Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 10-year-plan

Rss Feed Group items tagged

Paul Merrell

Iran Is Invited to Join U.S., Russia and Europe for Talks on Syria's Future - The New Y... - 0 views

  • Iran has been invited to join talks in Vienna this week with Russia, the United States and European nations on whether a political resolution is possible in the Syrian civil war. If Iran accepts, it will be the first time Secretary of State John Kerry will enter formal negotiations with Tehran on issues beyond the nuclear accord reached in July. Russia has been pressing to include Iran, the only other major power giving military support to President Bashar al-Assad in his effort to remain in power. Senior American officials have begun to acknowledge in recent weeks that no serious discussion of a possible political succession plan in Syria can happen without Tehran’s involvement.But the American denunciation of Iran’s activities in Syria, including its support for Mr. Assad’s forces and for terror groups like Hezbollah, has always prevented the United States from including Iran in formal talks about the Syrian crisis. Continue reading the main story Related Coverage Turkey Confirms Strikes Against Kurdish Militias in SyriaOCT. 27, 2015 U.N. Rights Investigator Highly Critical of IranOCT. 27, 2015 Assad Makes Unannounced Trip to Moscow to Discuss Syria With PutinOCT. 21, 2015 The State Department spokesman, John Kirby, buried that policy at a briefing on Tuesday, before it was announced that Mr. Kerry would attend the meeting on Syria in Vienna on Thursday and Friday. “We anticipate that Iran will be invited to attend this upcoming meeting,” Mr. Kirby said.
  • Mr. Kirby added that the United States still opposed what he termed Iran’s “destabilizing activities” in Syria. But he said that the United States “recognized that at some point in the discussion, moving toward a political transition, we have to have a conversation and a dialogue with Iran.”The change is another example of how Russia’s military entry into the Syrian war has changed the power dynamic of the sporadic negotiations. For a long while the United States argued that Mr. Assad must go — as President Obama declared four years ago at the White House — before negotiations on a successor could begin. That position was altered recently to say that a political solution could be sought as long as it included an eventual transition of power, perhaps to another Alawite-dominated government.But the latest shift is a recognition that Russia and Iran may well be the two biggest voices in who succeeds Mr. Assad — if any political transition can be engineered — and that to leave the Iranians out of the conversation was “simply ignoring reality,” one senior American diplomat said.
Paul Merrell

Former CIA Officer Detained in Europe While Trying to Clear Her Name in Rendition Case ... - 0 views

  • A former CIA counterterrorism officer who has spent nearly a decade trying to clear her name over her alleged role in the infamous rendition of a terrorism suspect was detained in Portugal this week after trying to leave the country.Sabrina De Sousa, 59, was en route to see her mother in India on Monday when she was stopped by law enforcement authorities at Lisbon Portela Airport on an outstanding European arrest warrant issued in Italy. Days before she was detained, VICE News had been with De Sousa in Lisbon filming a documentary about her ordeal and the rendition case. De Sousa's husband informed VICE News of her arrest, which we independently confirmed through diplomatic and law enforcement sources in Portugal, who declined to discuss the case on the record.De Sousa told VICE News Thursday that she was detained overnight at the main police headquarters in Lisbon. A hearing was held before a Portuguese prosecutor and a judge at the Tribunal da Relação de Lisboa Tuesday to determine whether she should remain in custody. De Sousa, a dual US and Portuguese citizen, said she was advised by her attorneys not to discuss details of the hearing, but that the judge freed her and seized her US and Portuguese passports while a decision is made about whether she should be extradited to Italy, which is expected in about 10 days. 
  • In a landmark 2009 ruling, De Sousa and nearly two-dozen other CIA officers were convicted in absentia in Italy on kidnapping and other charges in connection with the February 2003 abduction of Osama Mustapha Hassan Nasr, better known as Abu Omar, a radical cleric whose fiery anti-American speeches in the immediate aftermath of 9/11 attracted the attention of the CIA.
  • After Abu Omar disappeared, an investigation spearheaded by a Milan prosecutor revealed that he was taken off a Milan street in broad daylight by CIA and Italian intelligence officers and rendered to Egypt, where the cleric says he was brutally tortured during interrogations about his alleged plans for recruiting jihadists to fight against Americans.It was the first prosecution and conviction involving American intelligence officers connected to the CIA's highly controversial rendition, detention, and interrogation program. De Sousa was sentenced in absentia to a five-year prison term in Italy.But De Sousa, who had been operating under diplomatic cover at the US Consulate in Milan at the time the rendition was carried out — she was officially listed as a State Department employee — has for years maintained her innocence. On the day the operation took place, she said she was on a ski trip with her son. She acknowledged that she served as a translator for the CIA snatch team and Italian intelligence that planned the abduction, but she said she was "cut out" of the operation long before it took place.
  • ...1 more annotation...
  • Armando Spataro, the Italian prosecutor who prosecuted De Sousa and other CIA officers, told VICE News in an interview at his office in Milan last month that De Sousa has one way to "clear her reputation: She should come and tell us everything.""I don't want to comment on her statements," he said. "I have to tell you that not only in the Abu Omar abduction but with any felony, like grand theft auto, it is not only responsible who executed but also who helped the preparation."
  •  
    "She acknowledged that she served as a translator for the CIA snatch team and Italian intelligence that planned the abduction, but she said she was "cut out" of the operation long before it took place." If she truly said that and it was U.S. law that applied, she would have confessed to being a co-conspirator and an accomplice. Either way, just as guilty as the guys who carried out the snatch. 
Paul Merrell

The U.S. Government's Secret Plans to Spy for American Corporations - The Intercept - 0 views

  • Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. So critical is this denial to the U.S. government that last August, an NSA spokesperson emailed The Washington Post to say (emphasis in original): “The department does ***not*** engage in economic espionage in any domain, including cyber.” After that categorical statement to the Post, the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations.
  • In a graphic describing an “illustrative example,” the report heralds “technology acquisition by all means.” Some of the planning relates to foreign superiority in surveillance technology, but other parts are explicitly concerned with using cyber-espionage to bolster the competitive advantage of U.S. corporations. The report thus envisions a scenario in which companies from India and Russia work together to develop technological innovation, and the U.S. intelligence community then “conducts cyber operations” against “research facilities” in those countries, acquires their proprietary data, and then “assesses whether and how its findings would be useful to U.S. industry” (click on image to enlarge):
  • One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” Such a development, the report says “could put the United States at a growing—and potentially permanent—disadvantage in crucial areas such as energy, nanotechnology, medicine, and information technology.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence” (emphasis added). In particular, the DNI’s report envisions “cyber operations” to penetrate “covert centers of innovation” such as R&D facilities.
  • ...3 more annotations...
  • Director of National Intelligence James Clapper, for instance, responded to the Petrobras revelations by claiming: “It is not a secret that the Intelligence Community collects information about economic and financial matters…. What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of—or give intelligence we collect to—U.S. companies to enhance their international competitiveness or increase their bottom line.” But a secret 2009 report issued by Clapper’s own office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies as they identify future threats to the U.S. and lay out the actions the U.S. intelligence community should take in response. It anticipates a series of potential scenarios the U.S. may face in 2025, from a “China/Russia/India/Iran centered bloc [that] challenges U.S. supremacy” to a world in which “identity-based groups supplant nation-states,” and games out how the U.S. intelligence community should operate in those alternative futures—the idea being to assess “the most challenging issues [the U.S.] could face beyond the standard planning cycle.”
  • he report describes itself as “an essential long-term piece, looking out between 10 and 20 years” designed to enable ”the IC [to] best posture itself to meet the range of challenges it may face.” Whatever else is true, one thing is unmistakable: the report blithely acknowledges that stealing secrets to help American corporations secure competitive advantage is an acceptable future role for U.S. intelligence agencies. In May, the U.S. Justice Department indicted five Chinese government employees on charges that they spied on U.S. companies. At the time, Attorney General Eric Holder said the spying took place “for no reason other than to advantage state-owned companies and other interests in China,” and “this is a tactic that the U.S. government categorically denounces.” But the following day, The New York Times detailed numerous episodes of American economic spying that seemed quite similar. Harvard Law School professor and former Bush Justice Department official Jack Goldsmith wrote that the accusations in the indictment sound “a lot like the kind of cyber-snooping on firms that the United States does.” But U.S. officials continued to insist that using surveillance capabilities to bestow economic advantage for the benefit of a country’s corporations is wrong, immoral, and illegal.
  • Yet this 2009 report advocates doing exactly that in the event that ”that the technological capacity of foreign multinational corporations outstrip[s] that of U.S. corporations.” Using covert cyber operations to pilfer “proprietary information” and then determining how it ”would be useful to U.S. industry” is precisely what the U.S. government has been vehemently insisting it does not do, even though for years it has officially prepared to do precisely that.
  •  
    DNI James Clapper caught telling another whopper. 
Paul Merrell

