Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 2013

Rss Feed Group items tagged

4More

Syrian Air Strike Exterminates Commander Behind 2013 Chemical Weapons Attack in Ghouta ... - 0 views

  • Zahran Alloush, the commander of the Jaysh al-Islam alliance was killed in a Damascus suburb. August 21, 2013 the Saudi intelligence asset Alloush was commanding Liwa-al-Islam when he gave the order to launch the chemical weapons attack against the East Ghouta suburb of Damascus. Zahran Alloush has been on the payroll of Saudi intelligence since the 1980s.
  • The Central Command of the Syrian Arab Army confirmed that it successfully launched an air strike in the Damascus suburb of Otaya, targeting and killing several Jihadist commanders. Among them the leader of Jaysh al-Islam, Zahran Alloush. Jaysh al-Islam is an alliance of several Jihadist militia, including Liwa-al-Islam. Jaysh al-Islam is allied with the Syrian Al-Qaeda Franchise Jabhat Al-Nusrah. An in-depth investigation by nsnbc international, in 2013, concluded that Zahran Alloush was the commander who gave the direct order to launch the chemical weapons attack in East Ghouta on August 21, 2013.
  • The investigation also concluded that command responsibility for Alloush’s decision led directly to the U.S.’s Chairman of the Joint Chiefs of Staff, the White House, and to the Saudi government. Alloush would also be in control over choosing the “security guards” UN inspectors had to submit to while gathering evidence after the chemical weapons attack in East Ghouta. (see details and names in the report). Zahran Alloush, Liwa-al-Islam and Saudi intelligence also played central roles in the attempt to obstruct Syria’s decommissioning of chemical weapons by launching attacks against chemical weapons transports. The information about these transports was highly classified, leading the Syrian government to the conclusion that Saudi intelligence provided information to Liwa-al-Islam. Zahran Alloush was since the 1990s involved in the Salafist – Wahabbist terrorist networks in Syria which led to his arrest by Syrian intelligence. He was released in early of 2011, when the Assad administration granted a general amnesty. Immediately after his March 2011 release from prison, Zahran Alloush began receiving substantial funds and weapons from Saudi intelligence, which enabled him to establish Liwa-al-Islam as a de facto Saudi Arabia sponsored mercenary brigade under the auspices of the Saudi Interior Ministry.
  • ...1 more annotation...
  • The Saudi intelligence assets Alloush and Liwa-al-Islam also played crucial roles in the demise of the predominantly Qatari and Turkish backed Free Syrian Army (FSA) and other, predominantly Qatari-backed insurgencies. In June 2013 in the Jobar district of Damascus, for example, Alloush withdrew his Liwa-al-Islam troops during a major battle with the Syrian Arab Army without announcing the sudden withdrawal to the Qatar-sponsored First Brigade and the Liwa Jaish al-Muslimeen. Both brigades were literally wiped out by the Syrian Army. The air strike that exterminated Zahran Alloush also exterminated one of the primary field commanders who were responsible for the transition from the primacy of Muslim Brotherhood linked insurgencies to Al-Qaeda-linked insurgencies in the Syrian theater. That includes the primacy of Jabhat al-Nusrah, Jaysh al-Islam, Liwa-al-Islam, and ultimately also the self-proclaimed Islamic State, a.k.a. ISIL, ISIS or Daesh.
6More

Washington Gets Explicit: Its 'War on Terror' is Permanent - 0 views

  • On Thursday, the Senate Armed Services Committee held a hearing on whether the statutory basis for this "war" - the 2001 Authorization to Use Military Force (AUMF) - should be revised (meaning: expanded). This is how Wired's Spencer Ackerman (soon to be the Guardian US's national security editor) described the most significant exchange: "Asked at a Senate hearing today how long the war on terrorism will last, Michael Sheehan, the assistant secretary of defense for special operations and low-intensity conflict, answered, 'At least 10 to 20 years.' . . . A spokeswoman, Army Col. Anne Edgecomb, clarified that Sheehan meant the conflict is likely to last 10 to 20 more years from today - atop the 12 years that the conflict has already lasted. Welcome to America's Thirty Years War." That the Obama administration is now repeatedly declaring that the "war on terror" will last at least another decade (or two) is vastly more significant than all three of this week's big media controversies (Benghazi, IRS, and AP/DOJ) combined. The military historian Andrew Bacevich has spent years warning that US policy planners have adopted an explicit doctrine of "endless war". Obama officials, despite repeatedly boasting that they have delivered permanently crippling blows to al-Qaida, are now, as clearly as the English language permits, openly declaring this to be so.
  • It is hard to resist the conclusion that this war has no purpose other than its own eternal perpetuation. This war is not a means to any end but rather is the end in itself. Not only is it the end itself, but it is also its own fuel: it is precisely this endless war - justified in the name of stopping the threat of terrorism - that is the single greatest cause of that threat.
  • I wrote that the "war on terror" cannot and will not end on its own for two reasons: (1) it is designed by its very terms to be permanent, incapable of ending, since the war itself ironically ensures that there will never come a time when people stop wanting to bring violence back to the US (the operational definition of "terrorism"), and (2) the nation's most powerful political and economic factions reap a bonanza of benefits from its continuation. Whatever else is true, it is now beyond doubt that ending this war is the last thing on the mind of the 2009 Nobel Peace Prize winner and those who work at the highest levels of his administration. Is there any way they can make that clearer beyond declaring that it will continue for "at least" another 10-20 years? The genius of America's endless war machine is that, learning from the unplesantness of the Vietnam war protests, it has rendered the costs of war largely invisible. That is accomplished by heaping all of the fighting burden on a tiny and mostly economically marginalized faction of the population, by using sterile, mechanized instruments to deliver the violence, and by suppressing any real discussion in establishment media circles of America's innocent victims and the worldwide anti-American rage that generates. Though rarely visible, the costs are nonetheless gargantuan. Just in financial terms, as Americans are told they must sacrifice Social Security and Medicare benefits and place their children in a crumbling educational system, the Pentagon remains the world's largest employer and continues to militarily outspend the rest of the world by a significant margin. The mythology of the Reagan presidency is that he induced the collapse of the Soviet Union by luring it into unsustainable military spending and wars: should there come a point when we think about applying that lesson to ourselves?
  • ...3 more annotations...
  • Then there are the threats to Americans' security. Having their government spend decades proudly touting itself as "A Nation at War" and bringing horrific violence to the world is certain to prompt more and more people to want to attack Americans, as the US government itself claims took place just recently in Boston (and as clearly took place multiple other times over the last several years). And then there's the most intangible yet most significant cost: each year of endless war that passes further normalizes the endless rights erosions justified in its name. The second term of the Bush administration and first five years of the Obama presidency have been devoted to codifying and institutionalizing the vast and unchecked powers that are typically vested in leaders in the name of war. Those powers of secrecy, indefinite detention, mass surveillance, and due-process-free assassination are not going anywhere. They are now permanent fixtures not only in the US political system but, worse, in American political culture. Each year that passes, millions of young Americans come of age having spent their entire lives, literally, with these powers and this climate fixed in place: to them, there is nothing radical or aberrational about any of it. The post-9/11 era is all they have been trained to know. That is how a state of permanent war not only devastates its foreign targets but also degrades the population of the nation that prosecutes it.
  • Just to convey a sense for how degraded is this Washington "debate": Obama officials at yesterday's Senate hearing repeatedly insisted that this "war" is already one without geographical limits and without any real conceptual constraints. The AUMF's war power, they said, "stretches from Boston to the [tribal areas of Pakistan]" and can be used "anywhere around the world, including inside Syria, where the rebel Nusra Front recently allied itself with al-Qaida's Iraq affiliate, or even what Sen. Lindsey Graham (R-SC) called 'boots on the ground in Congo'". The acting general counsel of the Pentagon said it even "authorized war against al-Qaida's associated forces in Mali, Libya and Syria". Newly elected independent Sen. Angus King of Maine said after listening to how the Obama administration interprets its war powers under the AUMF: This is the most astounding and most astoundingly disturbing hearing that I've been to since I've been here. You guys have essentially rewritten the Constitution today."
  • In response to that, the only real movement in Congress is to think about how to enact a new law to expand the authorization even further. But it's a worthless and illusory debate, affecting nothing other than the pretexts and symbols used to justify what will, in all cases, be a permanent and limitless war. The Washington AUMF debate is about nothing other than whether more fig leafs are needed to make it all pretty and legal. The Obama administration already claims the power to wage endless and boundless war, in virtually total secrecy, and without a single meaningful check or constraint. No institution with any power disputes this. To the contrary, the only ones which exert real influence - Congress, the courts, the establishment media, the plutocratic class - clearly favor its continuation and only think about how further to enable it. That will continue unless and until Americans begin to realize just what a mammoth price they're paying for this ongoing splurge of war spending and endless aggression.
6More

