Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 2004

Rss Feed Group items tagged

Paul Merrell

Losing public opinion on BDS, activists turn to 'lawfare' - 0 views

  •      Champions of proposed Senate Bill SB1761, which passed both houses of the Illinois General Assembly May 18th, say it’s designed to fight anti-Semitic activism and protects Israel from the existential threat posed by the Boycott, Divestment, & Sanctions movement (BDS). Opponents of the bill say it places the economic welfare of Israel before U.S. interests, tacitly endorses the full annexation of the West Bank into Israel, and violates our country’s First Amendment rights. The bill’s opponents are right. But a potential threat of this legislation, edging closer to the criminalization of advocating for Palestinian rights and against occupation, threatens our core First Amendment rights and has been relatively absent from the discourse surrounding this bill.
  • And that’s not just here in the United States. Israeli lawmakers sought to criminalize public support of boycotts against Israel back in 2010 through their “Law for Prevention of Damage to the State of Israel through Boycott.” When I spoke with a staffer for Illinois State Rep. Sara Feigenholtz, one of the bill’s primary sponsors, inquiring if SB1761 was modeled after the 1977 amendments to the Export Administration Act (regarding the Arab League boycott of Israel), I was informed “These ‘antiboycott’ laws are the 1977 amendments to the Export Administration Act (EAA) and the Ribicoff Amendment to the 1976 Tax Reform Act (TRA). I hope this helps.…SB1761 falls in line with these federal laws”
  • Referencing EAA is another indication of the move toward weakening our First Amendment rights, as that amendment was meant to criminalize people who adhered to the Arab League’s boycott of Israel. Melissa Redmiles writes of the 70’s legislation in International Boycott Reports, 2003 and 2004 (pdf), from the IRS.gov website: “Those U.S persons who agree to participate in such boycotts are subject to criminal and civil penalties.” SB1761 seems to be the latest manifestation of a trend toward enacting a kind of trickle-down suppression. From the Center For Constitutional Rights website for Palestine Solidarity Legal Support: “These bills must be opposed in order to protect the right to engage in boycotts that reflect collective action to address a human rights issue, which the US Supreme Court has declared is protected speech… These bills would make it state policy to discourage support of human rights boycotts against Israel… and have the potential to stifle expressions of political beliefs…”
  • ...3 more annotations...
  • SB1761 requires all five public retirement benefits systems of the Illinois Pension Code to divest “all direct holdings” from any company which engages in boycotting Israel. This is designed to financially punish companies which participate in BDS; presumably European companies. But it will also burden an already severely crippled,“worst in nation”, Illinois pension system. Illinois Governor Bruce Rauner was quoted by Jewish United Fund News (JUF) earlier this month as saying, “I made a pledge that Illinois would become the first state in America to divest its public pension funds from any company in the world that boycotts Israel.” Rauner includes U.S. companies in his threat of divestment when he says “any company in the world.”
  • Relatedly from SB1761 itself: “It is not the intent [of this bill]… to cause divestiture from any company based in the United States of America.” Not intended? This soft language clearly leaves the door open to require Illinois public retirement systems’ divestiture from U.S. companies that participate in BDS. So, while politicians endorsing this bill can point to this statement of “intent” as some kind of safeguard for American companies, this same sentence simultaneously functions as a veiled threat to those companies.
  • SB1761 characterizes the motivations of the BDS movement as “intending to penalize… Israel.” Similarly, JUF News this month quoted JUF President Steven B. Nasatir saying, “At the core of the BDS movement is a quest to delegitimize Israel as a Jewish state.” That’s like stating that the intent of the Civil Rights Montgomery bus boycott was to “penalize white people.
  •  
    As though ACLU didn't already have enough lawsuits going. But this takes the cake. Although anti-BDS legislation has been introduced several times in Congress but never got off the ground because of the First Amendment barrier. Similar measures pending in Europe too.  The good news here is that Israel's right-wing government is getting desperate. The BDS movement is mushrooming globally and routinely is achieving success in convincing companies (and recording artists, etc.) to pull out of Israel. More so in Europe, but BDS is off to a great start in the U.S. Kerry warned Netanyahu before the latter blew up the last round of negotations with the Palestinians that BDS would soon make it politically impossible for the U.S. to continue providing cover for Israel on the U.N. Security Council. There's a big shift of public opinion in the U.S. about Israel's abuse of Palestinians well under way. It won't be long before introducing Israel Lobby measures in Congress will stop happening. 
Paul Merrell

60 percent of Americans don't trust their mass media - poll - RT USA - 0 views

  • A new Gallup poll has found that six in 10 Americans say that their trust in mass media ranges from “not very much” to “none at all.” Those surveyed were asked about the media reporting the news fully, accurately and fairly. Just 33 percent said they had a “fair amount” of trust in mass media such as newspapers, TV and radio, and only 7 percent had a “great deal” of trust and confidence that the mass media reports the news, according to a Gallup poll released this week.Ten years ago, Gallup found an even split of 50/50 among Americans regarding their trust and lack of trust of the media. According to their poll results, the last time the majority of Americans trusted their media was 1976.“Americans' trust level in the media has drifted downward over the past decade…Some of the loss in trust may have been self-inflicted,” wrote Rebecca Riffkin, a Gallup analyst, in a statement.
  • The new poll was conducted as a telephone survey over five days, from September 9 to 13, with over 1,000 adults from 50 US states and the District of Columbia.Pollsters found that trust in the media was lowest among Americans aged 18 to 49 than among those 50 and older, a pattern first noticed in 2012. Prior to 2012, there was less distinction between age groups except in 2005 and 2008.When poll results are examined along political lines, trust among Democrats has usually been higher over the past decade than among Republicans and independents. That remains the case in the new survey, with 55 percent of Democrats trusting mass media, while the Republicans polled registered 32 percent, an increase of 5 percent from 2014. The trust of independents, however, decreased from 38 percent to 33 percent.Pollsters know that trust opinions typically dip during election years – including 2004, 2008, 2012 and 2014 – but the dip in a non-election year is unusual. Gallup’s Riffkin said confidence in media has slowly eroded from a high of 55 percent in 1998 and 1999. Since 2007, the majority of Americans had little to no trust in the mass media.
Paul Merrell

NSA Spied on World Bank, IMF, UN, Pope, World Leaders, and American Politicians and Mil... - 0 views

  • He says the NSA started spying on President Obama when he was a candidate for Senate: 
  • Another very high-level NSA whistleblower – the head of the NSA’s global intelligence gathering operation – says that the NSA targeted CIA chief Petraeus. Of course, the NSA also spied on the leaders of Germany, Brazil and Mexico, and at least 35 world leaders total. The NSA also spies on the European Union, the European Parliament, the G20 summit and other allies.
  • The NSA conducts widespread industrial espionage on our allies. That has nothing to do with terrorism, either.  And the  NSA’s industrial espionage has been going on for many decades.
  •  
    Nice collection of links in a list of targets of NSA surveillance. 
Paul Merrell

Double Down: Game Change 2012: Obama bragged 'I'm really good at killing people' | Mail... - 0 views

  • President Barack Obama bragged to his aides that he's 'really good at killing people,' according to explosive claims in a new book about the 2012 presidential campaign.The revelation comes at a time when Obama, who won the Nobel Peace Prize in 2009, has faced increasing criticism for his use of drones to target insurgents and terrorist suspects, particularly in Pakistan and Yemen.  The London-based Bureau of Investigative Journalism estimates that Obama has authorized 326 drone strikes. Since 2004, CIA unmanned aerial vehicles have killed 2,500 to 3,600 people - including up to 950 civilians.
  •  
    Deplorably believable. 
Paul Merrell

