Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged online poll

Rss Feed Group items tagged

Paul Merrell

Clinton's lead over Trump narrows to less than three points: Reuters/Ipsos poll | Reuters - 0 views

  • Democratic presidential nominee Hillary Clinton's lead over Republican rival Donald Trump narrowed to less than 3 percentage points, according to a Reuters/Ipsos opinion poll released on Friday, down from nearly eight points on Monday.About 42 percent of likely voters favored Clinton, to Trump's 39 percent, according to the July 31-Aug. 4 online poll of 1,154 likely voters. The poll had a credibility interval of plus or minus 3 percentage points, meaning that the results suggest the race is roughly even.Among registered voters over the same period, Clinton held a lead of five percentage points, down from eight percentage points on Monday, according to the poll. The reasons behind the shift were unclear.
Paul Merrell

American Surveillance Now Threatens American Business - The Atlantic - 0 views

  • What does it look like when a society loses its sense of privacy? <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" title=""><img style="border:none;" src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" alt="" /></a></div>In the almost 18 months since the Snowden files first received coverage, writers and critics have had to guess at the answer. Does a certain trend, consumer complaint, or popular product epitomize some larger shift? Is trust in tech companies eroding—or is a subset just especially vocal about it? Polling would make those answers clear, but polling so far has been… confused. A new study, conducted by the Pew Internet Project last January and released last week, helps make the average American’s view of his or her privacy a little clearer. And their confidence in their own privacy is ... low. The study's findings—and the statistics it reports—stagger. Vast majorities of Americans are uncomfortable with how the government uses their data, how private companies use and distribute their data, and what the government does to regulate those companies. No summary can equal a recounting of the findings. Americans are displeased with government surveillance en masse:   
  • A new study finds that a vast majority of Americans trust neither the government nor tech companies with their personal data.
  • What does it look like when a society loses its sense of privacy? <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" title=""><img style="border:none;" src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" alt="" /></a></div>In the almost 18 months since the Snowden files first received coverage, writers and critics have had to guess at the answer. Does a certain trend, consumer complaint, or popular product epitomize some larger shift? Is trust in tech companies eroding—or is a subset just especially vocal about it? Polling would make those answers clear, but polling so far has been… confused. A new study, conducted by the Pew Internet Project last January and released last week, helps make the average American’s view of his or her privacy a little clearer. And their confidence in their own privacy is ... low. The study's findings—and the statistics it reports—stagger. Vast majorities of Americans are uncomfortable with how the government uses their data, how private companies use and distribute their data, and what the government does to regulate those companies. No summary can equal a recounting of the findings. Americans are displeased with government surveillance en masse:   
  • ...3 more annotations...
  • “It’s clear the global community of Internet users doesn’t like to be caught up in the American surveillance dragnet,” Senator Ron Wyden said last month. At the same event, Google chairman Eric Schmidt agreed with him. “What occurred was a loss of trust between America and other countries,” he said, according to the Los Angeles Times. “It's making it very difficult for American firms to do business.” But never mind the world. Americans don’t trust American social networks. More than half of the poll’s respondents said that social networks were “not at all secure. Only 40 percent of Americans believe email or texting is at least “somewhat” secure. Indeed, Americans trusted most of all communication technologies where some protections has been enshrined into the law (though the report didn’t ask about snail mail). That is: Talking on the telephone, whether on a landline or cell phone, is the only kind of communication that a majority of adults believe to be “very secure” or “somewhat secure.”
  • According to the study, 70 percent of Americans are “at least somewhat concerned” with the government secretly obtaining information they post to social networking sites. Eighty percent of respondents agreed that “Americans should be concerned” with government surveillance of telephones and the web. They are also uncomfortable with how private corporations use their data: Ninety-one percent of Americans believe that “consumers have lost control over how personal information is collected and used by companies,” according to the study. Eighty percent of Americans who use social networks “say they are concerned about third parties like advertisers or businesses accessing the data they share on these sites.” And even though they’re squeamish about the government’s use of data, they want it to regulate tech companies and data brokers more strictly: 64 percent wanted the government to do more to regulate private data collection. Since June 2013, American politicians and corporate leaders have fretted over how much the leaks would cost U.S. businesses abroad.
  • (That may seem a bit incongruous, because making a telephone call is one area where you can be almost sure you are being surveilled: The government has requisitioned mass call records from phone companies since 2001. But Americans appear, when discussing security, to differentiate between the contents of the call and data about it.) Last month, Ramsey Homsany, the general counsel of Dropbox, said that one big thing could take down the California tech scene. “We have built this incredible economic engine in this region of the country,” said Homsany in the Los Angeles Times, “and [mistrust] is the one thing that starts to rot it from the inside out.” According to this poll, the mistrust has already begun corroding—and is already, in fact, well advanced. We’ve always assumed that the great hurt to American business will come globally—that citizens of other nations will stop using tech companies’s services. But the new Pew data shows that Americans suspect American businesses just as much. And while, unlike citizens of other nations, they may not have other places to turn, they may stop putting sensitive or delicate information online.
Paul Merrell

