Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 2014 budget

Rss Feed Group items tagged

Paul Merrell

US Military Uses IMF and World Bank to Launder 85% of Its Black Budget | Global Researc... - 1 views

  • hough transparency was a cause he championed when campaigning for the presidency, President Obama has largely avoided making certain defense costs known to the public. However, when it comes to military appropriations for government spy agencies, we know from Freedom of Information Act requests that the so-called “black budget” is an increasingly massive expenditure subsidized by American taxpayers. The CIA and and NSA alone garnered $52.6 billion in funding in 2013 while the Department of Defense black ops budget for secret military projects exceeds this number. It is estimated to be $58.7 billion for the fiscal year 2015. What is the black budget? Officially, it is the military’s appropriations for “spy satellites, stealth bombers, next-missile-spotting radars, next-gen drones, and ultra-powerful eavesdropping gear.” However, of greater interest to some may be the clandestine nature and full scope of the black budget, which, according to analyst Catherine Austin Fitts, goes far beyond classified appropriations. Based on her research, some of which can be found in her piece “What’s Up With the Black Budget?,” Fitts concludes that the during the last decade, global financial elites have configured an elaborate system that makes most of the military budget unauditable. This is because the real black budget includes money acquired by intelligence groups via narcotics trafficking, predatory lending, and various kinds of other financial fraud.
  • The result of this vast, geopolitically-sanctioned money laundering scheme is that Housing and Urban Devopment and other agencies are used for drug trafficking and securities fraud. According to Fitts, the scheme allows for at least 85 percent of the U.S. federal budget to remain unaudited. Fitts has been researching this issue since 2001, when she began to believe that a financial coup d’etat was underway. Specifically, she suspected that the banks, corporations, and investors acting in each global region were part of a “global heist,” whereby capital was being sucked out of each country. She was right.
  • As Fitts asserts, “[She] served as Assistant Secretary of Housing at the US Department of Housing and Urban Development (HUD) in the United States where I oversaw billions of government investment in US communities…..I later found out that the government contractor leading the War on Drugs strategy for U.S. aid to Peru, Colombia and Bolivia was the same contractor in charge of knowledge management for HUD enforcement. This Washington-Wall Street game was a global game. The peasant women of Latin America were up against the same financial pirates and business model as the people in South Central Los Angeles, West Philadelphia, Baltimore and the South Bronx.” This is part of an even larger financial scheme. It is fairly well-established by now that international financial institutions like the World Trade Organization, the World Bank, and the International Monetary Fund operate primarily as instruments of corporate power and nation-controlling infrastructure investment mechanisms. For example, the primary purpose of the World Bank is to bully developing countries into borrowing money for infrastructure investments that will fleece trillions of dollars while permanently indebting these “debtor” nations to West. But how exactly does the World Bank go about doing this? John Perkins wrote about this paradigm in his book, Confessions of an Economic Hitman. During the 1970s, Perkins worked for the international engineering consulting firm, Chas T. Main, as an “economic hitman.” He says the operations of the World Bank are nothing less than “pure economic colonization on behalf of powerful corporations and banks that use the United States government as their tool.”
  • ...1 more annotation...
  • In his book, Perkins discusses Joseph Stiglitz, the Chief Economist for the World Bank from 1997-2000, at length. Stiglitz described the four-step plan for bamboozling developing countries into becoming debtor nations: Step One, according to Stiglitz, is to convince a nation to privatize its state industries. Step Two utilizes “capital market liberalization,” which refers to the sudden influx of speculative investment money that depletes national reserves and property values while triggering a large interest bump by the IMF. Step Three, Stiglitz says, is “Market-Based Pricing,” which means raising the prices on food, water and cooking gas. This leads to “Step Three and a Half: The IMF Riot.” Examples of this can be seen in Indonesia, Bolivia, Ecuador and many other countries where the IMF’s actions have caused financial turmoil and social strife. Step 4, of course, is “free trade,” where all barriers to the exploitation of local produce are eliminated. There is a connection between the U.S. black budget and the trillion dollar international investment fraud scheme. Our government and the banking cartels and corporatocracy running it have configured a complex screen to block our ability to audit their budget and the funds they use for various black op projects. However, they can not block our ability to uncover their actions and raise awareness.
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Pentagon Still Plans to Blow Through Its Allowance - 0 views

  • a few years ago, Congress gave the Pentagon strict limits on its annual allowance, but the Department has struggled to stay within that budget. In advance of the Pentagon’s annual budget request, which usually is submitted during the spring, a senior defense official, Alan Estevez, confirmed that the Department plans on blowing through the budget caps next year. “We’re going to propose a budget next January and it’s going to be above sequestration levels.” Shocker!
  • When Estevez refers to “above sequestration levels,” he means above the legal spending limits that Congress has placed on the federal discretionary budget via legislation called the Budget Control Act (BCA). However, the Pentagon continues to propose funding levels that exceed the authorized amounts. Earlier this year, when the Pentagon first submitted its budget for Fiscal Year 2015, military planners proposed spending $115 billion more than is allowed by the spending caps over the next five years.
  • Now, Estevez is confirming that the Pentagon will indeed follow through on its pledge to blow through its allowance. “We’re obviously planning a budget above sequestration, similar to what we put forward in [Fiscal Year] ’15,” says Estevez. This coming year, in Fiscal Year 2016, the Pentagon will propose spending more than $60 billion above the amount authorized by Congress. CBO Assessment
  • ...1 more annotation...
  • While the Pentagon admits that it wants to spend $115 billion more than is allowed, an independent government watchdog says that, in reality, the Pentagon wants to spend even more than that. According to the nonpartisan Congressional Budget Office (CBO), which objectively analyzes the federal government’s long-term spending plans, the Pentagon actually would spend $182 billion more than is allowed over the five-year period from FY 2015 through FY 2019. That’s because CBO has a more realistic way of evaluating Pentagon spending plans.
  •  
    Remember September 10, 2001? That's the day that Donald Rumsfeld announced that the Pentagon couldn't account for $2.3 trillion in spending. https://www.youtube.com/watch?v=xU4GdHLUHwU The accountability situation hasn't changed. Ignoring the sequestration limits simply compounds the DoD's impunity for the law. 
Paul Merrell

Voters Say "Yes" to the Republican Who Said "No" to Wall Street | The Nation - 0 views