2012: The Year of the Cooperative by Jessica Reeder - YES! Magazine - 0 views

  • The United Nations has named 2012 as the International Year of Cooperatives, and indeed, co-ops seem poised to become a dominant business model around the world. Today, nearly one billion people worldwide are cooperative member-owners. That’s one in five adults over 15
  • Most co-ops also follow the Seven Cooperative Principles, a unique set of guidelines that help maintain their member-driven nature.
  • In fact, the United States is full of co-ops — around 30,000 of them with nearly 900,000 members. Thirty percent of Americans belong to cooperatively-owned credit unions, the largest of which serves 3.4 million Department of Defense employees and has $45 billion in assets. In 2004, the ten largest co-ops in America earned over $12 billion in revenues
  • ...3 more annotations...
  • In America, 93 million credit union member-owners control $920 billion in assets.
  • “Cooperatives, in their various forms, promote the fullest possible participation in the economic and social development of all people, including women, youth, older persons, persons with disabilities and indigenous peoples, are becoming a major factor of economic and social development and contribute to the eradication of poverty.” - UN Resolution 64/136, 2010
  • The trend is well-established: The cooperative model is expected to be the world’s fastest-growing business model by 2025.
  •  
    Are worker-owned co-ops replacing unions as the method to ensure that workers share in business profits and productivity gains? The thought had occurred to me until now. But we buy most of our groceries from Winco, a worker-owned grocery chain because their prices are lowest, even lower than Walmart. And many of the forestry-related companies in our area are worker-owned co-ops. They have big competitive advantages for several reasons, not the least of which is that their bottom-up leadership is far smaller and less expensive than the leadership of a top-down stock corporation with comparable sales. No competition between the workers and upper managers/external stockholders for profit sharing. Far less turnover in workers; as owners the workers are more committed to the co-op and to staying with it. Are co-ops part of a shadow economy emerging from the ashes of the U.S. bankster-driven economy? And is there enough flexibility in U.S. law for a bottom-up shadow government to begin taking shape, based on contract law perhaps? No one could be forced to sign the contract, of course, but I see room for at least an alternate dispute resolution process to resolve disputes between contract parties. One based on mediation rather than arbitration, as the U.S. judicial system behaves. (The U.S. judicial system is beyond salvage, in my studied opinion.)  Food for thought. 
Paul Merrell

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
Paul Merrell

The Ron Paul Institute for Peace and Prosperity : Do We Need to Bring Back Internment C... - 0 views

  • ast week, Retired General Wesley Clark, who was NATO commander during the US bombing of Serbia, proposed that “disloyal Americans” be sent to internment camps for the “duration of the conflict.” Discussing the recent military base shootings in Chattanooga, TN, in which five US service members were killed, Clark recalled the internment of American citizens during World War II who were merely suspected of having Nazi sympathies. He said: “back then we didn’t say ‘that was freedom of speech,’ we put him in a camp.”   He called for the government to identify people most likely to be radicalized so we can “cut this off at the beginning.” That sounds like “pre-crime”!   Gen. Clark ran for president in 2004 and it’s probably a good thing he didn’t win considering what seems to be his disregard for the Constitution. Unfortunately in the current presidential race Donald Trump even one-upped Clark, stating recently that NSA whistleblower Edward Snowden is a traitor and should be treated like one, implying that the government should kill him.   These statements and others like them most likely reflect the frustration felt in Washington over a 15 year war on terror where there has been no victory and where we actually seem worse off than when we started. The real problem is they will argue and bicker over changing tactics but their interventionist strategy remains the same.   Retired Army Gen. Mike Flynn, who was head of the Defense Intelligence Agency during the US wars in Afghanistan and Iraq, told al-Jazeera this week that US drones create more terrorists than they kill. He said: “The more weapons we give, the more bombs we drop, that just … fuels the conflict.” Still Washington pursues the same strategy while expecting different results.
  •  
    Words from Ron Paul
Paul Merrell

WikiLeaks - NSA Helped CIA Outmanoeuvre Europe on Torture - 0 views

  • Central to today's publication is a Top Secret NSA intercept of the communications of Foreign Minister Steinmeier. The intercept dates from just after an official visit to the United States on 29 November 2005, where FM Steinmeier met his US counterpart, Secretary of State Condoleezza Rice. According to the intercept, Steinmeier "seemed relieved that he had not received any definitive response from the U.S. Secretary of State regarding press reports of CIA flights through Germany to secret prisons in eastern Europe allegedly used for interrogating terrorism suspects." The visit occurred in the context of an escalating and ongoing scandal in Europe over clandestine "rendition flights" conducted by the Central Intelligence Agency (CIA) using the airspace and airport facilities of cooperating European countries, in which it was alleged by leading news publications that European citizens and residents had been abducted outside of any legal process and taken to secret "black site" prisons, where they could be tortured with impunity. After the scandal emerged, European governments defied their publics, continuing to cooperate with the United States while denying all knowledge of rendition flights. These denials relied heavily on the insistence of European governments that they had received confidential "diplomatic assurances" from the United States that nothing illegal was taking place. It was subsequently shown in numerous court proceedings and commissions of inquiry that the activity was illegal. At the time of Steinmeier's meeting, reports of CIA rendition flights through Germany had recently emerged, and were publicly dismissed as unconfirmed by German authorities.
  • In the years since 2005, successive investigations by human rights groups and international bodies, such as the Council of Europe, have substantiated that extraordinary rendition was indeed occurring. In 2007 the European Parliament approved a finding in a report by a special investigative committee where it was stated that Germany, among other states, aided or knew about the CIA's extraordinary rendition programme. Prior to becoming Foreign Minister in 2005, Frank-Walter Steinmeier served as Head of Chancellery (Chief of Staff) in the government of Chancellor Gerhard Schroeder, where he was responsible for coordinating the work of German intelligence agencies. In 2004, during this tenure, Khaled El-Masri, a German citizen, was abducted by the CIA and renditioned to a black site in Afghanistan where he was interrogated and tortured for four months. Eventually the CIA realised that it had the wrong "El-Masri", and dumped the German on a desolate road in Albania and began a cover-up. El-Masri's case has been substantiated and confirmed in numerous inquiries, and at the European Court of Human Rights.
  • Today's publication of the 20 target selectors adds to the previous WikiLeaks publication of 125 German numbers targeted by the NSA, showing systematic mass spying on the Chancellor and the Chancellery (All the Chancellor's Men, 8 July) and German politicians and officials handling economic, trade and financial affairs (The Euro Intercepts, 1 July).
  •  
    Hmmmm.... I don't remember anything in the Senate Intelligence Committee's published executive summary on CIA torture about the CIA getting an assist from NSA on its rendition and torture projects. 
Paul Merrell

Al Qaeda: The Database | Global Research - Centre for Research on Globalization - 0 views

  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . . “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.”
  • “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat. “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world.
  • ...3 more annotations...
  • “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
Paul Merrell

The 'Athens Affair' shows why we need encryption without backdoors | Trevor Timm | Comm... - 0 views

