Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 2015

Rss Feed Group items tagged

Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

New Leak Of Final TPP Text Confirms Attack On Freedom Of Expression, Public Health - 0 views

  • Offering a first glimpse of the secret 12-nation “trade” deal in its final form—and fodder for its growing ranks of opponents—WikiLeaks on Friday published the final negotiated text for the Trans-Pacific Partnership (TPP)’s Intellectual Property Rights chapter, confirming that the pro-corporate pact would harm freedom of expression by bolstering monopolies while and injure public health by blocking patient access to lifesaving medicines. The document is dated October 5, the same day it was announced in Atlanta, Georgia that the member states to the treaty had reached an accord after more than five years of negotiations. Aside from the WikiLeaks publication, the vast majority of the mammoth deal’s contents are still being withheld from the public—which a WikiLeaks press statement suggests is a strategic move by world leaders to forestall public criticism until after the Canadian election on October 19. Initial analyses suggest that many of the chapter’s more troubling provisions, such as broader patent and data protections that pharmaceutical companies use to delay generic competition, have stayed in place since draft versions were leaked in 2014 and 2015. Moreover, it codifies a crackdown on freedom of speech with rules allowing widespread internet censorship.
Paul Merrell

Obama May Find It Impossible to Mend Frayed Ties to Netanyahu - NYTimes.com - 0 views

  • But now that Mr. Netanyahu has won after aggressively campaigning against a Palestinian state and Mr. Obama’s potential nuclear deal with Iran, the question is whether the president and prime minister can ever repair their relationship — and whether Mr. Obama will even try.On Wednesday, part of the answer seemed to be that the president would not make the effort. Continue reading the main story Related Coverage Win in Israel Sets Netanyahu on Path to Rebuild and Redefine GovernmentMARCH 18, 2015 Palestinian Leaders See Validation of Their Statehood EffortMARCH 18, 2015 Netanyahu Soundly Defeats Chief Rival in Israeli ElectionsMARCH 17, 2015 News Analysis: Deep Wounds and Lingering Questions After Israel’s Bitter RaceMARCH 17, 2015 In strikingly strong criticism, the White House called Mr. Netanyahu’s campaign rhetoric, in which he railed against Israeli Arabs because they went out to vote, an attempt to “marginalize Arab-Israeli citizens” and inconsistent with the values that bind Israel and the United States. The White House press secretary, Josh Earnest, told reporters traveling with Mr. Obama on Air Force One on Wednesday that Mr. Netanyahu’s statement was “deeply concerning and it is divisive and I can tell you that these are views the administration intends to communicate directly to the Israelis.”
  • And with Mr. Netanyahu’s last-minute turnaround against a Palestinian state alongside Israel, several administration officials said that the Obama administration may now agree to passage of a United Nations Security Council resolution embodying principles of a two-state solution that would be based on the pre-1967 lines between Israel and the West Bank and Gaza Strip and mutually agreed swaps.Most foreign policy experts say that Israel would have to cede territory to the Palestinians in exchange for holding on to major Jewish settlement blocks in the West Bank.
  • Such a Security Council resolution would be anathema to Mr. Netanyahu. Although the principles are United States policy, until now officials would never have endorsed them in the United Nations because the action would have been seen as too antagonistic to Israel.Continue reading the main story “The premise of our position internationally has been to support direct negotiations between the Israelis and the Palestinians,” a senior White House official said. “We are now in a reality where the Israeli government no longer supports direct negotiations. Therefore we clearly have to factor that into our decisions going forward.”
  • ...7 more annotations...
  • Administration officials said that although the relationship between Israel and the United States would remain strong, it would not be managed by Mr. Obama and Mr. Netanyahu. Instead it would be left to Secretary of State John Kerry, one of Mr. Netanyahu’s only remaining friends in the administration, and to Pentagon officials who handle the close military alliance with Israel. “The president is a pretty pragmatic person and if he felt it would be useful, he will certainly engage,” said a senior administration official, who asked not to be identified while discussing Mr. Obama’s opinions of Mr. Netanyahu. “But he’s not going to waste his time.”
  • Another source of administration anger is Ron Dermer, Israel’s ambassador to Washington and an American-born former Republican political operative. Some administration officials said that it would improve the atmosphere if Mr. Dermer stepped down — he helped orchestrate an invitation from Speaker John A. Boehner to have Mr. Netanyahu address Congress without first consulting the White House — but it would not change the underlying divisions over policy.
  • Despite the fractured relationship between Mr. Obama and Mr. Netanyahu, Israel, which has received more American aid since the end of World War II than any other country, will continue to get more than $3 billion annually in mostly military funding. In addition, the United States military will continue to work closely with the Israel Defense Forces to maintain Israel’s military edge against its regional adversaries.Foreign policy experts said that the United States would for the most part continue to side with Israel internationally, even as a growing number of European allies seek to pressure Israel to stop settlement expansion in the West Bank and to recognize Palestinian statehood.
  • But Daniel Levy, a former Israeli peace negotiator who is now the head of the Middle East and North Africa program at the European Council on Foreign Relations, warned that the administration’s patience was growing thin. “What the Obama administration is saying is that, ‘Yes, we’re still committed to you,’ ” Mr. Levy said. “But if you don’t give us something to work with, we can’t continue to carry the rest of the world for you.”Mr. Netanyahu’s objections to a nuclear deal with Iran, and his decision to firmly ally himself with Mr. Obama’s Republican opponents in expressing his ire over the Iran talks, may well have hardened the president’s decision to push for an agreement, one Obama adviser said Wednesday. At the very least, Mr. Netanyahu’s opposition has done nothing to steer Mr. Obama away from his preferred course of reining in Iran’s nuclear ambitions through an international agreement that would sharply limit Tehran’s ability to produce nuclear fuel for at least 10 years, in exchange for a gradual easing of economic sanctions. Mr. Kerry and Mohammad Javad Zarif, the Iranian foreign minister, are continuing talks in Lausanne, Switzerland, this week with the goal of reaching an agreement by the end of the month.
  • “We do think we’re going to get something,” one senior administration official said. He noted, pointedly, “We are backed by the P-5 plus 1” — using the diplomatic moniker for Britain, France, Russia, China and Germany, and the United States. Mr. Netanyahu, the official added, should “look carefully” at his own anti-deal coalition, which, besides congressional Republicans, consists mostly of the Sunni Arab states that all detest Israel but lately have come to fear a rising Iran more.
  • Although Mr. Netanyahu is certain to be a major critic of any Iran agreement and to push Republicans in Congress to oppose it, Aaron David Miller, a former State Department official who is now a vice president at the Woodrow Wilson International Center for Scholars, said that in the end the Israeli leader would not get his way. “You will have an Iran deal,” Mr. Miller said. ”The Israelis will not like it. But in the end, Israel will not be able to block it.”That is in part because the administration expects lawmakers will be reluctant to reject a deal for fear that they would be held responsible for what could happen after — either a nuclear-armed Iran or war with Iran.
  • After Iran, administration officials said the next major confrontation with Mr. Netanyahu would most likely be over continued Israeli settlement building in the West Bank. The Palestinians plan to file a case in the International Criminal Court in April contending that the settlements are a continuing war crime.Martin S. Indyk, Mr. Obama’s former special envoy on recent negotiations between the Israelis and the Palestinians and now the executive vice president of the Brookings Institution, said that although the United States would always be a strong supporter of Israel, Mr. Netanyahu was in dangerous terrain. “Israel does not need to be, and should not aspire to be, a nation that dwells alone,” Mr. Indyk said.
  •  
    Haven't made my way back to it yet, but Obama called Netanyahu to congratulate him on reelection, but gave him some marching orders, then the White House leaked enough to make it clear that the tail is no longer wagging the dog.  Coupled with this NY Times piece yesterday, Netanyahu undoubtedly got the message. He did a 180 degree about face today.
Paul Merrell

