! reported Thursday that city officials “say some courts will be kept open almost 24 hours per day in case protesters are arrested en masse. Authorities have also opened up extra jail space to hold protesters.” The decision to shut down classes at Case Western Reserve University to house riot police drew ire from students and faculty,
  • Adding tension to the situation in Cleveland is the fact that several Black Lives Matter protests last week saw mass arrests and violent behavior from police, leading civil rights groups in Louisiana to sue the Baton Rouge police force for violating demonstrators’ First Amendment rights—not to mention the fatal police shootings of two black men in St. Pauland Baton Rouge a week prior. In Cleveland in particular, there is widespread distrust of the police department that fatally shot 12-year-old Tamir Rice, and then lied about the circumstances of the killing to cover themselves. Police nationwide have also been on edge since a lone gunman ambushed a peaceful protest in Dallas, killing five officers. Moreover, it emerged on Thursday that officials from the FBI have been personally contacting civil rights activists associated with the Black Lives Matter movement to warn them that they shouldn’t show up at the convention, the Independent reports.
  • As Ohio has an “open carry” law allowing the open display of guns, observers expect many convention-goers to be armed. “Should violence break out during protests in Cleveland, open-carry activists bearing long-gun rifles may distract officers, frighten demonstrators, or inadvertently endanger themselves,” CityLab argued.
  • ...2 more annotations...
  • Activists are preparing for the worst. The Boston Globe reported that hundreds of demonstrators “will undergo training to help ensure their safety. Some will don neon green caps and be tasked with documenting—with video—the use of force by police or attacks by other groups.” “Activists are being trained to make sure their hands are always exposed, so it’s evident they are not holding weapons, and to clearly articulate if approached by police that they are ‘complying, not resisting,'” the newspaper added.
  • Heads of the Department of Homeland Security and the FBI both told reporters that theyfear violence from “radical activists” at next week’s convention, ABC reported. “It’s a threat we’re watching very, very carefully,” FBI director James Comey said.
  •  
    The DNC convention may be every bit as tension-filled, with Sanders supporters aiming to bring 1 million people to the convention to sway the vote on floor amendments to the Democratic platform.
Paul Merrell

The disappeared: Chicago police detain Americans at abuse-laden 'black site' | US news ... - 0 views

  • The Chicago police department operates an off-the-books interrogation compound, rendering Americans unable to be found by family or attorneys while locked inside what lawyers say is the domestic equivalent of a CIA black site.
  • The secretive warehouse is the latest example of Chicago police practices that echo the much-criticized detention abuses of the US war on terrorism. While those abuses impacted people overseas, Homan Square – said to house military-style vehicles, interrogation cells and even a cage – trains its focus on Americans, most often poor, black and brown. Unlike a precinct, no one taken to Homan Square is said to be booked. Witnesses, suspects or other Chicagoans who end up inside do not appear to have a public, searchable record entered into a database indicating where they are, as happens when someone is booked at a precinct. Lawyers and relatives insist there is no way of finding their whereabouts. Those lawyers who have attempted to gain access to Homan Square are most often turned away, even as their clients remain in custody inside.
  • The Chicago police department operates an off-the-books interrogation compound, rendering Americans unable to be found by family or attorneys while locked inside what lawyers say is the domestic equivalent of a CIA black site.
  • ...7 more annotations...
  • The facility, a nondescript warehouse on Chicago’s west side known as Homan Square, has long been the scene of secretive work by special police units. Interviews with local attorneys and one protester who spent the better part of a day shackled in Homan Square describe operations that deny access to basic constitutional rights. Alleged police practices at Homan Square, according to those familiar with the facility who spoke out to the Guardian after its investigation into Chicago police abuse, include: Keeping arrestees out of official booking databases. Beating by police, resulting in head wounds. Shackling for prolonged periods. Denying attorneys access to the “secure” facility. Holding people without legal counsel for between 12 and 24 hours, including people as young as 15. At least one man was found unresponsive in a Homan Square “interview room” and later pronounced dead.
  • Brian Jacob Church, a protester known as one of the “Nato Three”, was held and questioned at Homan Square in 2012 following a police raid. Officers restrained Church for the better part of a day, denying him access to an attorney, before sending him to a nearby police station to be booked and charged.
  • The facility, a nondescript warehouse on Chicago’s west side known as Homan Square, has long been the scene of secretive work by special police units. Interviews with local attorneys and one protester who spent the better part of a day shackled in Homan Square describe operations that deny access to basic constitutional rights. Alleged police practices at Homan Square, according to those familiar with the facility who spoke out to the Guardian after its investigation into Chicago police abuse, include: Keeping arrestees out of official booking databases. Beating by police, resulting in head wounds. Shackling for prolonged periods. Denying attorneys access to the “secure” facility. Holding people without legal counsel for between 12 and 24 hours, including people as young as 15. At least one man was found unresponsive in a Homan Square “interview room” and later pronounced dead.
  • “Homan Square is definitely an unusual place,” Church told the Guardian on Friday. “It brings to mind the interrogation facilities they use in the Middle East. The CIA calls them black sites. It’s a domestic black site. When you go in, no one knows what’s happened to you.”
  • The secretive warehouse is the latest example of Chicago police practices that echo the much-criticized detention abuses of the US war on terrorism. While those abuses impacted people overseas, Homan Square – said to house military-style vehicles, interrogation cells and even a cage – trains its focus on Americans, most often poor, black and brown. Unlike a precinct, no one taken to Homan Square is said to be booked. Witnesses, suspects or other Chicagoans who end up inside do not appear to have a public, searchable record entered into a database indicating where they are, as happens when someone is booked at a precinct. Lawyers and relatives insist there is no way of finding their whereabouts. Those lawyers who have attempted to gain access to Homan Square are most often turned away, even as their clients remain in custody inside.
  • “It’s sort of an open secret among attorneys that regularly make police station visits, this place – if you can’t find a client in the system, odds are they’re there,” said Chicago lawyer Julia Bartmes. Chicago civil-rights attorney Flint Taylor said Homan Square represented a routinization of a notorious practice in local police work that violates the fifth and sixth amendments of the constitution. “This Homan Square revelation seems to me to be an institutionalization of the practice that dates back more than 40 years,” Taylor said, “of violating a suspect or witness’ rights to a lawyer and not to be physically or otherwise coerced into giving a statement.”
  • “It’s sort of an open secret among attorneys that regularly make police station visits, this place – if you can’t find a client in the system, odds are they’re there,” said Chicago lawyer Julia Bartmes. Chicago civil-rights attorney Flint Taylor said Homan Square represented a routinization of a notorious practice in local police work that violates the fifth and sixth amendments of the constitution.
Paul Merrell