  • Just as it seems the White House is close to finally announcing its policy on encryption - the FBI has been pushing for tech companies like Apple and Google to insert backdoors into their phones so the US government can always access users’ data - new Snowden revelations and an investigation by a legendary journalist show exactly why the FBI’s plans are so dangerous. One of the biggest arguments against mandating backdoors in encryption is the fact that, even if you trust the United States government never to abuse that power (and who does?), other criminal hackers and foreign governments will be able to exploit the backdoor to use it themselves. A backdoor is an inherent vulnerability that other actors will attempt to find and try to use it for their own nefarious purposes as soon as they know it exists, putting all of our cybersecurity at risk. In a meticulous investigation, longtime NSA reporter James Bamford reported at the Intercept Tuesday that the NSA was behind the notorious “Athens Affair”. In surveillance circles, the Athens Affair is stuff of legend: after the 2004 Olympics, the Greek government discovered that an unknown attacker had hacked into Vodafone’s “lawful intercept” system, the phone company’s mechanism of wiretapping phone calls. The attacker spied on phone calls of the president, other Greek politicians and journalists before it was discovered. According to Bamford’s story, all this happened after the US spy agency cooperated with Greek law enforcement to keep an eye on potential terrorist attacks for the Olympics. Instead of packing up their surveillance gear, they covertly pointed it towards the Greek government and its people. But that’s not all: according to Snowden documents that Bamford cited, this is a common tactic of the NSA. They often attack the “lawful intercept” systems in other countries to spy on government and citizens without their knowledge:
  • Exploiting the weaknesses associated with lawful intercept programs was a common trick for NSA. According to a previously unreleased top-secret PowerPoint presentation from 2012, titled “Exploiting Foreign Lawful Intercept Roundtable”, the agency’s “countries of interest” for this work included, at that time, Mexico, Indonesia, Egypt and others. The presentation also notes that NSA had about 60 “Fingerprints” — ways to identify data — from telecom companies and industry groups that develop lawful intercept systems, including Ericsson, as well as Motorola, Nokia and Siemens. It’s the exact nightmare scenario security experts have warned about when it comes to backdoors: they are not only available to those that operate them “legally”, but also to those who can hack into them to spy without anyone’s knowledge. If the NSA can do it, so can China, Russia and a host of other malicious actors.
Paul Merrell

Pakistan Charges CIA Officials Over Drone Deaths | Al Jazeera America - 0 views

  • A Pakistani judge on Tuesday ordered criminal charges to be filed against a former CIA lawyer who oversaw the agency’s drone program and a former station chief in Islamabad over a 2009 strike that killed two people. Former acting general counsel John A. Rizzo and former station chief Jonathan Bank must face charges of murder, conspiracy, waging war against Pakistan and terrorism, ruled Justice Shaukat Aziz Siddiqui of the Islamabad High Court. A court clerk and a lawyer involved in the case, Mirza Shahzad Akbar, confirmed details of the ruling. Rizzo and Bank could not be immediately reached for comment. The CIA declined to comment when contacted by Al Jazeera America. Bank’s cover was blown in late 2010 when a Pakistani man, Kareem Khan, threatened to sue the CIA and others for $500 million over the deaths of his sons Zaenullah Khan and Asif Iqbal in a Dec. 31, 2009, strike in the North Waziristan tribal region.
  • As the outrage over the deaths grew, protesters in Islamabad began carrying placards bearing Bank's name, as listed in the lawsuit, and urging him to leave the country. The CIA pulled Bank from the country on Dec. 16, 2010, when he began receiving death threats. His outing spurred questions at the time of whether Pakistan's spy service might have leaked the information, something Islamabad denied. The disclosure didn't prevent Bank from landing another sensitive job. He became chief of the Iran operations division at CIA headquarters in Virginia. He was removed from that post after CIA officials concluded that he created a hostile work environment in the division. He has since been detailed to the Pentagon's intelligence arm.   Rizzo was the CIA's acting general counsel overseeing its drone program. He later left the agency and wrote a book about his experiences at the CIA.  
  • It is estimated that since 2004, the U.S. has carried out over 400 drone strikes in the country, killing anywhere from 421 to 960 civilians, according to the Bureau of Investigative Journalism, which tracks the U.S. campaign. The foundation says the last U.S. drone strike in Pakistan was on Jan. 29 and killed at least six suspected fighters. It is not clear how the judge's ruling will affect relations between Pakistan and the U.S., especially over the drone program. While Pakistan's government often decries the strikes, many believe it allows them to target the insurgents who threaten it. Massive protests against the drone program previously blocked a land route used by NATO forces to resupply troops in neighboring Afghanistan.   Any legal action stands no chance of success unless U.S. officials cooperate with the court, something highly unlikely, given the secretive nature of the drone program, which the CIA rarely publicly discusses.
  • ...1 more annotation...
  • Under the judge's order, Pakistan's federal police force must file the charges against Rizzo and Bank, though the police have so far refused, reportedly out of a reluctance to upset the country's diplomatic relations with the U.S.
Paul Merrell

A young prince may cost Syria and Yemen dear - Voices - The Independent - 0 views