Most say Afghan war 'wrong': US poll - 0 views

  • A US poll suggests most people want President Barack Obama to pull troops out of Afghanistan faster than he's doing, and many are sceptical about a tentative nuclear deal with Iran.
  • In the Associated Press-GfK poll, 57 per cent now say that going to war in Afghanistan after the 2001 attacks was probably the "wrong thing to do".Fifty-three per cent say the pace of the planned withdrawal is too slow, 34 per cent say the pace is just about right and 10 per cent say it is too fast.All combat troops are scheduled to leave by the end of 2014.Meanwhile, 59 per cent approve of the preliminary deal between Iran and six global powers to curb Iran's nuclear ambitions, but that support is soft and many doubt the preliminary deal will lead to concrete results.
  • The poll of 1367 adults was conducted December 5-9 using KnowledgePanel, GfK's probability-based online panel, with the margin of sampling error plus or minus 3.5 percentage points.
Paul Merrell

More Americans see man who leaked NSA secrets as 'patriot' than traitor: Poll | Reuters - 0 views

  • Roughly one in three Americans say the former security contractor who leaked details of top-secret U.S. surveillance activity is a patriot and should not be prosecuted, according to a Reuters/Ipsos poll released on Wednesday. Some 23 percent of those surveyed said former National Security Agency contractor Edward Snowden is a traitor while 31 percent said he is a patriot. Another 46 percent said they did not know.
  • In the Reuters/Ipsos poll, 35 percent of those surveyed said Snowden should not face charges while 25 percent said he should be prosecuted to the full extent of the law. Another 40 percent said they did not know.Snowden told the South China Post he intends to stay in Hong Kong and fight any effort to extradite him to the United States to face legal action.The online survey of 645 Americans was conducted on Tuesday and Wednesday. It has a credibility interval of plus or minus 4.4 percentage points for each result.
  •  
    Hard to get a conviction when one out of 3 jurors see the defendant as a patriot and his "crime" as an act of patriotism. 
Paul Merrell

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet - The In... - 0 views

  • The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
  • he “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities: • “Change outcome of online polls” (UNDERPASS) • “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH) • “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
  • • “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO) • “Find private photographs of targets on Facebook” (SPRING BISHOP) • “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE) • “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM) • “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR) • “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
  • ...1 more annotation...
  • • “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE) • “Ability to spoof any email address and send email under that identity” (CHANGELING) • “For connecting two target phone together in a call” (IMPERIAL BARGE) While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”
Paul Merrell

Barrier Breakers 2016: A Project of Correct The Record - Correct The Record - 0 views