  • House Speaker John Boehner and his cronies removed North Carolina Congressman Walter Jones from the House Financial Services Committee in late 2012, as part of a purge that removed Republicans who were not all in for Wall Street -- and for Boehner's brand of "service" to the industries that are supposed to be regulated by Congress -- from the one panel with the power to hold bankers and brokers to account. But Jones, who had opposed bank bailouts and favored Wall Street regulation, did not go quietly. He spoke up about the purge and made little secret of his sense that -- though he had split with Boehner on a number of issues -- his biggest "sin" in the eyes of the party leadership was his refusal to bow to the demands of big campaign donors. “This whole place is all about money. Money is more important than policy,” complained Jones, who has in recent years co-sponsored most major pieces of campaign-finance reform legislation in the House -- including a call for a constitutional amendment designed to restore the ability of federal, state and local officials to regulate campaign spending.
  • The congressman's bluntness did not go over well with the masters of the universe on Wall Street. So, this spring, they set out to purge Walter Jones from Congress altogether. They found a consummate DC insider with close ties to the financial-services industry, Taylor Griffin, and filled the challenger's campaign treasury with PAC checks from J.P. Morgan, Wells Fargo and Bank of America, as well as political powerbrokers like former Republican National Committee chairman Haley Barbour and Wayne Berman of the Blackstone Group. It did not stop there. Jones' independence extended far beyond debates over Wall Street bailouts and regulation. The Republican is a social and economic conservative -- make that a social and economic very conservative -- but he has repeatedly broken with the party establishment on issues of war and peace, privacy rights, trade policy and budgets. He even voted against proposals by the darling of Wall Street and the party establishment, Congressman Paul Ryan
  • Bush administration aides and apologists rushed in with public statements and "independent" expenditures to attack Jones for his opposition to wars in Iraq and Afghanistan, and for his refusal to go along with moves that might lead to wars with Iran and other countries. Former Bush White House spokesman Ari Fleischer gave his enthusiastic backing to Griffin, as did former national security adviser Juan Zarate. Sarah Palin, one of the party's most consistent militarists, came in big for Griffin, who hailed her as an "old friend." A neo-conservative group, the Emergency Committee For Israel, spent at least $250,000 on ads that claimed Jones "preaches American decline." What Jones actually said was that, “Lyndon Johnson’s probably rotting in hell right now because of the Vietnam War, and he probably needs to move over for Dick Cheney.” At the same time, the wealthy champions of Ryan's crony-capitalist approach to budgeting were in with big money for TV ads and direct mail from the "Ending Spending Action Fund" -- a super PAC backed by billionaire businessman Joe Ricketts. By a lot of DC measures, Jones should have been doomed.
  • ...1 more annotation...
  • But the ten-term congressman bet that the voters of eastern North Carolina would stick with him. “I’m not going to sacrifice my integrity for anyone or any party,” he said. “It’s the price you pay. I didn’t come (to Washington) to be a puppet for anyone. And I think the public back in my district, which is the most important, has seen I’m willing to do what I think is right.” It was the right bet. On Tuesday, Republican primary voters in eastern North Carolina decided to purge the Wall Street donors and the special interests. The reelected Walter Jones by a solid 51-45 margin.
Paul Merrell

ICREACH: How the NSA Built Its Own Secret Google -The Intercept - 0 views

  • The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. Planning documents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants. ICREACH contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy.
  • ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. A planning document from 2007 lists the DEA, FBI, Central Intelligence Agency, and the Defense Intelligence Agency as core members. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs. The creation of ICREACH represented a landmark moment in the history of classified U.S. government surveillance, according to the NSA documents.
  • Documents published with this article: CIA Colleagues Enthusiastically Welcome NSA Training Sharing Communications Metadata Across the U.S. Intelligence Community CRISSCROSS/PROTON Point Paper Decision Memorandum for the DNI on ICREACH Metadata Sharing Memorandum Sharing SIGINT metadata on ICREACH Metadata Policy Conference ICREACH Wholesale Sharing Black Budget Extracts
  •  
     The most important Snowden disclosure yet. It's a long, detailed article, but it's a must read. I couldn't highlight any more without highlighting the entire article. Read the whole thing soon or you're going to be late for the mob with pitchforks.  This is beyond outrageous. The integrity of our entire system of government is now at issue. 
Paul Merrell

Pentagon 'big winner' in $1T omnibus bill | TheHill - 0 views

  • The Pentagon and the defense industry came out of the $1 trillion omnibus spending bill as a big winner, experts and lawmakers said Tuesday, a day after the bill was released. “The big winner is the Defense Department. They should be breaking out champagne in the Pentagon,” said Gordon Adams, a defense budget expert and former Clinton official.The omnibus spending bill provides about $497 billion for the Defense Department in 2014 — about the same as in 2013. But the Pentagon also received $85.2 billion in overseas contingency operations (OCO) for the war in Afghanistan, roughly $5 billion more than it requested for 2014.Before last month’s budget deal that relieved $22.4 billion in sequestration cuts, the 2014 defense budget would have been around $475 billion. The OCO funding, which Adams said is the “cherry on top of the dessert,” can be used to pay for operations and maintenance in the base budget and help restore military readiness lost in previous years. Fiscal watchdog and anti-war groups criticized the $5 billion increase from the Pentagon's request in OCO funding as a “slush fund to pad the department’s budget and avoid spending reductions,” especially with the winding down of the Afghan War. 
  • The defense industry was also a winner in the omnibus spending bill, Adams said. All major weapons systems procurement requests were fully-funded, including the F-35 Joint Strike Fighter — the Pentagon’s most expensive weapons system in history. Also fully funded were the Army’s M1 Abrams tank program, and the Navy’s shipbuilding plans for eight new ships. Israel is also a winner in the omnibus spending bill, with money fully provided for the Arrow, David’s Sling, and the Iron Dome rocket defense systems. 
  • While lawmakers touted the completed spending bill as a win for nearly everyone, there were a few losers. One of the most notable losers included the Pentagon’s research and development projects, which received $7 billion less than last year.In addition, the defense space program and the procurement for the E-2D Advanced Hawkeye program were delayed. Also, funds for the Afghan National Security Forces is about half as much as the White House requested, Adams said.
  • ...1 more annotation...
  • Overall, lawmakers said the omnibus spending bill, which is expected to pass this week, was 'a good start'. 
  •  
    The War Party wins again. Spending cuts will come out of non-defense branches of government. Meanwhile, the Judicial Branch is nearly flat on its back because of sequestration. Judicial spending before sequestration was only 0.19 per cent of federal spending (19 cents of each $100) but  $350 million got chopped by sequestration.  The result: things like massive delays in court proceedings and a 35 per cent cut in personnel in the Federal Defenders office, a loss of institutional knowledge that will never be recovered.
Paul Merrell