Are The Middle East Wars Really About Forcing the World Into Dollars and Private Centra... - 0 views

  • Why is the U.S. targeting Iran’s central bank? Well, multi-billionaire Hugo Salinas Price told King World News: What happened to Mr. Gaddafi, many speculate the real reason he was ousted was that he was planning an all-African currency for conducting trade. The same thing happened to him that happened to Saddam because the US doesn’t want any solid competing currency out there vs the dollar. You know Gaddafi was talking about a gold dinar. And as I noted in August: Ellen Brown argues in the Asia Times that there were even deeper reasons for the war than gold, oil or middle eastern regime change. Brown argues that Libya – like Iraq under Hussein – challenged the supremacy of the dollar and the Western banks: Later, the same general said they planned to take out seven countries in five years: Iraq, Syria, Lebanon, Libya, Somalia, Sudan, and Iran. What do these seven countries have in common? In the context of banking, one that sticks out is that none of them is listed among the 56 member banks of the Bank for International Settlements (BIS). That evidently puts them outside the long regulatory arm of the central bankers’ central bank in Switzerland.
  • The most renegade of the lot could be Libya and Iraq, the two that have actually been attacked. Kenneth Schortgen Jr, writing on Examiner.com, noted that “[s]ix months before the US moved into Iraq to take down Saddam Hussein, the oil nation had made the move to accept euros instead of dollars for oil, and this became a threat to the global dominance of the dollar as the reserve currency, and its dominion as the petrodollar.” According to a Russian article titled “Bombing of Libya – Punishment for Ghaddafi for His Attempt to Refuse US Dollar”, Gaddafi made a similarly bold move: he initiated a movement to refuse the dollar and the euro, and called on Arab and African nations to use a new currency instead, the gold dinar. Gaddafi suggested establishing a united African continent, with its 200 million people using this single currency. *** And that brings us back to the puzzle of the Libyan central bank. In an article posted on the Market Oracle, Eric Encina observed:
  • One seldom mentioned fact by western politicians and media pundits: the Central Bank of Libya is 100% State Owned … Currently, the Libyan government creates its own money, the Libyan Dinar, through the facilities of its own central bank. Few can argue that Libya is a sovereign nation with its own great resources, able to sustain its own economic destiny. One major problem for globalist banking cartels is that in order to do business with Libya, they must go through the Libyan Central Bank and its national currency, a place where they have absolutely zero dominion or power-broking ability. Hence, taking down the Central Bank of Libya (CBL) may not appear in the speeches of Obama, Cameron and Sarkozy but this is certainly at the top of the globalist agenda for absorbing Libya into its hive of compliant nations.
  • ...3 more annotations...
  • Adding credence to the theory about why Gadhafi had to be overthrown, as The New American reported in March, was the rebels’ odd decision to create a central bank to replace Gadhafi’s state-owned monetary authority. The decision was broadcast to the world in the early weeks of the conflict. In a statement describing a March 19 meeting, the rebel council announced, among other things, the creation of a new oil company. And more importantly: “Designation of the Central Bank of Benghazi as a monetary authority competent in monetary policies in Libya and appointment of a Governor to the Central Bank of Libya, with a temporary headquarters in Benghazi.” The creation of a new central bank, even more so than the new national oil regime, left analysts scratching their heads. “I have never before heard of a central bank being created in just a matter of weeks out of a popular uprising,” noted Robert Wenzel in an analysis for the Economic Policy Journal. “This suggests we have a bit more than a rag tag bunch of rebels running around and that there are some pretty sophisticated influences,” he added. Wenzel also noted that the uprising looked like a “major oil and money play, with the true disaffected rebels being used as puppets and cover” while the transfer of control over money and oil supplies takes place.
  • Similar scenarios involving the global monetary system — based on the U.S. dollar as a global reserve currency, backed by the fact that oil is traded in American money — have also been associated with other targets of the U.S. government. Some analysts even say a pattern is developing. Iran, for example, is one of the few nations left in the world with a state-owned central bank. And Iraqi despot Saddam Hussein, once armed by the U.S. government to make war on Iran, was threatening to start selling oil in currencies other than the dollar just prior to the Bush administration’s “regime change” mission. While most of the establishment press in America has been silent on the issue of Gadhafi’s gold dinar scheme, in Russia, China, and the global alternative media, the theory has exploded in popularity.
  • Posted on January 13, 2012 by WashingtonsBlog The Reason for the Wars in the Middle East and North Africa:  Dollars The Middle Eastern and North African wars – planned 20 years ago – don’t necessarily have much to do with fighting terrorism. See this,  this and this. They are, in reality, about oil. And protecting Israel (and read the section entitled “Securing the Realm” here). But as AFP reports today, there is another major motivation for the expanding wars: The latest round of American sanctions are aimed at shutting down Iran’s central bank, a senior US official said Thursday, spelling out that intention directly for the first time. “We do need to close down the Central Bank of Iran (CBI),” the official told reporters on condition of anonymity, while adding that the United States is moving quickly to implement the sanctions, signed into law last month. *** Foreign central banks that deal with the Iranian central bank on oil transactions could also face similar restrictions under the new law, which has sparked fears of damage to US ties with nations like Russia and China. “If a correspondent bank of a US bank wants to do business with us and they’re doing business with CBI or other designated Iranian banks… then they’re going to get in trouble with us,” the US official said.
  •  
    I only highlighted snippets. Lots more and lots of links. 
Paul Merrell

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional committee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial institutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms with Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency with which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of its largest.19 The political clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [Italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘It was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 It also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the Italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter Maritime Bank, which interlocked with BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 It is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. It is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. It may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
Paul Merrell

Beltway Foreign Policy Groups to Congress: Stay Out of the Way on Iran! « Lob... - 0 views