Freedom Rider: Obama's Hollow Legacy | Black Agenda Report - 0 views

  • Democrats used to value things like global peace and justice in the workplace. But, for decades they have given their votes to warmongers and job-exporters. This week, they are mourning the defeat of a politician they once would have despised. In January, lots of Black Democrats will cry over the exit of a president who “won by making himself palatable to white people while also taking advantage of undeserved black pride.”
  • The most obvious example of Obama’s lack of substance was his relationship with black Americans. His disdain and contempt for the people who loved him the most was clear to anyone who paid attention. Jokes about “cousin Pookie” and parents serving fried chicken for breakfast should have been seen as the racist screeds they clearly were. But the desire to see a black face in a prominent place endures to our detriment.
  • Obama won by making himself palatable to white people while also taking advantage of undeserved black pride. Hillary Clinton would be the president elect if the new voters who emerged in 2008 had remained committed to the Democratic Party. But their loyalty was to the imagery of Barack Obama as president. Their joy was confined to seeing him meet the queen of England alongside his first lady or disembarking from Air Force One with his signature swagger. The sight of Barack and Michelle hosting a state dinner was enough to make black hearts swoon. Policy initiatives need not intrude upon the love fest. The end result of this unrequited and superficial love was six million fewer votes cast for Hillary Clinton in 2016 than for Obama in 2012. The apocryphal cousin Pookie stayed home and no one should be surprised. There is no secret to keeping voters engaged. They are engaged if their needs are met. Deliver for voters and they deliver in the voting booth. Even the unpopular and shady Hillary Clinton could have won Michigan if the people of Flint had received the federal help they needed so badly. Not only did the Obama environmental protection agency allow the beleaguered city to be given contaminated water, but he showed up for a photo opportunity and did nothing else as residents suffered. He drank a glass of water, posed for the cameras and returned to Washington. The people of Flint are still living under conditions Americans think of as being “Third World.”
  • ...1 more annotation...
  • The Obama team’s propaganda skills were legendary but the day of reckoning revealed the emptiness of what they produced. The corporate media acted like scribes under White House direction and declared that Russia was an enemy state and its president a 21st century Hitler. Now it is Donald Trump, the self-promoting reality television star, who declares his willingness to talk to his Russian counterpart. It is the sort of behavior that Democrats once valued. Democratic presidents Jimmy Carter and Bill Clinton began the tradition of getting Democrats to support what they didn’t like. Obama perfected the art, which ultimately led to the debacle. He will certainly not be the last to tempt the party faithful but in 2016 Democrats sold their souls and ended up with nothing. Defeat creates the most hollow feelings of all.
  •  
    Black Agenda Report tees off against Obama's legacy.
Paul Merrell

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth - 0 views

  • Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".
  • Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.
  • This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):
  • ...4 more annotations...
  • 1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.
  • If you think this is an excusable and responsible statement, raise your hand now.Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.
  • Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.
  • Privacy remains your own responsibility.
  •  
    And of course, Google would never succumb to a subpoena requiring it to turn over the audio stream to the NSA. The Tor Browser just keeps looking better and better. https://www.torproject.org/projects/torbrowser.html.en
Paul Merrell

Dangerous Crossroads: US-NATO To Deploy Ground Troops, Conduct Large Scale Naval Exerci... - 0 views

  • The World is at a dangerous Crossroads. The Western military alliance is in an advanced state of readiness. And so is Russia. Russia is heralded as the “Aggressor”. US-NATO military confrontation with Russia is contemplated. Enabling legislation in the US Senate under “The Russian Aggression Prevention Act” (RAPA) has “set the US on a path towards direct military conflict with Russia in Ukraine.”  Any US-Russian war is likely to quickly escalate into a nuclear war, since neither the US nor Russia would be willing to admit defeat, both have many thousands of nuclear weapons ready for instant use, and both rely upon Counterforce military doctrine that tasks their military, in the event of war, to preemptively destroy the nuclear forces of the enemy. (See Steven Starr, Global Research, August 22, 2014) The Russian Aggression Prevention Act (RAPA) is the culmination of more than twenty years of US-NATO war preparations, which consist in the military encirclement of both Russia and China:
  • On July 24, in consultation with the Pentagon, NATO’s Europe commander General Philip Breedlove called for “stockpiling a base in Poland with enough weapons, ammunition and other supplies to support a rapid deployment of thousands of troops against Russia”.(RT, July 24, 2014). According to General Breedlove, NATO needs “pre-positioned supplies, pre-positioned capabilities and a basing area ready to rapidly accept follow-on forces”: “He plans to recommend placing supplies — weapons, ammunition and ration packs — at the headquarters to enable a sudden influx of thousands of Nato troops” (Times, August 22, 2014, emphasis added) Breedlove’s “Blitzkrieg scenario” is to be presented at NATO’s summit in Wales in early September, according to The London Times.  It is a “copy and paste” text broadly consistent with the  Russian Aggression Prevention Act (RAPA) which directs President Obama to:
  • “(1) implement a plan for increasing U.S. and NATO support for the armed forces of Poland, Estonia, Lithuania, and Latvia, and other NATO member-states; and (2) direct the U.S. Permanent Representative to NATO to seek consideration for permanently basing NATO forces in such countries.” (S.2277 — 113th Congress (2013-2014)) More generally, a scenario of military escalation prevails with both sides involved in extensive war games. In turn, the structure of US sponsored military alliances plays a crucial role in war planning. We are dealing with a formidable military force involving a global alliance of 28 NATO member states. In turn, the US as well as NATO have established beyond the “Atlantic Region” a network of bilateral military alliances with “partner” countries directed against Russia, China, Iran and North Korea.
  • ...11 more annotations...
  • t is worth noting that FLEETEX is one among several US-NATO naval war games directed against an unnamed enemy. In July, NATO conducted naval exercises in the Black sea, in an area contiguous to Russia’s maritime borders.
  • NATO’s “Breeze” formally hosted by Bulgaria took place from July 4 to July 13, with the participation of naval vessels from Greece, Italy, Romania, Turkey, the U.K. and the U.S. The underlying scenario was the “”destruction of enemy ships in the sea and organization of air defense of naval groups and coastal infrastructure.” The exercises were “aimed at improving the tactical compatibility and collaboration among naval forces of the alliance’s member states…” (See Atlantic Council , see also Russia, U.S. ships sail in competing Black Sea exercises, July 7, Navy Times 2014) Ironically, NATO’s July Black Sea games started on exactly the same day as those of the “unnamed enemy”[Russia], involving its Crimea Black sea fleet of some 20 war ships and aircraft:
  • Russia has made it clear they don’t welcome NATO’s presence in the Black Sea. Russia’s navy let it be known that it is following the exercises with reconnaissance aircraft and surveillance ships. “The aviation of the Black Sea Fleet is paying special attention to the missile cruiser USS Vella Gulf which, though not formally the flagship of the ‘Breeze’ exercises, effectively is leading them,” a Russian naval source told NTV. (Ibid)
  • Since 2006, the US has been building up its weapons arsenal in Poland on Russia’s Western border (Kalingrad). The deployment of US forces in Poland was initiated  in July 2010 (within 40 miles from the border), with a view to training Polish forces in the use of US made Patriot missiles. (Stars and Stripes, 23 July 2010). In recent developments, the Pentagon announced in early August the deployment of US troops and National Guard forces to Ukraine as part of a military training operation. US-NATO is also planning further deployments of ground forces (as described by NATO General Breedlove) in Poland, Latvia, Estonia and Lithuania as well as in Georgia and Azerbaijan on Russia’s southern border. These deployments which are envisaged in the draft text of the “Russian Aggression Prevention Act” (RAPA) (S.2277 — 113th Congress (2013-2014)) are also part of a NATO “defensive” strategy in the case of a “Russian invasion”: Russia’s annexation of Crimea and the conflict in eastern Ukraine have alarmed Latvia, Estonia and Lithuania – like Ukraine, former Soviet republics with Russian-speaking minorities. NATO’s 28 leaders are expected to discuss plans to reassure Poland and the Baltics at a summit in Wales on Sept. 4-5.
  • Deployment on Russia’s Southern border is to be coordinated under a three country agreement signed on August 22, 2014 by Turkey, Georgia and Azerbaijan: Following the trilateral meeting of Azerbaijani, Turkish and Georgian defense ministers, Tbilisi announced that the three countries are interested in working out a plan to strengthen the defense capability. “The representatives of the governments of these three countries start to think about working out a plan to strengthen the defense capability,” Alasania said, adding that this is in the interests of Europe and NATO.“Because, this transit route [Baku-Tbilisi-Kars] is used to transport the alliance’s cargo to Afghanistan,” he said. Alasania also noted that these actions are not directed against anyone. (See Azeri News, August 22, 2014, emphasis added)
  • In the Far-east, Russia’s borders are also threatened by Obama’s “Pivot to Asia”. The “Pivot to Asia” from a military standpoint consists in extending US military deployments in the Asia-Pacific as well as harnessing the participation of Washington’s allies in the region, including Japan, South Korea and Australia. These countries have signed bilateral military cooperation agreements with Washington. As US allies, they are slated to be involved in Pentagon war plans directed against Russia, China and North Korea: Japan and South Korea are also both part of a grand U.S. military project involving the global stationing of missile systems and rapid military forces, as envisioned during the Reagan Administration. (Mahdi Darius Nazemroaya, Global Military Alliance: Encircling Russia and China, Global Research, October 5, 2007) This Pentagon strategy of military encirclement requires both centralized military decision making (Pentagon, USSTRATCOM) as well coordination with NATO and the various US regional commands.
  • On August 12, the US and Australia signed a military agreement allowing for the deployment of US troops in Australia. This agreement is part of Obama’s Pivot to Asia: The U.S. and Australia signed an agreement Tuesday [August 12] that will allow the two countries’ militaries to train and work better together as U.S. Marines and airmen deploy in and out of the country. “This long-term agreement will broaden and deepen our alliance’s contributions to regional security,” U.S. Defense Secretary Chuck Hagel said Tuesday. He described the U.S.-Australia alliance as the “bedrock” for stability in the Asia-Pacific region.
  • Ironically, coinciding with the announcement of the US-Australia agreement (August 12), Moscow announced that it would be conducting naval exercises in the Kuril Islands of the Pacific Ocean (which are claimed by Japan): “Exercises began involving military units in the region, which have been deployed to the Kuril Islands,” Colonel Alexander Gordeyev, a spokesman for Russia’s Eastern Military District, told news agency Interfax. (Moscow Times, August 12, 2014)
  • While this renewed East-West confrontation has mistakenly been labelled a “New Cold War”, none of the safeguards of The Cold War era prevail. International diplomacy has collapsed. Russia has been excluded from the Group of Eight (G-8), which has reverted to the G-7 (Group of Seven Nations). There is no “Cold War East-West dialogue” between competing superpowers geared towards avoiding military confrontation. In turn, the United Nations Security Council has become a de facto mouthpiece of the U.S. State Department. US-NATO will not, however, be able to win a conventional war against Russia, with the danger that military confrontation will lead to a nuclear war. In the post-Cold war era, however, nuclear weapons are no longer considered as a  “weapon of last resort” under the Cold War doctrine of “Mutual Assured Destruction” (MAD).  Quite the opposite. nuclear weapons are heralded by the Pentagon as “harmless to the surrounding civilian population because the explosion is underground”. In 2002, the U.S. Senate gave the green light for the use of nuclear weapons in the conventional war theater.  Nukes are part of the “military toolbox” to be used alongside conventional weapons.
  • When war becomes peace, the world is turned upside down.  In a bitter irony, nukes are now upheld by Washington as “instruments of peace”. In addition to nuclear weapons, the use of chemical weapons is also envisaged. Methods of non-conventional warfare are also contemplated by US-NATO including financial warfare, trade sanctions, covert ops, cyberwarfare, geoengineering and environmental modification technologies (ENMOD). But Russia also has  extensive capabilities in these areas.
  • The timeline towards war with Russia has been set. The Wales NATO venue on September 4-5, 2014 is of crucial importance. What we are dealing with is a World War III Scenario, which is the object of the Wales NATO Summit, hosted by Britain’s Prime Minister David Cameron. The agenda of this meeting has already been set by Washington, NATO and the British government. It requires, according to PM David Cameron in a letter addressed to heads of State and heads of government of NATO member states ahead of the Summit that: “Leaders [of NATO countries] must review NATO’s long term relationship with Russia at the summit in response to Russia’s illegal actions in Ukraine. And the PM wants to use the summit to agree how NATO will sustain a robust presence in Eastern Europe in the coming months to provide reassurance to allies there, building on work already underway in NATO.” (See PM writes to NATO leaders ahead of NATO Summit Wales 2014)
Paul Merrell