  • Task force will help Clinton supporters push back on online harassment and thank superdelegates Anonymous online attacks, from both sides of the political spectrum, have sought to spread lies and misleading narratives about Secretary Hillary Clinton. Hillary’s supporters are more enthusiastic than Sen. Bernie Sanders’ supporters, yet oftentimes are discouraged from engaging online and are “often afraid to voice their thoughts” because of the fear of online harassment. Many of Hillary Clinton’s female supporters in particular have been subject to intense cyber-bullying and sexist attacks from swarms of anonymous attackers. Among the many Hillary Clinton supporters attacked online, superdelegates have been subject to vicious attacks for supporting her. Even the director of MoveOn, which has endorsed Sen. Sanders, denounced this harassment. In response to these attacks on supporters and superdelegates, Correct The Record is launching the Barrier Breakers 2016 digital task force. While Hillary Clinton fights to break down barriers and bring America together, the Barrier Breakers 2016 digital task force will serve as a resource for supporters looking for positive content and push-back to share with their online progressive communities, as well as thanking prominent supporters and committed superdelegates on social media.
  • ask force will help Clinton supporters push back on online harassment and thank superdelegates Anonymous online attacks, from both sides of the political spectrum, have sought to spread lies and misleading narratives about Secretary Hillary Clinton. Hillary’s supporters are more enthusiastic than Sen. Bernie Sanders’ supporters, yet oftentimes are discouraged from engaging online and are “often afraid to voice their thoughts” because of the fear of online harassment. Many of Hillary Clinton’s female supporters in particular have been subject to intense cyber-bullying and sexist attacks from swarms of anonymous attackers. Among the many Hillary Clinton supporters attacked online, superdelegates have been subject to vicious attacks for supporting her. Even the director of MoveOn, which has endorsed Sen. Sanders, denounced this harassment. In response to these attacks on supporters and superdelegates, Correct The Record is launching the Barrier Breakers 2016 digital task force. While Hillary Clinton fights to break down barriers and bring America together, the Barrier Breakers 2016 digital task force will serve as a resource for supporters looking for positive content and push-back to share with their online progressive communities, as well as thanking prominent supporters and committed superdelegates on social media.
  • Correct The Record will invest more than $1 million into Barrier Breakers 2016 activities, including the more than tripling of its digital operation to engage in online messaging both for Secretary Clinton and to push back against attackers on social media platforms like Twitter, Facebook, Reddit, and Instagram. Barrier Breakers 2016 is a project of Correct The Record and the brainchild of David Brock, and the task force will be overseen by President of Correct The Record Brad Woodhouse and Digital Director Benjamin Fischbein. The task force staff’s backgrounds are as diverse as the community they will be engaging with and include former reporters, bloggers, public affairs specialists, designers, Ready for Hillary alumni, and Hillary super fans who have led groups similar to those with which the task force will organize. Lessons learned from online engagement with “Bernie Bros” during the Democratic Primary will be applied to the rest of the primary season and general election–responding quickly and forcefully to negative attacks and false narratives. Additionally, as the general election approaches, the task force will begin to push out information to Sanders supporters online, encouraging them to support Hillary Clinton. The task force currently combats online political harassment, having already addressed more than 5,000 individuals who have personally attacked Secretary Clinton on Twitter. The task force will provide a presence and space online where Clinton supporters can organize and engage with one another and are able to obtain graphics, videos, gifs, and messaging to use in their own social spaces. Additionally, the Barrier Breakers 2016 task force hopes to embrace the creativity of Hillary Clinton’s supporters by sharing their efforts and content with other groups.
Gary Edwards

Karl Rove: The President Is No B+ - WSJ.com - 0 views

  •  
    Once again Karl Rove lays the lumber to the liar Obama.  Rove provides a trove of stats and facts exposing Obama as a shameless liar and phony.  And then Rove points out that the American people are not fooled.  Polls show an increasing number of Americans are angry and aware that they have been had.  Obama is not who he claimed to be. excerpt:Barack Obama has won a place in history with the worst ratings of any president at the end of his first year: 49% approve and 46% disapprove of his job performance in the latest USA Today/Gallup Poll. There are many factors that explain it, including weakness abroad, an unprecedented spending binge at home, and making a perfectly awful health-care plan his signature domestic initiative. But something else is happening. Mr. Obama has not governed as the centrist, deficit-fighting, bipartisan consensus builder he promised to be. And his promise to embody a new kind of politics-free of finger-pointing, pettiness and spin-was a mirage. He has cheapened his office with needless attacks on his predecessor.
anjalitriyachi