  • The November 24 deadline for Iran and world powers to reach an agreement on Iran’s nuclear program is quickly approaching.
  • If there is a deal on Nov. 24, the White House indicated, in an article authored by David E. Sanger in Sunday’s New York Times, that it would not seek an immediate vote on the agreement or sanctions relief, instead asserting that the administration can, and may need to, roll back some sanctions unilaterally as part of immediate sanctions relief guarantees in a possible agreement. Hawks in Congress may want to portray their position as representing the mainstream consensus but a letter signed by thirty-seven organizations and sent to members of Congress on Thursday offers some indication that many foreign policy groups in the beltway are concerned by Congress’ latest effort to meddle in the final weeks of sensitive diplomacy before the November deadline. The signatories—which include the Center for Arms Control and Non-Proliferation; J Street; MoveOn.org; the National Iranian American Council; Progressive Democrats of America; the United Methodist Church and VoteVets— expressed “deep concern with inaccurate and counterproductive rhetoric from a handful of Members of Congress regarding possible outcomes of the current negotiations.”
  • They continue: Particularly irresponsible are threats to oppose any comprehensive agreement limiting Iran’s nuclear program that initially suspends US sanctions on Iran through lawful executive action. Congress’ authorization of the President’s power to suspend and re-impose US sanctions on Iran is clear and unmistakable in each piece of legislation it has passed on the subject. Use of these provisions by the President to implement the initial phase of an agreement that ensures Iran does not acquire a nuclear weapon would reflect an affirmation, not a subversion, of Congress’ will. The echo chamber on Capitol Hill may give members of the House and Senate the impression that only the threat of military action or crushing sanctions are effective tools in bringing Iran to the negotiating table. (My colleague Ali Gharib and I discussed the disproportionate voice given to individuals from neoconservative organizations at congressional hearings on Iran in a July article in The Nation.)
  • ...1 more annotation...
  • But the letter sent out on Thursday might give some congressional Democrats pause. Congress may lean hawkish but progressive groups in the beltway are throwing their weight behind the White House’s efforts to reach a diplomatic agreement on Iran’s nuclear program and are urging Congress to stay out of the way.
  •  
    There's more behind this story than appears in its words. "Progressive" organizations have largely stood silent on the topic of war since Obama was elected because they are Obama fans and Obama has been anything but peaceful. But now they turn out because Obama needs Congress to stay out of the Iran situation until negotiations are complete and for some time afterward. The pressure on Congress to intervene is coming from the Israel Lobby. Keep in mind that it's been the consensus position of all 17 U.S. intelligence agencies for many years that Iran has no plans to create a nuclear weapon capability. Several Israeli intelligence and military leaders have said the same thing. The Iranian nukes myth is a propaganda theme of the ultra-right wing Israeli government leadership that has been used for several years in efforts to persuade the U.S. to invade Iran and bomb it back into the Stone Age. And their excuse for involving the U.S. military evaporates if the Obama Administration successfully negotiates an agreement with Iran that limits its lawful development of nuclear energy for peaceful purposes that will safeguard from any change of mind in Iran on development of nuclear weapons via, e.g., production limits and on-site inspections. The counter-argument is that such an agreement would have to be ratified by the Senate on grounds that it would be a treaty. But that argument falls short of the mark because: [i] the Executive has always had the unfettered right to negotiate and sign treaties; [ii] the U.S. government is not bound by treaties unless and until the Senate ratifies the treaty; and [iii] Congress already explicitly gave Obama authority to impose and suspend economic sanctions at his discretion. Meanwhile, part of the interim agreement with Iran so that negotiations can take place is a promise by the Obama Administration that it would veto any legislation imposing further sanctions on Iran during the period of negotiation. Because of the Israel Lobby'
Paul Merrell

The New Snowden? NSA Contractor Arrested Over Alleged Theft Of Classified Data - 0 views

  • A contractor working for the National Security Agency (NSA) was arrested by the FBI following his alleged theft of “state secrets.” More specifically, the contractor, Harold Thomas Martin, is charged with stealing highly classified source codes developed to covertly hack the networks of foreign governments, according to several senior law enforcement and intelligence officials. The Justice Department has said that these stolen materials were “critical to national security.” Martin was employed by Booz Allen Hamilton, the company responsible for most of the NSA’s most sensitive cyber-operations. Edward Snowden, the most well-known NSA whistleblower, also worked for Booz Allen Hamilton until he fled to Hong Kong in 2013 where he revealed a trove of documents exposing the massive scope of the NSA dragnet surveillance. That surveillance system was shown to have targeted untold numbers of innocent Americans. According to the New York Times, the theft “raises the embarrassing prospect” that an NSA insider managed to steal highly damaging secret information from the NSA for the second time in three years, not to mention the “Shadow Broker” hack this past August, which made classified NSA hacking tools available to the public.
  • Snowden himself took to Twitter to comment on the arrest. In a tweet, he said the news of Martin’s arrest “is huge” and asked, “Did the FBI secretly arrest the person behind the reports [that the] NSA sat on huge flaws in US products?” It is currently unknown if Martin was connected to those reports as well.
  • It also remains to be seen what Martin’s motivations were in removing classified data from the NSA. Though many suspect that he planned to follow in Snowden’s footsteps, the government will more likely argue that he had planned to commit espionage by selling state secrets to “adversaries.” According to the New York Times article on the arrest, Russia, China, Iran, and North Korea are named as examples of the “adversaries” who would have been targeted by the NSA codes that Martin is accused of stealing. However, Snowden revealed widespread US spying on foreign governments including several US allies such as France and Germany. This suggests that the stolen “source codes” were likely utilized on a much broader scale.
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