POGO Provides Statement for House Hearing on VA Whistleblowers - 0 views

  • In the spring of 2014, the Project On Government Oversight (POGO) put out the call to whistleblowers within the Department of Veterans Affairs (VA) to provide an inside perspective on the issues the Department was facing. In our 34-year history, POGO has never received as many submissions on a single issue. Nearly 800 current and former VA employees and veterans from 35 states and the District of Columbia contacted us. POGO reviewed each of the submissions, and found that concerns about the VA go far beyond long or falsified wait times for medical appointments; they extend to the quality of health care services veterans receive. A recurring and fundamental theme became clear: VA employees across the country fear they will face repercussions if they dare to raise a dissenting voice. POGO wrote a letter to Acting VA Secretary Sloan Gibson in July last year, highlighting three specific cases of current or former employees who agreed to share details about their personal experiences of retaliation.[1] In California, a VA inpatient pharmacy supervisor was placed on administrative leave and ordered not to speak out after protesting “inordinate delays” in delivering medication to patients and “refusal to comply with VHA regulations.” In one case, he said, a veteran’s epidural drip of pain control medication ran dry, and another veteran developed a high fever after he was administered a chemotherapy drug after its expiration point.
  • In Pennsylvania, a former VA doctor told POGO that he had been removed from clinical work and forced to spend his days in an office with nothing to do. This action occurred after he complained that, in medical emergencies, physicians who were supposed to be on call were failing or refusing to report to the hospital. The Office of Special Counsel (OSC) shared his concerns, writing “[w]e have concluded that there is a substantial likelihood that the information that you provided to OSC discloses a substantial and specific danger to public health and safety.”[2] In Appalachia, a former VA nurse told POGO she was intimidated by management and forced out of her job after she raised concerns that patients with serious injuries were being neglected. In one case she was reprimanded for referring a patient to the VA’s patient advocate after weeks of being unable to arrange transportation for a medical test to determine if he was in danger of sudden death. “Such an upsetting thing for a nurse just to see this blatant neglect occur almost on a daily basis. It was not only overlooked but appeared to be embraced,” she said. She also pointed out that there is “a culture of bullying employees….It’s just a culture of harassment that goes on if you report wrongdoing,” she said.
  • That culture doesn’t appear to be limited to just one or two VA clinics. Some people, including former employees who are now beyond the reach of VA management, were willing to be interviewed by POGO and to be quoted by name, but others said they contacted us anonymously because they are still employed at the VA and are worried about retaliation. One put it this way: “Management is extremely good at keeping things quiet and employees are very afraid to come forward.” This kind of fear and suppression of whistleblowers who report wrongdoing often culminates in the larger problems, as the VA is currently experiencing. By now it is well known that employees who recently raised concerns about veteran wait times faced reprisal. But whistleblower retaliation in the VA is nothing new. In 1992 a congressional report detailed the experiences of VA employees who were harassed or fired after reporting problems.[3] Throughout the 1990s there were several congressional hearings conducted on the quality of care at VA hospitals and on reprisal against VA employees who exposed inadequate care.[4] Despite then-Secretary Togo D. West’s declaration that such reprisals would not be tolerated, a House hearing in 1999 found that the reprisal problems still existed.[5] A Government Accountability Report from 2000 found that many VA employees were unaware of their rights to protections against retaliation for blowing the whistle on wrongdoing.[6] The report also found that the majority of employees feared retaliation and were therefore unwilling to report misconduct.
  • ...6 more annotations...
  • The Office of Special Counsel (OSC) has been working to investigate claims of retaliation and get favorable actions for many of the VA whistleblowers who have come forward. Since April 2014, the OSC has successfully obtained corrective actions for over 25 whistleblowers.[7] But the OSC still has over 100 pending VA reprisal cases to investigate, among the highest of any government agency, according to Special Counsel Carolyn Lerner.[8] Although the VA has been cooperative with the OSC and their recommendations, merely addressing isolated incidents is not enough.[9] The VA has been struggling with a culture problem for decades and something more must be done.
  • VA employees who have concerns about management or fear retaliation are supposed to be able to turn to the VA’s Office of Inspector General (OIG). But whistleblowers have come to doubt the VA IG’s willingness to hold wrongdoers accountable. Since 2014, the IG Office has not yet publically released any investigation into employee retaliation, making it difficult to assess how seriously the IG’s office is taking this issue. Furthermore, the VA IG’s office issued an administrative subpoena to POGO in May 2014 that was little more than an invasive fishing expedition for whistleblowers. The IG demanded “All records that POGO has received from current or former employees of the Department of Veterans Affairs, and other individuals or entities.”[10] Though POGO did not comply with the subpoena, such an action was cause for concern for many of the whistleblowers who had shared information with us. POGO remains concerned that there is not a permanent VA IG in place and that the position has been vacant for over a year.[11] Our own investigations have found that the absence of permanent leadership can have a serious impact on the effectiveness of an IG office.[12] Acting IGs do not undergo the same kind of extensive vetting process required of permanent IGs, and as a consequence usually lack the credibility of a permanent IG. Acting IGs also often seek appointment to the permanent position, which can compromise their independence by giving them an incentive to curry favor with the White House and the leadership of their agency.[13] Perhaps most worrisome, given the significant challenges facing the VA IG, a 2009 study found that vacancies in top agency positions promote agency inaction, create confusion among career employees, make an agency less likely to handle controversial issues, result in fewer enforcement actions by regulatory agencies and decrease public trust in government.[14]
  • It appears the VA IG may be subject to this dangerous lack of independence. For example, the VA OIG has failed to release the results of 140 health care investigations since 2006.[15] Furthermore, the Department of Treasury IG sent a letter to this Committee just last month raising concerns about another VA IG investigation. After speaking to witnesses familiar with the situation, the Treasury IG concluded that their testimony, “calls into question the integrity of the VA OIG’s actions in this particular manner.” The Treasury IG’s investigation also found that multiple witnesses stated a VA employee boasted about his ability to influence the VA OIG’s investigations.[16]
  • In POGO’s 2014 letter, we recommended concrete steps for incoming VA Secretary McDonald to take in order to demonstrate an agency-wide commitment to changing the VA’s culture of fear, bullying, and retaliation. Neither Acting Secretary Sloan Gibson nor Secretary McDonald have responded to our multiple requests for a meeting. Clearly, an important first step will be for the President to nominate a permanent IG for the VA. Hopefully strong and committed leadership in that office will correct its current course. POGO recommended that Secretary McDonald make a tangible and meaningful gesture to support those whistleblowers who have been trying to fix the VA from the inside. Once the OSC has identified meritorious cases, Secretary McDonald should personally meet with those whistleblowers and elevate their status from villain to hero. These employees should be publicly celebrated for their courage, and should receive positive recognition in their personnel files, including possibly receiving the types of bonuses that have been provided to wrongdoers in the past. Retaliation against whistleblowers is already a prohibited personnel practice, but it will be up to the senior-most VA leadership to ensure that this rule is enforced by the agency. This should not be an isolated event done in response to recent criticisms but an ongoing effort. Whistleblowing must be encouraged and celebrated or wrongdoing will continue.
  • But it’s not just the VA Secretary who can work to fix this problem. Congress should enact legislation that codifies accountability for those who retaliate against whistleblowers. The definition of “wrongdoing” must include retaliation. The cultural shift that is required inside the Department of Veterans Affairs must be accompanied by statutory mandates that protect whistleblowers and witnesses inside the agency from retaliation. Legislation should ensure that whistleblowers are able to be confident that stepping forward to expose wrongdoing will not result in retaliation, and should provide a system to hold retaliators within the VA accountable. Congress should also extend whistleblower protections to contractors and veterans who raise concerns about medical care provided by the VA. POGO’s investigation found that both of these groups also fear retaliation that prevents them from coming forward. While federal employees working at the VA enjoy whistleblower protections, contractors do not. Congress should extend the same protections to contractors in order to promote internal oversight in an increasingly contractor-heavy landscape.
  • In addition, a veteran who is receiving poor care should be able to speak to his or her patient advocate without fear of retaliation, including a reduction in the quality of health care. Without this reassurance, there is a disincentive to report poor care, allowing it to continue uncorrected. Congress should extend whistleblower protections to veteran whistleblowers. The VA and Congress must work together to end this culture of fear and retaliation. Whistleblowers who report concerns that affect veteran health must be lauded, not shunned. And the law must protect them.
Paul Merrell