Defense Update:Russia 'Welcomes' the US Destroyer Truxtun, by Moving Bastion Anti-Ship ... - 0 views

  • Unconfirmed news reports claim the Russian Navy is deploying land-based ‘Bastion’ anti-ship missile systems as a response to the recent U.S. move entering two naval vessels to the Black Sea. The two American Arleigh Burke class destroyer USS Truxtun (DDG-103) crossed the Bosphorus Strait Friday, headed into the Black Sea, as tensions simmer over Ukraine’s Crimea region. The Russians also moved two naval combatants from the Mediterranean Task Force back to the Black Sea Fleet. Tension is mounting in the Crimea Peninsula with the preparations for a referendum on independence from Ukraine later this week. As of today, the Truxtun remain the only US warship in the Black Sea following the southbound passage of FF(G)-50 USS Taylor through the Bosphorus. The Taylor, a Perry class frigate was deployed to the Black Sea before the 2014 Sochi Olympic Games started. USS Taylor and the flag ship of the US 6th Fleet USS Mount Whitney were sent to the Black Sea to help with the evacuation of US athletes and spectators in case of an terror attack to the Games. However, when visiting the Black Sea port of Samsun, Turkey, the frigate damaged her propelled and had to be towed away to Souda, Crete for repairs
  • The US Navy said in a statement on Thursday that the ship was bound for the Black Sea to conduct military exercises with Bulgarian and Romanian naval forces. According to the Montreux Convention, warships of countries which do not border the Black Sea can only stay in the waters for 21 days. The Bastion anti-ship missile system was deployed last night (8-9 March) to Sevastopol from the Russian town of Anapa, Krasnodar, about 250 miles to the East. Follow bystanders recorded the movement of Bastion anti-ship launcher complex on the streets Crimea. The K-300P Bastion-P employs P-800 Yakhont (SS-N-26) anti-ship cruise missile hypersonic anti-ship missiles carried on mobile transporter-erector-launchers (TEL) is a Russian. The missiles are used as mobile coastal defence systems, having an effective range of 300 km.
Paul Merrell

Revealed: Senate report contains new details on CIA black sites | Al Jazeera America - 0 views