Do We Really Want a New World War With Russia? | New Eastern Outlook - 0 views

  • Washington continues making an international fool of herself by her inability to effectively counter the impression around the world that Russia, spending less than 10% of the Pentagon annually on defense, has managed to do more against ISIS in Syria in six weeks than the mighty US Air Force bombing campaign has done in almost a year and half. One aspect that bears attention is the demonstration by the Russian military of new technologies that belie the widely-held Western notion that Russia is little more than a backward oil and raw material commodity exporter. Recent reorganization of the Russian state military industrial complex as well as reorganization of the Soviet-era armed forces under Defense Minister Sergey Shoigu’s term are visible in the success so far of Russia’s ISIS and other terror strikes across Syria. Clearly Russian military capabilities have undergone a sea-change since the Soviet Cold War era. In war there are never winners. Yet Russia has been in an unwanted war with Washington de facto since the George W. Bush Administration announced its lunatic plan to place what they euphemistically term “Ballistic Missile Defense” missiles and advanced radar in Poland, Czech Republic, Romania and Turkey after 2007. Without going into detail, BMD technologies are the opposite of defensive. They instead make a pre-emptive war highly likely. Of course the radioactive ash heap in such an exchange would be first and foremost the EU countries foolish enough to invite US BMD to their soil.
  • What the Russian General Staff has managed, since the precision air campaign began September 30, has stunned western defense planners with Russian technological feats not expected. Two specific technologies are worth looking at more closely: The Russian Sukoi SU-34 fighter-bomber and what is called the Bumblebee hyperbaric mortar weapon.
  • The plane responsible for some of the most damaging strikes on ISIS and other terror enclaves in Syria is manufactured by the Russian state aircraft industry under the name Sukhoi SU-34. As the Russian news agency RIA Novosti described the aircraft, “The Su-34 is meant to deliver a sufficiently large ordnance load to a predetermined area, hit the target accurately and take evasive action against pursuing enemy planes.” The plane is also designed to deal with enemy fighters in aerial combat such as the US F-16. The SU-34 made a first test flight in 1990 as the collapse of the Soviet Union and the chaos of the Yeltsin years caused many delays. Finally in 2010 the plane was in full production. According to a report in US Defense Industry Daily, among the SU-34 features are: • 8 ton ordnance load which can accommodate precision-guided weapons, as well as R-73/AA-11 Archer and R-77/AA-12 ‘AMRAAMSKI’ missiles and an internal 30mm GSh-301 gun. • Maximum speed of Mach 1.8 at altitude.
  • ...8 more annotations...
  • • 3,000 km range, extensible to “over 4,000 km” with the help of additional drop tanks. The SU-34 can also refuel in mid-air. • It can fly in TERCOM (Terrain Contour Matching) mode for low-level flight, and has software to execute a number of difficult maneuvers. • Leninets B004 phased array multimode X-band radar, which interleaves terrain-following radar and other modes.
  • Clearly the aircraft is impressive as it has demonstrated against terrorist centers in Syria. Now, however, beginning this month it will add a “game-changer” in the form of a new component. Speaking at the Dubai Air Show on November 12, Igor Nasenkov, the First Deputy General Director of the Radio-Electronic Technologies Concern (KRET) announced that this month, that is in the next few days, SUKHOI SU-34 fighter-bombers will become electronic warfare aircraft as well. Nasenkov explained that the new Khibiny aircraft electronic countermeasures (ECM) systems, installed on the wingtips, will give the SU-34 jets electronic warfare capabilities to launch effective electronic countermeasures against radar systems, anti-aircraft missile systems and airborne early warning and control aircraft. KRET is a holding or group of some 95 Russian state electronic companies formed in 2009 under the giant Russian state military industry holding, Rostec.
  • Russia’s advances in what is euphemistically termed in military jargon, Electronic Counter Measures or ECM, is causing some sleepless nights for the US Pentagon top brass to be sure. In the battles in eastern pro-Russian Ukraine earlier this year, as well as in the Black Sea, and now in Syria, according to ranking US military sources, Russia deployed highly-effective ECM technologies like the Krasukha-4, to successfully jam hostile radar and aircraft. Lt. General Ben Hodges, Commander of US Army Europe (USAREUR) describes Russian ECM capabilities used in Ukraine as “eye-watering,” suggesting some US and NATO officers are more than slightly disturbed by what they see. Ronald Pontius, deputy to Army Cyber Command’s chief, Lt. Gen. Edward Cardon, told a conference in October that, “You can’t but come to the conclusion that we’re not making progress at the pace the threat demands.” In short, Pentagon planners have been caught flat-footed for all the trillions of wasted US taxpayer dollars in recent years thrown at the military industry.
  • During the critical days of the March 2014 Crimean citizens’ referendum vote to appeal for status within Russia, New York Times reporters then in Crimea reported the presence of Russian electronic jamming systems, known as R-330Zh Zhitel, manufactured by Protek in Voronezh, Russia. That state-of-the-art technology was believed to have been used to prevent the Ukrainian Army from invading Crimea before the referendum. Russian forces in Crimea, where Russia had a legal basing agreement with Kiev, reportedly were able to block all communication of Kiev military forces, preventing a Crimean bloodbath. Washington was stunned.
  • Thereafter, in April, 2014, one month after the accession of Crimea into the Russian Federation, President Obama ordered the USS Donald Cook into the Black Sea waters just off Crimea, the home port of Russia’s Black Sea Fleet, to “reassure” EU states of US resolve. Donald Cook was no ordinary guided missile destroyer. It had been refitted to be one of four ships as part of Washington’s Aegis Ballistic Missile Defense System aimed at Russia’s nuclear arsenal. USS Donald Cook boldly entered the Black Sea on April 8 heading to Russian territorial waters. On April 12, just four days later, the US ship inexplicably left the area of the Crimean waters of the Black Sea for a port in NATO-member Romania. From there it left the Black Sea entirely. A report on April 30, 2014 in Russian newspaper Rossiyskaya Gazeta Online titled, “What Frightened the American Destroyer,” stated that while the USS Donald Cook was near Crimean (Russian by that time) waters, a Russian Su-24 Frontal Aviation bomber conducted a flyby of the destroyer. The Rossiyskaya Gazeta went on to write that the Russian SU-24 “did not have bombs or missiles onboard. One canister with the Khibin electronic warfare complex was suspended under the fuselage.” As it got close to the US destroyer, the Khibins turned off the USS Donald Cook’s “radar, combat control circuits, and data transmission system – in short, they turned off the entire Aegis just like we turn off a television by pressing the button on the control panel. After this, the Su-24 simulated a missile launch at the blind and deaf ship. Later, it happened once again, and again – a total of 12 times.”
  • While the US Army denied the incident as Russian propaganda, the fact is that USS Donald Cook never approached Russian Black Sea waters again. Nor did NATO ships that replaced it in the Black Sea. A report in 2015 by the US Army’s Foreign Military Studies Office assessed that Russia, “does indeed possess a growing EW capability, and the political and military leadership understand the importance…Their growing ability to blind or disrupt digital communications might help level the playing field when fighting against a superior conventional foe.” Now new Russian Khibini Electronic Counter Measure systems are being installed on the wingtips of Russia’s SUKHOI SU-34 fighter-bombers going after ISIS in Syria.
  • A second highly-advanced new Russian military technology that’s raising more than eyebrows in US Defense Secretary ‘Ash’ Carter’s Pentagon is Russia’s new Bumblebee which Russia’s military classifies as a flamethrower. In reality it is a highly advanced thermobaric weapon which launches a warhead that uses a combination of an explosive charge and highly combustible fuel. When the rocket reaches the target, the fuel is dispersed in a cloud that is then detonated by the explosive charge. US Military experts recently asked by the US scientific and engineering magazine Popular Mechanics to evaluate the Bumblebee stated that, “the resulting explosion is devastating, radiating a shockwave and fireball up to six or seven meters in diameter.” The US experts noted that the Bumblebee is “especially useful against troops in bunkers, trenches, and even armored vehicles, as the dispersing gas can enter small spaces and allow the fireball to expand inside. Thermobarics are particularly devastating to buildings — a thermobaric round entering a structure can literally blow up the building from within with overpressure.”
  • We don’t go into yet another new highly secret Russian military technology recently subject of a Russian TV report beyond a brief mention, as little is known. It is indicative of what is being developed as Russia prepares for the unthinkable from Washington. The “Ocean Multipurpose System: Status-6” is a new Russian nuclear submarine weapons system designed to bypass NATO radars and any existing missile defense systems, while causing heavy damage to “important economic facilities” along the enemy’s coastal regions. Reportedly the Status-6 will cause what the Russian military terms, “assured unacceptable damage” to an adversary force. They state that its detonation “in the area of the enemy coast” (say, New York or Boston or Washington?) would result in “extensive zones of radioactive contamination” that would ensure that the region would not be used for “military, economic, business or other activity for a long time.” Status-6 reportedly is a massive torpedo, designated as a “self-propelled underwater vehicle.” It has a range of up to 10 thousand kilometers and can operate at a depth of up to 1,000 meters. At a November 10 meeting with the Russian military chiefs, Vladimir Putin stated that Russia would counter NATO’s US-led missile shield program through “new strike systems capable of penetrating any missile defenses.” Presumably he was referring to Status-6.
  •  
    Not to mentiont that Russia has deployed its S-400 surface to air defense system to Syria, which is 2 generations later than the currently deployed U.S. Patriot systems. The S-400 can knock down aircraft or missiles flying up to 90,000 feet and travels at over 17,000 mph, very near Earth escape velocity. It has a lateral range of nearly 300 miles.
Paul Merrell

How a false witness helped the CIA make a case for torture | Al Jazeera America - 0 views