The ultimate goal of the NSA is total population control | Antony Loewenstein | Comment... - 0 views

  • William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.
  • “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.Binney, who featured in a 2012 short film by Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government intrusion unlimited.“The ultimate goal of the NSA is total population control”, Binney said, “but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone.”
  • It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”The lack of official oversight is one of Binney’s key concerns, particularly of the secret Foreign Intelligence Surveillance Court (Fisa), which is held out by NSA defenders as a sign of the surveillance scheme's constitutionality.“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally.”
  • ...4 more annotations...
  • He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out but fear retribution and exile, not unlike Snowden himself, who is likely to remain there for some time.
  • Binney recently told the German NSA inquiry committee that his former employer had a “totalitarian mentality” that was the "greatest threat" to US society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over of Iraq.The era of mass surveillance has gone from the fringes of public debate to the mainstream, where it belongs. The Pew Research Centre released a report this month, Digital Life in 2025, that predicted worsening state control and censorship, reduced public trust, and increased commercialisation of every aspect of web culture.It’s not just internet experts warning about the internet’s colonisation by state and corporate power. One of Europe’s leading web creators, Lena Thiele, presented her stunning series Netwars in London on the threat of cyber warfare. She showed how easy it is for governments and corporations to capture our personal information without us even realising.Thiele said that the US budget for cyber security was US$67 billion in 2013 and will double by 2016. Much of this money is wasted and doesn't protect online infrastructure. This fact doesn’t worry the multinationals making a killing from the gross exaggeration of fear that permeates the public domain.
  • Wikileaks understands this reality better than most. Founder Julian Assange and investigative editor Sarah Harrison both remain in legal limbo. I spent time with Assange in his current home at the Ecuadorian embassy in London last week, where he continues to work, release leaks, and fight various legal battles. He hopes to resolve his predicament soon.At the Centre for Investigative Journalism conference, Harrison stressed the importance of journalists who work with technologists to best report the NSA stories. “It’s no accident”, she said, “that some of the best stories on the NSA are in Germany, where there’s technical assistance from people like Jacob Appelbaum.” A core Wikileaks belief, she stressed, is releasing all documents in their entirety, something the group criticised the news site The Intercept for not doing on a recent story. “The full archive should always be published”, Harrison said.
  • With 8m documents on its website after years of leaking, the importance of publishing and maintaining source documents for the media, general public and court cases can’t be under-estimated. “I see Wikileaks as a library”, Assange said. “We’re the librarians who can’t say no.”With evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney said: “I call people who are covering up NSA crimes traitors”.
Paul Merrell

The true cost of national security : Columbia Journalism Review - 0 views

  • Soon, we will get the president’s proposed fiscal 2014 spending plan. Much attention will focus on Social Security and Medicare, which have been flashpoints lately. Meanwhile, if coverage in years past is any guide, we can expect stories from many news outlets that will significantly understate a third huge slice of spending—the real costs of military and other national defense spending.
  • Meanwhile, wars are debt-financed, even though taxes were raised to help pay for every war American prior to Afghanistan and Iraq. Add in interest costs attributable to past conflicts, as the pacifist War Resisters League does, and the fiscal 2013 cost of national security comes to more than $1.3 trillion—two and a half times the basic Defense budget. That pretty much all-in cost almost equals the $1.6 trillion expected to be raised through the individual federal income tax in fiscal 2013, as shown in Table S-5 of the proposed White House budget. By this broadest measure, the cost of national security consumes every individual income tax dollar except the last one paid by each thousand paid per American. That doesn’t leave much for other spending on commonwealth goods and services that provide the foundation for private incomes and wealth. Social Security and Medicare, financed with payroll taxes, cost $820 billion and $528 billion respectively, for a total of $1.3 trillion, making their combined cost less than the broadest measure of national security spending.
  •  
    Defense spending --- the elephant in the budget debate room that mainstream media ignores. 
Paul Merrell

Tomgram: Mattea Kramer, Is the Pentagon Doomed -- To Be Flush Forever | TomDispatch - 0 views

  • Today, TomDispatch regular Mattea Kramer provides a third potential reason in her striking explanation of just how the Pentagon has been managing to avoid serious sequestration cuts.  It turns out that billions of dollars in extra funding are being salted away in a supplementary war-fighting budget that Congress grants the U.S. military, which is subject to neither cuts nor caps.  But here’s a potential problem: that budget relies on the existence of an Afghan War.  What if, after 2014, there isn’t even a residual American component to that war?  Not that the Pentagon wouldn't try to keep "war budget" funding alive, but it's clearly a harder, more embarrassing task without a war to fund. That's just one of the questions that emerges from Kramer’s clear-eyed look at what -- once you’ve read her piece -- can only be considered the Pentagon’s sequestration con game.  It’s a shocking tale largely because, while the budget figures are clear enough, you can’t read about them anywhere except here at TomDispatch. 
Paul Merrell

The War Against Austerity | The American Conservative - 0 views

  • From the president to the secretary of defense, the chairman of the Joint Chiefs of Staff, and every Republican and Democrat at the top of Congress’ defense committees, they all agree: “austerity” at the Pentagon must end. American forces are not getting enough money for training; weapons are short of maintenance; our forces are shrinking, and the defense industrial base is struggling. The Islamic State’s success in the Middle East makes the argument for a bigger Pentagon budget compelling at the strategic level. One au courant pundit articulated this conventional wisdom saying “the [budget] cuts intensify a growing global concern that America is in decline.”
  • Joining the crowd, President Obama said the “Draconian” cuts in the Pentagon budget must be reversed. The fix is in. The Pentagon is to be rescued from the spending cuts imposed by the three-year-old Budget Control Act of 2011 and its sequestration process. The rationale for reduction has been overtaken by world events, precipitous declines in military readiness, contraction of our forces and badly needed hardware modernization. These arguments collapse under scrutiny.
  •  
    Good, hard criticism and suggestions for reform in U.S. military spending. Backed by hard statistics and good graphs. But still missing the number I really want to see: What is our interventionist foreign policy costing us as opposed to a foreign policy that was aimed at peace, i.e., defensive only.  Interference in the internal affairs of foreign nations is prohibited by international law, treaties that the U.S. is party to. If the U.S. abided by that law instead of inflicting violence all over the globe, it is a certainty that "defense" spending could at least be halved. 
Gary Edwards