Whom would you want to see as President? - 0 views

  •  
    Poll it for your opinion
Paul Merrell

Zogby Analytics - The Zogby Poll℠: Sanders and Biden dominate Trump; Obama an... - 0 views

  • Zogby Analytics conducted a hybrid (live interviewer telephone and online) survey of 1,514 likely voters in the US. The survey was conducted 10/19/2017 - 10/25/2017. Based on a confidence interval of 95%, the margin of error for 1,514 is +/- 2.5 percentage points. In our latest poll, we analyzed voters' attitudes concerning potential 2020 presidential election match-ups. We found Donald Trump is in close races against Senator Elizabeth Warren and former first lady Michelle Obama. We also see the president in difficult match-ups with Senator Bernie Sanders and former vice president Joe Biden. In the match-up between President Trump and Bernie Sanders, the senator from Vermont receives a narrow majority of voters, while Trump receives 40% of voters. Sanders does better than Trump with women (56%-35%), younger voters age 18-24 (69%-27%), 18-29 (64%-30%), Walmart shoppers (47%-42%), voters age 50-64 (46%-44%), Amazon shoppers (51%-41%) and all minorities. As per usual Trump beats Sanders among voters age 65+ (53%-40%) NASCAR fans (47%-46%), Catholic voters (49%-43%), and rural voters (53%-36%). Sanders does the most damage to Trump among men (both tied at46%), and beats him significantly with Independents (51%-36%). Bernie Sanders also cuts into Trump's lead with older voters and NASCAR fans. When we examine Trump vs. former vice president Joe Biden, Biden beats the president 50% to 40%. Joe Biden, like Bernie Sanders, is favored among younger voters age 18-24 (74%-18%), voters age 18-29 (60%-31%), women (57%-34%), Independents (50%-37%), and all minority groups. President Trump struggles against Biden because Biden is able to tap into the president's base of voters who frequently shop at Walmart (tied at 46%), voters age 50-64 (Biden leads 47% to 43%) and voters with no college education (Biden leads 47% to 42%).
Paul Merrell

Poll: One-Third of Americans Would Accept Cavity Searches By TSA - 0 views

  • In past columns, I have lamented how our government has not only stripped away core civil liberties from citizens, but that citizens have become increasing passive and accepting of the loss of such freedoms. A new poll conducted by Harris Interactive offers a particularly chilling measure of just how passive and accepting citizens have become to the new realities of our internal security system. The poll found almost one third of American adults would accept a “TSA body cavity search” in order to fly. Moreover a majority believes that it is reasonable to criminalize the act of disobeying any TSA agent.  The survey was conducted online by Harris Interactive on behalf of Infowars from November 5-7 among 2059 American adults. People were asked: “Given the recent reports concerning the threat posed by terrorists who plan to implant bombs within their own bodies, how willing, if at all, would you be to undergo a TSA body cavity search in order to fly?” Thirty percent said yes.
Paul Merrell