  • Buried amid details of “rectal rehydration” and waterboarding that dominated the headlines over last week’s Senate Intelligence Committee findings was an alarming detail: Both the committee’s summary report and its rebuttal by the CIA admit that a source whose claims were central to the July 2004 resumption of the torture program  — and, almost certainly, to authorizing the Internet dragnet collecting massive amounts of Americans’ email metadata — fabricated claims about an election year plot. Both the torture program and President Bush's warrantless wiretap program, Stellar Wind, were partly halted from March through June of 2004. That March, Assistant Attorney General Jack Goldsmith prepared to withdraw Pentagon authorization for torture, amid growing concern following the publication of pictures of detainee abuse at Iraq's Abu Ghraib, and a May 2004 CIA inspector general report criticizing a number of aspects of the Agency's interrogation program. On June 4, 2004, CIA Director George Tenet suspended the use of torture techniques.
  • During the same period, the DOJ lawyers who pushed to stop torture were also persuading President George W. Bush to halt aspects of Stellar Wind, a program that conducted warrantless wiretapping of Americans’ communications inside the U.S., on top of the Internet metadata. After a dramatic confrontation in the hospital room of Attorney General John Ashcroft on March 10, 2004, acting Attorney General Jim Comey and Goldsmith informed Bush there was no legal basis for parts of the program. Ultimately, Bush agreed to modify aspects of it, in part by halting the collection of Internet metadata. But even as Bush officials suspended that part of the program on March 26, they quickly set about finding legal cover for its resumption. One way they did so was by pointing to imminent threats — such as a planned election-season attack — in the United States.
  • The CIA in March 2004 received reporting from a source the torture report calls "Asset Y,” who said a known Al-Qaeda associate in Pakistan, Janat Gul — whom CIA at the time believed was a key facilitator — had set up a meeting between Asset Y and Al-Qaeda's finance chief, and was helping plan attacks inside the United States timed to coincide with the November 2004 elections. According to the report, CIA officers immediately expressed doubts about the veracity of the information they’d been given by Asset Y. A senior CIA officer called the report "vague" and "worthless in terms of actionable intelligence." He noted that Al Qaeda had already issued a statement “emphasizing a lack of desire to strike before the U.S. election” and suggested that since Al-Qaeda was aware that “threat reporting causes panic in Washington” and inevitably results in leaks, planting a false claim of an election season attack would be a good way for the network to test whether Asset Y was working for its enemies. Another officer, assigned to the group hunting Osama bin Laden, also expressed doubts. In its rebuttal to the Senate report, the CIA argues the agency was right to take seriously Asset Y’s reporting , in spite of those initial doubts. The CIA wrote numerous reports about the claim “even as we worked to resolve the inconsistencies.” Reports from detainee Hassan Ghul, who was captured in January 2004, supported the possibility that a cell of Al-Qaeda members in Pakistan’s tribal areas might be planning a plot of which he was unaware. And the CIA corroborated other parts of Asset Y's reporting.
  • ...5 more annotations...
  • Still, the CIA had one further reason for doubting claims that Gul was at the center of an Al-Qaeda election-year plot. Ghu told the CIA about an attempt by Gul, in the fall of 2003, to sell anti-aircraft missiles to Al-Qaeda; the Qaeda figure in Ghul’s story didn't even want to work with Gul. And Ghul later learned Gul was probably lying about his ability to acquire the missiles.
  • Nevertheless, the CIA took seriously Asset Y’s claim that Gul was involved in an election plot and moved quickly to gain custody of him after his arrest by Pakistan in June 2004. Even before CIA rendered Gul to its custody, Tenet started lobbying to get torture techniques reapproved for his interrogation. On June 29, Tenet wrote National Security Adviser Condoleezza Rice seeking approval to once again use some of the techniques whose use he suspended less than four weeks earlier, in the hope of gathering information on the election season plot. "Given the magnitude of the danger posed by the pre-election plot and Gul's almost certain knowledge of any intelligence about that plot” Tenet wrote, relying on Asset Y's claims, “I request the fastest possible resolution of the above issues." On July 20, according to the report, top administration officials gave CIA verbal approval to get back into the torture business. Ashcroft stated that most previously approved interrogation techniques would not violate U.S. law on July 22 (though not waterboarding). And by the end of July, CIA started coaxing DOJ to approve other techniques — such as slapping someone in the stomach or hosing them down with cold water or limiting their food — which had already been used by the CIA but never officially approved by DOJ.
  • At the same time, the government was also using the ostensible election-season plot, among others, to persuade the Foreign Intelligence Surveillance Court (FISC) – the secret court that approves domestic spying on Americans – to authorize the Internet dragnet. After Bush halted the Internet dragnet on March 26, his aides began working with FISC presiding judge Colleen Kollar-Kotelly to find a way to use FISA authority -- normally been used to access records for a single phone or Internet account -- to collect Internet metadata in bulk. They provided a series of briefings, including one attended by Terrorist Threat Integration Center head John Brennan and CIA Director George Tenet, to explain the threat. In addition, they provided what – under Stellar Wind – analysts called a “scary memo,” summarizing all the threats facing the country to underscore the urgency of the program. Tenet's declaration included as an appendix to an application submitted in the days before July 14, 2004, laid out the threats CIA and others were fighting that summer.
  • Judge Kollar-Kotelly invoked Tenet's material in a redacted section of her opinion authorizing the phone dragnet, pointing to it as a key reason to permit collection of what she called “enormous” amounts of data from innocent Americans.
  • Soon after the reauthorization of the torture and the Internet dragnet, the CIA realized ASSET Y's story wasn't true. By September, an officer involved in Janat Gul's interrogation observed, “we lack credible information that ties him to pre-election threat information or direct operational planning against the United States, at home or abroad.” In October, CIA reassessed ASSET Y, and found him to be deceptive. When pressured, ASSET Y admitted had had made up the story of a meeting set up by Gul. ASSET Y blamed his CIA handler for pressuring him for intelligence, leading him to lie about the meeting. By 2005, CIA had concluded that ASSET Y was a fabricator, and Janat Gul was a “rather poorly educated village man [who is] quite lazy [who] was looking to make some easy money for little work and he was easily persuaded to move people and run errands for folks on our target list” (though the Agency wasn't always forthright about the judgment to DOJ). The torture program, which was resumed in part because of a perceived urgency of extracting information from Gul on a plot that didn't exist, continued for several more years. The Internet dragnet continued under FISC authorization, on and off, until December 2011. And several other still active NSA programs, including the phone dragnet, relied on Kollar-Kotelly's earlier authorization as precedents – the case for which had also been derived, in part, from one long discredited fabricator.
Gary Edwards

The Money Masters - 0 views

  •  
    ""The purpose of this financial crisis is to take down the U.S. dollar as the stable datum of planetary finance and, in the midst of the resulting confusion, put in its place a Global Monetary Authority [GMA - run directly by international bankers freed of any government control] -a planetary financial control organization"- Bruce Wiseman *The U.S did modify these rules somewhat a year after the devastation had taken place here, but the rules are still fully in place in the rest of the world and the results are appalling. "The powers of financial capitalism had a far-reaching plan, nothing less than to create a world system of financial control in private hands able to dominate the political system of each country and the economy of the world as a whole… Their secret is that they have annexed from governments, monarchies, and republics the power to create the world's money…" .- Prof. Carroll Quigley renowned, late Georgetown macro-historian (mentioned by former President Clinton in his first nomination acceptance speech), author of Tragedy and Hope. "He [Carroll Quigley] was one of the last great macro-historians who traced the development of civilization…with an awesome capability." - Dr. Peter F. Krogh, Dean of the School of Foreign Service (Georgetown) The Two Step Plan to National Economic Reform and Recovery 1. Directs the Treasury Department to issue U.S. Notes (like Lincoln's Greenbacks; can also be in electronic deposit format) to pay off the National debt. 2. Increases the reserve ratio private banks are required to maintain from 10% to 100%, thereby terminating their ability to create money, while simultaneously absorbing the funds created to retire the national debt."
Gary Edwards

Mish's Global Economic Trend Analysis: Boehner's Credibility Gone in Revised Proposal; ... - 1 views

  •  
    Best Deal You Can Get? Notice the rank and file starting to cave in to Boehner's gaseous proposal. Rep. Steve Chabot, R-Ohio called it "the best deal we can get." No it's not. It's not even the best deal you can't get. The Senate will not go along, so there is nothing to get. As long as you are going to submit proposals you can't get, you may as well make it a good one. $950 billion over 10 years is not a good deal. It's not even a down payment on a good deal, and with that, Boehner just pissed away his credibility. In the end, something will pass. But it will not do a damn thing credible to reduce the deficit. Reid's plan and Boehner's plan are both back-loaded. Republicans had a golden opportunity to attempt to extract some major concessions in return for tiny tax concessions. Instead, they are going to settle for nothing. This fiasco is exactly why Republicans need someone like Chris Christie running for president. No one else has managed to show any leadership.
Paul Merrell

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Propose... - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
Paul Merrell

US plans to fight in Somalia for two more years - Middle East Monitor - 0 views

  • The US Pentagon has inked plans to the White House to fight in Somalia for two more years, the New York Times reported yesterday.
  • According to the blueprint, the US will conduct an internal review on Somalia within 24 months to decide whether to continue fighting in the country. The news comes off the back of an escalation in counter-terrorism drone strikes in Somalia under President Donald Trump.
  • rump has already provided the US military and CIA broader authority to execute strikes in Somalia, considering it an “area of active hostilities”. As a result, 30 airstrikes have been executed in Somalia, with the most recent killing some 100 Somalis. Controversial raids have also taken place under Trump, with the most notable taking place in August, killing 10 civilians in southern Somalia as they ran and took cover behind banana trees. A US investigation concluded that no civilians were killed in the raid, despite human rights groups disputing the claim.
  • ...2 more annotations...
  • A United Nations report released on Saturday documented 4,585 civilian casualties in Somalia, of which 2,078 were killed and 2,507 injured between 1 January 2016 and 14 October 2017. The report did not specifically mention the number of deaths caused by US drone strikes.
  • According to the Bureau of Investigative Journalism, 510 killed and 54 injured in reported strikes across Somalia since 2007. The US is combating the Al-Qaeda affiliated Al-Shabaab group in Somalia, which is responsible for frequent attacks in densely populated areas. Al-Shaabab seeks to dislodge the government and govern over Somalia using a strict interpretation of Islamic Law. US activity in Somalia is joined by a small regiment of 85 British troops based in southern Somalia.
Paul Merrell