The Mythical Banking Crisis and the Failure of the New Deal :: The Mises Economics Blog... - 0 views

  •  
    Everything you know about FDR, The New Deal and the Great Depression Banking Crisis is wrong!!!! "From David Stockman's Contra Corner. Remarks to the Committee For The Republic, Washington DC, February 2014 (Part 4 in a 6-Part Series) Go to Part 1. The Great Depression thus did not represent the failure of capitalism or some inherent suicidal tendency of the free market to plunge into cyclical depression-absent the constant ministrations of the state through monetary, fiscal, tax and regulatory interventions.  Instead, the Great Depression was a unique historical occurrence-the delayed consequence of the monumental folly of the Great War, abetted by the financial deformations spawned by modern central banking. But ironically, the "failure of capitalism" explanation of the Great Depression is exactly what enabled the Warfare State to thrive and dominate the rest of the 20th century because it gave birth to what have become its twin handmaidens--Keynesian economics and monetary central planning. Together, these two doctrines eroded and eventually destroyed the great policy barrier--that is, the old-time religion of balanced budgets- that had kept America a relatively peaceful Republic until 1914. To be sure, under Mellon's tutelage, Harding, Coolidge and Hoover strove mightily, and on paper successfully, to restore the pre-1914 status quo ante on the fiscal front.  But it was a pyrrhic victory-since Mellon's surpluses rested on an artificially booming, bubbling economy that was destined to hit the wall. The Hoover Recovery of 1932 Worse still, Hoover's bitter-end fidelity to fiscal orthodoxy, as embodied in his infamous balanced budget of June 1932, got blamed for prolonging the depression.  Yet, as I have demonstrated in the chapter of my book called "New Deal Myths of Recovery", the Great Depression was already over by early summer 1932."
Gary Edwards

How World War I Paved the Way for the Warfare State :: The Mises Economics Blog: The Ci... - 0 views

  •  
    Part ONE "by David Stockman Remarks To The Committee For The Republic, Washington DC, February 2014 (Part 1 of 6 Parts) [From David Stockman's Contra Corner.] Flask in hand, Boris Yelstin famously mounted a tank outside the Soviet Parliament in August 1991. Presently, the fearsome Red Army stood down-an outcome which 45 years of Cold War military mobilization by the West had failed to accomplish. At the time, the U.S. Warfare State's budget- counting the pentagon, spy agencies, DOE weapons, foreign aid, homeland security and veterans--was about $500 billion in today's dollars.  Now, a quarter century on from the Cold War's end, that same metric stands at $900 billion. This near doubling of the Warfare State's fiscal girth is a tad incongruous.  After all, America's war machine was designed to thwart a giant, nuclear-armed industrial state, but, alas, we now have no industrial state enemies left on the planet. The much-shrunken Russian successor to the Soviet Union, for example, has become a kleptocracy run by a clever thief who prefers stealing from his own citizens. Likewise, the Red Chinese threat consists of a re-conditioned aircraft carrier bought second-hand from a former naval power--otherwise known as the former Ukraine. China's bubble-ridden domestic economy would collapse within six weeks were it to actually bomb the 4,000 Wal-Mart outlets in America on which its mercantilist export machine utterly depends. On top of that, we've been fired as the world's policeman, al Qaeda has splintered among warlords who inhabit the armpits of the world from Yemen to Somalia and during last September's Syria war scare the American people even took away the President's keys to the Tomahawk missile batteries.  In short, the persistence of America's trillion dollar Warfare State budget needs some serious "splainin". The Great War and Its Aftermath My purpose tonight is to sketch the long story of how it all happened, starti
Paul Merrell