NSA surveillance may be legal - but it's unconstitutional - The Washington Post - 0 views

  • Laura K. Donohue is a professor at Georgetown University Law Center and director of Georgetown’s Center on National Security and the Law. The National Security Agency’s recently revealed surveillance programs undermine the purpose of the Foreign Intelligence Surveillance Act, which was established to prevent this kind of overreach. They violate the Fourth Amendment’s guarantee against unreasonable search and seizure. And they underscore the dangers of growing executive power.
  • Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online data including e-mails, photographs, documents and connection logs. The information that can be assembledabout any one person — much less organizations, social networks and entire communities — is staggering: What we do, think and believe.The government defends the programs’ legality, saying they comply with FISA and its amendments. It may be right, but only because FISA has ceased to provide a meaningful constraint.Under the traditional FISA, if the government wants to conduct electronic surveillance, it must make a classified application to a special court, identitying or describing the target. It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the facilities to be monitored will be used by the target.In 2008, Congress added section 702 to the statute, allowing the government to use electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court order for each target. A U.S. citizen may not intentionally be targeted.To the extent that the FISC sanctioned PRISM, it may be consistent with the law. But it is disingenuous to suggest that millions of Americans’ e-mails, photographs and documents are “incidental” to an investigation targeting foreigners overseas.
  • Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online data including e-mails, photographs, documents and connection logs. The information that can be assembledabout any one person — much less organizations, social networks and entire communities — is staggering: What we do, think and believe.The government defends the programs’ legality, saying they comply with FISA and its amendments. It may be right, but only because FISA has ceased to provide a meaningful constraint.
  • ...3 more annotations...
  • Under the traditional FISA, if the government wants to conduct electronic surveillance, it must make a classified application to a special court, identitying or describing the target. It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the facilities to be monitored will be used by the target.In 2008, Congress added section 702 to the statute, allowing the government to use electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court order for each target. A U.S. citizen may not intentionally be targeted.To the extent that the FISC sanctioned PRISM, it may be consistent with the law. But it is disingenuous to suggest that millions of Americans’ e-mails, photographs and documents are “incidental” to an investigation targeting foreigners overseas.The telephony metadata program raises similar concerns. FISA did not originally envision the government accessing records. Following the 1995 Oklahoma City bombing, Congress allowed applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further expanded FISA to give the government access to any business or personal records. Under section 215 of the Patriot Act, the government no longer has to prove that the target is a foreign power. It need only state that the records are sought as part of an investigation to protect against terrorism or clandestine intelligence.
  • The telephony metadata program raises similar concerns. FISA did not originally envision the government accessing records. Following the 1995 Oklahoma City bombing, Congress allowed applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further expanded FISA to give the government access to any business or personal records. Under section 215 of the Patriot Act, the government no longer has to prove that the target is a foreign power. It need only state that the records are sought as part of an investigation to protect against terrorism or clandestine intelligence.This means that FISA can now be used to gather records concerning individuals who are neither the target of any investigation nor an agent of a foreign power. Entire databases — such as telephony metadata — can be obtained, as long as an authorized investigation exists.Congress didn’t pass Section 215 to allow for the wholesale collection of information. As Rep. F. James Sensenbrenner Jr. (R-Wis.), who helped draft the statute, wrote in the Guardian: “Congress intended to allow the intelligence communities to access targeted information for specific investigations. How can every call that every American makes or receives be relevant to a specific investigation?”As a constitutional matter, the Supreme Court has long held that, where an individual has a reasonable expectation of privacy, search and seizure may occur only once the government has obtained a warrant, supported by probable cause and issued by a judge. The warrant must specify the places to be searched and items to be seized.
  • There are exceptions to the warrant requirement. In 1979 the court held that the use of a pen register to record numbers dialed from someone’s home was not a search. The court suggested that people who disclose their communications to others assume the risk that law enforcement may obtain the information.More than three decades later, digitization and the explosion of social-network technology have changed the calculus. In the ordinary course of life, third parties obtain massive amounts of information about us that, when analyzed, have much deeper implications for our privacy than before.As for Section 702 of FISA, the Supreme Court has held that the Fourth Amendment does not protect foreigners from searches conducted abroad. But it has never recognized a foreign intelligence exception to the warrant requirement when foreign-targeted searches result in the collection of vast stores of citizens’ communications.Americans reasonably expect that their movements, communications and decisions will not be recorded and analyzed by the government. A majority of the Supreme Court seems to agree. Last year, the court considered a case involving 28-day GPS surveillance. Justice Samuel Alito suggested that in most criminal investigations, long-term monitoring “impinges on expectations of privacy.” Justice Sonia Sotomayor recognized that following a person’s movements “reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.”The FISC is supposed to operate as a check. But it is a secret court, notorious for its low rate of denial. From 1979 to 2002, it did not reject a single application. Over the past five years, out of nearly 8,600 applications, only two have been denied.
2More

Did the White House Help Plan the Syrian Chemical Attack? - 0 views

  •  
    "by Yossef Bodansky excerpt: There is a growing volume of new evidence from numerous sources in the Middle East - mostly affiliated with the Syrian opposition and its sponsors and supporters - which makes a very strong case, based on solid circumstantial evidence, that the August 21, 2013, chemical strike in the Damascus suburbs was indeed a pre-meditated provocation by the Syrian opposition. The extent of US foreknowledge of this provocation needs further investigation because available data puts the "horror" of the Barack Obama White House in a different and disturbing light. On August 13-14, 2013, Western-sponsored opposition forces in Turkey started advance preparations for a major and irregular military surge. Initial meetings between senior opposition military commanders and representatives of Qatari, Turkish, and US Intelligence ["Mukhabarat Amriki"] took place at the converted Turkish military garrison in Antakya, Hatay Province, used as the command center and headquarters of the Free Syrian Army (FSA) and their foreign sponsors. Very senior opposition commanders who had arrived from Istanbul briefed the regional commanders of an imminent escalation in the fighting due to "a war-changing development" which would, in turn, lead to a US-led bombing of Syria. The opposition forces had to quickly prepare their forces for exploiting the US-led bombing in order to march on Damascus and topple the Bashar al-Assad Government, the senior commanders explained. The Qatari and Turkish intelligence officials assured the Syrian regional commanders that they would be provided with plenty of weapons for the coming offensive. Indeed, unprecedented weapons distribution started in all opposition camps in Hatay Province on August 21-23, 2013. In the Reyhanli area alone, opposition forces received well in excess of 400 tons of weapons, mainly anti-aircraft weaponry from shoulder-fired missiles to ammunition for light-guns and machine guns. The weapons were distri
  •  
    "by Yossef Bodansky excerpt: There is a growing volume of new evidence from numerous sources in the Middle East - mostly affiliated with the Syrian opposition and its sponsors and supporters - which makes a very strong case, based on solid circumstantial evidence, that the August 21, 2013, chemical strike in the Damascus suburbs was indeed a pre-meditated provocation by the Syrian opposition. The extent of US foreknowledge of this provocation needs further investigation because available data puts the "horror" of the Barack Obama White House in a different and disturbing light. On August 13-14, 2013, Western-sponsored opposition forces in Turkey started advance preparations for a major and irregular military surge. Initial meetings between senior opposition military commanders and representatives of Qatari, Turkish, and US Intelligence ["Mukhabarat Amriki"] took place at the converted Turkish military garrison in Antakya, Hatay Province, used as the command center and headquarters of the Free Syrian Army (FSA) and their foreign sponsors. Very senior opposition commanders who had arrived from Istanbul briefed the regional commanders of an imminent escalation in the fighting due to "a war-changing development" which would, in turn, lead to a US-led bombing of Syria. The opposition forces had to quickly prepare their forces for exploiting the US-led bombing in order to march on Damascus and topple the Bashar al-Assad Government, the senior commanders explained. The Qatari and Turkish intelligence officials assured the Syrian regional commanders that they would be provided with plenty of weapons for the coming offensive. Indeed, unprecedented weapons distribution started in all opposition camps in Hatay Province on August 21-23, 2013. In the Reyhanli area alone, opposition forces received well in excess of 400 tons of weapons, mainly anti-aircraft weaponry from shoulder-fired missiles to ammunition for light-guns and machine guns. The weapons were distri
7More