NSA Director Finally Admits Encryption Is Needed to Protect Public's Privacy - 0 views

  • NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy The new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. By Carey Wedler | AntiMedia | January 22, 2016 Share this article! https://mail.google.com/mail/?view=cm&fs=1&to&su=NSA%20Director%20Finally%20Admits%20Encryption%20Is%20Needed%20to%20Protect%20Public%E2%80%99s%20Privacy&body=http%3A%2F%2Fwww.mintpress
  • Rogers cited the recent Office of Personnel Management hack of over 20 million users as a reason to increase encryption rather than scale it back. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack that compromised the personal data about 20 million people who obtained background checks. Rogers’ comments, while forward-thinking, signify an about face in his stance on encryption. In February 2015, he said he “shares [FBI] Director [James] Comey’s concern” about cell phone companies’ decision to add encryption features to their products. Comey has been one loudest critics of encryption. However, Rogers’ comments on Thursday now directly conflict with Comey’s stated position. The FBI director has publicly chastised encryption, as well as the companies that provide it. In 2014, he claimed Apple’s then-new encryption feature could lead the world to “a very dark place.” At a Department of Justice hearing in November, Comey testified that “Increasingly, the shadow that is ‘going dark’ is falling across more and more of our work.” Though he claimed, “We support encryption,” he insisted “we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, to resolve it. So, I think the conversation’s in a healthier place.”
  • At the same hearing, Comey and Attorney General Loretta Lynch declined to comment on whether they had proof the Paris attackers used encryption. Even so, Comey recently lobbied for tech companies to do away with end-to-end encryption. However, his crusade has fallen on unsympathetic ears, both from the private companies he seeks to control — and from the NSA. Prior to Rogers’ statements in support of encryption Thursday, former NSA chief Michael Hayden said, “I disagree with Jim Comey. I actually think end-to-end encryption is good for America.” Still another former NSA chair has criticized calls for backdoor access to information. In October, Mike McConnell told a panel at an encryption summit that the United States is “better served by stronger encryption, rather than baking in weaker encryption.” Former Department of Homeland Security chief, Michael Chertoff, has also spoken out against government being able to bypass encryption.
  • ...2 more annotations...
  • Regardless of these individual defenses of encryption, the Intercept explained why these statements may be irrelevant: “Left unsaid is the fact that the FBI and NSA have the ability to circumvent encryption and get to the content too — by hacking. Hacking allows law enforcement to plant malicious code on someone’s computer in order to gain access to the photos, messages, and text before they were ever encrypted in the first place, and after they’ve been decrypted. The NSA has an entire team of advanced hackers, possibly as many as 600, camped out at Fort Meade.”
  • Rogers statements, of course, are not a full-fledged endorsement of privacy, nor can the NSA be expected to make it a priority. Even so, his new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. “So spending time arguing about ‘hey, encryption is bad and we ought to do away with it’ … that’s a waste of time to me,” Rogers said Thursday. “So what we’ve got to ask ourselves is, with that foundation, what’s the best way for us to deal with it? And how do we meet those very legitimate concerns from multiple perspectives?”
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Gary Edwards

America Is Exhibiting All of the Signs of a Failing Empire Washington's Blog - 1 views

  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • ...2 more annotations...
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  •  
    "America Is Exhibiting All of the Signs of a Failing Empire Posted on October 10, 2015 by WashingtonsBlog The American Empire Is Quickly Declining Consummate insider Colonel Lawrence Wilkerson - former chief of staff to Colin Powell, and now distinguished adjunct professor of Government and Public Policy at William & Mary - notes that the U.S. is exhibiting all of the signs of a failing empire, including: Relying on massive military force (and using gigantic complexes to support it) as the be-all and end-all of power, and belittling diplomacy Maintaining standing armies, instead of disbanding military forces between wars Using more mercenary forces than citizen troops Spending disproportionately large amounts of blood and treasure in order to counter threats on the status quo … which simply exacerbates the threat against the empire Going ethically and morally bankrupt Ending up up having bankers and financiers end up running the real power Suffering great hiccups in finance and trade The leaders no longer really believe in or follow the ideals of the founders"
  •  
    The 1 hour-25 minute video talk is well worth listening to. Col. Wilkerson is now a professor who has deeply studied the decline of empires. He speaks from deep knowledge both as a former insider and as a scholar about the state of the American Empire. But notice that the linked page has two copies of the same talk embedded. Don't bother watching both unless you want to hear it twice. :-)
Paul Merrell