  • A Senate Intelligence Committee report provides the first official confirmation that the CIA secretly operated a black site prison out of Guantánamo Bay, two U.S. officials who have read portions of the report have told Al Jazeera. The officials — who spoke on condition of anonymity because the 6,600-page report on the CIA’s detention and interrogation program remains classified — said top-secret agency documents reveal that at least 10 high-value targets were secretly held and interrogated at Guantánamo’s Camp Echo at various times from late 2003 to 2004. They were then flown to Rabat, Morocco, before being officially sent to the U.S. military’s detention facility at Guantánamo in September 2006. In September 2006, President George W. Bush formally announced that 14 CIA captives had been transferred to Guantánamo and would be prosecuted before military tribunals. He then acknowledged for the first time that the CIA had been operating a secret network of prisons overseas to detain and interrogate high-value targets.
  • The Senate report, according to Al Jazeera’s sources, says that the CIA detained some high-value suspects on Diego Garcia, an Indian Ocean island controlled by the United Kingdom and leased to the United States. The classified CIA documents say the black site arrangement at Diego Garcia was made with the “full cooperation” of the British government. That would confirm long-standing claims by human rights investigators and journalists, whose allegations — based on flight logs and unnamed government sources — have routinely been denied by the CIA. The CIA and State Department declined Al Jazeera’s requests for comment. The Intelligence Committee last week voted 11 to 3 to declassify the report’s 480-page executive summary and 20 conclusions and findings, which incorporate responses from Republican members of the committee and from the CIA. The executive summary will undergo a declassification review, led by the CIA, with input from the State Department and the Office of the Director of National Intelligence, the U.S. officials said. The panel’s chairwoman, Democratic Sen. Dianne Feinstein, said in a statement last Thursday that the full 6,600-page report, with 37,000 footnotes, “will be held for declassification at a later time.”
  • Leaked details of the committee’s report have caused waves in countries like Poland, where the CIA is known to have operated a black site prison — which Polish officials continue to deny having known about. The U.S. officials who spoke to Al Jazeera said that the Senate report reveals 20 prisoners were secretly detained in Poland from 2002 to 2005. They added that Polish officials recently sought assurances from diplomats and visiting U.S. officials that the Senate report would conceal details about Poland’s role in allowing the CIA black site to be operated on Polish soil. Al Jazeera’s sources said U.S. officials reassured their Polish counterparts last year that it was almost certain that the declassified version of the report would not identify the countries that cooperated with the CIA’s detention and interrogation program.
  • ...6 more annotations...
  • According to the Senate report, Al Jazeera’s sources said, a majority of the more than 100 detainees held in CIA custody were detained in secret prisons in Afghanistan and Morocco, where they were subject to torture methods not sanctioned by the Justice Department. Those methods are recalled by the report in vivid narratives lifted from daily logs of the detention and interrogation of about 34 high-value prisoners. The report allegedly notes that about 85 detainees deemed low-value passed through the black sites and were later dumped at Guantánamo or handed off to foreign intelligence services. More than 10 of those handed over to foreign intelligence agencies “to face terrorism charges” are now “unaccounted for” and presumed dead, the U.S. officials said. The Senate report says more than two dozen of these men designated low-value had, in fact, been wrongfully detained and rendered to other countries on the basis of intelligence obtained from CIA captives under torture and from information shared with CIA officials by other governments, both of which turned out to be false. The report allegedly singles out a top CIA official for botching a handful of renditions and outlines agency efforts to cover up the mistakes. The Senate report allegedly accuses “senior CIA officials” of lying during multiple closed-session briefings to members of Congress from 2003 to 2005 about the use of certain “enhanced” interrogation techniques. The report says an agency official lied to Congress in 2005 when he insisted the U.S. was adhering to international treaties barring cruel and degrading treatment of prisoners, the U.S. officials told Al Jazeera.
  • The report not only accuses certain CIA officials of deliberately misleading Congress; Al Jazeera’s sources say it also suggests that the agency sanctioned leaks to selected journalists about phantom plots supposedly disrupted as a result of information gained through the program in order to craft a narrative of success. The Senate report, like a 2009 Senate Armed Services Committee report (PDF), says Air Force psychologists under contract to the CIA reverse-engineered a decades-old resistance-training program taught to U.S. airmen known as survival evasion resistance escape (SERE). According to a SERE training document obtained by Al Jazeera titled “Coercive Exploitation Techniques,” Air Force personnel were taught that communist regimes used “deprivations” of “food, water, sleep and medical care” as well as “the use of threats” in order to weaken a captive’s mental and physical ability to resist interrogation. “Isolation” would be used, according to the SERE program, to deprive the “recipient of all social support” so that he develops a “dependency” on his interrogator. And “physical duress, violence and torture” are used to weaken “mental and physical ability to resist exploitation.” Ironically, perhaps, the SERE document (displayed below) notes that such techniques were used by the Soviet Union, China and North Korea to obtain false confessions.
  • Senate investigators allegedly obtained from the CIA a 2003 “business plan,” written by Air Force psychologists James Mitchell and Bruce Jessen, that contained erroneous details about the positive aspects of the enhanced interrogation program and the veracity of the intelligence its extracted from detainees. The “business plan” states that Al-Qaeda captives were “resistant” to “standard” interrogation techniques, an argument the Senate report found lacked merit because torture techniques were used before they were even questioned. Neither Jessen, who lives in Spokane, Wash., nor Mitchell, who resides in Land o’ Lakes, Fla., responded to phone calls or emails for comment. Both men are featured prominently in the Senate’s report, according to U.S. officials.
  • According to Al Jazeera’s sources, Zain Abidin Mohammed Husain Abu Zubaydah was the only captive subjected to all 10 torture techniques identified in an August 2002 Justice Department memo. But the U.S. officials said the Senate report concludes that the methods applied to Abu Zubaydah went above and beyond the guidelines outlined in that memo and were used before the memo establishing their legality was written. The Senate report allegedly adopts part of a narrative from former FBI special agent Ali Soufan, who first interrogated Abu Zubaydah at the black site and wrote in his book “The Black Banners” that Mitchell was conducting an “experiment” on Abu Zubaydah. For example, the August 2002 Justice Department legal memo authorized sleep deprivation for Abu Zubaydah for 11 consecutive days, but Mitchell kept him awake far longer, the U.S. officials said, citing classified CIA cables. Abu Zubaydah was stripped naked, strapped into a chair and doused with cold water to keep him awake. He was then interrogated and asked what he knew, at which point, his attorney told Al Jazeera, Abu Zubaydah was “psychotic” and would have admitted to anything.
  • Additionally, the report allegedly says that Abu Zubaydah was stuffed into a pet crate (the type used to transport dogs on airplanes) over the course of two weeks and routinely passed out, was shackled by his wrists to the ceiling of his cell and subjected to an endless loop of loud music. One former interrogator briefed about Abu Zubaydah’s interrogations from May to July 2002 told Al Jazeera that the music used to batter the detainee’s senses was by the Red Hot Chili Peppers. Abu Zubaydah’s attorney, Brent Mickum, hopes the Senate report’s executive summary will vindicate what he has been saying for years. “My client was tortured brutally well before any legal memo was issued,” Mickum said. He expects the report to “show that my client was a nonmember of Al-Qaeda, contrary to all of the earlier reports by the Bush administration. I am also confident that the report will show that, after he was deemed to be compliant while he was held in Thailand, that he continued to be tortured on explicit orders from the Bush administration.” The Senate report, according to Al Jazeera’s sources, says that CIA interrogators were under an enormous pressure from top agency officials, themselves under pressure from the White House, to use “enhanced” interrogation techniques to obtain information from detainees connecting Iraq and Al-Qaeda.
  • One interrogator who worked for the CIA and the U.S. military during Bush’s tenure and participated in the interrogations of two high-value CIA prisoners told Al Jazeera — speaking on condition of anonymity because he is still employed by the U.S. government — that the “enhanced” interrogation program was “nothing more than the Stanford Prison Experiment writ large.” (The 1971 Stanford University study shocked the public by demonstrating how easily people placed in authority over more vulnerable others resorted to cruelty.) “Interrogators were being pressured — You have to get info from these people,’” the interrogator told Al Jazeera. “There was no consideration that the person we were interrogating may not know. That was always seen as a resistance technique. ‘They [the detainees] must be lying!’ There was pressure on us from above to produce what they wanted. Not a single person I worked with knew how to conduct an interrogation or [had] ever conducted an interrogation.”
Paul Merrell

FBI monitored and critiqued African American writers for decades | Books | The Guardian - 0 views

  • Newly declassified documents from the FBI reveal how the US federal agency under J Edgar Hoover monitored the activities of dozens of prominent African American writers for decades, devoting thousands of pages to detailing their activities and critiquing their work. Academic William Maxwell first stumbled upon the extent of the surveillance when he submitted a freedom of information request for the FBI file of Claude McKay. The Jamaican-born writer was a key figure in the Harlem Renaissance, author of the sonnet If We Must Die, supposedly recited by Winston Churchill, and Maxwell was preparing an edition of his complete poems. When the file came through from the FBI, it stretched to 193 pages and, said Maxwell, revealed “that the bureau had closely read and aggressively chased McKay” – describing him as a “notorious negro revolutionary” – “all across the Atlantic world, and into Moscow”.
  • Maxwell, associate professor of English and African American studies at Washington University in St Louis, decided to investigate further, knowing that other scholars had already found files on well-known black writers such as Langston Hughes and James Baldwin. He made 106 freedom of information requests about what he describes as “noteworthy Afro-modernists” to the FBI; 51 of those writers had files, ranging from three to 1,884 pages each. “I suspected there would be more than a few,” said Maxwell. “I knew Hoover was especially impressed and worried by the busy crossroads of black protest, leftwing politics, and literary potential. But I was surprised to learn that the FBI had read, monitored, and ‘filed’ nearly half of the nationally prominent African American authors working from 1919 (Hoover’s first year at the Bureau, and the first year of the Harlem Renaissance) to 1972 (the year of Hoover’s death and the peak of the nationalist Black Arts movement). In this, I realised, the FBI had outdone most every other major institution of US literary study, only fitfully concerned with black writing.”
  • Maxwell’s book about his discovery, FB Eyes: How J Edgar Hoover’s Ghostreaders Framed African American Literature, is out on 18 February from Princeton University Press. It argues that the FBI’s attention was fuelled by Hoover’s “personal fascination with black culture”, that “the FBI is perhaps the most dedicated and influential forgotten critic of African American literature”, and that “African American literature is characterised by a deep awareness of FBI ghostreading”.
  • ...2 more annotations...
  • Digital copies of 49 of the FBI files have been made available to the public online. “The collected files of the entire set of authors comprise 13,892 pages, or the rough equivalent of 46 300-page PhD theses,” Maxwell writes in the book. “FBI ghostreaders genuinely rivalled the productivity of their academic counterparts.” The academic told the Guardian that he believes the FBI monitoring stems from the fact that “from the beginning of his tenure at the FBI ... Hoover was exercised by what he saw as an emerging alliance between black literacy and black radicalism”.
  • The files show how the travel arrangements of black writers were closely scrutinised by the FBI, with the passport records of a long list of authors “combed for scraps of criminal behaviour and ‘derogatory information’”, writes Maxwell. Some writers were threatened by “‘stops’, instructions to advise and defer to the Bureau if a suspect tried to pass through a designated point of entry” to the US.
Paul Merrell