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
2More

Lawfare › The NSA Documents: The Entire Series - 0 views

  • Our series on the NSA documents now being complete, I thought I would collect all of the posts together in one place. Here are the documents themselves. And here are our seven posts commenting on them: The Introduction Summary of the October 2011 FISC Opinion Summary of the November 2011 FISC Opinion Summary of the September 2012 FISC Opinion Summary of Statements to Congress Summary of the Minimization Procedures Summary of the Semi-Annual Compliance Report Now that the series is done, I will turn to the question of
  •  
    Someone had the sense and time to collect them all. The linked site has many NSA/privacy research resources 
8More

Boundless Informant: the NSA's secret tool to track global surveillance data | World ne... - 0 views

  • The National Security Agency has developed a powerful tool for recording and analysing where its intelligence comes from, raising questions about its repeated assurances to Congress that it cannot keep track of all the surveillance it performs on American communications. The Guardian has acquired top-secret documents about the NSA datamining tool, called Boundless Informant, that details and even maps by country the voluminous amount of information it collects from computer and telephone networks.
  • The heatmap gives each nation a color code based on how extensively it is subjected to NSA surveillance. The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance).The disclosure of the internal Boundless Informant system comes amid a struggle between the NSA and its overseers in the Senate over whether it can track the intelligence it collects on American communications. The NSA's position is that it is not technologically feasible to do so.
  • A snapshot of the Boundless Informant data, contained in a top secret NSA "global heat map" seen by the Guardian, shows that in March 2013 the agency collected 97bn pieces of intelligence from computer networks worldwide.
  • ...4 more annotations...
  • The focus of the internal NSA tool is on counting and categorizing the records of communications, known as metadata, rather than the content of an email or instant message. The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. One document says it is designed to give NSA officials answers to questions like, "What type of coverage do we have on country X" in "near real-time by asking the SIGINT [signals intelligence] infrastructure."An NSA factsheet about the program, acquired by the Guardian, says: "The tool allows users to select a country on a map and view the metadata volume and select details about the collections against that country."
  • At a hearing of the Senate intelligence committee In March this year, Democratic senator Ron Wyden asked James Clapper, the director of national intelligence: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" "No sir," replied Clapper.
  • Other documents seen by the Guardian further demonstrate that the NSA does in fact break down its surveillance intercepts which could allow the agency to determine how many of them are from the US. The level of detail includes individual IP addresses.
  • Senators have expressed their frustration at the NSA's refusal to supply statistics. In a letter to NSA director General Keith Alexander in October last year, senator Wyden and his Democratic colleague on the Senate intelligence committee, Mark Udall, noted that "the intelligence community has stated repeatedly that it is not possible to provide even a rough estimate of how many American communications have been collected under the Fisa Amendments Act, and has even declined to estimate the scale of this collection."At a congressional hearing in March last year, Alexander denied point-blank that the agency had the figures on how many Americans had their electronic communications collected or reviewed. Asked if he had the capability to get them, Alexander said: "No. No. We do not have the technical insights in the United States." He added that "nor do we do have the equipment in the United States to actually collect that kind of information".
  •  
    Have NSA and other Administration officials perjured themselves in testimony to Congress? It look that way. Next question: will they be prosecuted?  See also related article at and the leaked FAQ on BoundlessInformant itself at . 
5More

Tomgram: Nick Turse, Special Ops Goes Global | TomDispatch - 0 views

  • I started with a blank map that quickly turned into a global pincushion.  It didn’t take long before every continent but Antarctica was bristling with markers indicating special operations forces’ missions, deployments, and interactions with foreign military forces in 2012-2013.  With that, the true size and scope of the U.S. military’s secret military began to come into focus.  It was, to say the least, vast. A review of open source information reveals that in 2012 and 2013, U.S. Special Operations forces (SOF) were likely deployed to -- or training, advising, or operating with the personnel of -- more than 100 foreign countries.   And that’s probably an undercount.  In 2011, then-SOCOM spokesman Colonel Tim Nye told TomDispatch that Special Operations personnel were annually sent to 120 countries around the world. They were in, that is, about 60% of the nations on the planet.  “We’re deployed in a number of locations,” was as specific as Bockholt would ever get when I talked to him in the waning days of 2013. And when SOCOM did finally get back to me with an eleventh hour answer, the number offered made almost no sense. 
  • Despite the lack of official cooperation, an analysis by TomDispatch reveals SOCOM to be a command on the make with an already sprawling reach. As Special Operations Command chief Admiral William McRaven put it in SOCOM 2020, his blueprint for the future, it has ambitious aspirations to create “a Global SOF network of like-minded interagency allies and partners.”  In other words, in that future now only six years off, it wants to be everywhere. 
  • Born of a failed 1980 raid to rescue American hostages in Iran (in which eight U.S. service members died), U.S. Special Operations Command was established in 1987.  Made up of units from all the service branches, SOCOM is tasked with carrying out Washington’s most specialized and secret missions, including assassinations, counterterrorist raids, special reconnaissance, unconventional warfare, psychological operations, foreign troop training, and weapons of mass destruction counter-proliferation operations.
  • ...1 more annotation...
  • In the post-9/11 era, the command has grown steadily.  With about 33,000 personnel in 2001, it is reportedly on track to reach 72,000 in 2014.  (About half this number are called, in the jargon of the trade, “badged operators” -- SEALs, Rangers, Special Operations Aviators, Green Berets -- while the rest are support personnel.)  Funding for the command has also jumped exponentially as SOCOM’s baseline budget tripled from $2.3 billion to $6.9 billion between 2001 and 2013.  If you add in supplemental funding, it had actually more than quadrupled to $10.4 billion.  Not surprisingly, personnel deployments abroad skyrocketed from 4,900 “man-years” -- as the command puts it -- in 2001 to 11,500 in 2013.  About 11,000 special operators are now working abroad at any one time and on any given day they are in 70 to 80 countries, though the New York Times reported that, according to statistics provided to them by SOCOM, during one week in March 2013 that number reached 92. 
  •  
    Nick Turse strikes again. To my knowledge he is the only journalist tracking the aftermath of Obama's decision to deploy U.S. special operations forces globally.
6More

Amend the Federal Reserve: We Need a Central Bank that Serves Main Street | Global Rese... - 0 views