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

Review & Outlook: Loose Lips on Syria - WSJ.com - 0 views

  • An American military attack on Syria could begin as early as Thursday and will involve three days of missile strikes, according to "senior U.S. officials" talking to NBC News. The Washington Post has the bombing at "no more than two days," though long-range bombers could "possibly" join the missiles. "Factors weighing into the timing of any action include a desire to get it done before the president leaves for Russia next week," reports CNN, citing a "senior administration official." The New York Times, quoting a Pentagon official, adds that "the initial target list has fewer than 50 sites, including air bases where Syria's Russian-made attack helicopters are deployed." The Times adds that "like several other military officials contacted for this report, the official agreed to discuss planning options only on condition of anonymity." Thus do the legal and moral requirements of secret military operations lose out in this Administration to the imperatives of in-the-know spin and political gestures.
  • It's always possible that all of this leaking about when, how and for how long the U.S. will attack Syria is an elaborate head-fake, like Patton's ghost army on the eve of D-Day, poised for the assault on Calais. But based on this Administration's past behavior, such as the leaked bin Laden raid details, chances are most of this really is the war plan. Which makes us wonder why the Administration even bothers to pursue the likes of Edward Snowden when it is giving away its plan of attack to anyone in Damascus with an Internet connection. The answer, it seems, is that the attack in Syria isn't really about damaging the Bashar Assad regime's capacity to murder its own people, much less about ending the Assad regime for good. "I want to make clear that the options that we are considering are not about regime change," White House spokesman Jay Carney said Tuesday. Translation: We're not coming for you, Bashar, so don't worry. And by the way, you might want to fly those attack choppers off base, at least until next week.
  • So what is the purpose of a U.S. attack? Mr. Carney elaborated that it's "about responding to [a] clear violation of an international standard that prohibits the use of chemical weapons." He added that the U.S. had a national security interest that Assad's use of chemical weapons "not go unanswered." This is another way of saying that the attacks are primarily about making a political statement, and vindicating President Obama's ill-considered promise of "consequences," rather than materially degrading Assad's ability to continue to wage war against his own people. It should go without saying that the principal purpose of a military strike is to have a military effect. Political statements can always be delivered politically, and U.S. airmen should not be put in harm's way to deliver what amounts to an extremely loud diplomatic demarche. That's especially so with a "do something" strike that is, in fact, deliberately calibrated to do very little. We wrote Tuesday that there is likely to be no good outcome in Syria until Assad and his regime are gone. Military strikes that advance that goal—either by targeting Assad directly or crippling his army's ability to fight—deserve the support of the American people and our international partners. That's not what this Administration seems to have in mind.
  •  
    This typically pompous Wall Street Journal editorial gets part of it right but ignores several elephants in the room. -- No way this goes down without Russia having agreed to it. Russia's only foreign military base is a naval port in Syria. Russia has deployed anti-aircraft missile batteries in Syria. Russia has supplied the Syrian government with state-of-the-art antiaircraft shoulder-held missiles. Several months ago, the Russians moved a fleet of warships into the Mediterranean for the first time, to protect Syria from foreign attack, including at least one submarine equipped with anti-ship missiles.  The U.S. and Russia have been engaged in building up their forces positioned around for over a year, in an escalating fashion. Russia has a huge economic incentive to keep Assad in power because he is blocking the natural gas pipeline that western interests want to run through Syria Russia has also built up its forces within Syria, a pipeline that would break Russia's near-monopoly on supplying natural gas to the European Union. A direct military intervention in Syria doesn't go down without Russia's approval, notwithstanding what their later statements might be. Obama is an accomplished liar but he's politically timid. Touching off World War III is not on his agenda. 2. Iran also has to acquiesce in advance. Syria and Iran have a mutual defense treaty, the first announced in 2005, a later treaty announced in 2008. http://tinyurl.com/oez2dq7 (.) Thousands of crack Iranian Revolutionary Guards troops are already stationed in Syria. As the only other Shia-majority state in the region, Syria is critical to Iran's own defense. Iran has the ability to close the Straits of Hormuz, thereby toppling the western world economy as petroleum supplies suddenly dry up. The U.S. Navy lacks the ability to quickly clear the Straits of mines, as was proved in embarrassingly bad tests the U.S. Navy did last year. Iran is not a world power but its military might is nothing to sneez
Paul Merrell

Edward Snowden was targeted by Russian spies 6 years BEFORE he exposed US secrets - Mir... - 0 views