Putin's Lightning War in Syria - 0 views

  • For more than a year, the United States has been playing patty-cake with an army of homicidal maniacs who call themselves ISIS. On Monday, Russian President Vladimir Putin announced that he’d had enough of Washington’s song-and-dance and was planning to bring a little Russian justice to the terrorist militias that had killed 225,000 Syrians and ripped the country to shreds. In language that could not be more explicit, Putin said to the General Assembly: “We can no longer tolerate the currents state of affairs in the world”.  Less than 48 hours later, Russian bombers were raining down precision-guided munitions on terrorist strongholds across western Syria sending the jihadi vermin scrambling for cover. That’s how you fight terrorism if you’re serious about it.   Bravo, Putin.
  • Putin’s blitz caught the entire western political establishment flat-footed. Even now, three days into the air campaign, neither the administration nor the policy wonks at the many far-right think tanks in Washington have even settled on an approach, much less a strategy, to developments on the ground. What’s clear, is that Putin’s action has surprised everyone including the media which to-this-day hasn’t even settled on it’s talking points. This is extraordinary. Ask yourself this, dear reader: How can our political and military leaders watch Moscow deploy its troops, warplanes and military hardware to a theater where the US is carrying out major operations and have absolutely no plan of how deal with those forces if they are sent into battle? If you are convinced, as I am, that we are governed by numbskulls, you will certainly find confirmation of that fact in recent events.
  • But while the Obama administration is frantically searching for a strategy, Putin’s air-squadrons are unleashing holy hell on the sociopaths, the head-choppers and the other assorted vipers that comprise the Islamic State.  And Mr. Putin is getting plenty of help too, particularly from the crack-troops in the Iranian Quds forces and from the ferocious militia that defeated the IDF in two separate conflicts, Hezbollah, the Army of God. Check this out from Reuters: “Hundreds of Iranian troops have arrived in Syria in the last 10 days and will soon join government forces and their Lebanese Hezbollah allies in a major ground offensive backed by Russian air strikes, two Lebanese sources told Reuters…. “The (Russian) air strikes will in the near future be accompanied by ground advances by the Syrian army and its allies,” said one of the sources familiar with political and military developments in the conflict…. “The vanguard of Iranian ground forces began arriving in Syria: soldiers and officers specifically to participate in this battle. They are not advisors … we mean hundreds with equipment and weapons. They will be followed by more,” the second source said. Iraqis would also take part in the operation, the source said.”
  • ...5 more annotations...
  • (“Assad allies, including Iranians, prepare ground attack in Syria: sources“, Reuters) A military alliance between Moscow, Tehran and Hezbollah? You’re darn tootin’, and you can thank Barack Obama and his lunatic regime change plan for that development. Many critics of Putin’s action have said that “He doesn’t know what he’s doing” or “He’ll get bogged down” or “It’ll be another Vietnam”. Wrong. The fact is, Putin is more a devotee of the Powell Doctrine than any of the morons at the Pentagon. And he is particularly mindful of Rule Number 5 which states: “Is there a plausible exit strategy to avoid endless entanglement?” Has Putin thought about that or has he merely blundered ahead impulsively like US leaders are so apt to do?  Here’s what he said on September 30:
  • “We naturally have no intention of getting deeply entangled in this conflict. We will act strictly in accordance with our set mission. First, we will support the Syrian army only in its lawful fight against terrorist groups. Second, our support will be limited to airstrikes and will not involve ground operations. Third, our support will have a limited timeframe and will continue only while the Syrian army conducts its anti-terrorist offensive.” Bingo. In other words, he’s going to bomb these jokers into oblivion and let Quds brigade and Hezbollah mop up afterwards. There will be no Russian boots-on-the-ground. The Russian airforce will get precise intelligence on ISIS locations from Syrian agents on the battlefield which will minimize civilian casualties and limit damage to critical infrastructure. It will also make mincemeat out of anyone on the receiving end of the bombardment. Does anyone seriously believe that  ISIS and the disparate rabble of “moderate” throat-slitters that receive CIA funding are going to be able to withstand this impending onslaught?
  • No way. Putin’s going to cut through these guys like a tornado through a trailer park.  Yes, ISIS has had some success against the bedraggled Iraqi and Syrian armies. But now they’re up-against the A Team where they are clearly out of their league.  Rolling up these cutthroats is going to take a lot less time than anyone figured. Russian bombers are already destroying ammo dumps, fuel depots, heavy military hardware, command posts, anything that enhances ISIS’s ability to wage war.  The new anti-terror coalition is going to cut supply lines and hang the jihadis out to dry. And the whole operation is going to be wrapped up before Uncle Sam even get’s his boots laced.  This is from Iran’s Press TV: “A senior member of Russia’s parliament says an ongoing air campaign by Moscow against militants operating in Syria is going to intensify. Alexei Pushkov, who serves as the chairman of the Committee for International Affairs at the Russian State Duma, said Friday that Moscow will be intensifying its attacks against the militants in Syria while studying the risks associated with an extensive operation.
  • “There is always a risk of being bogged down, but in Moscow, we are talking about an operation of three to four months,” Alexei Pushkov said, Reuters reported. Russia started to launch coordinated airstrikes on the positions of militants in Syria on Wednesday. The move came shortly after members of the Russian upper house of the parliament, the Federation Council, authorized the operations in Syria.” (Press TV) There’s not going to be any pussyfooting around. Putin’s going to go straight for the jugular and then head for the exits.
  • Do you think they’ve figured this out at the White House yet?  Do you think they understand that Iranian troops and Hezbollah are not going to distinguish between the “moderate” terrorists and the “extreme” terrorists; that they’re simply going to “kill them all and let God sort it out”.  Do you think they realize that Washington’s Middle East policy just collapsed and that the funding of jihadis and dreams of regime change just ended for good?  Do you think they grasp that Washington’s role as guarantor of global security has just been transferred to Vladimir Putin who has put himself and his country at risk to defend the fundamental principles of international law, national sovereignty and self determination? Here’s Putin again:  “We are supporting the government of Syria in the fight against a terrorist aggression. We are offering and will continue to offer it necessary military-technical assistance. We must continue a dialogue for the sake of reaching consensus. But it’s impossible to achieve real success as long as bloodshed continues and people don’t feel secure. We won’t achieve anything until we defeat terrorism in Syria.” Putin is leading a coalition in the fight against terror. We should all be grateful for that.
  •  
    The inimitable Mike Whitney.
Gary Edwards

ObamaCare Turns Three: 10 Disturbing Facts Americans Have Learned - Investors.com - 0 views

  •  
    Nice list of the top ten friction points certain to have Americans up in arms over ObamaCare as the socialization of the American Healthcare System kicks in.  I can't help but think that the real reason the Republican Party continues in their determination to fully FUND and implement ObamaCare is they know it will be the end of the Democrat Socialist Political Party.  What i'm not so sure about is if the Repubicans can avoid the anger of America for their  having funded ObamaCare, broken the treasury, destroyed the currency, and wrecked the country - all for the purpose, right or wrong, of getting rid of their socialist political enemies. excerpts: "... as ObamaCare's third anniversary approaches - President Obama signed it into law on March 23, 2010 - the country is starting to find out what the sweeping health care overhaul will actually do. ObamaCare backers typically tout popular features that went into effect almost immediately. The law expanded Medicare's drug coverage, for example, and let children stay on their parents' plans until they turned 26. But the bulk of ObamaCare doesn't take effect until next year. That's when the so-called insurance exchanges are supposed to be up and running, when the mandate on individuals and businesses kicks in, and when the avalanche of regulations on the insurance industry hits. As this start date draws near, evidence is piling up that ObamaCare will: ..... " ..... Boost Insurance Costs ................. ..... Push Millions Off Employer Coverage ............ ..... Cause Premiums to Skyrocket ............ ..... Cost Millions of People Their Jobs .............. .....  Tax The Middle Class Hard ............ .....  Add To The Growing Deficit .... $1.5 Trillion per year and counting........... .....  Cost Far More Than Promised ............. .....  Become a Bureaucratic Nightmare .... .....  Exacerbate Doctor Shortages ............ .....  Keave Millions of Americans Uninsured ....... 
Gary Edwards