Martin Shkreli Arrested on Securities Fraud Charges - 0 views

  • Martin Shkreli, a boastful pharmaceutical executive who came under withering criticism for price gouging vital drugs, denied securities fraud charges on Thursday following an early morning arrest, and was freed on a $5 million bond. While the 32-year-old has earned a rare level of infamy for his brazenness in business and his personal life, what he was charged with had nothing to do with skyrocketing drug prices. He is accused of repeatedly losing money for investors and lying to them about it, illegally taking assets from one of his companies to pay off debtors in another. “Shkreli essentially ran his company like a Ponzi scheme where he used each subsequent company to pay off defrauded investors from the prior company,” Brooklyn U.S. Attorney Robert Capers said at a press conference.
  • Evan Greebel, a New York lawyer, who is alleged in the federal indictment to have helped Shkreli in his schemes, was also arrested and charged. Like Shkreli, he pleaded not guilty, and he was freed on a $1 million bond. Both men and their lawyers declined to comment after their court appearance.
  • Read the full text of the indictment here In the federal indictment and a complaint by the Securities and Exchange Commission, authorities say Shkreli began losing money and lying to investors from the time he began managing money. In his mid-20s, he got nine investors to place $3 million with him and at one point he had only $331. Securities fraud is hardly unheard of on Wall Streeet and the amounts involved here are nowhere near on the scale of Bernie Madoff. But Shkreli’s case has drawn such attention because of his defiant price-gouging and his own up-by-the-bootstraps history. The son of immigrants from Albania and Croatia who did janitorial work and raised him and his brothers in working-class Brooklyn, Shkreli seemed at first to embody the American dream and then to mock it. After dropping out of an elite Manhattan high school, he worked as an intern for Jim Cramer’s hedge fund as a 17-year-old and quickly impressed with his ability to call stocks. He created hedge funds, taught himself biology and, after earning a BA at Baruch College in New York City, began hedge funds investing in biotech.
  • ...9 more annotations...
  • He became famous within a certain world but entered public consciousness after he raised the price more than 55-fold for Daraprim in September from $13.50 per pill to $750. It is the preferred treatment for a parasitic condition known as toxoplasmosis, which can be deadly for unborn babies and patients with compromised immune systems including those with HIV or cancer. His company, Turing Pharmaceuticals AG, bought the drug, moved it to a closed distribution system and instantly drove the price into the stratosphere. He drew shocked rebukes from Congress, doctors and presidential candidates, and brought public attention to the rising prices of older drugs. Donald Trump called Shkreli a “spoiled brat,” and the BBC dubbed him the “most hated man in America.” Bernie Sanders, the Democratic presidential candidate, rejected a $2,700 campaign donation from him, directing it to an HIV clinic. A spokesman said the campaign would not keep money “from this poster boy for drug company greed.” All the criticism seemed at first to have some impact and Shkreli said he would lower the price. Then he reneged. When Hillary Clinton tried one more time last month to get him to cut the cost, he dismissed her with the tweet “lol.” At a Forbes summit in New York this month, wearing a hooded sweatshirt, he said if he could have done it over, “I probably would have raised the price higher,” adding, “My investors expect me to maximize profits.”
  • Shkreli did further damage to his public image with other acts and boasts. He spent millions on the only copy of a Wu-Tang Clan album that music fans are desperate to hear and then told Bloomberg Businessweek that he had no immediate plans to listen to it. He takes often to Twitter and message boards, bragging about his business strategies, musical tastes and politics; he live-streams from his office for long stretches. The SEC complaint and federal indictment lay out a series of schemes and cover-ups carried out by Shkreli. Capers said authorities began investigating him as early as 2014.
  • Barely 23, he was managing hedge fund Elea Capital in New York and lost it all in 2007. Around then, a trade with Lehman Brothers ended with a $2.3 million judgment against him, prosecutors said. In 2010, he lost his clients’ $3 million investment in his new fund, MSMB Capital. In 2011, he bet that shares of Orexigen Therapeutics Inc. would fall and wound up owing $7 million to his broker, Merrill Lynch, authorities said. He couldn’t pay, and he, an unnamed accomplice and MSMB Capital eventually extinguished the debt with a $1.35 million settlement, they said. Part of that money came from his next firm, authorities said. After the collapse of MSMB Capital, Shkreli launched MSMB Healthcare with about $5 million from 13 investors. He paid himself “far in excess” of the agreed-upon 1 percent management fee and 20 percent profit incentive, according to the SEC.
  • Shkreli then used cash from MSMB Healthcare to invest in Retrophin, the pharmaceutical company he founded in 2011, even though it “had no products or assets,” prosecutors said. Later, he used the assets of Retrophin to repay angry investors in his hedge funds, prosecutors said. Shkreli is confident that he will be cleared of the charges, according to a statement on his behalf. Shkreli is particularly disappointed that his litigation with Retrophin has become a government enforcement matter, according to the statement. He also denied the charges regarding the MSMB entities, which he said involve complex accounting matters that prosecutors and the SEC fail to understand, according to the statement. “It is no coincidence that these charges, the result of investigations which have been languishing for considerable time, have been filed at the same time of Shkreli’s high-profile, controversial and yet unrelated activities,” according to the statement. “The government suggested that Mr. Shkreli was involved in a Ponzi scheme. Ponzi victims do not make money, yet Mr. Shkreli’s investors enjoyed strong results.”
  • As Shkreli’s losses mounted, so did his lies. He fabricated portfolio statements and, with his lawyer’s help, deceived the SEC and outside accountants. He backdated records, manufactured a phony loan agreement between Retrophin and a hedge fund, and created sham consulting agreements with Retrophin as a way to route the company’s cash to his earlier investors. Greebel, the arrested lawyer, made sure Retrophin’s outside accountants were unaware of Shkreli’s financial maneuvers and helped him concoct the consulting agreements used to repay the hedge fund investors, the U.S. said. The cases mirror a lawsuit brought by Retrophin. Shkreli blithely dismissed his old company’s claims, saying, “The $65 million Retrophin wants from me would not dent me. I feel great. I’m licking my chops over the suits I’m going to file against them.” Earlier, he had denied wrongdoing in a post on InvestorsHub after Retrophin disclosed it had received a subpoena from federal prosecutors and the preliminary findings from its own investigation of Shkreli. He called the company’s allegations “completely false, untrue at best and defamatory at worst.”
  • “Every transaction I’ve ever made at Retrophin was done with outside counsel’s blessing,” he said on the investment blog in February, without identifying the lawyers. When Shkreli was working for Cramer’s firm, he was still a teenager. After recommending successful trades, Shkreli eventually set up his own hedge fund, quickly developing a reputation for trashing biotechnology stocks in online chatrooms and shorting them, to enormous profit. Widely admired for his intellect and sharp eye, he set up Retrophin to develop drugs and acquire older pharmaceuticals that could be sold for higher profits. Turing, which is less than a year old and has raised $90 million in financing, has followed a similar strategy with the purchase of drugs, including Daraprim. Shkreli recently bought a majority stake in KaloBios Pharmaceuticals Inc. after Turing received a warning from the New York attorney general that the distribution network for Daraprim may violate antitrust laws. State officials made their concerns known to Turing and Shkreli in an Oct. 12 letter obtained by Bloomberg.
  • KaloBios recently acquired the license for benznidazole, a standard treatment for Chagas, a deadly parasitic infection most common in South and Central America. The firm announced plans to increase the cost from a couple hundred dollars for two months to a pricing structure like that for hepatitis-C drugs, which can run to nearly $100,000 for 12 weeks.
  • With the federal charges and regulatory actions, Shkreli could be banned from running a public company, which could put the future of KaloBios into question. Trading in KaloBios shares was halted after the stock fell 53 percent. It’s less clear what the impact could be on Turing, which is closely held.
  • Federal authorities will have to ask a judge to impose an asset freeze if they want to guarantee Shkreli doesn’t dispose of ill-gotten gains. The charges suggest that a small group of health-care firms—ones that acquire the rights to drugs and significantly increase their prices—is drawing the scrutiny of regulators and prosecutors, with a possible chilling effect on aggressive drug-pricing strategies. Legislators are already paying attention. A hearing of the Senate Special Committee on Aging on Dec. 9 scrutinized such tactics. Before Shkreli started Turing, Retrophin raised the price of Thiola, used to treat a rare condition causing debilitating recurrences of kidney stones, from $1.50 a pill to $30. “Some of these companies seem to act more like hedge funds than traditional pharmaceutical companies,” said Senator Susan Collins, a Maine Republican who ran the recent hearing. George Scangos, CEO of biotechnology giant Biogen Inc., went further, saying in an interview, “Turing is to a research-based company like a loan shark is to a legitimate bank.”
  •  
    Couldn't happen to a nicer guy.
Paul Merrell