  • Ex-KGB Major Boris Karpichkov said spies from Russia’s SVR intelligence service posing as ­diplomats tricked Snowden into ­seeking asylum in Russia
  • Russian spies had whistleblower Edward Snowden in their sights SIX YEARS before he exposed US secrets, reports the Sunday People.Moscow believed the cyber wizard working for the CIA in Geneva was ripe for defection in 2007 and opened a file on him, says a KGB defector.But secret agents did not swoop until last year when Snowden, 30, fled to Hong Kong with 1.7 million top secret documents which he leaked to the media.Ex-KGB Major Boris Karpichkov said spies from Russia’s SVR intelligence service posing as ­diplomats tricked Snowden into ­seeking asylum in Russia.And when the turncoat went there the information was leaked to ­provoke the US into cancelling his passport , so restricting his movements, said Karpichkov.
  • “He wasn’t a Russian spy before he went to Moscow . But death threats have frightened him."These threats were a carefully planned operation by the Russian security services to make Snowden stay in Russia.“Snowden cannot leave Moscow even if he wanted as the Americans have cancelled his passport.”He was admitted to the country on a 12-month renewable visa.But Karpichkov said Snowden’s flight to Moscow was deliberately leaked by the Russians to provoke the Americans into just such an action.
  • ...1 more annotation...
  • Last week the Sunday People ­revealed how Snowden has given so much away about how our GCHQ eavesdroppers gather information on Islamist killers that officials have been forced to set up new procedures.This week it has emerged that GCHQ staff named by Snowden have made plans to rush their partners and kids to safety should they become targets for terrorists.A senior Whitehall source told us: “Parts of the radar have gone dark and that is very worrying. Snowden has committed the worst kind of treachery.”Karpichkov agreed.He said: “There is no doubt he has put Britain and America in grave danger.”
  •  
    To say I am dubious is a gross understatement. From the publication of his first leaked document, the western military intelligence/industrial complex has been attempting to kill the messenger rather than address the message. The meme that he defected to the Russians has been making the rounds for months, but without any supporting allegations, ignoring that his stay in Russia while in transit to Ecuador was the result of the U.S. pulling his passport. Now we have a story in a British yellow-journalism tabloid fairly infamous for publishing hoaxes that meets that criticism, Suddenly, we are told by a former KGB officer that Russian intelligence maneuvered the U.S. into pulling Snowden's passport while Snowden was on layover in Moscow during his travel from Hong Kong to South America.  But the public opinion polls have been moving in the civil libertarians' direction so an escalation in the quality of attacks on Snowden has been entirely predictable. And of course the article ends with an ad hominem "treachery attack on Snowden attributed to GCHQ and an anonymous "senior Whitehall source."  It will be interesting to see what Snowden and Glenn Greenwald have to say about this. If you're interested in the background of the ex-KBG officer, the following Google query will get you lots of information: +kgb +"boris karpichkov" -Snowden  
Gary Edwards

McCain Gets My Vote by Charles Krauthammer on National Review Online - 0 views

  •  
    Contrarian that I am, I'm voting for John McCain. I'm not talking about bucking the polls or the media consensus that it's over before it's over. I'm talking about bucking the rush of wet-fingered conservatives leaping to Barack Obama before they're left out in the cold without a single state dinner for the next four years.
Gary Edwards

Easy Credit and the Depression - Judge Posner @WSJ.com - 0 views

  •  
    What caused this recession? We still don't have a simple explanation. Such is the uncertainty sapping the country's confidence that in a recent Rasmussen Reports poll only 53% of Americans said they prefer capitalism to socialism; 27% were unsure and 20% preferred socialism. Before seeking political asylum in free-market Hong Kong, consider reading a new book that critiques what went wrong with capitalism, written in order to save it. Judge Richard Posner's "A Failure of Capitalism: The Crisis of '08 and the Descent into Depression" is noteworthy. As a longtime University of Chicago professor and father of the free-market-based law-and-economics movement, Judge Posner makes an unlikely critic of capitalism. But as author of some 40 books and as the most frequently cited federal appeals court jurist, he is also one of our most original and clearheaded thinkers. Who's to blame and who's responsible for the recession? Judge Posner, who calls it a depression, distinguishes between the roles played by government and the private sector. "Although financiers bear the primary responsibility for the depression," he writes, "I do not think they can be blamed for it -- implying moral censure -- any more than one can blame a lion for eating a zebra. Capitalism is Darwinian." A pragmatic explanation for behavior that looks irrational in retrospect shows that it was logical, based on incentives at the time. Blame lies elsewhere: "The responsibility for building the fences that prevent an economic collapse as a result of risky lending devolves on the government."
Paul Merrell