CIA photos of 'black sites' could complicate Guantanamo trials - The Washington Post - 0 views

  • Military prosecutors this year learned about a massive cache of CIA photographs of its former overseas “black sites” while reviewing material collected for the Senate investigation of the agency’s interrogation program, U.S. officials said. The existence of the approximately 14,000 photographs will probably cause yet another delay in the military commissions at Guantanamo Bay, Cuba, as attorneys for the defendants demand that all the images be turned over and the government wades through the material to decide what it thinks is relevant to the proceedings.
  • The death penalty cases against the five men first began in 2008 under the Bush administration and was abandoned by the Obama administration for a planned trial in federal court in New York. That effort collapsed, and the prosecution was returned to the military in 2011.
  • The electronic images depict external and internal shots of facilities where the CIA held ­al-Qaeda suspects after 9/11, but they do not show detainee interrogations, including the torture of some suspects who were subjected to waterboarding and other brutal techniques. They do include images of naked detainees during transport, according to the officials, who spoke on the condition of anonymity because the material remains classified. The pictures also show CIA personnel and members of foreign intelligence services, as well as psychologists Bruce Jessen and James Mitchell, among the architects of the interrogation program.
  • ...4 more annotations...
  • It’s unclear whether the military prosecutors have been able to review all the photographs and why they hadn’t unearthed them years earlier. Former U.S. officials said Martins’s team was supposed to have the same access as Senate investigators and federal prosecutors to shared electronic drives containing agency documents at a secret location in Virginia. “It raises the question whether the agency is being cooperative with the prosecutors,” said James Harrington, the civilian attorney for 9/11 defendant Ramzi Binalshibh. “It’s beyond preposterous.”
  • mong the images are those of cells and bathrooms at the detention sites, including a facility in Afghanistan known as “Salt Pit,” where the waterboard was photographed.
  • The bulk of the photographs depict black sites in Thailand, Afghanistan and Poland. There are fewer shots of prisons in Romania and Lithuania, which were among the last to be used before they were closed in 2006. A former intelligence official who reviewed some of the photographs of the prison in Thailand described them as nondescript.
  • “Why is it we are still learning about this stuff?” said Joe Margulies, Zubaydah’s attorney. “Who knows what is still out there? What else is there? That’s what is appalling.” James Connell, defense attorney for Ammar al-Baluchi, one of the 9/11 defendants, filed a motion in January 2013 to compel production of “documents and information” relating to where the “accused or a potential witness have been confined.” Connell said the military judge overseeing the case hasn’t ruled on that motion. “If pictures from black sites exist, they are crime scene photographs,” Connell said. “The military commission rules require the prosecution to turn them over to the defense, but federal and international prosecutors should also get a copy — not to mention the public.”
  •  
    So finally the locations of at least some of the CIA "black sites" are out in the open. 
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Do We Really Want a New World War With Russia? | New Eastern Outlook - 0 views