Violence in Israel and the Palestinian territories - the Guardian briefing | News | The... - 0 views

  • Israel and the occupied Palestinian territories have been convulsed by a wave of escalating violence in recent days. The lethal tensions ratcheted up sharply last Thursday when a married couple, Jewish settlers from Neria in the northern West Bank, were shot and killed in a car in front of their four children near Beit Furik, allegedly by members of a five-man Hamas cell who were subsequently arrested. Two more Israelis were stabbed and killed in Jerusalem’s Old City on Saturday by a Palestinian youth, who was shot dead at the scene. On Sunday, an 18-year-old Palestinian was shot dead by Israeli forces in clashes near the West Bank town of Tulkarem. The mounting friction has seen attacks by settlers on Palestinians, clashes between Palestinians and Israeli security forces and attempted attacks continue. On Wednesday. there were incidents in Jerusalem, where a Palestinian woman stabbed an Israeli man who then shot and seriously wounded her in the Old City, the southern Israeli city of Kiryat Gat, where a Palestinian was killed after reportedly trying to seize a gun from a soldier and stabbing him, and when a female Israeli settler’s car was stoned near Beit Sahour, which adjoins Bethlehem, in an incident in which it appears other settlers fired on Palestinians, seriously injuring a youth.
  • On the Palestinian side, anger escalated earlier this week after a 13-year-old boy in Bethlehem’s Aida refugee camp was shot and killed by an Israeli sniper in an incident the Israeli military has claimed was “unintentional” as soldiers were aiming at another individual.
  • Jerusalem has remained tense now for almost a year. Most analysts blame the recent heightened tension on several factors. Key among them has been the issue of the religious site in Jerusalem known to Muslims as al-Haram al-Sharif, or the Noble Sanctuary, and Jews as the Temple Mount. A long-running campaign by some fundamentalist Jews and their supporters for expanding their rights to worship in the Al-Aqsa mosque compound on the Temple Mount, supported by rightwing members of Israeli prime minister Binyamin Netanyahu’s own cabinet, has raised the suspicion – despite repeated Israeli denials – that Israel intends to change the precarious status quo for the site, which has been governed under the auspices of the Jordanian monarchy since 1967.
  • ...6 more annotations...
  • Recent Israeli police actions at the site scandalised the Muslim world and raised tensions. Israel has also banned two volunteer Islamic watch groups – male and female – accusing them of harassing Jews during the hours they are allowed to visit. That has combined with the lack of a peace process and growing resentment and frustration in Palestinian society aimed at both Israel and the Palestinian president, Mahmoud Abbas, and the Palestinian Authority. Israel has complained in recent weeks of an increase in stone throwing and molotov cocktail attacks on West Bank roads and in areas adjoining mainly Palestinian areas of Jerusalem, where an elderly motorist died after crashing his car during an alleged stoning attack. In response, Netanyahu and his cabinet have loosened live-fire regulations over the use of .22 calibre bullets on Palestinian demonstrators. Although described by Israel as “less lethal”, it is this type of ammunition that killed 13-year-old Abdul Rahman Shadi on Monday.
  • Part of the problem is the leadership on both sides. Netanyahu leads a rightwing/far-right coalition with the smallest of majorities. Several cabinet ministers support the settler movement and have publicly criticised him for not cracking down harder on Palestinian protest. Netanyahu’s weakness is reflected on the Palestinian side, where the ageing Abbas is seen as isolated, frustrated and increasingly out of step with other members of the Palestinian leadership, who would like a tougher line against Israel over continued settlement building and the absence of any peace process.
  • In his recent speech to the UN general assembly, Abbas went further than he had ever done before in threatening to end what he claims is Palestine’s unilateral adherence to the Oslo accords, which he said Israel refuses to honour. “We cannot continue to be bound by these signed agreements with Israel and Israel must assume fully its responsibilities of an occupying power,” he said. Abbas, however, stopped short of ending security cooperation between Israel and Palestinian security forces – mainly aimed at Hamas on the West Bank – and asked the UN for international protection. His speech at the United Nations has been seen as a move to placate growing discontents in Palestinian society. Both Abbas and Netanyahu are now both engaged in a delicate balancing act, trying to avoid further escalation that would be detrimental to both while trying not to lose the support of key constituencies. On Abbas’s side, that has meant ordering Palestinian factions and security forces to desist from joining the conflict, while on Netanyahu’s side it has seen numerous warnings of harsh measures – many of which have been repeatedly announced.
  • Nentanyahu does not want to risk a position where Abbas ends security cooperation and in the local jargon “hands back the keys” – in other words revokes the Oslo accords and insists on Israel once again taking full responsibility for administering the occupied territories. For his part, Abbas is said to see a limited popular uprising as useful because of the message it delivers to both Israel and the international community of the mounting risks of a moribund peace process and how serious things could become if security cooperation were to end.
  • At the end of the last round of the peace process last year, US diplomats warned about this potential outcome and Washington has largely withdrawn from a guiding role, exhausted by the lack of progress and frustrated with Netanyahu. Despite the Palestinian desire for a new multilateral international approach, it has failed to materialise as have any US guarantees to Abbas that they intend to advance the peace process. While Syria, migration and Russia are preoccupying western governments, Israel and Palestine have been largely left to their own devices.
  • Flare-ups of violence have a habit of coming and going but hopes that this one is coming to an end appear premature for now. However, the likelihood of the current violence fading away still remains the strongest bet. The biggest risk is a miscalculation by either side, which is out of the hands of either leader, that would alter the dynamics. Individuals on both sides have led some of the worst attacks: Jewish extremists in the summer burning three members of a Palestinian family to death, and “lone wolf attacks” launched by Palestinians angry about al-Aqsa and other issues. With neither side having a clear exit strategy, there is a risk is that Netanyahu and Abbas are being led by events rather than leading.
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Paul Merrell