Afghan Holocaust, Afghan Genocide - 0 views

  • This site is dedicated to informing people about the ongoing, US Alliance-imposed Afghan Holocaust and Afghan Genocide that as of 2012 is associated with post-2001 violent and non-violent avoidable deaths totalling 7.2  million and Afghan and Pashtun refugees totalling 5-6 million – an Afghan Holocaust ( a huge number of deaths) and an Afghan Genocide as defined by Article 2 of the UN Geneva Convention (see: http://www.edwebproject.org/sideshow/genocide/convention.html ) which states: “In the present Convention, genocide means any of the following acts committed with intent to destroy, in whole or in part, a national, ethnic, racial or religious group, as such: a) Killing members of the group; b) Causing serious bodily or mental harm to members of the group; c) Deliberately inflicting on the group conditions of life calculated to bring about its physical destruction in whole or in part; d) Imposing measures intended to prevent births within the group; e) Forcibly transferring children of the group to another group.”Also utterly ignored by Neocon American and Zionist  Imperialist (NAZI)-perverted and subverted Western Mainstream media are the 1.2 million people who have died world-wide since 9-11 due to US Alliance restoration of the Taliban-destroyed Afghan opium industry from 6% of world market share in 2001 to 93% in 2007, the breakdown (as of 2015)  including 280,000 Americans, 256,000 Indonesians, 68,000 Iranians, 25,000 British, 14,000 Canadians, 10,000 Germans, 5,000 Australians and 500 French.
  • As of January 2014  deaths from the Afghanistan War include approximately 7 million violent and non-violent excess deaths of Indigenous Afghans since 2001 and 3,417 US Alliance deaths (see: http://icasualties.org/oif/ ).As of January  2014 it is estimated from the latest UN Population Division data that in Occupied Afghanistan post-invasion non-violent excess deaths total 5.5 million.  Assuming expert US-Australian advice that the level of violence has been 4 times lower in the Afghan War than in the Iraq War where the ratio of violent deaths to non-violent avoidable deaths was 1.5 million/1.2million = 1.25, then post-invasion violent deaths in Afghanistan can be estimated at 1.25 x 5.5 million/4 = 1.7 million. Post-invasion violent and non-violent avoidable deaths total 5.5 million plus 1.7 million = 7.2 million; and post-invasion under-5 infant deaths total 3.0 million (90% avoidable and due to US Alliance war crimes in gross violence of the Geneva Convention – Articles 55 and 56 of the Geneva Convention Relative to the Protection of Civilian Persons in Time of War demand that an Occupier must supply life-sustaining food and medical requisites “to the fullest extent of the means available to it” (see: http://www1.umn.edu/humanrts/instree/y4gcpcp.htm ) but according to the WHO (see: http://www.who.int/countries/en/ ) the “total annual expenditure on health per capita” permitted in Occupied Afghanistan is $50 as compared to $8,608 in Occupier US, $3,322 in Occupier UK, $4.086 in Occupier France, $4,371 in Occupier Germany  and $3,692  in Occupier racist, white Apartheid Australia).  
  • There are 3-4 million Afghan refugees plus a further 2.5 million Pashtun refugees generated in NW Pakistan by the obscene war policies of war criminal Nobel Peace Prize Laureate Obama – this carnage involving 4.5 million post-invasion violent and non-violent excess Afghan deaths constitutes an Afghan Holocaust and an Afghan Genocide as defined by Article 2 of the UN Genocide Convention (see: http://www.edwebproject.org/sideshow/genocide/convention.html ).
  • ...6 more annotations...
  • As of January 2014  2009 it was estimated from the latest UN Population Division data that in Occupied Afghanistan post-invasion non-violent excess deaths totalled 5.5 million and post-invasion violent deaths totalled 1.7 million (this based on assuming expert US-Australian advice that the level of violence has been 4 times lower in the Afghan War than in the Iraq War).
  • The US Alliance restored the Taliban-destroyed Afghan opium industry from about 6% of world market share in 2001 to 93% in 2007 (see UNODC World Drug Report 2007: http://www.unodc.org/unodc/en/data-and-analysis/WDR-2007.html and World Drug Report 2009: http://www.unodc.org/unodc/en/data-and-analysis/WDR-2009.html   and World Drug Report , Opium/heroin market, 2009: http://www.unodc.org/documents/wdr/WDR_2009/WDR2009_Opium_Heroin_Market.pdf ).
  • About 0.1 million people die from opiate drug-related causes each year (see Australian National Drug Research Centre: http://db.ndri.curtin.edu.au/media.asp?mediarelid=40 ; UN Office on Drugs and Crime (UNODC), “Addiction, crime and insurgency. The transnational threat of Afghan opium”, 2009: http://www.unodc.org/documents/data-and-analysis/Afghanistan/Afghan_Opium_Trade_2009_web.pdf ) and hence about 0.8 million have died since the invasion of Afghanistan in October 2001, of whom about 90%, i.e. 0.9 x 0.8 million = 0.7 million people, have died as a result of the huge expansion of the Afghan opium industry under US Alliance occupation. In 2005 in the US, of 18,347 deaths due to narcotics and psychodysleptics, 12, 262 were due to heroin (2,011), other opioids (5,789) or methadone (4,462) (see Health E-stat, “Increases in poisoning and methadone-related deaths: United States,1999-2005 “: http://www.cdc.gov/nchs/data/hestat/poisoning/poisoning.pdf  ) . Given the over 90% contribution of the US restoration of the Taliban-destroyed opium industry to world illicit heroin production, and the interconnectedness and effective indistinguishability of "Afghan-derived heroin" from the "pool" of other abusively-used opiates, one can accordingly crudely estimate 0.9 x 12,262 persons/year x 8 years = 88,286 US opiate drug-related deaths (0.9 x 2,011 deaths/year x 8 years = 14,479 heroin-related deaths) connected with the aftermath of the US invasion and occupation of Afghanistan.
  • Global deaths from violent priorities and ignoring Developing World poverty. Professor John Holdren (Professor of Environmental Policy at the Kennedy School of Government at Harvard University; Director of the Woods Hole Research Center;  recent Chairman of the American Association for the Advancement of Science) identified nuclear weapons, poverty and global warming as the three biggest threats facing Humanity (see: http://www.aaas.org/news/releases/2007/0216am_holdren_address.shtml ). The US military budget is now about $1 trillion per annum (see: http://en.wikipedia.org/wiki/Military_budget_of_the_United_States ) and 2001 Economics Nobel Laureate and former World Bank Chief Economist, Professor Joseph Stiglitz (Columbia University) has estimated that the accrual cost (long-term committed cost as opposed to the shirt-term budgeted cost) of the Iraq War is about $3 trillion (see: http://www.abc.net.au/lateline/content/2007/s2236161.htm and “The Three Trillion Dollar War” by Joseph Stiglitz). In 2009, funds for war had been equally distributed between Iraq and Afghanistan, which each received $700 million. But in 2010, the bulk of the funds - $1.2 billion dollars will go to Afghanistan (see: http://www.defencetalk.com/afghan-war-costs-to-overtake-iraq-in-2010-pentagon-18679/ ). The budgeted cost from Congress of the Afghan War is estimated to have been $38 billion (see: http://www.asianews.it/index.php?l=en&art=16570
  • Poverty results in the deaths of 16 million people annually (including 9.5 million under-5 year old infants) from deprivation and deprivation exacerbated disease (2003 data; see Gideon Polya, “Body Count. Global avoidable mortality since 1950”, G.M. Polya, Melbourne, 2007). yet high female literacy, good governance, good primary health care and a modest increase in economic security could abolish this global avoidable mortality holocaust. It is estimated that the simple expedient of increasing the per capita of all countries to about $1000 would cost only $1.4 trillion, roughly the annual global “defence” budget and about 2.65 of global GNP (2003) ( p169,  Gideon Polya, “Body Count. Global avoidable mortality since 1950”). Global deaths from worsening climate genocide. Both Dr James Lovelock FRS (Gaia hypothesis) and Professor Kevin Anderson ( Director, Tyndall Centre for Climate Change Research, University of Manchester, UK) have recently estimated that fewer than 1 billion people will survive this century due to unaddressed, man-made global warming – noting that the world population is expected to reach 9.5 billion by 2050, these estimates translate to a climate genocide involving deaths of 10 billion people this century, this including 6 billion under-5 year old infants, 3 billion Muslims, 2 billion Indians, 0.5 billion Bengalis, 0.3 billion Pakistanis and 0.3 billion Bangladeshis (see “Climate Genocide”: http://sites.google.com/site/climategenocide/ ).
  • US Alliance war policies in a swathe of countries from Occupied Haiti to Occupied Afghanistan and NW Pakistan, coupled with similarly greedy and  racist US Alliance global warming policies, oppose and prevent global equity and will ultimately kill 10 billion non-Europeans this century.
  •  
    Nauseating statistics. Site also has stats for Palestine and Iraq.
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Paul Merrell

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
Paul Merrell

China Announces 12.2% Increase in Military Budget - NYTimes.com - 0 views

  • China announced on Wednesday that it would increase its military budget for 2014 to almost $132 billion, a 12.2 percent rise over last year. The rapid growth in defense spending is another sign of the country’s goal of becoming a dominant military presence in the Pacific, with a navy able to project power across the region.
Paul Merrell