  • A succession of crucially important military and diplomatic events are convulsing the political landscape of the Middle East. The most significant development is the understanding between the US and five other world powers with Iran on limiting Iran’s nuclear programme in return for an easing of sanctions. But the muting of hostility between the US and Iran, a destabilising feature of Middle East politics since the overthrow of the Shah in 1979, may not do much to stem the momentum towards ever greater violence in Syria, Yemen and Iraq.
  • What is striking about developments in the past few weeks is that it is Saudi Arabia that is seeking radical change in the region and is prepared to use military force to secure it. In Yemen, it has launched a devastating air war and, in Syria, it is collaborating with Turkey to support extreme jihadi movements led by Jabhat al-Nusra, the al-Qaeda affiliate that last week captured its first provincial capital.The Saudis are abandoning their tradition of pursuing extremely cautious policies, using their vast wealth to buy influence, working through proxies and keeping close to the US. In Yemen, it is the Saudi air force that is bombarding the Houthis, along with Yemeni army units still loyal to former president Ali Abdullah Saleh who was once seen as the Saudis’ and Americans’ man in Sanaa, the Yemeni capital. As with many other air campaigns, the Saudis and their Gulf Co-operation Council allies are finding that air strikes without a reliable military partner on the ground do not get you very far. But if Saudi ground forces are deployed in Yemen they will be entering a country that has been just as much of a quagmire as Afghanistan and Iraq.
  • The Saudis are portraying their intervention as provoked by Iranian-backed Shia Zaidis trying to take over the country. Much of this is propaganda. The Houthis, who come from the Zaidi tribes in Yemen’s northern mountains, have an effective military and political movement called Ansar Allah, modelled on Hezbollah in Lebanon. They have fought off six government offensives against them since 2004, all launched by former President Saleh, then allied to the Saudis. Saleh, himself a Zaidi but drawing his support from the Zaidi tribes around the capital, Sanaa, was a casualty of the Arab Spring in Yemen but still has the support of many army units.
  • ...4 more annotations...
  • Why has Saudi Arabia plunged into this morass, pretending that Iran is pulling the strings of the Shia minority though its role is marginal? The Zaidis, estimated to be a third of the 25 million Yemeni population, are very different Shia from those in Iran and Iraq. In the past, there has been little Sunni-Shia sectarianism in Yemen, but the Saudi determination to frame the conflict in sectarian terms may be self-fulfilling.Part of the explanation may lie with the domestic politics of Saudi Arabia. Madawi al-Rasheed, a Saudi visiting professor at LSE’s Middle East Centre, says in the online magazine al-Monitor that Saudi King Salman’s defence minister and head of the royal court, his son Mohammed bin Salman, aged about 30, wants to establish Saudi Arabia as absolutely dominant in the Arabian Peninsula. She adds caustically that he needs to earn a military title, “perhaps ‘Destroyer of Shiite Rejectionists and their Persian Backers in Yemen’, to remain relevant among more experienced and aspiring siblings and disgruntled royal cousins”. A successful military operation in Yemen would give him the credentials he needs.
  • A popular war would help unite Saudi liberals and Islamists behind a national banner while dissidents could be pilloried as traitors. Victory in Yemen would compensate for the frustration of Saudi policy in Iraq and Syria where the Saudis have been outmanoeuvred by Iran. In addition, it would be a defiant gesture towards a US administration that they see as too accommodating towards Iran.
  • Yemen is not the only country in which Saudi Arabia is taking a more vigorous role. Last week, President Bashar al-Assad of Syria suffered several defeats, the most important being the fall of the provincial capital Idlib, in northern Syria, to Jabhat al-Nusra which fought alongside two other hardline al-Qaeda-type movements, Ahrar al-Sham and Jund al-Aqsa. Al-Nusra’s leader, Abu Mohammed al-Golani, immediately announced the instruction of Sharia law in the city. Sent to Syria in 2011 by Isis leader Abu Bakr al-Baghdadi to create al-Nusra, he split from Baghdadi when he tried to reabsorb al-Nusra in 2013. Ideologically, the two groups differ little and the US has launched air strikes against  al-Nusra, though Turkey still treats it as if it represented moderates.The Syrian government last week accused Turkey of helping thousands of jihadi fighters to reach Idlib and of jamming Syrian army telecommunications, which helped to undermine the defences of the city. The prominent Saudi role in the fall of Idlib was publicised by Jamal Khashoggi, a Saudi journalist and adviser to the government, in an interview in The New York Times. He said that Saudi Arabia and Turkey had backed Jabhat al-Nusra and the other jihadis in capturing Idlib, adding that “co-ordination between Turkish and Saudi intelligence has never been as good as now”. Surprisingly, this open admission that Saudi Arabia is backing jihadi groups condemned as terrorists by the US attracted little attention. Meanwhile, Isis fighters have for the first time entered Damascus in strength, taking over part the Yarmouk Palestinian camp, only ten miles from the heart of the Syrian capital.
  • Saudi Arabia is not the first monarchy to imagine that it can earn patriotic credentials and stabilise its rule by waging a short and victorious foreign war. In 1914, the monarchs of Germany, Russia and Austro-Hungary had much the same idea and found out too late that they had sawed through the branch on which they were all sitting. Likewise, Saudi rulers may find to their cost that they have been far more successful than Iran ever was in destroying the political status quo in the Middle East.
Paul Merrell

Israel Joins Chinese Bank, Defies U.S.  « LobeLog - 0 views

  • Updating the post I wrote a couple of weeks ago on how the U.S. failed to persuade some of its closest allies not to join the new Chinese-backed Asian Infrastructure Investment Bank (AIIB), it’s worth noting that Israel has also abandoned Washington by signing up for membership. The Israeli foreign ministry announced on March 31–the deadline for applying to join the new bank–that Prime Minister Benjamin Netanyahu had signed “a letter of application to join the [AIIB], a result of the initiative of the President of China.”
  • The process of joining the bank was led by the Ministry of Foreign Affairs in recognition of the importance of joining major Asian organizations on the continent. Israel’s membership in the Bank will open opportunities for integration of Israeli companies in various infrastructure projects, which will be financed by the bank. …It should be noted that the establishment of the bank is a Chinese diplomatic achievement. China initially intended that 35 countries should join, and to date 50 countries have joined. The establishment of AIIB is one of the most important initiatives in terms of Chinese foreign policy and in particular for President Xi Jinping, as this is his personal initiative.
  • Needless to say, Israel’s decision, which is perfectly defensible on the grounds of national interest, constitutes another slap at the Obama administration, which in the view of many experts stupidly lobbied U.S. allies against membership. (Of Washington’s closest allies, only Canada and Japan did not apply.) Israel has substantial commercial interests in China, particularly in the hi-tech and defense sectors. In fact, the Pentagon has long complained about Israeli transfers of sensitive U.S. military technology to China. In 2004, the Bush administration even sent then-Undersecretary of Defense for Policy and Greater Israel advocate Douglas Feith to Jerusalem to demand the resignation of the director general of the Israeli Defense Ministry, Amos Yaron, for allegedly concealing details of the sale and upgrade of an Israel-made Harpy attack drone to China.
  • ...2 more annotations...
  • Of course, one of the reasons Obama lobbied allies against joining the bank is that he knew that a Republican Congress would itself reject Washington’s accession. The same Republican Congress has steadfastly refused to ratify a long-pending governance reform of the International Monetary Fund (IMF) and the World Bank that would give Beijing and some other middle-income countries a somewhat bigger voice in the two western-dominated Bretton-Woods institutions (even without diluting the U.S. voting power on their boards). And, yes, this is the same Republican Congress that invited Netanyahu to speak to it, that approves virtually any appropriation desired by Israel, and that is trying its utmost to derail a multilateral nuclear agreement with Iran largely at Bibi’s behest.
  • Like most small countries, Israel practices realpolitik. Despite claims by AIPAC, neoconservatives, and many Christian Zionists that Israel is our “closest ally” in the Middle East, if not the world, and that its “values” are identical to our own, in fact, it pursues its own interests abroad with little regard for Republican (or anyone else’s) sensibilities. As we have reported before, it is also providing support to al-Qaeda’s affiliate in Syria, but no Republican that I know of has raised the slightest objection. Indeed, in their devotion to Netanyahu and his Likud Party, no doubt well lubricated by the millions of dollars in campaign and other political contributions offered by Sheldon Adelson, Paul Singer, and other Republican Jewish Coalition donors, most Republican lawmakers appear perfectly comfortable with Israel’s Middle East policies, including continued settlement-building and expansion in the West Bank and East Jerusalem, the de facto blockade against Gaza, and demands that Israel be recognized as a Jewish State. These actions and others serve not only to radicalize the Palestinians and other Arabs but also make it more difficult for the United States and its military to gain goodwill and operate effectively throughout the region, as then-CentCom Commander Gen. David Petraeus told the Senate Armed Services Committee shortly after Netanyahu became prime minister. Indeed, no one has undermined U.S. credibility in the region and beyond over the past six years as much as Bibi himself.
Paul Merrell

Secret documents shine light on GCSB spying in Bangladesh - National - NZ Herald News - 0 views