  • Washington continues making an international fool of herself by her inability to effectively counter the impression around the world that Russia, spending less than 10% of the Pentagon annually on defense, has managed to do more against ISIS in Syria in six weeks than the mighty US Air Force bombing campaign has done in almost a year and half. One aspect that bears attention is the demonstration by the Russian military of new technologies that belie the widely-held Western notion that Russia is little more than a backward oil and raw material commodity exporter. Recent reorganization of the Russian state military industrial complex as well as reorganization of the Soviet-era armed forces under Defense Minister Sergey Shoigu’s term are visible in the success so far of Russia’s ISIS and other terror strikes across Syria. Clearly Russian military capabilities have undergone a sea-change since the Soviet Cold War era. In war there are never winners. Yet Russia has been in an unwanted war with Washington de facto since the George W. Bush Administration announced its lunatic plan to place what they euphemistically term “Ballistic Missile Defense” missiles and advanced radar in Poland, Czech Republic, Romania and Turkey after 2007. Without going into detail, BMD technologies are the opposite of defensive. They instead make a pre-emptive war highly likely. Of course the radioactive ash heap in such an exchange would be first and foremost the EU countries foolish enough to invite US BMD to their soil.
  • What the Russian General Staff has managed, since the precision air campaign began September 30, has stunned western defense planners with Russian technological feats not expected. Two specific technologies are worth looking at more closely: The Russian Sukoi SU-34 fighter-bomber and what is called the Bumblebee hyperbaric mortar weapon.
  • The plane responsible for some of the most damaging strikes on ISIS and other terror enclaves in Syria is manufactured by the Russian state aircraft industry under the name Sukhoi SU-34. As the Russian news agency RIA Novosti described the aircraft, “The Su-34 is meant to deliver a sufficiently large ordnance load to a predetermined area, hit the target accurately and take evasive action against pursuing enemy planes.” The plane is also designed to deal with enemy fighters in aerial combat such as the US F-16. The SU-34 made a first test flight in 1990 as the collapse of the Soviet Union and the chaos of the Yeltsin years caused many delays. Finally in 2010 the plane was in full production. According to a report in US Defense Industry Daily, among the SU-34 features are: • 8 ton ordnance load which can accommodate precision-guided weapons, as well as R-73/AA-11 Archer and R-77/AA-12 ‘AMRAAMSKI’ missiles and an internal 30mm GSh-301 gun. • Maximum speed of Mach 1.8 at altitude.
  • ...8 more annotations...
  • • 3,000 km range, extensible to “over 4,000 km” with the help of additional drop tanks. The SU-34 can also refuel in mid-air. • It can fly in TERCOM (Terrain Contour Matching) mode for low-level flight, and has software to execute a number of difficult maneuvers. • Leninets B004 phased array multimode X-band radar, which interleaves terrain-following radar and other modes.
  • Clearly the aircraft is impressive as it has demonstrated against terrorist centers in Syria. Now, however, beginning this month it will add a “game-changer” in the form of a new component. Speaking at the Dubai Air Show on November 12, Igor Nasenkov, the First Deputy General Director of the Radio-Electronic Technologies Concern (KRET) announced that this month, that is in the next few days, SUKHOI SU-34 fighter-bombers will become electronic warfare aircraft as well. Nasenkov explained that the new Khibiny aircraft electronic countermeasures (ECM) systems, installed on the wingtips, will give the SU-34 jets electronic warfare capabilities to launch effective electronic countermeasures against radar systems, anti-aircraft missile systems and airborne early warning and control aircraft. KRET is a holding or group of some 95 Russian state electronic companies formed in 2009 under the giant Russian state military industry holding, Rostec.
  • Russia’s advances in what is euphemistically termed in military jargon, Electronic Counter Measures or ECM, is causing some sleepless nights for the US Pentagon top brass to be sure. In the battles in eastern pro-Russian Ukraine earlier this year, as well as in the Black Sea, and now in Syria, according to ranking US military sources, Russia deployed highly-effective ECM technologies like the Krasukha-4, to successfully jam hostile radar and aircraft. Lt. General Ben Hodges, Commander of US Army Europe (USAREUR) describes Russian ECM capabilities used in Ukraine as “eye-watering,” suggesting some US and NATO officers are more than slightly disturbed by what they see. Ronald Pontius, deputy to Army Cyber Command’s chief, Lt. Gen. Edward Cardon, told a conference in October that, “You can’t but come to the conclusion that we’re not making progress at the pace the threat demands.” In short, Pentagon planners have been caught flat-footed for all the trillions of wasted US taxpayer dollars in recent years thrown at the military industry.
  • During the critical days of the March 2014 Crimean citizens’ referendum vote to appeal for status within Russia, New York Times reporters then in Crimea reported the presence of Russian electronic jamming systems, known as R-330Zh Zhitel, manufactured by Protek in Voronezh, Russia. That state-of-the-art technology was believed to have been used to prevent the Ukrainian Army from invading Crimea before the referendum. Russian forces in Crimea, where Russia had a legal basing agreement with Kiev, reportedly were able to block all communication of Kiev military forces, preventing a Crimean bloodbath. Washington was stunned.
  • Thereafter, in April, 2014, one month after the accession of Crimea into the Russian Federation, President Obama ordered the USS Donald Cook into the Black Sea waters just off Crimea, the home port of Russia’s Black Sea Fleet, to “reassure” EU states of US resolve. Donald Cook was no ordinary guided missile destroyer. It had been refitted to be one of four ships as part of Washington’s Aegis Ballistic Missile Defense System aimed at Russia’s nuclear arsenal. USS Donald Cook boldly entered the Black Sea on April 8 heading to Russian territorial waters. On April 12, just four days later, the US ship inexplicably left the area of the Crimean waters of the Black Sea for a port in NATO-member Romania. From there it left the Black Sea entirely. A report on April 30, 2014 in Russian newspaper Rossiyskaya Gazeta Online titled, “What Frightened the American Destroyer,” stated that while the USS Donald Cook was near Crimean (Russian by that time) waters, a Russian Su-24 Frontal Aviation bomber conducted a flyby of the destroyer. The Rossiyskaya Gazeta went on to write that the Russian SU-24 “did not have bombs or missiles onboard. One canister with the Khibin electronic warfare complex was suspended under the fuselage.” As it got close to the US destroyer, the Khibins turned off the USS Donald Cook’s “radar, combat control circuits, and data transmission system – in short, they turned off the entire Aegis just like we turn off a television by pressing the button on the control panel. After this, the Su-24 simulated a missile launch at the blind and deaf ship. Later, it happened once again, and again – a total of 12 times.”
  • While the US Army denied the incident as Russian propaganda, the fact is that USS Donald Cook never approached Russian Black Sea waters again. Nor did NATO ships that replaced it in the Black Sea. A report in 2015 by the US Army’s Foreign Military Studies Office assessed that Russia, “does indeed possess a growing EW capability, and the political and military leadership understand the importance…Their growing ability to blind or disrupt digital communications might help level the playing field when fighting against a superior conventional foe.” Now new Russian Khibini Electronic Counter Measure systems are being installed on the wingtips of Russia’s SUKHOI SU-34 fighter-bombers going after ISIS in Syria.
  • A second highly-advanced new Russian military technology that’s raising more than eyebrows in US Defense Secretary ‘Ash’ Carter’s Pentagon is Russia’s new Bumblebee which Russia’s military classifies as a flamethrower. In reality it is a highly advanced thermobaric weapon which launches a warhead that uses a combination of an explosive charge and highly combustible fuel. When the rocket reaches the target, the fuel is dispersed in a cloud that is then detonated by the explosive charge. US Military experts recently asked by the US scientific and engineering magazine Popular Mechanics to evaluate the Bumblebee stated that, “the resulting explosion is devastating, radiating a shockwave and fireball up to six or seven meters in diameter.” The US experts noted that the Bumblebee is “especially useful against troops in bunkers, trenches, and even armored vehicles, as the dispersing gas can enter small spaces and allow the fireball to expand inside. Thermobarics are particularly devastating to buildings — a thermobaric round entering a structure can literally blow up the building from within with overpressure.”
  • We don’t go into yet another new highly secret Russian military technology recently subject of a Russian TV report beyond a brief mention, as little is known. It is indicative of what is being developed as Russia prepares for the unthinkable from Washington. The “Ocean Multipurpose System: Status-6” is a new Russian nuclear submarine weapons system designed to bypass NATO radars and any existing missile defense systems, while causing heavy damage to “important economic facilities” along the enemy’s coastal regions. Reportedly the Status-6 will cause what the Russian military terms, “assured unacceptable damage” to an adversary force. They state that its detonation “in the area of the enemy coast” (say, New York or Boston or Washington?) would result in “extensive zones of radioactive contamination” that would ensure that the region would not be used for “military, economic, business or other activity for a long time.” Status-6 reportedly is a massive torpedo, designated as a “self-propelled underwater vehicle.” It has a range of up to 10 thousand kilometers and can operate at a depth of up to 1,000 meters. At a November 10 meeting with the Russian military chiefs, Vladimir Putin stated that Russia would counter NATO’s US-led missile shield program through “new strike systems capable of penetrating any missile defenses.” Presumably he was referring to Status-6.
  •  
    Not to mentiont that Russia has deployed its S-400 surface to air defense system to Syria, which is 2 generations later than the currently deployed U.S. Patriot systems. The S-400 can knock down aircraft or missiles flying up to 90,000 feet and travels at over 17,000 mph, very near Earth escape velocity. It has a lateral range of nearly 300 miles.
Gary Edwards

Terrorism: A Matrix of Lies and Deceit - Christopher Black - 0 views

  • Christopher Black is an international criminal lawyer based in Toronto, he is a member of the Law Society of Upper Canada and he is known for a number of high-profile cases involving human rights and war crimes, especially for the online magazine “New Eastern Outlook”.
  •  
    "Terrorism: A Matrix of Lies and Deceit - Good catch of a very interesting article from Marbux! Christopher Black (NEO) : So how is your war on "terrorism" going? I'm not doing too well at it since I have no idea who the enemy is. Like the American black comedian, Dick Gregory, who, on hearing that President Johnson had declared a war on poverty, ran out onto the street with a hand grenade to throw it at some poor people, I have no idea who the real enemy is, who to throw a grenade at. That makes me think. We are told, the world over, by every government, that we are in a "war against terrorism." But terrorism is an action, a tactic, a strategy. It's a method not person, a group, a country. How can there be a war against a method of war. But they want us to fight a method and never ask the why or the who. That doesn't seem to matter anymore. They tell us not to be concerned with why something happens, only how it happens. Let's face it, the Americans, with all the creative skills of Madison Avenue, have got us all to use a phrase that George Bush first used in 2001after the strange event in New York that has all the indicia of a state attack on its own people to justify the invasions of Afghanistan and then Iraq. It has become a euphemism and a justification for all the wars they have waged since. The people don't need to know why "terrorists" exist, or who they are and what motivates them, or even whether they really exist, for they are just "terrorists." Sometimes the war is against a "regime" that is "terrorising" its own people according to the "responsibility to protect" mafia that act as the chorus to the principal players in this theatre, as was done to Yugoslavia and Libya; or a regime that "terrorises the world", as we saw with Iraq. Sometimes the war is a phony war against 'terrorists" who are really mercenary forces fighting for the USA and its allies. We see this in Syria. We have seen it used agai
Gary Edwards