  • December 23rd marks the 100th anniversary of the Federal Reserve. Dissatisfaction with its track record has prompted calls to audit the Fed and end the Fed.  At the least, Congress needs to amend the Fed, modifying the Federal Reserve Act to give the central bank the tools necessary to carry out its mandates. The Federal Reserve is the only central bank with a dual mandate. It is charged not only with maintaining low, stable inflation but with promoting maximum sustainable employment. Yet unemployment remains stubbornly high, despite four years of radical tinkering with interest rates and quantitative easing (creating money on the Fed’s books). After pushing interest rates as low as they can go, the Fed has admitted that it has run out of tools. At an IMF conference on November 8, 2013, former Treasury Secretary Larry Summers suggested that since near-zero interest rates were not adequately promoting people to borrow and spend, it might now be necessary to set interest at below zero. This idea was lauded and expanded upon by other ivory-tower inside-the-box thinkers, including Paul Krugman. Negative interest would mean that banks would charge the depositor for holding his deposits rather than paying interest on them. Runs on the banks would no doubt follow, but the pundits have a solution for that: move to a cashless society, in which all money would be electronic. “This would make it impossible to hoard cash outside the bank,” wrote Danny Vinik in Business Insider, “allowing the Fed to cut interest rates to below zero, spurring people to spend more.”
  • Business Week quotes Douglas Holtz-Eakin, a former director of the Congressional Budget Office: “We’ve had four years of extraordinarily loose monetary policy without satisfactory results, and the only thing they come up with is we need more?” Paul Craig Roberts, former Assistant Secretary of the Treasury, calls the idea “harebrained.” He is equally skeptical of quantitative easing, the Fed’s other tool for stimulating the economy. Roberts points to Andrew Huszar’s explosive November 11th Wall Street Journal article titled “Confessions of a Quantitative Easer,” in which Huszar says that QE was always intended to serve Wall Street, not Main Street.  Huszar’s assignment at the Fed was to manage the purchase of $1.25 trillion in mortgages with dollars created on a computer screen. He says he resigned when he realized that the real purpose of the policy was to drive up the prices of the banks’ holdings of debt instruments, to provide the banks with trillions of dollars at zero cost with which to lend and speculate, and to provide the banks with “fat commissions from brokering most of the Fed’s QE transactions.”
  • Bernanke created debt-free money and bought government debt with it, returning the interest to the Treasury. The result was interest-free credit, a good deal for the government. But the problem, says Lounsbury, is that: The helicopters dropped all the money into a hole in the ground (excess reserve accounts) and very little made its way into the economy.  It was essentially a rearrangement of the balance sheets of the creditor nation with little impact on the debtor nation. . . . The fatal flaw of QE is that it delivers money to the accounts of the creditors and does nothing for the accounts of the debtors. Bad debts remain unserviced and the debt crisis continues.
  • ...2 more annotations...
  • Bernanke delivered the money to the creditors because that was all the Federal Reserve Act allowed. If the Fed is to fulfill its mandate, it clearly needs more tools; and that means amending the Act.  Harvard professor Ken Rogoff, who spoke at the November 2013 IMF conference before Larry Summers, suggested several possibilities; and one was to broaden access to the central bank, allowing anyone to have an ATM at the Fed. Rajiv Sethi, Barnard/Columbia Professor of Economics, expanded on this idea in a blog titled “The Payments System and Monetary Transmission.” He suggested making the Federal Reserve the repository for all deposit banking. This would make deposit insurance unnecessary; it would eliminate the need to impose higher capital requirements; and it would allow the Fed to implement monetary policy by targeting debtor rather than creditor balance sheets. Instead of returning its profits to the Treasury, the Fed could do a helicopter drop directly into consumer bank accounts, stimulating demand in the consumer economy. John Lounsbury expanded further on these ideas. He wrote in Econintersect that they would open a pathway for investment banking and depository banking to be separated from each other, analogous to that under Glass-Steagall. Banks would no longer be too big to fail, since they could fail without destroying the general payment system of the economy. Lounsbury said the central bank could operate as a true public bank and repository for all federal banking transactions, and it could operate in the mode of a postal savings system for the general populace.
  • The Federal Reserve Act was drafted by bankers to create a banker’s bank that would serve their interests. It is their own private club, and its legal structure keeps all non-members out.  A century after the Fed’s creation, a sober look at its history leads to the conclusion that it is a privately controlled institution whose corporate owners use it to direct our entire economy for their own ends, without democratic influence or accountability.  Substantial changes are needed to transform the Fed, and these will only come with massive public pressure. Congress has the power to amend the Fed – just as it did in 1934, 1958 and 2010. For the central bank to satisfy its mandate to promote full employment and to become an institution that serves all the people, not just the 1%, the Fed needs fundamental reform.
  •  
    In my view, the Fed is beyond salvage. It needs abolition, not a new role. The Constitution grants Congress the power to mint and coin money, not a group of rent-seeking banksters. 
12More

N.S.A. Spied on Allies, Aid Groups and Businesses - NYTimes.com - 0 views

  • Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.
  • While the names of some political and diplomatic leaders have previously emerged as targets, the newly disclosed intelligence documents provide a much fuller portrait of the spies’ sweeping interests in more than 60 countries. Britain’s Government Communications Headquarters, working closely with the National Security Agency, monitored the communications of senior European Union officials, foreign leaders including African heads of state and sometimes their family members, directors of United Nations and other relief programs, and officials overseeing oil and finance ministries, according to the documents. In addition to Israel, some targets involved close allies like France and Germany, where tensions have already erupted over recent revelations about spying by the N.S.A.
  • Details of the surveillance are described in documents from the N.S.A. and Britain’s eavesdropping agency, known as GCHQ, dating from 2008 to 2011. The target lists appear in a set of GCHQ reports that sometimes identify which agency requested the surveillance, but more often do not. The documents were leaked by the former N.S.A. contractor Edward J. Snowden and shared by The New York Times, The Guardian and Der Spiegel. The reports are spare, technical bulletins produced as the spies, typically working out of British intelligence sites, systematically tapped one international communications link after another, focusing especially on satellite transmissions. The value of each link is gauged, in part, by the number of surveillance targets found to be using it for emails, text messages or phone calls. More than 1,000 targets, which also include people suspected of being terrorists or militants, are in the reports. It is unclear what the eavesdroppers gleaned. The documents include a few fragmentary transcripts of conversations and messages, but otherwise contain only hints that further information was available elsewhere, possibly in a larger database.
  • ...8 more annotations...
  • Ms. Hansen, the spokeswoman for the European Commission, said that it was already engaged in talks with the United States that were “needed to restore trust and confidence in the trans-Atlantic relationship.” She added that “the commission will raise these new allegations with U.S. and U.K. authorities.”
  • Also appearing on the surveillance lists is Joaquín Almunia, vice president of the European Commission, which, among other powers, has oversight of antitrust issues in Europe. The commission has broad authority over local and foreign companies, and it has punished a number of American companies, including Microsoft and Intel, with heavy fines for hampering fair competition. The reports say that spies intercepted Mr. Almunia’s communications in 2008 and 2009. Mr. Almunia, a Spaniard, assumed direct authority over the commission’s antitrust office in 2010. He has been involved in a three-year standoff with Google over how the company runs its search engine. Competitors of the online giant had complained that it was prioritizing its own search results and using content like travel reviews and ratings from other websites without permission. While pushing for a settlement with Google, Mr. Almunia has warned that the company could face large fines if it does not cooperate.
  • Some condemned the surveillance on Friday as unjustified and improper. “This is not the type of behavior that we expect from strategic partners,” Pia Ahrenkilde Hansen, a spokeswoman for the European Commission, said on the latest revelations of American and British spying in Europe. Some of the surveillance relates to issues that are being scrutinized by President Obama and a panel he appointed in Washington that on Wednesday recommended tighter limits on the N.S.A., particularly on spying of foreign leaders, especially allies.
  • “We do not use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line,” said Vanee Vines, an N.S.A. spokeswoman. But she added that some economic spying was justified by national security needs. “The intelligence community’s efforts to understand economic systems and policies, and monitor anomalous economic activities, are critical to providing policy makers with the information they need to make informed decisions that are in the best interest of our national security,” Ms. Vines said.
  • The surveillance reports show American and British spies’ deep appetite for information. The French companies Total, the oil and gas giant, and Thales, an electronics, logistics and transportation outfit, appear as targets, as do a French ambassador, an “Estonian Skype security team” and the German Embassy in Rwanda.
  • Multiple United Nations Missions in Geneva are listed as targets, including Unicef and the United Nations Institute for Disarmament Research. So is Médecins du Monde, a medical relief organization that goes into war-ravaged areas. Leigh Daynes, an executive director of the organization in Britain, responded to news about the surveillance by saying: “There is absolutely no reason for our operations to be secretly monitored.” More obvious intelligence targets are also listed, though in smaller numbers, including people identified as “Israeli grey arms dealer,” “Taleban ministry of refugee affairs” and “various entities in Beijing.” Some of those included are described as possible members of Al Qaeda, and as suspected extremists or jihadists.
  • While few if any American citizens appear to be named in the documents, they make clear that some of the intercepted communications either began or ended in the United States and that N.S.A. facilities carried out interceptions around the world in collaboration with their British partners. Some of the interceptions appear to have been made at the Sugar Grove, W.Va., listening post run by the N.S.A. and code-named Timberline, and some are explicitly tied to N.S.A. target lists in the reports.
  • Strengthening the likelihood that full transcripts were taken during the intercepts is the case of Mohamed Ibn Chambas, an official of the Economic Community of West African States, known as Ecowas, a regional initiative of 15 countries that promotes economic and industrial activity. Whether intentionally or through some oversight, when Mr. Chambas’s communications were intercepted in August 2009, dozens of his complete text messages were copied into one of the reports.
  •  
    No mention of any "terrorist" targets. Could it be that Snowden and Greenwald are right, that the surveillance is not about terrorism at all? Surely our nation's leaders would not lie to us about that. Right. The Politics of Fear.
4More