Nato's action plan in Ukraine is right out of Dr Strangelove | John Pilger | Comment is... - 0 views

  • In 1964, the year Dr Strangelove was made, "the missile gap" was the false flag. To build more and bigger nuclear weapons and pursue an undeclared policy of domination, President John F Kennedy approved the CIA's propaganda that the Soviet Union was well ahead of the US in the production of intercontinental ballistic missiles. This filled front pages as the "Russian threat". In fact, the Americans were so far ahead in production of the missiles, the Russians never approached them. The cold war was based largely on this lie.
  • Since the collapse of the Soviet Union, the US has ringed Russia with military bases, nuclear warplanes and missiles as part of its Nato enlargement project. Reneging on the Reagan administration's promise to the Soviet president Mikhail Gorbachev in 1990 that Nato would not expand "one inch to the east", Nato has all but taken over eastern Europe. In the former Soviet Caucasus, Nato's military build-up is the most extensive since the second world war.In February, the US mounted one of its proxy "colour" coups against the elected government of Ukraine; the shock troops were fascists. For the first time since 1945, a pro-Nazi, openly antisemitic party controls key areas of state power in a European capital. No western European leader has condemned this revival of fascism on the border of Russia. Some 30 million Russians died in the invasion of their country by Hitler's Nazis, who were supported by the infamous Ukrainian Insurgent Army (the UPA) which was responsible for numerous Jewish and Polish massacres. The Organisation of Ukrainian Nationalists, of which the UPA was the military wing, inspires today's Svoboda party.Since Washington's putsch in Kiev – and Moscow's inevitable response in Russian Crimea to protect its Black Sea fleet – the provocation and isolation of Russia have been inverted in the news to the "Russian threat". This is fossilised propaganda. The US air force general who runs Nato forces in Europe – General Philip Breedlove, no less – claimed more than two weeks ago to have pictures showing 40,000 Russian troops "massing" on the border with Ukraine. So did Colin Powell claim to have pictures proving there were weapons of mass destruction in Iraq. What is certain is that Barack Obama's rapacious, reckless coup in Ukraine has ignited a civil war and Vladimir Putin is being lured into a trap.
  • Following a 13-year rampage that began in stricken Afghanistan well after Osama bin Laden had fled, then destroyed Iraq beneath a false flag, invented a "nuclear rogue" in Iran, dispatched Libya to a Hobbesian anarchy and backed jihadists in Syria, the US finally has a new cold war to supplement its worldwide campaign of murder and terror by drone.A Nato membership action plan – straight from the war room of Dr Strangelove – is General Breedlove's gift to the new dictatorship in Ukraine. "Rapid Trident" will put US troops on Ukraine's Russian border and "Sea Breeze" will put US warships within sight of Russian ports. At the same time, Nato war games in eastern Europe are designed to intimidate Russia. Imagine the response if this madness was reversed and happened on the US's borders. Cue General Turgidson.And there is China. On 23 April, Obama will begin a tour of Asia to promote his "pivot" to China. The aim is to convince his "allies" in the region, principally Japan, to rearm and prepare for the possibility of war with China. By 2020, almost two-thirds of all US naval forces in the world will be transferred to the Asia-Pacific area. This is the greatest military concentration in that vast region since the second world war.
  • ...1 more annotation...
  • In an arc extending from Australia to Japan, China will face US missiles and nuclear-armed bombers. A strategic naval base is being built on the Korean island of Jeju, less than 400 miles from Shanghai and the industrial heartland of the only country whose economic power is likely to surpass that of the US. Obama's "pivot" is designed to undermine China's influence in its region. It is as if a world war has begun by other means.This is not a Dr Strangelove fantasy. Obama's defence secretary, Charles "Chuck" Hagel, was in Beijing last week to deliver a warning that China, like Russia, could face isolation and war if it did not bow to US demands. He compared the annexation of Crimea to China's complex territorial dispute with Japan over uninhabited islands in the East China Sea. "You cannot go around the world," said Hagel with a straight face, "and violate the sovereignty of nations by force, coercion or intimidation." As for America's massive movement of naval forces and nuclear weapons to Asia, that is "a sign of the humanitarian assistance the US military can provide".Obama is seeking a bigger budget for nuclear weapons than the historical peak during the cold war, the era of Dr Strangelove. The US is pursuing its longstanding ambition to dominate the Eurasian landmass, stretching from China to Europe: a "manifest destiny" made right by might.
  •  
    Until the late 1940s, the U.S. had a "War Department." But in 1949, having just completed the largest foreign war in U.S. history, the War Department ironically was renamed as the "Defense Department." Ever since, the U.S. has waged nothing but foreign wars, none that could literally be characterized as necessary to defend the U.S. As John Pilger eloquently encapsulates in this article, perhaps it's past time to return the Department to the "Department of Wars of Aggression."  
Paul Merrell