Moon of Alabama - 0 views

  • Over the last year the U.S. bombed Jabhat al-Nusra personal and facilities in Syria some five or six times. The al-Qaeda subgroup also has a history of attacking U.S. paid "relative moderate" proxy forces in Syria. The Pentagon recently inserted another U.S. mercenary group into north Syria. This was accompanied by a media campaign in which the administration lauded itself for the operation. The newly inserted group is especially trained and equipped to direct U.S. air attacks like those that earlier hit al-Nusra fighters. Now that freshly inserted group was attacked by Jabhat al-Nusra. Some of its members were killed and others were abducted. The Obama administration is shocked, SHOCKED, ABSOLUTELY SHOCKED that Jabhat al-Nusra would do such a ghastly deed. "Why would they do that?" "Who could have known that they would attack U.S. proxy forces???"
  • There is no longer an Jihadist ISIS or ISIL in Syria and Iraq. The people leading that entity declared (pdf) today, at the highly symbolic beginning of Ramadan, themselves to be a new caliphate:
  • Could someone explain to the fucking dimwits in the Pentagon and the Obama administrations that people everywhere, and especially terrorists group, hate it when you bomb them and kill their leaders? That those people you bomb might want to take revenge against you and your proxies? That people you bombed will not like your targeting team moving in next door to them? That alQaeda is not an "ally"? These people are too pathetically clueless to even be embarrassed about it. The accumulated intelligence quotient of the administration and Pentagon officials running the anti-Syria operation must be below three digits. But aside from their lack of basic intelligence the utter lack of simple "street smarts" is the real problem here. These people have no idea how life works outside of their beltway cages.
  • ...12 more annotations...
  • On more thought from me on why the dimwits did not foresee that Nusra would attack. The White House insisted on calling a part of Nusra the "Khorasan group" and explained that it was only bombing this groups of alQaeda veterans now part of Nusra because the "Khorasan group" planning to hit in "western" countries. No expert nor anyone on the ground in Syria thought that this differentiation was meaningful. Nusra is alQaeda and so are all of its members. But the White House and Pentagon probably thought that Nusra would accept the artificial separation they themselves had made up. That Nusra would understand that it is seen as an "ally" and only the "Khorasan group" is seen as an enemy. If that was the line of thinking, and the situation seems to point to that, then these people have fallen for their own propaganda stunt. They probably believed that the "Khorasan group" was an accepted narrative because they were telling that tale to themselves. Poor idiots.
  • UPDATE: The one sane guy at the Council of Foreign relations, Micah Zenko, foresaw this debacle and wrote on March 2: [The U.S. trained mercenaries] will immediately be an attractive target for attacks by the Islamic State, Assad’s ground and air forces, and perhaps Nusra and other forces. Killing or taking prisoner fighters (or the families of those fighters) who were trained by the U.S. military will offer propaganda value, as well as leverage, to bargain for those prisoners’ release. He compared the whole operation to the 1961 CIA invasion of Cuba: Last September, the White House and Congress agreed to authorize and fund a train-and-equip project similar to the Bay of Pigs, but this time in the Middle East, without any discussion about phase two. The Syrian project resembles 1961 in two ways: What happens when the fighting starts is undecided, and the intended strategic objective is wholly implausible.
  • The attack on Friday was mounted by the Nusra Front, which is affiliated with Al Qaeda. It came a day after the Nusra Front captured two leaders and at least six fighters of Division 30, which supplied the first trainees to graduate from the Pentagon’s anti-Islamic State training program. In Washington, several current and former senior administration officials acknowledged that the attack and the abductions by the Nusra Front took American officials by surprise and amounted to a significant intelligence failure. While American military trainers had gone to great lengths to protect the initial group of trainees from attacks by Islamic State or Syrian Army forces, they did not anticipate an assault from the Nusra Front. In fact, officials said on Friday, they expected the Nusra Front to welcome Division 30 as an ally in its fight against the Islamic State....A senior Defense Department official acknowledged that the threat to the trainees and their Syrian recruiters had been misjudged, and said that officials were trying to understand why the Nusra Front had turned on the trainees. Like other Obama administration operations this one did not fail because of "intelligence failure" but because an utter lack of common sense.
  • U.S. media can no agree with itself if Russia is giving ISIS an airforce or if Russia pounds ISIS with the biggest bomber raid in decades. Such confusion occurs when propaganda fantasies collide with the observable reality. To bridge such divide requires some fudging. So when the U.S. claims to act against the finances of the Islamic State while not doing much, the U.S Public Broadcasting Service has to use footage of Russian airstrikes against the Islamic State while reporting claimed U.S. airstrike successes. The U.S. military recently claimed to have hit Islamic State oil tankers in Syria. This only after Putin embarrassed Obama at the G-20 meeting in Turkey. Putin showed satellite pictures of ridiculous long tanker lines waiting for days and weeks to load oil from the Islamic State without any U.S. interference.
  • The U.S. then claimed to have hit 116 oil tankers while the Russian air force claims to have hit 500. But there is an important difference between these claims. The Russians provided videos showing how their airstrikes hit at least two different very large oil tanker assemblies with hundreds of tankers in each. They also provided video of several hits on oil storage sites and refinery infrastructure. I have found no video of U.S. hits on Islamic State oil tanker assemblies. The U.S. PBS NewsHour did not find any either. In their TV report yesterday about Islamic State financing and the claimed U.S. hits on oil trucks they used the videos Russia provided without revealing the source. You can see the Russian videos played within an interview with a U.S. military spokesperson at 2:22 min.
  • The U.S. military spokesperson speaks on camera about U.S. airforce hits against the Islamic State. The video cuts to footage taken by Russian airplanes hitting oil tanks and then trucks. The voice-over while showing the Russian video with the Russians blowing up trucks says: "For the first time the U.S. is attacking oil delivery trucks." The video then cuts back to the U.S. military spokesperson. At no point is the Russian campaign mentioned or the source of the footage revealed. Any average viewer of the PBS report will assume that the black and white explosions of oil trucks and tanks are from of U.S. airstrikes filmed by U.S. air force planes. The U.S. military itself admitted that its strikes on IS oil infrastructure over the last year were "minimally effective". One wonders then how effective the claimed strike against 116 trucks really was. But unless we have U.S. video of such strikes and not copies of Russian strike video fraudulently passed off as U.S. strikes we will not know if those strikes happened at all.
  • The wannabe Sultan Erdogan did not get his will in Syria where he had planned to capture and annex Aleppo. The Russians prevented that. He now goes for his secondary target, Mosul in Iraq, which many Turks see as historic part of their country
  • Mosul, Iraq's second biggest city with about a million inhabitants, is currently occupied by the Islamic State. On Friday a column of some 1,200 Turkish soldiers with some 20 tanks and heavy artillery moved into a camp near Mosul. The camp was one of four small training areas where Turkey was training Kurds and some Sunni-Arab Iraqis to fight the Islamic State. The small camps in the northern Kurdish area have been there since the 1990s. They were first established to fight the PKK. Later their Turkish presence was justified as ceasefire monitors after an agreement ended the inner Kurdish war between the KDP forces loyal to the Barzani clan and the PUK forces of the Talabani clan. The bases were actually used to monitor movement of the PKK forces which fight for Kurdish independence in Turkey. The base near Mosul is new and it was claimed to be just a small weapons training base. But tanks and artillery have a very different quality than some basic AK-47 training. Turkey says it will increase the numbers in these camps to over 2000 soldiers.
  • Should Mosul be cleared of the Islamic State the Turkish heavy weapons will make it possible for Turkey to claim the city unless the Iraqi government will use all its power to fight that claim. Should the city stay in the hands of the Islamic State Turkey will make a deal with it and act as its protector. It will benefit from the oil around Mosul which will be transferred through north Iraq to Turkey and from there sold on the world markets. In short: This is an effort to seize Iraq's northern oil fields. That is the plan but it is a risky one. Turkey did not ask for permission to invade Iraq and did not inform the Iraqi government. The Turks claim that they were invited by the Kurds: Turkey will have a permanent military base in the Bashiqa region of Mosul as the Turkish forces in the region training the Peshmerga forces have been reinforced, Hürriyet reported. The deal regarding the base was signed between Kurdistan Regional Government (KRG) President Massoud Barzani and Turkish Foreign Minister Feridun Sinirlioğlu, during the latter’s visit to northern Iraq on Nov. 4. There are two problems with this. First: Massoud Barzani is no longer president of the KRG. His mandate ran out and the parliament refused to prolong it. Second: Mosul and its Bashiqa area are not part of the KRG. Barzani making a deal about it is like him making a deal about Paris.
  • The Iraqi government and all major Iraqi parties see the Turkish invasion as a hostile act against their country. Abadi demanded the immediate withdrawal of the Turkish forces but it is unlikely that Turkey will act on that. Some Iraqi politicians have called for the immediate dispatch of the Iraqi air force to bomb the Turks near Mosul. That would probably the best solution right now but the U.S. installed Premier Abadi is too timid to go for such strikes. The thinking in Baghdad is that Turkey can be kicked out after the Islamic State is defeated. But this thinking gives Turkey only more reason to keep the Islamic State alive and use it for its own purpose. The cancer should be routed now as it is still small. Barzani's Kurdistan is so broke that is has even confiscated foreign bank accounts to pay some bills. That may be the reason why Barzani agreed to the deal now. But the roots run deeper. Barzani is illegally selling oil that belongs to the Iraqi government to Turkey. The Barzani family occupies  not only the presidential office in the KRG but also the prime minister position and the local secret services. It is running the oil business and gets a big share of everything else. On the Turkish side the oil deal is handled within the family of President Erdogan. His son in law, now energy minister, had the exclusive right to transport the Kurdish oil through Turkey. Erdogan's son controls the shipping company that transports the oil over sea to the customer, most often Israel. The oil under the control of the Islamic State in Iraq passes the exactly same route. These are businesses that generate hundreds of millions per year.
  • It is unlikely that U.S., if it is not behinds Turkey new escapade, will do anything about it. The best Iraq could do now is to ask the Russians for their active military support. The Turks insisted on their sovereignty when they ambushed a Russian jet that brushed its border but had no intend of harming Turkey. Iraq should likewise insist on its sovereignty, ask Russia for help and immediately kick the Turks out. The longer it waits the bigger the risk that Turkey will eventually own Mosul.
  • Another fake news item currently circling is that Trump has given order to the military to create safe zones for Syria. The reality is still far from it: [H]is administration crafted a draft order that would direct the Pentagon and the State Department to submit plans for the safe zones within 90 days. The order hasn't yet been issued. The draft of the order, which will be endlessly revised, says that safe zones could be in Syria or in neighboring countries. The Pentagon has always argued against such zones in Syria and the plans it will submit, should such an order be issued at all, will reflect that. The safe zones in Syria ain't gonna happen
  •  
    So the first group of U.S. trained "moderate" Syrian opposition fighters are an epic fail. Who'd of thunk? 
Paul Merrell