NSA Spied on World Bank, IMF, UN, Pope, World Leaders, and American Politicians and Mil... - 0 views

  • He says the NSA started spying on President Obama when he was a candidate for Senate: 
  • Another very high-level NSA whistleblower – the head of the NSA’s global intelligence gathering operation – says that the NSA targeted CIA chief Petraeus. Of course, the NSA also spied on the leaders of Germany, Brazil and Mexico, and at least 35 world leaders total. The NSA also spies on the European Union, the European Parliament, the G20 summit and other allies.
  • The NSA conducts widespread industrial espionage on our allies. That has nothing to do with terrorism, either.  And the  NSA’s industrial espionage has been going on for many decades.
  •  
    Nice collection of links in a list of targets of NSA surveillance. 
3More

The Handover - An FP Slideshow | Foreign Policy - 0 views

  • Tuesday marked a milestone for the 12-year-old war in Afghanistan, with NATO forces officially handing over responsibility for the country's security to Afghan government forces. Since 2010, when President Barack Obama accelerated training as part of his rapid surge of forces into the country, the Afghan National Army has grown from around 100,000 members to 195,000. But it still faces a number of challenges, including a desertion rate so high that it needs 50,000 new recruits every year to replace those who leave). In December 2012, a Pentagon report determined that only one of the Afghan military's 23 brigades was able to operate effectively without NATO support. Now, Afghan troops will have to do just that; except in rare cases, they will no longer be able to rely on the support of U.S. warplanes, medical evacuation helicopters, or ground troops.
  • Tuesday marked a milestone for the 12-year-old war in Afghanistan, with NATO forces officially handing over responsibility for the country's security to Afghan government forces. Since 2010, when President Barack Obama accelerated training as part of his rapid surge of forces into the country, the Afghan National Army has grown from around 100,000 members to 195,000. But it still faces a number of challenges, including a desertion rate so high that it needs 50,000 new recruits every year to replace those who leave). In December 2012, a Pentagon report determined that only one of the Afghan military's 23 brigades was able to operate effectively without NATO support. Now, Afghan troops will have to do just that; except in rare cases, they will no longer be able to rely on the support of U.S. warplanes, medical evacuation helicopters, or ground troops. Here's a look back at the long preparation for this week's big handover. An Afghan National Army soldier assigned to the Mobile Strike Force Kandak fires an RPG-7 rocket-propelled grenade launcher during a live-fire exercise supervised by Marines Team on Camp Shorabak, Helmand province, Afghanistan on May 20, 2013.
  •  
    Here in one paragraph are a lot of the reasons two of Obama's claims about U.S. plans in Afghanistan cannot both be true: [i] all U.S. -and NATO combat troops will be withdrawn from Afghanistan by the end of 2014; and [ii] a fairly large contingent of U.S. non-combat troops will remain on U.S. bases in Afghanistan to advise, train, and support the Karzai government's defense forces.  1. The "surge" didn't work even though Obama sent more troops than the military had requested. Even at the peak of U.S. forces in that country, the U.S. military had been beaten back into enclaves by the Taliban. Nonetheless, Obama has  continued to draw down U.S. forces there. NATO allies have been pulling up their tent pegs too. 2. The Afghan government forces are utterly incapable of holding out against the Taliban without strong NATO backing that Obama says is ending. 3. Therefore, a small non-combatant U.S. force left behind after 2014 would be virtually defenseless if left behind. There seems to be no question that U.S. involvement in Afghanistan is winding down steadily. And Obama isn't dumb enough to have a few thousand U.S. troops stay behind to be slaughtered. So his "stay behind" claims are a bluff. The Taliban can read those tea leaves at least as well as I can. This is Vietnam War Redux, also a repeat of the Soviet retreat from Afghanistan. Obama has no credible stick to wield in negotiations with the Taliban. Therefore, the negotiations are either a sham or Obama has to offer the Taliban a carrot of suitable size. The Taliban has no incentive to participate in a sham; they've won their war and the U.S. departure is imminent. Therefore, we need consider what carrot Obama might offer the Taliban. A better royalty agreement on the sidetracked Trans-Afghanistan Pipeline that would supply India with natural gas? .  That doesn't seem enough.  But a consortium of western investors willing to pay royalties t
12More

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
2More

US Backing for 'Moderate' Syrian Rebels: Long Reported, Continually Forgotten - 0 views

  • That the US is arming and training Syrian rebels has been well-documented for over two years, yet Western media have historically suffered from a strange collective amnesia when reporting this fact. As Ian Sinclair noted last September in the Huffington Post (9/23/14): In mid-2012, the most influential newspaper in the world reported the US was helping to arm the rebels–a fact confirmed by subsequent stories in the New York Times itself, as well as numerous reports in other mainstream news outlets around the world. Contrast this publicly available, easily accessed information with these summaries from the mainstream media of the ongoing US role in Syria…:
  •  
    Nicely and throughly documented expose of false reporting in mainstream media about U.S. arming and traning the "moderate" Syrian opposition since 2013.  
10More

Top US and Saudi Officials responsible for Chemical Weapons in Syria | nsnbc international - 0 views