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
Paul Merrell

Inside the Battle Over the CIA Torture Report - Bloomberg View - 0 views

  • After months of internal wrangling, the Senate Intelligence Committee is finally set to release its report on President George W. Bush-era CIA practices, which among other details will contain information about foreign countries that aided in the secret detention and interrogation of suspected terrorists. Several U.S. officials told us that the negotiations are nearly complete between the Central Intelligence Agency and the committee's Democratic staff, which prepared the classified 6,300-page report and its 600-page, soon-to-be-released declassified executive summary. Dianne Feinstein, the committee's chairman, is set to release the summary early next week. Her staff members had objected vigorously to hundreds of redactions the CIA had proposed in the executive summary. After an often-contentious process to resolve the disputes, managed by top White House officials, Feinstein was able to roll back the majority of the disputed CIA redactions.
  • Among the most significant of Feinstein’s victories, the report will retain information on countries that aided the CIA program by hosting black sites or otherwise participating in the secret rendition of suspected terrorists. The countries will not be identified by name, but in other ways, such as code names like “Country A.” This falls short of Feinstein’s original desire, which was to name the countries explicitly, but represents a big victory for the committee nonetheless. In a victory for the CIA, Feinstein reluctantly agreed to allow the redactions of the pseudonyms of agency personnel mentioned in the report. The CIA maintained that any reference to individuals working under cover that offered clues to their identities could place them in harm’s way. “We need to understand the role that particular countries played across time. Even having pseudonyms for countries in the report is important for a full accounting,” said Raha Wala, senior counsel at Human Rights First, which advocated on behalf of the report’s declassification.
  • The CIA and some Republican senators had argued that even such masked identifications could be deciphered, leading to compromised relationships with those countries’ governments. In June 2013, the top intelligence official at the State Department, Philip Goldberg, wrote a classified letter to Congress warning against the disclosure of the names of countries who had participated in the program.
  • ...4 more annotations...
  • John Rizzo, who served as the CIA's acting general counsel during the black-site program and later wrote a memoir, "Company Man," said the agency has long fought against declassifying any information on the locations of the secret prisons overseas. "That was something we had fought for years and years," Rizzo told us. "Up to now one of the only remaining classified facts about the program was the names of countries where there were black sites." Rizzo said the concern about even referencing the locations of the black sites is that one could piece together the locations with other information that is likely to be in the final public report. One Republican Senate staffer familiar with the negotiations over the report said Feinstein's office relented on some concerns about redacting information that could identify countries hosting the black sites. "Do you scrub enough information to prevent that information from being released?" the staffer said. "It ended up as a half-step in-between, some of the stuff she wanted released and some of the information identifying the countries has been redacted."
  • There is also a risk that any information about foreign countries that aided the CIA programs, even using code names,  could be matched against public reporting that already exists to make them more identifiable. There have been news reports about cooperation by the governments of Poland,  Lithuania, Romania, Thailand and others. "Just because something is leaked doesn’t mean it’s still not secret," Rizzo said. "A national security secret is still a national security secret until the government says otherwise."
  • Originally there had been bipartisan support for the majority staff’s investigation, and the committee’s Republican staff was initially part of the investigation -- but it withdrew early in the process. Even after the Republican staff disowned the investigation, some Republican senators continued to support declassification, including John McCain and Lindsey Graham.
  • The release will not include internal CIA documents that the agency accused Feinstein’s staff of improperly removing from a CIA facility that had been set up for the investigators to work at. Feinstein said that her staff had removed the documents, including a review by Panetta, only after CIA officials tried to surreptitiously remove them from computers being used by the committee’s staff. “What was unique and interesting about the internal documents was not their classification level, but rather their analysis and acknowledgement of significant CIA wrongdoing,” Feinstein said on the Senate floor in July. “The interrogations and the conditions of confinement at the CIA detention sites were far different and far more harsh than the way the CIA had described them to us.”
  •  
    Nations that knowingly hosted the CIA "black sites" won't be named, as though their own citizens should be deprived of that information. I still maintain that there would be no need for redacting CIA agents' names who participated in the torture if they were named in criminal complaints as they are required to be by the Convention Against Torture, which -- through the Constitution's Treaty Clause, is "the law of this land." 
Paul Merrell

Failed NATO Invasion of Moldova SITREP, by Scott | The Vineyard of the Saker - 0 views