  • Secret documents reveal New Zealand has shared intelligence collected through covert surveillance with Bangladesh despite that country's security forces being implicated in extrajudicial killings, torture and other human rights abuses. The documents shine light on the major role played by the Government Communications Security Bureau (GCSB) in electronic spying operations conducted in the small South Asian nation. The surveillance has been used to aid the United States as part of its global counter-terrorism campaign, launched after the September 11 attacks in 2001. The New Zealand Herald analysed the documents in collaboration with US news website The Intercept, which obtained them from the NSA whistle-blower Edward Snowden.
  • The Bangladesh spying is revealed in an April 2013 US National Security Agency (NSA) report about its relationship with New Zealand. In a section called "What Partner Provides to NSA", it says "GCSB has been the lead for the intelligence community on the Bangladesh CT [Counter-Terrorism] target since 2004." The GCSB provides "one of the key SIGINT [signals intelligence] sources of [Bangladesh counter-terrorism] reporting to the US intelligence community."
  • The intelligence gathered by the GCSB staff was also being forwarded to foreign intelligence agencies, including Bangladesh's state intelligence agency. In recent years, human rights groups have issued several reports documenting Bangladeshi intelligence and security agencies' disregard for international prohibitions on torture and alleged involvement in politically motivated killings. In 2014, a case was filed in the International Criminal Court accusing the Bangladesh Government of committing crimes against humanity. The GCSB's surveillance operations in Bangladesh are among the most surprising and obscure yet revealed. Bangladesh barely registers in New Zealand foreign policy. The Ministry of Foreign Affairs and Trade website says: "Relations between New Zealand and Bangladesh remain friendly, although interaction is limited." Nonetheless, a New Zealand government source told the Herald that Bangladesh is the main focus of one of the GCSB's four analysis sections, called ICT, and has been for over a decade. ICT, the Transnational Issues section, was set up in April 2002 in the wake of the September 11 attacks to focus on terrorism threats.
  • ...5 more annotations...
  • The 2009 document reveals that there is a special collection site in the Bangladesh capital, Dhaka, for eavesdropping on local communications. New Zealand does not have a high commission or any other official building in Bangladesh in which to hide a covert listening post. The Snowden documents suggest the Dhaka unit may be located inside a US-controlled building with operations overseen by the NSA and the Central Intelligence Agency (CIA).
  • Green Party co-leader Russel Norman said the spy agency was "dragging" New Zealand into human rights abuses, and the Government should stop providing intelligence assistance to Bangladesh. "All three key anti-terrorism government agencies in Bangladesh have been implicated in horrendous human rights abuses, so it is impossible to guarantee that the information passed on did not lead to innocent people being killed or tortured," Dr Norman said. "John Key has always justified the GCSB on the basis that it is there to protect the good guys, but these documents reveal that it is helping the bad guys.
  • The intelligence gathered by the GCSB staff was being forwarded to foreign intelligence agencies. The April 2013 NSA report said the "GCSB's Bangladesh CT [counter terrorism] reporting provided unique intelligence leads that have enabled successful CT operations by Bangladesh State Intelligence Service, CIA and India over the past year". The specific Bangladesh "State Intelligence Service" referred to is not named in the document. Bangladesh has several agencies that focus on gathering intelligence, primarily including the Directorate General of Forces Intelligence (DGFI), the National Security Intelligence agency (NSI), and the police Special Branch. The lead agency that executes the country's counter-terrorism operations is the Rapid Action Battalion, or RAB. Each of these agencies has been accused of involvement in severe human rights abuses over a sustained number of years. In 2008, for instance, Human Rights Watch alleged that the Special Branch headquarters in Dhaka's Maghbazar neighbourhood was used to torture detainees.
  • In 2010, a trade union activist accused the NSI of arresting, torturing, and threatening to kill him. The same activist was found dead in unexplained circumstances two years later, his toes and feet broken, legs and body battered and bruised, and his legs apparently pierced with a sharp object. Bangladesh's intelligence agencies and main police and security forces co-operate closely. Most notably, they work together as part of a notorious centre called the Taskforce for Interrogation Cell, located inside a compound in northern Dhaka that is controlled by the RAB unit. In 2011, Britain's Guardian newspaper reported the interrogation cell was used as a place to extract information and confessions from "enemies of the state". It was described as a "torture centre" used for "deliberate and systematic" mistreatment of detainees. One British man detained there in 2009 on terrorism-related charges was allegedly hooded and strapped to a chair while a drill was driven into his right shoulder and hip.
  • Other torture methods used by Bangladeshi authorities, according to Human Rights Watch, have included "burning with acid, hammering of nails into toes ... electric shocks, beatings on legs with iron rods, beating with batons on backs after sprinkling sand on them, ice torture, finger piercing, and mock executions". In February last year, the US Government suspended its own support for the RAB, citing "gross violation of human rights" committed by the force's members. The same month, a case against the Bangladesh Government was lodged in the International Criminal Court, accusing the country's officials of waging a brutal campaign of "widespread or systematic" torture, killings, and other human rights abuses that amounted to crimes against humanity.
Paul Merrell

Billionaire chocolate baron wins Ukraine election - World - NZ Herald News - 0 views

  • Chocolate baron Petro Poroshenko has claimed victory in Ukraine's presidential election, vowing to bring peace after months of turmoil and a pro-Russian insurgency that thwarted voting across much of the separatist east. The 48-year-old self-made billionaire, who exit polls said on Sunday had won almost 56 per cent of the vote, swiftly declared he would work to bring peace to Ukraine. "My first decisive step will be aimed at ending the war, ending chaos, and bringing peace to a united and free Ukraine," he said at a press conference in Kiev. "I am certain that our decisive actions will bring fairly quick results," he added. "The presidential election showed that Ukrainians have chosen the path of European integration," Poroshenko said.
  • The results put him far ahead of his nearest rival Yulia Tymoshenko, the former prime minister who spearheaded the 2004 pro-democracy Orange Revolution but then became embroiled in corruption scandals that saw her put behind bars by the old pro-Russian regime. If confirmed by election officials, the results will avoid the need for a June 15 runoff that would have extended political uncertainty at the most painful moment in Ukraine's 23-year-old post-Soviet history. Poroshenko vowed to pay his first trip outside the capital to the eastern industrial rust belt where pro-Moscow insurgents have proclaimed the creation of their own independent republic. Ukrainians had voted en masse in the capital Kiev and the west of the country but the insurgency thwarted voting across most of the separatist east.
  • Russian President Vladimir Putin, facing the threat of more US and EU sanctions, appeared to make a major concession on Friday by saying he was ready to work with the new Kiev team. "We understand that the people of Ukraine want their country to emerge from this crisis. We will treat their choice with respect," he said.
Gary Edwards