  • On 21 August 2013, the Syrian Arab Army launched a major military campaign in Damascus. The campaign, called “Operation Shield of the Capital”, was the largest military operation of the Syrian Arab Army in the Damascus region since the beginning of the war in 2011.
  • Although U.S. Intelligence reports repeatedly stressed that the opposition was incapable of launching a major, well coordinated attack, the Syrian Army in Damascus was confronted with an organized fighting force of 25.000 men under arms. The Saudi Arabia backed Jihadist front had amassed 25.000 fighters, organized in 13 battalions or kitab, to to launch a major assault against the capital Damascus. Most of the battalions belonged to Jabhat al-Nusrah and Liwa-al-Islam. The other battalions that took part in the campaign, were the Abou Zhar al-Ghaffari, al-Ansar, al-Mohajereen, Daraa al-Sham, Harun al-Rashid, Issa bin Mariam, Sultan Mohammad al-Fatih, Syouf al-Haqq, the Glory of the Caliphate, the Jobar Martyrs. During the night of 20 to 21 August and during the early morning hours of 21 August, the Syrian Arab Army broke through the insurgent lines in the area near the Jobar entrance. The breakthrough resulted in a collapse of the jihadists defensive positions and to a crushing and decisive strategic defeat of the Jabhat al-Nusrah led brigades.
  • Loosing Jobar effectively cut off the insurgents connection to the Jordanian border town of Al-Mafraq, the most important logistical base for the insurgents as well as for Saudi Arabia and the United States in Jordan. Al-Mafraq was already used as a major staging ground for the two failed attempts to conquer the city of Homs in June and July 2012. In 2012 al-Mafraq became the staging ground for some 40.000 fighters; more than 20.000 of them fought under the Libyan Islamic Fighting Group, which was under the command of Abdelhakim Belhadj and his second in command, Mahdi al-Harati. The CIA maintains a station, US Special Forces (JSOC) train insurgents, and several other US institutions are present in al-Mafraq. The point is of particular importance with regards to the visit of the U.S. Chairman of the Joint Chiefs of Staff to Jordan, which will be detailed below. Al-Mafraq has been the major transit point for Saudi and U.S. arms shipments since 2012, and the delivery of advanced Saudi and U.S. weapons to the insurgents since early August 2013.
  • ...6 more annotations...
  • The collapse of the insurgent front prompted the front commanders, most of which work in liaison to U.S. Special Forces, to deploy an elite force that should prevent the Syrian Army, at all costs, from gaining access to the Jobar Entrance, and from gaining control over the Jobar area. The majority of the insurgent crack forces came from Liwa-al-Islam with some additional troops from Jabhat al-Nusrah. The commanding officer of the elite forces was a Saudi national who is known by the name Abu Ayesha, whom eyewitnesses from Ghouta later identified as Abu Abdul-Moneim. Abdul-Moneim had established a cache of weapons, some of which had a tube-like structure, and others which looked like big gas bottles. The cache was located in a tunnel in the Eastern Ghouta district of Damascus. Reports about this tunnel and the weapons cache emerged in international media, after the son of Abdul-Moneim and 12 other fighters lost their lives there, because they mishandled improvised chemical weapons and caused a leak in one of them. Besides Abu Abdul-Moneim, the supreme leader of the Liwa-al-Islam and commander of their chemical weapons specialists, Zahran Alloush took personal charge of the elite troops and chemical weapons specialists who were operating under his direct command. Liwa-al-Islam has, along with other al-Qaeda brigades, the capability to manufacture and launch primitive, but none the less very deadly chemical weapons. The chemical weapons which Zahran Alloush had delivered to Damascus were most likely from al-Qaeda’s (ISIL) chemical weapons stockpiles in Iraq.
  • In early September 2013, Iran’s Foreign Minister Mohammad Javad Zarif stated, that Iran had sent a memo to the White House via the Swiss Embassy in Tehran. Tehran had reportedly informed the USA that handmade articles for chemical weapons, including Sarin gas, were being transferred to Syria. The White House failed to respond. Having to hold the Jobar Entrance and the Jobar district of Damascus “at any cost to maintain any hopes of launching a successful, major military assault on Damascus”, the insurgent commanders decided to launch a chemical weapons attack to halt the advance of the Syrian Arab Army. The political and military opposition and core members of the international alliance behind them had already decided that chemical weapons should be used in August – September. The large scale use of chemical weapons should justify renewed calls for a military intervention. Intelligence about this decision transpired in June.  nsnbc international issued several reports in late June and early July, warning that the insurgents would use large scale chemical weapons attacks in August or September.
  • The decision to launch the chemical weapon on 21 August was most likely based on two considerations. That the use of chemical weapons was already planned. That the Jobar Entrance should be defended at all costs. The final decision, made by Zahran Alloush may in fact have been predetermined together with his U.S. – Saudi liaison officers. Launching a chemical weapons attack would allow the USA, UK and France, to call for military strikes against Syria and to turn the tide. Also, Russian and Syrian intelligence sources described the weapons which were used in the attack as rockets which were altered so as to carry chemicals, launched by Liwa-al-Islam. The projectiles were most likely fired from a flatbed.
  • There is a growing and substantial amount of evidence that indicates direct U.S. and Saudi involvement in the chemical weapons attack. To begin with one merely has to answer the fundamental question “Who Benefits”, and the answer is definitely not “the Syrian government”. In fact, the  Federal German Intelligence Service (BND) claims that it has intercepted phone calls between Syrian officers and the Syrian High Command. The BND is convinced that none of the Syrian forces have used a chemical weapon. Leaving alone any moral considerations, the domestic and international repercussions were foreseeable and there would not have been any strategic benefit for the Syrian Army or the government.
  • Also, the involvement of Saudi Arabia ultimately points towards Washington and the White House. The involvement of Liwa-al-Islam in the chemical weapons attack establishes a strong chain of circumstantial evidence to the Saudi Intelligence Chief Prince Bandar bin Sultan. The supreme leader of Liwa-al-Islam and commander of the groups’ chemical weapons specialists, Zahran Alloush, has been working for the then Saudi Intelligence Chief Prince Turki al-Faisal in both Afghanistan and Yemen in the 1980s. Since the 1990s, Alloush was involved in the Salafist – Wahabbist terrorist networks in Syria which led to his arrest by Syrian intelligence. He was released in early of 2011, when the Assad administration granted a general amnesty. Immediately after his March 2011 release from prison, Zahran Alloush began receiving substantial funds and weapons from Saudi intelligence, which enabled him to establish Liwa-al-Islam as a de facto Saudi Arabia sponsored mercenary brigade under the auspices of the Saudi Interior Ministry.
  • Saudi funding enabled Alloush to establish the Liwa-al-Islam as a major fighting force in Syria. The group gained fame due to risky, high-profile attacks. On 8 July 2012, the group carried out a bomb attack against the headquarters of Syria’s National Security Council in Rawda Square, Damascus. The group succeeded in assassinating several high profile members of Syria’s security establishment, including the Deputy Minister of Defense and brother-in-law of President Bashar al-Assad, Assaf Shawkat, Defense Minister Dawoud Rajiha, Hassan Turkmani, a former Defense Minister and military adviser to then Vice-President Farouk al-Sharaa.
  •  
    One I had missed before. Whodunnit on the Ghouta, Syria sarin gas attack, right down to the unit commander, a Saudi intelligence asset working with a U.S. Special Forces unit, both controlled by the U.S.-led command and control center in Jordan.   
2More

Multiple New Polls Show Americans Reject Wholesale NSA Domestic Spying | Electronic Fro... - 0 views

  • Yesterday, the Guardian released a comprehensive poll showing widespread concern about NSA spying. Two-thirds of Americans think the NSA's role should be reviewed. The poll also showed Americans demanding accountability and more information from public officials—two key points of our recently launched stopwatching.us campaign. But there's more. So far, Gallup has one of the better-worded questions, finding that 53% of Americans disapprove of the NSA spying. A CBS poll also showed that a majority—at 58%—of Americans disapprove of the government "collecting phone records of ordinary Americans." And Rasmussen—though sometimes known for push polling—also recently conducted a poll showing that 59% of Americans are opposed to the current NSA spying.
  • The only poll showing less than a majority on the side of government overreach was Pew Research Center, which asked Americans whether it was acceptable that the NSA obtained "secret court orders to track the calls of millions of Americans to investigate terrorism." Pew reported that 56% of Americans said it was "acceptable." But the question is poorly worded. It doesn't mention the widespread, dragnet nature of the spying. It also neglects to describe the "information" being given—metadata, which is far more sensitive and can provide far more information than just the ability to "track the calls" of Americans. And it was conducted early on in the scandal, before it was revealed that the NSA doesn't even have to obtain court orders to search already collected information. Despite the aggregate numbers, many of the polls took place at the same time Americans were finding out new facts about the program. More questions must be asked. And if history is any indication, the American people will be finding out much more. Indeed, just today the Guardian reported that its working on a whole new series with even more NSA revelations about spying. One thing is definitely clear: the American public is demanding answers and needs more information. That's why Congress must create a special investigatory committee to reveal the full extent of the programs. Democracy demands it. Go here to take action. 
4More