How the NSA Converts Spoken Words Into Searchable Text - The Intercept - 0 views

  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest. The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
  • ...9 more annotations...
  • The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s. What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds. In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited. Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
  • A 2008 document from the Snowden archive shows that  transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing: (U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing. A version of the system the NSA uses is now even available commercially.
  • But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.” The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states. A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
  • According to a 2011 memo, “How is Human Language Technology (HLT) Progressing?“, NSA that year deployed “HLT Labs” to Afghanistan, NSA facilities in Texas and Georgia, and listening posts in Latin America run by the Special Collection Service, a joint NSA/CIA unit that operates out of embassies and other locations. “Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
  • The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America. For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.” The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
  • VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
  • What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.” The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
  • Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
  • The presidentially appointed but independent Privacy and Civil Liberties Oversight Board (PCLOB) didn’t mention speech-to-text technology in its public reports. “I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept. His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
Paul Merrell

The Spy Cables: A glimpse into the world of espionage - Al Jazeera English - 0 views

  • A digital leak to Al Jazeera of hundreds of secret intelligence documents from the world's spy agencies has offered an unprecedented insight into operational dealings of the shadowy and highly politicised realm of global espionage. Over the coming days, Al Jazeera's Investigative Unit is publishing The Spy Cables, in collaboration with The Guardian newspaper.
  • Spanning a period from 2006 until December 2014, they include detailed briefings and internal analyses written by operatives of South Africa's State Security Agency (SSA). They also reveal the South Africans' secret correspondence with the US intelligence agency, the CIA, Britain's MI6, Israel's Mossad, Russia's FSB and Iran's operatives, as well as dozens of other services from Asia to the Middle East and Africa.
  • Among the revelations, the Spy Cables disclose how: Israel's Mossad told its allies that Iran was not working to produce nuclear weapons just a month after Prime Minister Benjamin Netanyahu warned it was barely a year from being able to do so; The CIA made attempts to contact Hamas directly despite the US government listing the Palestinian group as a "terrorist organisation"; Britain's MI6 sought South African help in an operation to recruit a North Korean official who had previously refused their cash; and South African and Ethiopian spies struggled to "neutralise" an assassination plot targeting a leading African diplomat.
  • ...6 more annotations...
  • Mossad contradicted Netanyahu on Iran nuclear programme The Spy Cables A glimpse into the world of espionage Spy Cables South African spies wary of Iran operations Spy Cables expose 'desperate' US approach to Hamas Israeli cable reveals S Africa missile theft cover-up The Spy Cables - Al Jazeera English Yazidis battle ISIL Disaster 'made us stronger' Spy Cables Abbas and Israel ally against 2009 UN probe Cables describe British attempt to recruit N Korean spy The Rise of the Oligarchs
  • Unlike the Edward Snowden documents that focus on electronic signals intelligence, commonly referred to in intelligence circles as "SIGINT", the Spy Cables deal with human intelligence, or "HUMINT".
  • Rather than chronicling spy-movie style tales of  ruthless efficiency of intelligence agencies, they offer an unprecedented glimpse into the daily working lives of people whose jobs are kept secret from the public.
  • The Spy Cables also reveal that in many cases, intelligence agencies are over-classifying information and hiding behind an unnecessary veil of secrecy. This harms the ability of a democratic society to either consent to the activities of their intelligence agencies or provide adequate checks and balances to their powers.
  • Spy Cables expose 'desperate' US approach to Hamas Leaked documents also show Mossad lobbying South Africa against Goldstone Report, claiming Abbas shared their stance.
  • Spy Cables: South African spies wary of Iran operations Leaked documents describe Tehran working to counter sanctions by using front companies and official channels.
Paul Merrell