The Purchase Of Our Republic | Zero Hedge - 0 views

  • The massive consolidation of wealth, combined with the removal of any limits on money in campaigns, has allowed for the purchase of our government. Today I am publishing a comprehensive and important guest essay, The Purchase of Our Republic, by longtime correspondent Y. Falkson.
  • Americans know that something is wrong, deeply wrong. They see signs of the problem everywhere: income inequality, growing concentration and power of mega corporations, political donations/corruption, the absence of jobs with decent salaries, the explosion of the US prison population, healthcare costs, student loan debt, homelessness, etc. etc.  However, the true causes and benefactors behind these problems are purposely hidden from view. What Americans see is Kabuki Theater of a functioning form of capitalism and democracy, but beyond this veneer our country has devolved into the exact opposite. Those who benefit from this crony capitalist state go to extreme lengths to paper over the reality and convince Americans that the system works, the American Dream is still a reality and that American democracy is in fact democratic. Below I hope to begin to outline some of the underlying dynamics and trends that have evolved in recent decades and led us so far from what we once were. As fun as it would be, the answer is not some evil conspiracy by the Illuminati, but rather the unfortunate result of three long term and mutually reinforcing components that have been attacking the fundamental roots of the structure of our Republic. The first is the increased concentr
  • ation of corporate and private wealth. Both of which are quickly yelled down in the media as anti-free market and class war hysteria. The second is the use of this wealth to capture all three branches of government in order to ensure the continued extraction of capital from the many and to the few.The rich might have climbed the ladder because they earned it, but they have then purchased government to pull up the ladder behind them. The consequence of the first two components is a democracy in name only that represents the very few.
  • ...28 more annotations...
  • 1. Faux Capitalism = Wealth Consolidation / Income Inequality
  • While there is no true beginning to the story, we can start with the incredible build up and concentration of wealth among corporations in recent decades. The USA now boasts a cartel-like set of corporate titans in almost every industry. It goes beyond, but certainly includes, our Too Biggerer To Fail banks, merged from what was 37 banks in 1995 into a Frankenstein’s monster like 5 (Citigroup, JP Morgan-Chase, Bank of America, Wells Fargo and Goldman Sachs). In agriculture, Monsanto alone controls over 85% of all corn and soy bean crops, four companies control 83% of the beef market, 66% of the hog market and 58% of the chicken market. So while shopping at the grocery store might appear to be the manifestation of capitalism at its finest, it doesn’t take much digging to look behind the curtain to see how little competition truly exists.
  • When the average American goes to pick up some groceries, they are shopping at Walmart and buying something from P&G that is mostly made of Monsanto corn. Is that true choice? The same story plays out with our news and media (and other industries) where we have gone from 50 companies in 1983 to the big 6 which control over 90% of all media. Is choosing to watch one of 30 news channels, all of which are owned by News Corp (Rupert Murdoch) a real choice? This is not capitalism and they are not competing, not in the true sense of the word. Along with this consolidation of corporations in recent decades, their senior leaders have taken up a larger and larger piece of the pie at the expense of their employees. In particular, the ratio of CEO-to-worker pay has increased 1,000 percent since 1950. Unsurprisingly, Walmart is both the largest employer in the country and the worst CEO pay offender with a ratio of over 1000:1. This is at a time where worker productivity has increased significantly, something that historically correlated with increased pay. But no more. It’s a new twist on the old Soviet saying “we pretend to work and they pretend to pay us”, but now it’s closer to “we do all of the work and they pretend to pay us”.
  • Private Wealth: As a consequence of the royal tribute we pay to the C-suite class these days, we have likely surpassed the pre-Depression Roaring Twenties in terms of inequality.
  • This, amazingly, has only accelerated since the crisis in 2008 in thanks to bailouts, Quantitative Easing and other gifts from Congress and the Fed. The wealthy 1% and in particular the .01% have now grown their fortunes to levels that tax comprehension and even their ability to spend it (the decisions by a few billionaires such as Bill Gates to essentially donate his fortune is a tacit acknowledgement that our current system over provides wealth to a select few).
  • So what is an incredibly wealthy capitalist CEO of a mega-corporation do once they control their industry and have essentially limitless wealth? Well in a competitive market, the only way to go from the top is down and the only thing that can make that happen is competition. Consequently, competition must be avoided whenever possible.
  • To squash or prevent competition, the oligopolies and oligarchs target their resources on the one place that can make competition illegal, our government.Something to keep in mind the next time you see a corporate billionaire grandstanding about the importance of “Free Markets” when their strategy is quite the opposite. As this capture of the government has taken place we have essentially shifted from capitalism and to crony capitalism. So we now have industries that have mastered the art of faking capitalism by turning our government into one that fakes democracy. This government takeover took time, but the purchase of all 3 branches of government has almost been completed by 2014. You don’t have to take my word for it, luckily that has now been empirically proven in an analysis of over 20 years of government policy where the clear conclusion was that policy makers respond solely to those in the top 90th percentile and essentially ignore the large majority of Americans.
  • 2. Wealthy Purchase of Government Institutions / Elections
  • Purchase of the Executive Branch:
  • Let’s take a step back and take a glimpse at how the government was purchased, beginning with the executive branch. In 1980, Reagan’s election cost less than $300 million. When Bush beat Kerry in 2004, it cost almost 3x times as much, almost $900 Million. 4 years later, the 2008 election cost a record $1.3 Billion. It was in this election where Obama hammered the final nail in the coffin for government funded for elections. Obama, more so than any other candidate in recent decades had the widespread support of millions of small donors, but in the end I guess it wasn’t enough. So when Obama “leaned to the green”, it forever set the precedent that you can’t win without the backing of our nation’s oligarchs. Consequently, the money has only gushed in since as the cost of Obama’s reelection in 2012 skyrocketed to an unfathomable $7 billion. Needless to say this is slightly above the rate of inflation. Our Presidents are now preselected exclusively by a tiny fraction of Americans can have the money to fund what has become necessary for a legitimate run. Summary: Candidates spend years courting the super-rich to build up a multi-billion dollar war chest. Only those who succeed can actually run a campaign that an average American will be aware of. Then Americans get to choose one of the pre-selected “candidates”. No wonder voter turnout is so low… Executive branch, check!
  • – Note that media corporations benefit doubly as they can use their cash to fund elections, but are also the beneficiary of all that money as it is used for campaign spending.
  • Purchase of the Legislative Branch:
  • The process has progressed similarly in Congress. In 1978, outside groups spent $303,000 on congressional races. In 2012 that was up to $457,000,000. That is over 1,500 times the level in 1978. It would be funny, if it was so blatant and terrifying. By many accounts, our “leaders” in Congress spend 50% or more of their time working the phones or fundraisers rather than trying (and failing) to actually do the “people’s business”. Let’s also take a minute to appreciate the hypocrisy of anyone that pretends that the money doesn’t influence our government. Businesses do not give to politicians for charity. This is a payment for services that has proven exceedingly reliable and profitable. The ROI for money invested in purchasing Congressman is what CEO dreams are made of. No wonder the incentive is to invest in Congress rather than R&D or marketing. There are very few places in the world or times in history where you can find ROI’s in the thousands, or even the tens of thousands.
  • Review: Congressmen beg for money to get elected, make sure to vote the way your benefactors would like, consequently get more money to get elected again. If at any point they do lose or quit, they take the big payday to work for those who have been paying them all along. Legislative Branch, Check!
  • In addition, increasingly those who work on Congress (and regulators) were previously employed by these large corporations or expect to work there later. A recent example is Chris Dodd who left the Senate the head lobbyist for Hollywood at the MPAA, the guys behind SOPA and PIPA, but there are many many others.
  • Judicial Branch Endorsement of the Purchase of Government:
  • Last but not least, we have the enabling Judicial Branch. It only took a few purchased presidents to ensure the appointment of a majority of “free market” and “pro-business” judges. For instance, and disgracefully, Clarence Thomas was once legal counsel for Monsanto, but has not once recused himself from any cases involving Monsanto and always votes in their favor. These radicals have now fully endorsed and enabled the influx of money used to purchase the other branches. Specifically, 2 major decisions have completely opened the floodgates, Citizens United and McCutcheon. The first allowed unlimited contributions of corporate money into elections and brought us the notorious declaration that “corporations are people” and that “money is free speech”. This was more recently followed up with the private wealth equivalent in McCutcheon. In this ruling, Supreme Court Chief Justice John Roberts said as part of his majority opinion (presumably with a straight face) “… nor does the possibility that an individual who spends large sums may garner influence over or access to elected officials or political parties”. And with this, the Supreme Court has fully endorsed both major sources of immense wealth to purchase our elections and consequently our government. Review: The rich fund Presidential elections, Presidents nominate “business-friendly” judges and then the bought Congress approves their nominations. New judge then votes to ensure even more money is allowed to purchase elections. Judicial Branch, CHECK!
  • 3. A Faux Republic Dependent Upon the Funders and Not the Voters
  • The Founder’s Hope and the Sad Reality:
  • Acknowledging where we are as a country, it is often helpful to look to where we started for some perspective. Unsurprisingly, this type of problem was not overlooked back in the 18th century. In 1776, James Madison stated that his goal was to design a republic in which “powerful interest groups would be rendered incapable of subdoing the general will”. Madison hoped, perhaps naively, that factions would be thwarted by competing with other factions. Sadly, we are now in a time where factions (aka wealthy special interests) subdue the will of the people and ensure the government responds to them alone on those issues where they have a “special interest” and consequently asymmetric stakes in the game (Charles Hugh Smith). As a result, these groups essentially collude to allocate their resources to their own issues, but do not “thwart” or compete with other factions as they do the same. It’s a pretty great system, as long as you’re one of the wealthy few who can use their money to drown out the poor and voiceless many. And just like that, what was once a Republic has become a corrupt shell of its past self. All the signs are still there; votes, elections, campaigns, branches of government, etc., but behind the scenes the only ones represented are those who can afford to be heard.
  • Summary: This massive consolidation of wealth, combined with the removal of any limits on money in campaigns, has allowed for the purchase of our government, or as Dick Durban once stated, “frankly they [the banks in this case] own the place”. If money = free speech, then those with all the money, have all the free speech.
  • What Might Help? Now that I have likely and thoroughly depressed the reader, let’s bounce around some ideas for what can be done. As stated in the beginning, this is not an unknown problem and many people are promoting a number of ways to fix or at least ameliorate the problem. I will briefly describe just a few which I think provide some direction any of us could easily implement or support.
  • Change the Rules: Laurence Lessig of Harvard Law has put forward a visionary proposal for re-writing the way that campaigns are financed in his book, Republic, Lost: How Money Corrupts Congress--and a Plan to Stop It. Put simply, he would like to empower every voter with a stipend, say $150 per election to give to whatever candidate or candidates they prefer. If you would like to accept this money, you would need to forgo any other contributions or support (one would hope including the indirect PAC kind). This would actually provide even more money than is used in current elections, but would effectively democratize the funding process. While there would still be a “funding election” that takes place before the actual election, the funding would not be unequally provided. Lessig’s work has only begun, as this sort of bill or likely constitutional reform is nearly impossible to achieve, but he has undertaken and I assume will continue to implement many brave and creative ways of bringing about the change all American’s should support. Most recently he has suggested we begin to fund, ironically enough, a Super PAC to end all Super PACs. It would be funded with the solitary goal of changing how money impacts our elections. Please support them here: www.mayone.us/
  • Change Our Day-to-Day: At the more micro level, Charles Hugh Smith believes that we will inevitably see our overly centralized and inefficient system erode away as it is replaced by more resilient, local and efficient businesses and societies outside of the current system. With that in mind, he recommends that “all anyone can do is the basic things--lower our energy footprint, stay healthy and avoid unnecessary medications and procedures, support local businesses, organic food growers, etc. In other words, what we can do is support local businesses that are part of the emerging economy rather than support corporate cartels.” Your Vote Does Matter: Do you live in Ohio, Florida or New Hampshire? Probably not. Despite what we are told every 4 years, there are actually states outside of the “swing states”, and even more surprising, the very large majority of Americans live in those states where your “vote doesn’t matter”. New Yorkers an Californians all know their state will turn Blue no matter who the candidates are and either don’t vote at all, or often vote for the Blue team in order to feel like they are on the winning side.
  • The truth is that if you see the election as Red vs. Blue, you vote probably doesn’t matter. But here is the trick, if all the people who think their vote didn’t matter decided to vote for whom they might actually believe in, then their votes just might matter.
  • What if all the growing number of “Independents” (who usually still vote Blue), chose to vote for a third party? What if a third party candidate won a state like New York or California? What if that candidate was one whose primary promise to the voters was to champion a change to the role of money in government (perhaps in line with what Lessig proposes)? Would you vote for such a person?I would argue you should. If California alone (with 55 electoral votes) were to vote for a 3rd party that would likely prevent either Red or Blue candidate from winning the requisite 270 electoral votes.
  • Think about the message that would send to both parties. I would predict that both sides would start to bend over backwards for an endorsement from that 3rd party and they would have to get it by taking up the same primary cause for reforming money in government. Consequently, at the root of our corrupted system which is perpetually ignored as both sides might suddenly become the big issue of the election. Then maybe we might begin to turn things around.
  • Sources: Charles Hugh Smith (oftwominds, Surivival+, etc.), Yves Smith (Naked Capitalism, Econned), Laurence Lessig (Republic Lost, multiple TED Talks), Matt Taibbi (blog at Rolling Stone and now at The Intercept), Zero Hedge, John Robb, Max Keiser, Clay Shirky (Cognitive Surplus), Aldous Huxley (Brave New World, Brave New World Revisited), George Orwell (1984), Michael Lewis, Daniel Kahneman (Thinking Fast and Slow), James Richards (Currency Wars), Han Joon Chang (23 Things They Don’t Tell You About Capitalism) and Joseph Stiglitz (Mismeasuring Our Lives) 
Paul Merrell