Saudi Arabia in Search of a New Course | nsnbc international - 0 views

  • Saudi Arabia, one of the wealthiest countries in the world, is experiencing serious financial problems. The ongoing plummeting of oil prices is forcing the Saudis to be more careful with money. Tens of billions of dollars invested abroad are making a return to the kingdom. In July 2015, Saudi Arabia’s authorities, for the first time in 8 years, issued governmental bonds worth $4 bn.
  • Bloomberg reports that Saudi Arabia has already withdrawn $50-70 bn, which it had previously invested worldwide through management companies. It is noteworthy that the country has been withdrawing funds for the past six months. For example, Saudi Arabia’s SAMA Foreign Holdings reached its maximum in August 2014, having amounted to $737 bn. But since then, the fund has been shrinking because oil prices have dropped more than twice in this period. Saudi Arabia’s budget deficit is forecast to reach 20%; however, reduction of expenditures still remains a sensitive topic. In the context of the continuous fall in oil prices, Riyadh has worked out a plan to gradually reduce public spending to cope with a sharp decrease in budget revenues caused by the slumping oil prices. For example, Saudi Arabia’s Ministry of Finance has issued an order prescribing all state companies to temporary stop hiring new employees and launching new projects until the end of the fiscal year. In addition, the government procurement of new cars and furniture has also been put on hold as well as the signing and approval of new lease agreements for state institutions and enterprises. The expropriation of plots of land for the purpose of the subsequent extraction of oil has also been suspended throughout the country. The Ministry of Finance has, at the same time, demanded an acceleration in the collection procedure of oil revenues.
  • “To prove that the country indeed has a sound fiscal discipline, the government has to take steps to cut expenditures in the 4th quarter. Subsequently Saudi Arabia will be compelled to find new ways to reduce expenditures and boost efficiency in order to assure there will be no budget deficit in 2016,” John Sfakianakis, Director of the Middle East Division of the Ashmore Group, said in his interview to Bloomberg. It should be pointed out in that regard that oil revenues comprise about 90% of Saudi Arabia’s budget, and the landslide of oil prices of over 40% within the last 12 months adversely affected the country’s financial standing. And, although the kingdom’s debt burden remains one of the lowest in the world (less than 2% of the GDP), the kingdom’s international assets have been consistently shrinking for the last nine months and reached a two year minimum. This situation directly influences the policy of OPEC since Saudi Arabia (which extracts almost 30% of the OPEC’s oil, positions itself as an extremely influential raw material supplier, maintains powerful military forces, and has its own global ambitions, immense resources and substantial diplomatic experience) de facto plays the role of the shadow leader of this organization. At times siding with the US, and then pursuing its own interests, the kingdom has assumed such an influential position in the international community that other countries revere its opinion, and as for the last oil crisis, Saudi Arabia is seen as its key player.
  • ...3 more annotations...
  • And, based on the information provided by the international mass media, the Saudi leadership has split in their opinion on whether to continue funding Syria or to begin reducing their financial commitment. “Riyadh is facing a choice: to give more support to the moderate opposition or to look for a compromise,” an American expert on national security, James Farvell, wrote in The National Interest. The expert explained that if Saudis offer more support, that would trigger a confrontation with Russia, but if they side with Moscow, Russia’s regional influence might be reinforced and that might, in turn, challenge Saudi Arabia’s interests. Because of this dilemma, controversial information regarding Saudi’s decisions are appearing in the press. On the one hand, Saudi Arabia was one of the first to condemn Russia after the beginning of the Russian military operation in Syria on September 30. It accused Russia of bombing the troops of moderate opposition instead of ISIS. “These attacks resulted in the deaths of numerous innocent victims. We call for a stop it immediately,” demagogically and groundlessly said the representative of Saudi Arabia Abdallah al-Muallimi in the UN. Simultaneously 53 religious leaders signed an online appeal to support a jihad against the Syrian authorities as well as the presence of Russia and Iran in this country. They appealed to the countries of the Muslim world to render “moral, financial, military and political support to those who are called the ‘holy warriors of Syria’.” The authors of the appeal explicitly stated that if they fail, the other Sunni states in the region, and, first of all, Saudi Arabia will be the next victims.
  • With reference to a high-ranking Saudi official who wished to remain anonymous, the BBC stated that armed groups of the so-called moderate opposition would receive new, high-tech weapons, including tank destroyers. Jaish al-Fath, The Free Syrian Army and The Southern Front moderate opposition groups will also receive support. According to the source, it is quite likely that the “moderate opposition” in Syria will receive surface-to-air systems as well. Keeping in mind that Russia is carrying out air strikes across not only the facilities of ISIS, but also the above listed groups, a scenario when Saudis turn their weapon against Russian aviation is quite possible. On the other hand, a curious document, apparently a copy of the instructions issued for the embassies of Saudi Arabia in the Middle Eastern countries, has been uploaded to the Internet. The main idea of the documents is that all the diplomatic representative offices should gradually cease financial support of the armed Syrian opposition, apparently owing to the low efficiency of militants’ activities. The authenticity of the document raises certain doubts, as is always the case with such documents. However, specialists in the Arabic language concluded that the text was written by a native speaker, and that the document’s design conforms to the style adopted in Saudi Arabia. It shouldn’t be ruled out that the drying up of the source of funding, that militants used to receive from the Saudis, against the backdrop of a certain degree of success of the government troops as well as the increasing military and technical assistance to Syria on the part of Russia, have convinced many “oppositionists” to surrender and change masters. This process is expected to only accelerate in the future.
  • On Sunday, October 11, the Defense Minister, Mohammed bin Salman, visited Sochi. The search for common ground on the issues related to the situation in Syria was the main theme of the meeting held by the son of the Saudi king and Vladimir Putin. The parties also discussed the prospects of their economic cooperation. And, since Saudi Arabia is currently experiencing certain financial difficulties and is in the “clutches” of economic uncertainty, this topic was of a special interest. It was the second visit to the Russian Federation of the Saudi prince, who currently carries out sensitive missions related to the complex relations between the two countries. It should be noted that King of Saudi Arabia Salman bin Abdulaziz Al Saud has been admitted to hospital in a critical condition and is currently being kept in the intensive care unit of the King Faisal royal hospital in Riyadh.
Paul Merrell

Saudi Arabia is on the Brink of Regime Change - nsnbc international | nsnbc international - 0 views