Saul Alinsky Leaves the White House | The American Spectator - 0 views

  •  
    "When Barack Obama leaves the White House tomorrow, he leaves with his worst dreams unrealized. Still, what he leaves behind is awful. Thank goodness he'll be gone. The very day after Obama was elected in 2008, I predicted in this space that his team would steal the Senate by hook and crook (see: Al Franken); nuke the filibuster at least for judicial nominees; liberalize voting laws (or enforcement thereof) to make fraud easier while charging opponents with "vote suppression"; drum up spurious allegations of civil rights violations; punish anti-abortion protesters; enact "copious new regulations, especially environmental, to be used selectively to ensnare other conservative malcontents"; invasively use the IRS to harass conservative organizations; and tacitly encourage civil unrest in furtherance of Obamite goals. All those predictions of course came true. Obama and company also waged bureaucratic war against independent inspectors general; tried their hardest (even illegally) to hobble fossil fuels industries; evaded Congress's intent by sending cash and uranium to a near-nuclear-ready Iran; fumbled and stumbled while veterans suffered virtually criminal neglect; wasted hundreds of billions of taxpayer dollars on projects that were not "shovel-ready" and did not create many jobs; oversaw an economy in which the workforce participation rate dropped to historically low levels while real median household income also fell and personal debt rose, and in which food stamp rolls grew to a number larger than the population of Spain; horrendously politicized the Justice Department; and saw race relations worsen for the first time in decades. In what should have been treated by the media as major scandals (or more major than the media represented them), the Obama administration encouraged illegal gun-running to Mexican cartels, with untold numbers of resultant deaths; failed to provide adequate security before or rescue during the Benghazi tragedy; provide
Gary Edwards

The New Debt Deal: Why States Will Get Whacked & Musings on the Bush Tax Cuts - Budget ... - 0 views

  •  
    excerpt: "Well friends it's August 3, and despite their best efforts Congress and the President did finally pass a deal to raise the debt-ceiling. It's call the Budget Control Act of 2011. Happy days, right? Not so fast, Fonzarelli. Nearly every lawmaker who voted for the bill has described it as the legislative equivalent of a '87 Buick Wagon: not pretty, but it'll get you to work. Here in the halls of the National Priorities Project we've been mulling over the details of the plan extensively, which you can read about here and here. After looking at this stuff for 2 straight days, my reaction to the Budget Control Act (debt deal) can summed up thusly: Picture of the statue of Liberty sticking out of the sand, from the last scene in the movie, "Planet of the Apes".  Caption "...we finally, really did it." In exchange for raising the debt-ceiling by an initial $900 billion, the bill calls for an immediate $917 billion in cuts through discretionary spending caps over the next 10 years.* Raising the debt-ceiling further - which will need to happen next year - is contingent upon further savings to be identified by a new bipartisan commission: the "Super Committee, or "Super Congress" it's being called. This group of 12 lawmakers (6 Democratic, 6 Republican Senators & Representatives) will have to identify another $1.2 - $1.5 trillion in deficit reduction measures by November 23, 2011. Congress will also be required to have an up-or-down vote on the recommendations by December 23, 2011. This means after the Super Committee makes its recommendations there will be no further discussion, debate, or filibustering. Just an aye-or-nay vote in each chamber of Congress.
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