  • It’s hard to overestimate the value of planning in advance, especially when it comes to getting reservations in popular restaurants and invading countries by military force. In the week of the May 9th Victory Day two significant failures took place  each one remarkable in its own way. Each event went completely unreported by the Western corporate and government media, but discussed on Social Media.
  • In the following three weeks after the incident with the USS Florida, while Russia was preparing for Victory Day celebrations and all eyes were on Moscow, attention of Ukrainians was fully concentrated on the visit of Victoria Nuland to Kiev on April 26th allegedly to discuss the implementation of the Minsk II Agreement and the future elections in Donetsk and Lugansk republics. Since the day when President Putin said that the republics can have their elections anytime they want, the question of these elections ceased to be a subject of blackmail toward the Kremlin.   It appeared that the true reason for Nuland’s visit could be located to the west of Kiev, rather than the east. Just recently, Robert D. Kaplan, a former Stratfor’s Chief Geopolitical Analyst, and currently a senior fellow at the Center for a New American Security (CNAS) has published a book “In Europe’s Shadow” where he lays out a plan to reunite Romania with “its lost province of Moldova.” Nuland visited Moldova back in January, with the task to coerce Moldova’s government and its oligarchs to change the country’s Constitution provision of neutrality. Before she left, she gave a short speech at the American Embassy in Bucharest after a private dinner with PM Ciolos and President Klaus. “We powerfully support the desire of the people in Moldova to have responsible leaders who can implement reforms. This is the best way to assure the future of Moldova. Romania and the United States, in conjunction with NATO, have support programs in place to assure the security of Moldova but the government has to work to implement these programs.”
  • Moldova is one of the poorest countries in Eastern Europe, and its economy heavily relies on Russia. According to the CIA Fact Book: Moldova’s annual remittances of about $1.12 billion comes from the roughly one million Moldovans working in Europe, Russia, and other former Soviet Bloc countries; Moldova imports almost all of its energy supplies from Russia and Ukraine; Moldova’s dependence on Russian energy is underscored by a more than $5 billion debt to Russian natural gas supplier Gazprom; Moldova signed an Association Agreement and a Deep and Comprehensive Free Trade Agreement with the EU during fall 2014, however its biggest trade partner remains Russia. Everyone understands that a NATO membership will cut all economic ties with Russia, including jobs, and it will turn Moldova into a failed state, or in the CIA doublespeak, the country would stop being vulnerable to “Russian pressure.” Apparently, the failure of Moldova as a state, and its disappearance as a nation is also what the EU wants. On January 6, the new Moldovan Ambassador to Germany was presenting his credentials when, out of the blue, the German president asked the new ambassador what the procedure was for Republic of Moldova to formally unite with Romania. On May 4th, the Katehon reported on Vladimir Plahotniuc’s (the infamous Moldavian oligarch and mafia boss) visit to the US and his meeting with Victoria Nuland there. As the Victory Day celebration was approaching, we all fully anticipated from the US to conduct terror acts, military excursions/drills, and political and legal attacks on Russia as the US and the EU always do to harass Russia during its major national and Church holidays.
  • ...6 more annotations...
  • Starting with April 21st,  we saw a flurry of “news” about Ukraine and Romania joining NATO Black Sea flotilla and the organization of Romanian-Ukrainian-Bulgarian brigade similar to that created by Poland. On April 26, Georgia (Gruzia) pitched in via the Georgia Today: “creation of NATO Black Sea Fleet Gains US Support” and praising Turkey, Bulgaria and Romania for calls to expand the Western military. All what Russia said to all this NATO generated noise was a brief statement of  Russia’s envoy to NATO Alexander Grushko. “NATO should be in a position to know that all necessary steps will be taken from our side to neutralize the emerging threats.” With all these  preparations for the war on Russia going on, NATO also planned military drills in neutral Moldova, chosen to start on May 2nd, the day of remembrance for the victims of the Odessa Massacre. Meanwhile, the patriots of Moldavia who worked together regardless of their political views, discovered something interesting and saved Moldova. NATO reported that for drills they would be entering Moldova in four formations, and that the total of motorized units will be 50+. However, the very first formation that made an attempt to enter the territory of Moldova contained 100+ unites. This was just one formation. And there was expected three more formations.
  • The plan of NATO was to enter the country with too large for this tiny country forces, to stage a bloody false flag attack during the Victory Day celebration in Moldova with the participation of Ukrainian Right Sector terrorists masquerading as “pro-Russia separatists.” This plot worked in Ukraine, so it should work in Moldova, right? That’s the true reason why Nuland was in Kiev two weeks prior. After this false flag attack, a Romanian fleet was planned to enter Ukrainian territorial waters “by invitation of the Ukrainian government” and arrive to Odessa in order to block Russian fleets from interfering and helping Transnistria. But… Coming back to the bizarre incident near Gibraltar, when one NATO member’s tiny 20 tone Costal Guards’ boat was attacked by another NATO member for interfering with the 18,000 tones behemoth of a submarine  of the third NATO member. The NATO plan apparently was to stealthy and quietly position the Ohio-class ballistic guided-missile submarine USS Florida (SSGN 728) in the Mediterranean or even in the Black Sea so it would be able to shoot into Moldova to overwhelm Moldovan minuscule defense forces. We have to remember that it was the USS Florida “that opened up the Libya intervention,” firing more than 90 cruise missiles to destroy Libya’s air defenses and clearing the way for NATO air strikes. “Never before in the history of the United States of America has one ship conducted that much land attack strikes, conventionally, in one short time period,” Rear Adm. Rick Breckenridge had said.
  • However, thanks to Spanish Costal Guards the submarine was discovered and talked about all around the world via social media and the press. The USS Florida had no other options but to retreat and return to home base. In fact, there were TWO incidents on the same April 16th  day involving the USS Florida. First, it was  the Spanish patrol boat belonged to the Servicio de Vigilancia Aduanera, at whom the British Navy opened  fire.  A bit later,  the Guardia Civil vessel Rio Cedeña tried to cut across the submarine’s bow and was photographed  by multiple witnesses.
  • According to V.V. Pyakin, a political analyst with the Concept Technologies Foundation, a think tank located in St. Petersburg, NATO was in a process of conducting a full-scale invasion of Moldova with the annexation of a Southern part of Ukraine including Odessa to construct a NATO Navy base there. Moldova was supposed to become a part of Romania automatically with the US military forces arriving to the capital and taking  over the government of Moldova. That’s why NATO needed all those military “drills” in the Black Sea region and in the Baltics simultaneously. When the patriotic forces of Moldavia discovered that NATO was about to enter the territory of Moldova in four formations, 100+ motorized units each, they protested loudly and blocked the entrance of NATO troops on the border. Meanwhile, the biggest political fraction in Moldova threatened with the impeachment of the president for treason, if  NATO troops would be allowed to enter the country. Reports from Moldova at the time disclosed that American troops stopped at the border crossing didn’t have proper ID and other papers. Moldovans came to greet them with the banners “Moldova is a neutral country” and “Stop bases of NATO,” “Stop NATO” and “NATO go home.” As the result, on April 28th only about 60 units and 200 servicemen the U.S. Army 2nd Cavalry Regimental Engineer Squadron were allowed to enter the country.
  • When a formation of American military crossed the Romanian-Moldova border allegedly to take part in  Dragon Pioneer 2016 NATO military drills, Moldavian opposition leaders expressed protests. Several members of the Parliament blocked the road.  They reported to Russian and international media and news outlets that the US troops didn’t have an international agreement signed by the defense ministers of Moldova and USA. They also lacked a legal government agreement on the entrance of the heavy military equipment and weaponry to the territory of the country. 60% of American servicemen didn’t have valid military IDs. According to a TASS report,  “To prevent collisions, officers from the Fulger (Lightning) police battalion of special purpose intervened, which were specially delivered from Chisinau. After checking the documents, a column of military vehicles followed the US to the place of temporary location at the site of Negresht,” said the inspectorate.” “The initiative to invite the US troops into the country and hold the exhibition of American technology belongs to the Minister of Defense of Moldova Anatol Șalaru, who is famous for the organization of the “Museum of Soviet occupation” in Chisinau, calls to repeal neutrality and make the country a member of NATO, and the fight against monuments of the Soviet era.” This move was harshly criticized by Igor Dodon, whose party has the largest faction in Parliament and controls a quarter of the seats.
  • He stated: “We believe military exercises involving US troops on Moldovan territory is a flagrant violation of the constitutional principle of neutrality of Moldova. In this regard, the deputies from the Party of socialists have already initiated a number of procedures. They will continue, and this will be one of the reasons for introducing in May the initiative to dismiss the government.” By Victory Day it became apparent that the Nuland-Kogan-NATO plan for invasion of Moldova was foiled. All Americans could do was   to “crush” a Victory Day parade in the center of Moldova’s capital by coming uninvited and bringing their motorized vehicles to it. And that’s where NATO troops and Moldovan patriots came face to face. Pindos lost their freaking mind:  An American Colonel demands from the citizen of Moldova to leave the central square ПИНДОСЫ ОХРЕНЕЛИ В КОНЕЦ! Американский полковник предлагает покинуть центральную площадь Кишинева гражданину РМ pic.twitter.com/FfECO3NBXi — Серж Высоцкий (@Albertich50) May 12, 2016 An American Colonel demands from the citizen of Moldova to leave the central square
Gary Edwards

Banksters - William Black tells the real truth - YouTube - 0 views

  •  
    Savings & Loan crisis regulator Bill Black testifies in front of the House in 2011.  He explains the financial collapse of 2008, the role of subprime and liar's loans, and the incredible fraud running rampant through the Bankster industry.  Lehman Brothers alone was responsible for near 80% of the fraudulent liar loan mortgage security packages sold throughout the world.  Black lays much of the blame on the Federal Reserve, the SEC, and three individuals: Greenspan, Bernanke, and Timothy Geitner (NY Federal Reserve).  He compares how regulators with limited authority were able to contain and minimise the Savings and Loan fraud problem, with the near total lack of effort by the Federal Reserve, FDIC and SEC regulators.  Extrordinary testimony.  And Congress, the Justice Department, the Federal rEserve, the SEC, the FDIC and all the other elite regulators continue to do NOTHING!
Gary Edwards

Ali Soufan Video Interviews | The Soufan Group - 1 views

  •  
    Former FBI agent and author of Black Banners - the inside story of 911. Ali Soufan on The Colbert Report January 4, 2012 Ali Soufan on The Colbert Report Ali Soufan on Charlie Rose December 23, 2011 Ali Soufan on Charlie Rose Ali Soufan Testifies Before British Parliament December 13, 2011 On Tuesday October 18, 2011, Ali Soufan gave oral evidence before the House of Commons' Home Affairs Committee, on the "roots of radicalization." Read the testimony here: http://soufangroup.com/news/details/?Article_Id=191 Anthony Franks on The John Batchelor Show November 3, 2011 Anthony Franks interviewed on the John Batchelor radio show. The interview covered the recent Atmospheric report that examined the current local dispute over gas fields in the Eastern Mediterranean off the island off Cyprus involving U.S. Noble Energy Inc., and how the complex Turkish, US, and Israeli national interests intersected - and then how the interplay of regional energy politics impacts on the U.S. withdrawal from Iraq as it seeks ways to maintain regional influence through an intelligence and military presence in Turkey and Kuwait. Ali Soufan on AC360: Anwar al-Awlaki October 1, 2011 Ali Soufan talks to Anderson Cooper about Anwar al-Awlaki and al Qaeda in Yemen Ali Soufan on Anderson Cooper September 28, 2011 Talking about The Black Banners and harsh interrogation techniques Ali Soufan on Hardball with Chris Matthews September 23, 2011 Talking about the relationship with Pakistan's ISI. Ali Soufan talks with Martin Bashir on MSNBC September 15, 2011 Could the CIA have thwarted the 9/11 Plot? Fox: Judge Napolitano Interviews Ali Soufan: Eyewitness to the War on Terror September 15, 2011 Former FBI agent Ali Soufan recounts his eight years of counterterrorism work for the FBI and explains why 9/11 could?ve been prevented as well as why torture doesn't work. Ali Soufan on Morning Joe: The Interrogator September 13, 2011 Ali Soufan visits MSNBC's Morning Joe to discuss "The Black Banners
1 - 20 of 322 Next › Last »
Showing 20 items per page