9/11 Museum World Trade Center Evidence: No Plane Hit Pentagon? | Dissident Voice - 0 views

  • Even a determined debunker of 9/11 skeptics, while laying out a coherent argument that the official 9/11 Pentagon story is true (and conflating physical evidence with photography), ends up concluding: In this essay I asked what conclusions about the Pentagon attack were supported by physical evidence — primarily post-crash photographs of the site. I found that, in every aspect I considered, this evidence comports with the crash of a Boeing 757. At the same time, the evidence does not conclusively prove that the aircraft was a 757, much less that it was Flight 77. However, that lack of conclusiveness should not be surprising given the systematic suppression of evidence by authorities.
  • At best, the events of 9/11 represent the catastrophic failure of numerous American agencies, including airport security, air traffic controllers, national air defense command, and the U.S. Air Force. That reality alone is enough to raise suspicions of a cover-up, if only to avoid accountability for lethal incompetence. Absence of evidence is not evidence of absence. At worst, the events of 9/11 were the result of an almost unimaginable criminal conspiracy designed to produce the “new Pearl Harbor” that would enable fans of the New American Century (many of them members of the Bush administration) to take the United States in new, warlike, world-dominating directions (maybe something like a Global War on Terror).
  • In any event, the Bush administration fought long and hard to prevent any investigation of 9/11 and continued to work to undermine the 9/11 Commission until it produced its flawed report in August 2004. That final report omits any mention, much less explanation, of what Vice President Dick Cheney knew and when he knew it regarding the attack on the Pentagon. The 9/11 Commission knew full well – and chose not to confront – the serious implications of the testimony to the commission by Transportation Secretary Norman Pinetta (May 23, 2003): During the time that the airplane was coming into the Pentagon, there was a young man who would come in and say to the Vice President…the plane is 50 miles out…the plane is 30 miles out….and when it got down to the plane is 10 miles out, the young man also said to the vice president “do the orders still stand?” And the Vice President turned and whipped his neck around and said “Of course the orders still stand, have you heard anything to the contrary!??”
  • ...1 more annotation...
  • Even now, still in the shadows of 9/11, it might be instructive to hear President Bush and members of his administration vigorously questioned, under oath, as to why they decided to pay no attention – none at all (Bush is said to have told a CIA officer “you’ve covered your ass,” which sounds in retrospect almost like foreknowledge) – to the CIA briefing paper with the title: “Bin Laden Determined To Strike in US.” Long after the facts of 9/11, the Bush people defended their absolute inattention and inaction based on the absence of evidence.
  •  
    Re 9-11, I see the cover-up conspiracy's existence as having been established beyond any reasonable doubt in enormous detail. The cover-up conspiracy's very existence casts doubt on the official version of events. The official version of events itself is a conspiracy theory and it seems beyond question that a conspiracy involving multiple persons was in fact involved (four airliners hijacked within a few hours of each other involves more than  a single pilot acting on his own). The remaining problem is determining who the real conspirators were, their roles and actions, and their motives. Given that the official version is itself a conspiracy theory, other reconstructions of events cannot logically be discarded just on the basis that they are conspiracy theories. 
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