  • It seems that Saudi Arabia has started to undergo the transformation various experts predicted. Those became obvious when the sitting king Salman bin Abdulaziz Al Saud replaced his deceased elder brother Abdullah bin Abdulaziz Al Saud in January 2015, and made a number of quite unusual arrangements within the ruling elite, appointing the head of the Ministry of Interior Muhammad bin Nayef from Abdullah’s clan the Crown Prince, while his 33-year-old son Mohammad bin Salman Al Saudfrom the Sudairy clan received the appointment of Deputy Crown Prince.
  • Now it seems that the wheels of the political machine are moving again. Last week reports from Riyadh indicated that his disease is taking a toll on the king and he wants to renounce his reign in favor of the Crown Prince. But then neighboring states, especially Qatar and the United Arab Emirates, started hinting that the members of the Saudi royal family along with the sheikhs of the strongest tribes, which are the foundation of Al Saud’s rule, are extremely dissatisfied with the sharp deterioration of the economic and social situation in the country, leading to a major drop in their personal incomes. It is no secret that Riyadh increased the volume of oil production to weaken the positions of its main competitors – Russia, Iran and Venezuela. But the kingdom had to take a punch as well, it was forced to unseal its reserve fund and cut the funding of numerous social programs.
  • Now the highly respected Institute for Gulf Affairs is stating that the king of Saudi Arabia Salman bin Abdulaziz Al Saud is preparing to renounce the throne in favor of his son Mohammad bin Salman Al Saud, and has since brought his country to the brink of a disaster. It means that the 80-year-old Salman is trying desperately hard to persuade his brothers on the succession board to allow him to change the principle of succession of the Saudi throne, since he’s ready to leave, but not so ready for his nephew Mohammad bin Salman Al Saud to rule the country. What the king has been doing is allegedly done “only for the sake of the stability of the kingdom.” Although the reality of the situation is clear – should Salman retain his position, the disintegration of the kingdom is imminent, with certain Shia areas breaking away, while the regions on the border with Yemen which are mostly populated by Yemeni tribes, more than happy to return home. Moreover, the Minister of Interior used to be a habitual cocaine user, so he was only able to “produce” two daughters, and now he’s somewhat incapable of producing more children. Should the king manage to carry out the above described scheme, he will become the first Saudi monarch to leave the throne to his son.
  • ...3 more annotations...
  • And the fact that there’s a growing crisis in Saudi Arabia was evident from the cuts in subsidies and bonuses that king Salman started at the beginning of this year to reduce the country’s total dependence on oil. After decades of extensive use of oil revenues to subsidize companies’ payment of generous salaries and providing enormous social benefits, falling oil prices struck Saudi Arabia at its heart. It’s enough to say that revenues from oil exports in 2015 alone dropped by half. Ultimately it’s hard to say which country suffers the most from these oil wars – Russia or Saudi Arabia, since the latter has virtually no other sectors to support the economy. Saudi economist Turki Fadaak believes that Saudi Arabia is exiting the policy of “universal welfare”, so there’s an ongoing psychological shift in the minds of the ruling elite of the state. Fadaak is convinced that the ultimate aim of king Salman’s measures is to eliminate the Saudi dependency on oil. But is it really? According to leading international experts – the answer is a resounding “no”, with all the arguments to the contrary nothing more than fantasy.
  • Although initially it seemed that Salman, who came to power after the death of his brother, King Abdullah, will continue his course, after assuming the throne Salman generously spent over 30 billion dollars from the budget on bonuses for civil servants, military personnel, and students. Additionally, prices for basic goods and services, including fuel, electricity and water prices were kept at extremely low levels due to government subsidies from oil revenues. However, due to falling oil prices, under the pressure of such costs the budget started to rupture. The most important thing now for the kingdom is to execute the transition from the extremely lavish social security system to a productive economy, but then the subjects of the king will be forced to cut their costs, and it looks that they do not agree with this notion. And accusations in the imminent economic collapse will go Salman’s way, so it is better for him to leave now, before protests even start.
  • It is curious that Saudi Arabia has been rather realistic about its budget for the year 2016, since it was based on the average price of oil keeping at the level 29 dollars per barrel. Last year, the Saudi budget deficit amounted to almost 98 billion dollars and the costs were considerably higher than it was originally planed due to bonuses for civil servants, military personnel and retirees. In 2016 the authorities decided to put up to 49 billion dollars into a special fund to provide funding for the most important projects in case oil prices drop even further. But it was Saudi Arabia back in 2014 that proposed new tactics for OPEC, that implied that there would be no cuts in the level of production, the tactics that drove oil prices to today’s levels. So we are to learn pretty soon should Riyadh choose the path of the utter and complete collapse of the kingdom, or the path of giving power to the young and pragmatic technocrats who are going to pursue a comprehensive oil policy. Either way, Saudi Arabia will be forced to put an end to the costly military adventures in Syria and Yemen as well as its confrontations with Russia and Iran.
Paul Merrell

Collapse of Ukraine Government: Prime Minister Yatsenyuk Resigns amidst Pressures Exert... - 0 views

  • Ukraine’s Prime Minister Arseniy Yatsenyuk announced his resignation in the Rada (Parliament) and that of the entire Cabinet on Thursday, July 24.  This decision was taken following the withdrawal of two parties from the coalition government and the non-adoption of two important pieces of legislation, which had been demanded by the International Monetary Fund (IMF) “I announce my resignation after the collapse of the coalition and the blocking of government initiatives … “In connection with the breakup of the parliamentary coalition, as well as non-adoption of a number of important bills, I announce my resignation,” The resignation of the Prime Minister signifies the collapse of the government and the resignation of the entire cabinet. “But the cabinet members will continue fulfilling their duties until a new coalition is formed in the Rada.”
  • On July 24th, the Rada failed to support the government’s bill pertaining to the 2014 budget sequestration, which had been demanded by the IMF on behalf of Kiev’s external creditors. The disbursement by the IMF of the “Second Tranche” of a 17 billion dollar policy based loan was conditional upon the prior adoption of this legislation.
  • The national economy is in crisis, the political structures of the country are in total disarray, all of which is occurring in the immediate wake of the Malaysian Airlines MH17 crash in Eastern Ukraine. The two parties which left the coalition are The Neo-Nazi Svoboda party and the Centre Right Ukraine Democratic Alliance for Reform (UDAR) Party led by former champion boxer Vitali Klitschko.
  • ...3 more annotations...
  • The entire country is in an impasse. No money will be forthcoming from the IMF until this legislation is adopted. In the meantime, Ukraine remains on the blacklist of its external creditors. Moreover, a controversial draft law on reforming the country’s gas transportation system was rejected (Itar-Tass, July 24, 2014). Both bills were tied into the government’s negotiations with both the EU and the IMF.
  • President Poroshenko (left) has intimated that the resignation of the cabinet has paved the way for a process of meaningful political restructuring:  “Society wants a full reset of state authorities,” said Mr Poroshenko. What is implied by Poroshenko’s statement is that the parliamentary process is slated to become defunct inasmuch as Rada is obligated to adopt the legislation demanded by the IMF and the European Union. And if the Rada does not adopt the legislation, the composition of the Parliament will be changed through a process of outright political manipulation. The 2014 budget project demanded by the IMF includes massive cuts in social spending coupled with increased allocations to the Armed Forces. Its adoption will contribute (virtually overnight) to a further process of the impoverishment of the Ukraine population.
  • Yatsenyuk intimated in his resignation speech that the State was bankrupt and that failure to abide by IMF demands would create social chaos: “The fact is that today you failed to vote for the laws, and I have nothing (with which) to pay wages of policemen, doctors, teachers; nothing to buy a rifle with, nothing to fuel an armored personnel carrier with. Today you failed to take a decision to fill the gas storages to allow us to live through the winter, to at last free ourselves from dependence on Russian gas,” (Rada, July 24, 2014)
  •  
    The American coup-imposed government of Ukraine goes bankrupt and collapses. 
1 - 20 of 71 Next › Last »
Showing 20 items per page