Britain Used Spy Team to Shape Latin American Public Opinion on Falklands - The Intercept - 0 views

  • Faced with mounting international pressure over the Falkland Islands territorial dispute, the British government enlisted its spy service, including a highly secretive unit known for using “dirty tricks,” to covertly launch offensive cyberoperations to prevent Argentina from taking the islands. A shadowy unit of the British spy agency Government Communications Headquarters (GCHQ) had been preparing a bold, covert plan called “Operation QUITO” since at least 2009. Documents provided to The Intercept by National Security Agency whistleblower Edward Snowden, published in partnership with Argentine news site Todo Notícias, refer to the mission as a “long-running, large scale, pioneering effects operation.” At the heart of this operation was the Joint Threat Research and Intelligence Group, known by the acronym JTRIG, a secretive unit that has been involved in spreading misinformation.
  • The British government, which has continuously administered the Falkland Islands — also known as the Malvinas — since 1833, has rejected Argentine and international calls to open negotiations on territorial sovereignty. Worried that Argentina, emboldened by international opinion, may attempt to retake the islands diplomatically or militarily, JTRIG and other GCHQ divisions were tasked “to support FCO’s [Foreign and Commonwealth Office’s] goals relating to Argentina and the Falkland Islands.” A subsequent document suggests the main FCO goal was to “[prevent] Argentina from taking over the Falkland Islands” and that new offensive cyberoperations were underway in 2011 to further that end. Tensions between the two nations, which fought a war over the small archipelago in the South Atlantic Ocean in 1982, reached a boil in 2010 with the British discovery of large, offshore oil and gas reserves potentially worth billions of dollars.
  • While the full extent of JTRIG’s tactics used in the Falklands mission is unclear, the scope of JTRIG’s approved capabilities offers an idea of what may have been done. The group, first revealed last year by NBC News and The Intercept, has developed various techniques — including “false flag” operations, sexual “honey traps,” and implanting computer viruses — to collect intelligence, plant propaganda and diminish or discredit opponents. As reported in The Intercept last year, JTRIG “has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, ‘amplif[y]’ sanctioned messages on YouTube,” and plant false Facebook wall posts for “entire countries.” According to a study of the group by the U.K.’s Defence Science and Technology Laboratory (DSTL), “the language of JTRIG’s operations is characterized by terms such as ‘discredit,’ promote ‘distrust,’ ‘dissuade,’ ‘deceive,’ ‘disrupt,’ ‘delay,’ ‘deny,’ ‘denigrate/degrade,’ and ‘deter.’” The unit’s activities generally break down into two symbiotic categories: online Human Intelligence, or HUMINT, and “effects operations.” Online HUMINT is the collection of information on human targets through passive tracking or overt interaction with a target through an alias. These operations may sometimes be in support of, or in conjunction with, covert MI-6 agents on the ground.
  • ...2 more annotations...
  • Effects operations are used to disseminate deception and disruption online. A full catalog of JTRIG’s capabilities as of 2012 can be seen here. Operation QUITO, the group’s operation to support the Foreign Office’s “goals relating to Argentina and the Falkland Islands” is called a “pioneering effects operation.” That operation, still in the planning stages, had undergone “a significant amount of prep work” and was “almost complete” as of 2009.
  • GCHQ’s mission regarding the Falkland Islands also appears to extend beyond just Argentina and involve regional leaders and attitudes. A November 2011 workshop on “Mission Driven Access” gathered staff to “build on pioneering work already done” and tried to develop new ideas for real world scenarios. One such scenario: “GCHQ has consistently underperformed on Brazil, with growing concerns that [South] American attitudes on the Falklands are swinging behind Argentina. A forthcoming Ministerial visit to Chile provides an opportunity to counter the trend. The Foreign Office are looking for advice.”
Paul Merrell

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
1 - 20 of 32 Next ›
Showing 20 items per page