"Top secret" Shin Bet memo suggested dead Arafat would benefit Israel | The Electronic ... - 0 views

  • A “top secret” Israeli intelligence memo from 2000 concluded that the “disappearance” of Palestinian leader Yasser Arafat would be beneficial to Israel. The memo, revealed in a book to be published this week by British-Israeli political scientist Ahron Bregman, adds evidence to support the thesis that Arafat, who died in November 2004 in a French military hospital, was assassinated. The Electronic Intifada obtained an advance copy of Bregman’s book, Cursed Victory: A History of Israel and the Occupied Territories (Penguin).
  • Bregman himself is circumspect about whether Israel had a hand in Arafat’s death, but sees a number of clues, including public statements by then Prime Minister Ariel Sharon that Israel wanted him dead and was prepared to kill him. Yet Bregman finds a “clear indication that the Israelis did intend to kill Arafat” in a “Top Secret” document dated 15 October 2000 – a few months before Sharon came to power and a few weeks into the second Palestinian uprising – from the Shabak, Israel’s General Security Service (also known as Shin Bet).
  • Bregman then describes the document’s reasoning and conclusions: After going through “why Arafat is necessary,” and then “why Arafat is not necessary,” the document says that “the damage [Arafat] causes is bigger than his benefits….” And the subsequent conclusion is straightforward: “7. Arafat, the person, is a serious threat to the security of the state. His disappearance outweighs the benefits of his continuing existence.” And yet, even this Shabak “Top Secret” report does not provide us with enough evidence of assassination and we will probably have to wait for more information to ascertain what really killed Arafat.
  • ...4 more annotations...
  • Al Jazeera English investigative reporting since 2012 has revealed that Arafat’s personal effects contained high levels of the radioactive element polonium. Independent Swiss scientists later conducted tests on Arafat’s exhumed remains and concluded there was “moderate” support for the theory that Yasser Arafat was poisoned. While separate French and Russian scientific reports, also based on samples of Arafat’s remains, cast doubt on the conclusions by the Swiss radiation scientists at the Radiophysics Institute in Lausanne, the Swiss have hit back explaining why the French conclusions were flawed.
  • The French and Russian reports – unlike the Swiss findings – were never made public, but the Swiss scientists obtained copies and have explained, in an article in the Swiss magazine Le Temps last month, why the French and Russian test results actually support their conclusions. All three reports found high levels of polonium-210 in Arafat’s body. “Not only were the levels of polonium of the same order” in all three reports, Le Temps says, “but the scientists also noted similar differences” among the samples from different parts of Arafat’s remains. The key difference was not therefore in the test results, but in the interpretation.
  • The French concluded that the high level of the radioactive element was caused by radon, a naturally occurring element in the environment, but had not taken any measurements from the surrounding area to support this thesis. According to the Swiss, the French conclusion amounts to speculation. The more thorough Swiss, by contrast, did take samples from the surrounding area. Le Temps reports: “The Swiss anticipated the possible interference of radon. In their report they demolish the hypothesis. Not only was the level of radon in the sealed tomb very weak, but the soil situated under [Arafat’s] abdominal cavity, and therefore in contact with the body, was 17 times more ‘contaminated’ than soil situated far from the body.”
  • The presence of radon, which would be the same throughout the area, could not possibly explain such concentrations. While the Swiss findings look stronger than ever, the debate continues. Bregman’s revelations add a new, albeit circumstantial element, showing that Israeli intelligence, which has assassinated many Palestinian leaders, saw a rationale for eliminating Arafat as well.
  •  
    For those who support secret violence by governments, may the fleas of a thousand camels infest your armpits for the remainder of your lives.  
Paul Merrell

Washington concealed US troops exposure to chemical weapons in Iraq - intel docs - RT News - 1 views

  • American soldiers discovered more than 4,990 chemical munitions in Iraq, according to Iraqi and US officials and previously classified intelligence documents, which may now be in the hands of Islamic State militants. For much of the duration of the Iraq War, which saw US soldiers open a military invasion against the Ba’athist country in March 2003 amid tremendous international outcry, US forces "repeatedly encountered, and on six occasions were wounded by, chemical weapons” leftover from the Iraq-Iran War, reported the New York Times.
  • The hefty eight-part report, largely based on interviews and highly redacted intelligence documents, said “17 American service members and seven Iraqi police officers…were exposed to nerve or mustard agents” between 2004 and 2011. The article detailed the harrowing chemical encounters of several servicemen, including Sergeant Duling, who in August 2008 unwittingly led his unit into a munitions pit outside Baghdad. “This is mustard agent,” he said, after carrying out an examination of the contents of the rusting artillery. “We’ve all been exposed.” At first blush, it may seem inconceivable that the United States, which had argued for an invasion of Iraq on the grounds that it was harboring weapons of mass destruction (an accusation that the UN weapons inspectors on the ground in Iraq prior to the American invasion/occupation had proven to be incorrect), would want to keep the discovery of WMDs in Iraq under wraps.
  • One reason for the hush-up, the report suggests, is that the United States was largely responsible for Iraq having chemical weapons in the first place. “In five of six incidents in which troops were wounded by chemical agents, the munitions appeared to have been designed in the United States, manufactured in Europe and filled in chemical agent production lines built in Iraq by Western companies,” it said. Many of the casings were M110s, which the United States military had developed decades ago to disperse white phosphorous or mustard gas.
  • ...2 more annotations...
  • “The United States also exported the shells and the technology behind them,” the Times reported. “When Iraq went arms shopping in the 1980s, it found manufacturers in Italy and Spain willing to deal their copies. By 1988, these two countries alone had sold Iraq 85,000 empty M110-type shells, according to confidential United Nations documents.” This is where the story begins to get very disturbing. During the Iraq-Iran War (1980-1988), Baghdad actively sought the development of chemical weapons with the help of a number of Western countries, including the United States, West Germany, the Netherlands, the United Kingdom, and France, according to internal Iraqi documents.
  • It is has already been widely documented that at least 50,000 Iranian civilians and soldiers were killed by Iraqi chemical weapons in the course of the war. As the Times report detailed, many of the chemical weapons incidents were centered around the now largely destroyed Muthanna State Establishment, which was “the center of Iraqi chemical agent production in the 1980s.” This is especially worrying because since June, that sensitive area has been in the possession of the Islamic State,
« First ‹ Previous 81 - 100 of 138 Next › Last »
Showing 20 items per page