Big Pharma Accused Of Illegal Price-Fixing, What You're Not Being Told - 0 views

  • A lawsuit filed Thursday in the U.S. District Court for the District of Connecticut alleges Heritage Pharmaceuticals, EpiPen-maker Mylan NV, and others conspired to manipulate U.S. drug prices. The suit was filed on behalf of the states of Connecticut, Delaware, Florida, Hawaii, Idaho, Iowa, Kansas, and at least 12 others. Naming Heritage Pharmaceuticals Inc. as the “ringleader” of the alleged conspiracy, the suit claims the prices of doxycycline hyclate, an antibiotic, and glyburide, a treatment drug for diabetics, were kept artificially high due to a scheme involving Mylan, Mayne Pharma, Aurobindo Pharma, Teva Pharmaceuticals, and Citron Pharma LLC. Federal prosecutors claim the price-fixing scheme was orchestrated by executives who have left Heritage. The suit is part of an ongoing, two-year long antitrust investigation conducted by the U.S. Department of Justice. According to the New York Attorney General’s Office, former Heritage executives Jeffrey Glazer and Jason Malek conspired with others to avoid competition by “[entering] into numerous illegal conspiracies in order to unreasonably restrain trade, artificially inflate and manipulate prices and reduce competition.” By resorting to price-fixing, companies involved may have believed they would secure their market shares without presenting a major risk to one another. This alleged scheme, the suit argues, has caused “significant, lasting and ultimately harmful rippling effect in the United States healthcare system.” The 20 states named as plaintiffs in the suit claim the companies were aware of the legal ramifications of their actions and took steps to hide their intent and actions as soon as the investigation was launched.
  • Recently, Mylan was chastised for inflating the price of the EpiPen, a device used to combat life-threatening allergic reactions. As Anti-Media reported in August, news organizations “had a field day” when reports showed the price of the autoinjector had gone from $57 each in 2007 to $600 for a double package in 2016. During a hearing before Congress over the EpiPen scandal, Mylan CEO Heather Bresch called the outraged reactions to the price hike “overblown.” Adding that the price of the autoinjectors wouldn’t change anytime soon, Bresch defended the company’s decision, claiming “[Mylan]’s profit on its $609 EpiPen two-packs is about $50 per pen.” When examining Mylan’s involvement in politics since Bresch was named the company’s executive, it becomes apparent that Mylan may have had the opportunity to approach regulators from a privileged position due to the fact Sen. Joe Manchin (D-WV) is the CEO’s father. By 2010, the Food and Drug Administration (FDA) had changed federal guidelines associated with epinephrine prescriptions, allowing Mylan to change its EpiPen labels. By shifting packaging and selling twin-packs instead of single pens while marketing the devices to “anyone at risk,” Mylan widened the EpiPen market. In 2013, a congressional bill pressuring states to have stocks of EpiPens on hand was signed into law. It was conceived after a local seven-year-old died due to an allergic reaction to peanuts.
  • Mylan lobbied heavily for this bill and spent over $1 million that year alone in lobbying efforts. Due to this legislative success, up to 47 states now “require or encourage schools to stock the devices.” But as the company led the fight to introduce the EpiPen to a larger audience, it also led a legal battle to bring its competitors to their knees by influencing regulation that artificially raises costs of doing business for other companies. From our August report: “In 2009, Pfizer Inc., the world’s biggest drugmaker, and Mylan sued Teva Pharmaceutical Industries Ltd. over a patent infringement. At the time, the Israeli company was accused of using Mylan’s design without permission. But in 2012, both parties reached an agreement, and Teva was allowed to seek approval from the FDA for its epinephrine injecting device. “According to Gizmodo, Teva has failed to obtain approval from the FDA to develop affordable generic versions of the EpiPen. The company says it won’t try to go through the same process again until 2017. “The only other device that was closer to competing with Mylan’s EpiPen was Auvi-Q, and it was also driven out of the market. In 2015, the company launched a recall campaign claiming the devices could be delivering faulty dosages.”
  • ...1 more annotation...
  • What this story shows us is that if companies conspire among themselves to keep competitors at bay, the federal government will accuse them of breaking antitrust laws. But when Congress approves increased regulation, effectively barring smaller companies from competing while creating monopolies, price-fixing is perfectly acceptable. Instead of a lawsuit against Heritage and Mylan, how about the People v. United States Congress? After all, if it weren’t for their relentless pursuit of special interest protections, companies wouldn’t have turned into the conglomerates they have become.
8More

U.S. Military and Intelligence Officials to Obama: "Assad NOT Responsible for Chemical ... - 1 views