To beat ISIS, kick out US-led coalition | nsnbc international - 0 views

  • It’s been a bad time for foes of ISIS. Islamic State scored a neat hat-trick by invading strategic Ramadi in Iraq’s mainly Sunni Anbar province, occupying Syria’s historic gem Palmyra, and taking over Al-Tanf, the last remaining border crossing with Iraq. The multinational, American-led ‘Coalition’ launched last August to thwart Islamic State’s (IS, formerly ISIS) march across Syria and Iraq…did nothing.
  • The Iraqis have shot back. Key MP Hakim al-Zamili blames Ramadi’s collapse on the US’s failure to provide “good equipment, weapons and aerial support” to troops. Deputy Prime Minister Saleh Mutlaq, himself a Sunni from Anbar Province, concluded that the Americans were coming up short in all areas. “The Coalition airstrikes are not enough to eliminate IS.” Furthermore, the US policy of recruiting Sunni tribes for the fight, he added, was “too late” – it is “important but not enough.” If ever there was an understatement, this is it. Washington’s long-stated objective of rallying together a vetted Sunni fighting force – or its equivalent in the form of a National Guard – has always served as a placeholder to avoid facing realities.
  • One thing we have learned from IS gains in small and large Sunni towns alike, is that the extremist group prides itself on sleeper cells and alliances inside of these areas. Sunni tribes and families, both, are divided on their support of IS. And the militants ensure that everyone else falls in line through a brutal campaign of inflicting fear and pain indiscriminately. So the likelihood of a significant, anti-IS, well-trained and equipped Sunni fighting force emerging anytime soon is just about nil. So too is the idea of a US-led Coalition air force that can cripple Islamic State. Washington has run fewer sorties over Syria and Iraq in the nine months since inception of its air campaign, than Israel ran in its entire three-week Gaza blitz in 2008-09. Where were the American bombers when Ramadi and Palmyra were being taken? And why does the US Air Force only seem to engage in earnest when their Kurdish allies are being threatened – as in Kobani (Ain al-Arab), Syria, and Erbil in Iraq?
  • ...12 more annotations...
  • If actions speak louder than words, then Washington’s moves in the Mideast have been deafening. Forget talk of a ‘unified Iraq’ with a ‘strong central government’. And definitely forget loudly-proclaimed objectives of ‘training moderate forces’ to ‘fight off IS’ across the Jordanian and Turkish borders in Syria. That’s just talk. An objective look at US interests in the region paint an entirely different picture. The Americans seek to maintain absolute hegemony in the Mideast, even as they exit costly military occupations of Iraq and Afghanistan. Their primary interests are 1) access to low cost oil and gas, 2) propping up Israel, and more recently, 3) undermining Russian (and Chinese) influence in the region. Clinging on to hegemony would be a whole lot easier without the presence of a powerful, independent Islamic Republic of Iran, which continues to throw a wrench in many of Washington’s regional projects. So hegemony is somewhat dependent on weakening Iran – and its supportive alliances.
  • But why ignore Sunni groups who are unreservedly opposed to IS? Aren’t they America’s natural constituents inside Iraq? The Takfiri extremist groups serve a purpose for Washington. IS has had the ability – where competing Sunni factions, with their ever-growing lists of demands from Baghdad, have not – to transform the US’ ‘buffer’ project into a physical reality. And Washington has not needed to expend blood, treasure or manpower to get the job done.
  • You only have to look at recent US actions in Iraq to see this unspoken plan in action. Washington’s most intensive airstrikes to date were when Kurdish Erbil and its environs came under threat by ISIS.Washington’s most intensive airstrikes to date were when Kurdish Erbil and its environs came under threat by ISIS. Congress has breached all international norms by ushering through legislation to directly arm Sunni and Kurdish militias and bypass the central government in Baghdad. And despite endless promises and commitments, the Americans have failed at every hurdle to train and equip the Iraqi Army and security forces to do anything useful. A weak, divided Iraq can never become a regional powerhouse allied with Iran and the Resistance Axis. Likewise a weak, divided Syria. But without US control over these central governments, the only way to achieve this is 1) through the creation of sectarian and ethnic strife that could carve out pro-US buffers inside the ‘Resistance states’ and/or 2) through the creation of a hostile ‘Sunni buffer’ to break this line from Iran to Palestine.
  • General Walid Sukariyya, a Sunni, pro-resistance member of Lebanon’s parliament, agrees. “ISIS will be better for the US and Israel than having a strong Iran, Iraq and Syria…If they succeed at this, the Sunni state in Iraq will split the resistance from Palestine.” While Washington has long sought to create a buffer in Iraq on the Syrian border, it has literally spent years trying – and failing – to find, then mold, representative Sunni Iraqi leaders who will comfortably toe a pro-American line. An example of this is the Anbar delegation US General John Allen handpicked last December for a DC tour, which excluded representatives of the two most prominent Sunni tribes fighting IS in Iraq – the Albu Alwan and Albu Nimr. A spokesman for the tribes, speaking to Al-Jarida newspaper, objected at the time: “We are fighting ISIL and getting slaughtered, while suffering from a shortage of weapons. In the meantime, others are going to Washington to get funds and will later be assigned as our leaders.”
  • With the removal of Saddam Hussein in Iraq, the US inadvertently extended Iran’s arc of influence in a direct geographic line to Palestine, leaving the Israeli colonial project vulnerable. Former President George W. Bush immediately took on the task of destroying this Resistance Axis by attempting to neuter Iranian allies Hezbollah, Syria and Hamas – and failed. The Arab Spring presented a fresh opportunity to regroup: the US and its Turkish and Persian Gulf allies swung into action to create conditions for regime-change in Syria. The goal? To break this geographic line from Iran – through Iraq, Syria and Lebanon – to Palestine. When regime-change failed, the goalpost moved to the next best plan: dividing Syria into several competing chunks, which would weaken the central state and create a pro-US ‘buffer’ along the border with Israel. Weakening the central government in Iraq by dividing the state along Kurdish, Sunni and Shiite lines has also been a priority for the Americans.
  • The DIA brief makes clear that the escalation of conflict in Syria will create further sectarianism and radicalization, which will increase the likelihood of an ‘Islamic State’ on the Syrian-Iraqi border, one that would likely be manned by the Islamic State of Iraq (ISI). So what did Washington do when it received this information? It lied. Less than one month after the DIA report was published, US Secretary of State John Kerry told the Senate Foreign Relations Committee this about the Syrian opposition: “I just don’t agree that a majority are Al-Qaeda and the bad guys. That’s not true. There are about 70,000 to 100,000 oppositionists … Maybe 15 percent to 25 percent might be in one group or another who are what we would deem to be bad guys…There is a real moderate opposition that exists.” Using the fabricated storyline of ‘moderate rebels’ who need assistance to fight a ‘criminal Syrian regime’, the US government kept the Syrian conflict buzzing, knowing full well the outcome would mean the establishment of a Sunni extremist entity spanning the Syrian-Iraqi border…which could cripple, what the Americans call, “the strategic depth of the Shia expansion.”As US Council on Foreign Relations member and terrorism analyst Max Abrahms conceded on Twitter: “The August 5, 2012 DIA report confirms much of what Assad has been saying all along about his opponents both inside & outside Syria.”
  • Since last year, numerous Iraqi officials have complained about the US airdropping weapons to IS – whether deliberately or inadvertently remains disputed. Military sources, on the other hand, have made clear that the US-led Coalition ignores many of the Iraqi requests for air cover during ground operations. If the US isn’t willing to play ball in Iraq’s existential fight against IS, then why bother with the Americans at all? Iraqi Prime Minister Haider al-Abadi is viewed as a ‘weak’ head of state – a relatively pro-American official who will work diligently to keep a balance between US interests and those of Iraq’s powerful neighbor, Iran. But after the disastrous fall of Ramadi, and more bad news from inside Syria, Abadi has little choice but to mitigate these losses, and rapidly. The prime minister has now ordered the engagement of thousands of Hashd al-Shaabi (Shiite paramilitary groups, commonly known as the Popular Mobilization Forces) troops in the Anbar to wrest back control of Ramadi. And this – unusually – comes with the blessings of Anbar’s Sunni tribes who voted overwhelmingly to appeal to the Hashd for military assistance.
  • Joining the Hashd are a few thousand Sunni fighters, making this a politically palatable response. If the Ramadi operation goes well, this joint Sunni-Shiite effort (which also proved successful in Tikrit) could provide Iraq with a model to emulate far and wide. The recent losses in Syria and Iraq have galvanized IS’ opponents from Lebanon to Iran to Russia, with commitments pouring in for weapons, manpower and funds. If Ramadi is recovered, this grouping is unlikely to halt its march, and will make a push to the Syrian border through IS-heavy territory. There is good reason for this: the militants who took Ramadi came across the Syrian border – in full sight of US reconnaissance capabilities. A senior resistance state official told me earlier this year: “We will not allow the establishment of a big (extremist) demographic and geographic area between Syria and Iraq. We will work to push Syrian ISIS inside Syria and Iraqi ISIS inside Iraq.”
  • Right now, the key to pushing back Takfiri gains inside Syria’s eastern and northwestern theaters lies in the strengthening of the Iraqi military landscape. And an absolute priority will be in clearing the IS ‘buffer’ between the two states. Eighteen months ago, in an analysis about how to fight jihadist militants from the Levant to the Persian Gulf, I wrote that the solution for this battle will be found only within the region, specifically from within those states whose security is most compromised or under threat: Lebanon, Syria, Iraq and Iran. I argued that these four states would be forced to increase their military cooperation as the battles intensified, and that they would provide the only ‘boots on the ground’ in this fight. And they will. But air cover is a necessary component of successful offensive operations, even in situations of unconventional warfare. If the US and its flimsy Coalition are unable or unwilling to provide the required reconnaissance assistance and the desired aerial coverage, as guided by a central Iraqi military command, then Iraq should look elsewhere for help.
  • Iran and Russia come to mind – and we may yet get there. Iraq and Syria need to merge their military strategies more effectively – again, an area where the Iranians and Russians can provide valuable expertise. Both states have hit a dangerous wall in the past few weeks, and the motivation for immediate and decisive action is high today. Lebanese resistance group Hezbollah is coming into play increasingly as well – its Secretary-General Hassan Nasrallah has recently promised that Hezbollah will no longer limit itself geographically, and will go where necessary to thwart this Takfiri enemy. The non-state actors that make up the jihadist and Takfiri core cannot be beaten by conventional armies, which is why local militias accustomed to asymmetric warfare are best suited for these battles. Criticizing the US’s utterly nonexistent response to the Ramadi debacle yesterday, Iran’s elite Quds Force Commander Qassem Suleimani points out: “Today, there is nobody in confrontation with [IS] except the Islamic Republic of Iran, as well as nations who are next to Iran or supported by Iran.” The Iranians have become central figures in the fight against terror, and are right next door to it – as opposed to Washington, over 6,000 miles away.
  • If the US has any real commitment to the War on Terror, it should focus on non-combat priorities that are also essential to undermine extremism: 1) securing the Turkish and Jordanian borders to prevent any further infiltration of jihadists into Syria and Iraq, 2) sanctioning countries and individuals who fund and weaponize the Takfiris, most of whom are staunch US allies, now ironically part of the ‘Coalition’ to fight IS, and 3) sharing critical intelligence about jihadist movements with those countries engaged in the battle. It is time to cut these losses and bring some heavyweights into this battle against extremism. If the US-directed Coalition will not deliver airstrikes under the explicit command of sovereign states engaged at great risk in this fight, it may be time to clear Iraqi and Syrian airspace of coalition jets, and fill those skies with committed partners instead.
  • Related documentation: DIA Doc Syria and Iraq:_ Pg.-291-Pgs.-287-293-JW-v-DOD-and-State-14-812-DOD-Release-2015-04-10-final-version11.
  •  
    Woh! Things definitely coming to an inflexion point in Syria and Iraq. This is a reprint from RT.com, the Russian video and web page news service. The hint of direct and overt military action by Russia and Iran should not be ignored. The U.S. is sandbagging for ISIL and al Nusiryah. 
« First ‹ Previous 41 - 60 of 193 Next › Last »
Showing 20 items per page