  • MEMORANDUM FOR: The President FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Is Syria a Trap? Precedence: IMMEDIATE We regret to inform you that some of our former co-workers are telling us, categorically, that contrary to the claims of your administration, the most reliable intelligence shows that Bashar al-Assad was NOT responsible for the chemical incident that killed and injured Syrian civilians on August 21, and that British intelligence officials also know this. In writing this brief report, we choose to assume that you have not been fully informed because your advisers decided to afford you the opportunity for what is commonly known as “plausible denial.” We have been down this road before – with President George W. Bush, to whom we addressed our first VIPS memorandumimmediately after Colin Powell’s Feb. 5, 2003 U.N. speech, in which he peddled fraudulent “intelligence” to support attacking Iraq. Then, also, we chose to give President Bush the benefit of the doubt, thinking he was being misled – or, at the least, very poorly advised.
  • The fraudulent nature of Powell’s speech was a no-brainer. And so, that very afternoon we strongly urged your predecessor to “widen the discussion beyond …  the circle of those advisers clearly bent on a war for which we see no compelling reason and from which we believe the unintended consequences are likely to be catastrophic.” We offer you the same advice today. Our sources confirm that a chemical incident of some sort did cause fatalities and injuries on August 21 in a suburb of Damascus. They insist, however, that the incident was not the result of an attack by the Syrian Army using military-grade chemical weapons from its arsenal. That is the most salient fact, according to CIA officers working on the Syria issue. They tell us that CIA Director John Brennan is perpetrating a pre-Iraq-War-type fraud on members of Congress, the media, the public – and perhaps even you. We have observed John Brennan closely over recent years and, sadly, we find what our former colleagues are now telling us easy to believe. Sadder still, this goes in spades for those of us who have worked with him personally; we give him zero credence. And that goes, as well, for his titular boss, Director of National Intelligence James Clapper, who has admitted he gave “clearly erroneous” sworn testimony to Congress denying NSA eavesdropping on Americans.
  • That Secretary of State John Kerry would invoke Clapper’s name this week in Congressional testimony, in an apparent attempt to enhance the credibility of the four-page “Government Assessment” strikes us as odd. The more so, since it was, for some unexplained reason, not Clapper but the White House that released the “assessment.” This is not a fine point. We know how these things are done. Although the “Government Assessment” is being sold to the media as an “intelligence summary,” it is a political, not an intelligence document. The drafters, massagers, and fixers avoided presenting essential detail. Moreover, they conceded upfront that, though they pinned “high confidence” on the assessment, it still fell “short of confirmation.”
  • ...3 more annotations...
  • There is a growing body of evidence from numerous sources in the Middle East — mostly affiliated with the Syrian opposition and its supporters — providing a strong circumstantial case that the August 21 chemical incident was a pre-planned provocation by the Syrian opposition and its Saudi and Turkish supporters. The aim is reported to have been to create the kind of incident that would bring the United States into the war. According to some reports, canisters containing chemical agent were brought into a suburb of Damascus, where they were then opened. Some people in the immediate vicinity died; others were injured. We are unaware of any reliable evidence that a Syrian military rocket capable of carrying a chemical agent was fired into the area. In fact, we are aware of no reliable physical evidence to support the claim that this was a result of a strike by a Syrian military unit with expertise in chemical weapons. In addition, we have learned that on August 13-14, 2013, Western-sponsored opposition forces in Turkey started advance preparations for a major, irregular military surge. Initial meetings between senior opposition military commanders and Qatari, Turkish and U.S. intelligence officials took place at the converted Turkish military garrison in Antakya, Hatay Province, now used as the command center and headquarters of the Free Syrian Army (FSA) and their foreign sponsors.
  • Senior opposition commanders who came from Istanbul pre-briefed the regional commanders on an imminent escalation in the fighting due to “a war-changing development,” which, in turn, would lead to a U.S.-led bombing of Syria. At operations coordinating meetings at Antakya, attended by senior Turkish, Qatari and U.S. intelligence officials as well as senior commanders of the Syrian opposition, the Syrians were told that the bombing would start in a few days. Opposition leaders were ordered to prepare their forces quickly to exploit the U.S. bombing, march into Damascus, and remove the Bashar al-Assad government The Qatari and Turkish intelligence officials assured the Syrian regional commanders that they would be provided with plenty of weapons for the coming offensive. And they were. A weapons distribution operation unprecedented in scope began in all opposition camps on August 21-23. The weapons were distributed from storehouses controlled by Qatari and Turkish intelligence under the tight supervision of U.S. intelligence officers.
  • We hope your advisers have warned you that retaliation for attacks on Syrian are not a matter of IF, but rather WHERE and WHEN. Retaliation is inevitable. For example, terrorist strikes on U.S. embassies and other installations are likely to make what happened to the U.S. “Mission” in Benghazi on Sept. 11, 2012, look like a minor dust-up by comparison. One of us addressed this key consideration directly a week ago in an article titled “Possible Consequences of a U.S. Military Attack on Syria – Remembering the U.S. Marine Barracks Destruction in Beirut, 1983.”
  •  
    This report by Veteran Intelligence Professionals for Sanity is almost certainly the most credible report contradicting the White House's "intelligence summary" that included zero evidence supporting the claim that Syrian government forces had unleashed the August 21, 2013 chemical attack in Ghoutu, near Damascus and less than five miles away from the just-arrived UN investigative team.  Spread it far and wide. 
  •  
    Wow!! The cover-up of this false flag operation designed to get us into another civil war is incredible. Yet the truth continues to leak out. The ruling elites must be so pissed right now. The Internet is changing the world balance of power - in real time no less. And we are witness. Awesome stuff Paul.
4More

On Obama's cancellation of summit with Putin and extradition [ Glenn Greenwald | Commen... - 0 views

  • Former Bush-era CIA and NSA director Michael Hayden appeared on CNN this week and confirmed that our reporting on the NSA's X-Keyscore program was accurate, telling the nation that we should all be grateful for those capabilities.NYU journalism professor Jay Rosen has a superb essay on the behavior of the US media in NSA stories.Foreign Policy CEO and Editor David Rothkopf becomes the latest establishment figure to recognize, as he puts it in a quite good column: "I have myself been too slow to recognize that the benefits we have derived from Snowden's revelations substantially outweigh the costs associated with the breach."
  • Meanwhile, 150 press freedom and human rights groups from around the world issued a letter demanding that the US cease prosecuting Snowden on the ground that "Snowden's disclosures have triggered a much-needed public debate about mass surveillance online everywhere" and "thanks to him, we have learned the extent to which our online lives are systematically monitored by governments, without transparency, accountability or safeguards from abuse."
  • Finally, Princeton University international law professor Richard Falk has an Op-Ed today explaining that the granting of asylum to Snowden wasn't just within Russia's rights, but was legally compelled.
  • ...1 more annotation...
  • The US frequently refuses extradition requests where, unlike with Snowden, it involves serious crimes and there is an extradition treaty
4More

Michael Hayden talks to CNN about XKEYSCORE program. - 0 views

  • Does the NSA really operate a vast database that allows its analysts to sift through millions of records showing nearly everything a user does on the Internet, as was recently reported? Yes, and people should stop worrying and learn to love it, according former NSA chief Gen. Michael Hayden. Last week, the Guardian published a series of leaked documents revealing new details about an NSA surveillance program called XKEYSCORE. The newspaper said that the program enabled the agency to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals,” and secret slides dated 2008 showed how people could be deemed a target for searching the Web for “suspicious stuff” or by using encryption. Following the disclosures, Hayden appeared on CNN to discuss the agency’s surveillance programs. The general, who directed the NSA from 1999 through 2005, was remarkably candid in his responses to Erin Burnett’s questions about the Guardian’s XKEYSCORE report. Was there any truth to claims that the NSA is sifting through millions of browsing histories and able to collect virtually everything users do on the Internet? “Yeah,” Hayden said. “And it's really good news.”
  • Not only that, Hayden went further. He revealed that the XKEYSCORE was “a tool that's been developed over the years, and lord knows we were trying to develop similar tools when I was at the National Security Agency.” The XKEYSCORE system, Hayden said, allows analysts to enter a “straight-forward question” into a computer and sift through the “oceans of data” that have been collected as part of foreign intelligence gathering efforts. How this process works was illustrated in the Guardian’s report. Analysts can enter search terms to sift through data and select from a drop-down menu a target’s “foreignness factor,” which is intended to minimize the warrantless surveillance of Americans. However, operating a vast electronic dragnet such as this is far from an exact science, and the NSA’s system of sifting data from the backbone of international Internet networks likely sometimes involves gobbling up information on Americans’ communications and online activity—whether it is done wittingly or not. Indeed, the NSA reportedly only needs to have 51 percent certainty that it is targeting a foreigner. And as leaked secret rules for the surveillance have shown, even if the NSA does “inadvertently” gather Americans’ communications, it can hold on to them if they are deemed valuable for vague “foreign intelligence” purposes or if the communications show evidence of a crime that has occurred or may occur in the future.
  • In the CNN interview, Hayden described XKEYSCORE as “really quite an achievement” and said that it enabled NSA spies to find the needle in the haystack. But his ardent defense of the system is unlikely to reassure civil liberties advocates. Having Hayden’s support is a rather dubious stamp of approval, particularly because he was responsible for leading the NSA’s illegal warrantless wiretapping program, which was initiated post-9/11 and exposed by the New York Times in 2005. Hayden later went on to lead the CIA from 2006 through 2009, where he oversaw the use of the waterboarding torture technique and the operation of a controversial black-site prison program that was eventually dismantled by President Obama. The former NSA chief retired in 2009, but he has since become a regular media commentator, using a recent column at CNN to blast Snowden for leaking the secret NSA documents and implying that he’d like to see the Guardian journalist Glenn Greenwald prosecuted as a “co-conspirator” for his role reporting the surveillance scoops.
  •  
    Let's see, the entire U.S. military has been forbidden from reading The Guardian because the documents Edward Snowden leaked are still classified. But a former NSA chief can confirm their accuracy on CNN?  Surely, even as I write a grand jury is busy indicting him on Espionage Act charges? No? Smells like hypocrisy to me. 
‹ Previous 21 - 40 of 1378 Next › Last »
Showing 20 items per page