Iran Is Invited to Join U.S., Russia and Europe for Talks on Syria's Future - The New Y... - 0 views

  • Iran has been invited to join talks in Vienna this week with Russia, the United States and European nations on whether a political resolution is possible in the Syrian civil war. If Iran accepts, it will be the first time Secretary of State John Kerry will enter formal negotiations with Tehran on issues beyond the nuclear accord reached in July. Russia has been pressing to include Iran, the only other major power giving military support to President Bashar al-Assad in his effort to remain in power. Senior American officials have begun to acknowledge in recent weeks that no serious discussion of a possible political succession plan in Syria can happen without Tehran’s involvement.But the American denunciation of Iran’s activities in Syria, including its support for Mr. Assad’s forces and for terror groups like Hezbollah, has always prevented the United States from including Iran in formal talks about the Syrian crisis. Continue reading the main story Related Coverage Turkey Confirms Strikes Against Kurdish Militias in SyriaOCT. 27, 2015 U.N. Rights Investigator Highly Critical of IranOCT. 27, 2015 Assad Makes Unannounced Trip to Moscow to Discuss Syria With PutinOCT. 21, 2015 The State Department spokesman, John Kirby, buried that policy at a briefing on Tuesday, before it was announced that Mr. Kerry would attend the meeting on Syria in Vienna on Thursday and Friday. “We anticipate that Iran will be invited to attend this upcoming meeting,” Mr. Kirby said.
  • Mr. Kirby added that the United States still opposed what he termed Iran’s “destabilizing activities” in Syria. But he said that the United States “recognized that at some point in the discussion, moving toward a political transition, we have to have a conversation and a dialogue with Iran.”The change is another example of how Russia’s military entry into the Syrian war has changed the power dynamic of the sporadic negotiations. For a long while the United States argued that Mr. Assad must go — as President Obama declared four years ago at the White House — before negotiations on a successor could begin. That position was altered recently to say that a political solution could be sought as long as it included an eventual transition of power, perhaps to another Alawite-dominated government.But the latest shift is a recognition that Russia and Iran may well be the two biggest voices in who succeeds Mr. Assad — if any political transition can be engineered — and that to leave the Iranians out of the conversation was “simply ignoring reality,” one senior American diplomat said.
Paul Merrell

Turkey could cut off Islamic State's supply lines. So why doesn't it? | David Graeber |... - 0 views

  • n the wake of the murderous attacks in Paris, we can expect western heads of state to do what they always do in such circumstances: declare total and unremitting war on those who brought it about. They don’t actually mean it. They’ve had the means to uproot and destroy Islamic State within their hands for over a year now. They’ve simply refused to make use of it. In fact, as the world watched leaders making statements of implacable resolve at the G20 summit in Antalaya, these same leaders are hobnobbing with Turkey’s president Recep Tayyip Erdoğan, a man whose tacit political, economic, and even military support contributed to Isis’s ability to perpetrate the atrocities in Paris, not to mention an endless stream of atrocities inside the Middle East.
  • How could Isis be eliminated? In the region, everyone knows. All it would really take would be to unleash the largely Kurdish forces of the YPG (Democratic Union party) in Syria, and PKK (Kurdistan Workers’ party) guerillas in Iraq and Turkey. These are, currently, the main forces actually fighting Isis on the ground. They have proved extraordinarily militarily effective and oppose every aspect of Isis’s reactionary ideology. But instead, YPG-controlled territory in Syria finds itself placed under a total embargo by Turkey, and PKK forces are under continual bombardment by the Turkish air force. Not only has Erdoğan done almost everything he can to cripple the forces actually fighting Isis; there is considerable evidence that his government has been at least tacitly aiding Isis itself. It might seem outrageous to suggest that a Nato member like Turkey would in any way support an organisation that murders western civilians in cold blood. That would be like a Nato member supporting al-Qaida. But in fact there is reason to believe that Erdoğan’s government does support the Syrian branch of al-Qaida (Jabhat al-Nusra) too, along with any number of other rebel groups that share its conservative Islamist ideology. The Institute for the Study of Human Rights at Columbia University has compiled a long list of evidence of Turkish support for Isis in Syria.
  • And then there are Erdoğan’s actual, stated positions. Back in August, the YPG, fresh from their victories in Kobani and Gire Spi, were poised to seize Jarablus, the last Isis-held town on the Turkish border that the terror organisation had been using to resupply its capital in Raqqa with weapons, materials, and recruits – Isis supply lines pass directly through Turkey. Commentators predicted that with Jarablus gone, Raqqa would soon follow. Erdoğan reacted by declaring Jarablus a “red line”: if the Kurds attacked, his forces would intervene militarily – against the YPG. So Jarablus remains in terrorist hands to this day, under de facto Turkish military protection.
  • ...3 more annotations...
  • How has Erdoğan got away with this? Mainly by claiming those fighting Isis are “terrorists” themselves. It is true that the PKK did fight a sometimes ugly guerilla war with Turkey in the 1990s, which resulted in it being placed on the international terror list. For the last 10 years, however, it has completely shifted strategy, renouncing separatism and adopting a strict policy of never harming civilians. The PKK was responsible for rescuing thousands of Yazidi civilians threatened with genocide by Isis in 2014, and its sister organisation, the YPG, of protecting Christian communities in Syria as well. Their strategy focuses on pursuing peace talks with the government, while encouraging local democratic autonomy in Kurdish areas under the aegis of the HDP, originally a nationalist political party, which has reinvented itself as a voice of a pan-Turkish democratic left.
  • They have proved extraordinarily militarily effective and with their embrace of grassroots democracy and women’s rights, oppose every aspect of Isis’ reactionary ideology. In June, HDP success at the polls denied Erdoğan his parliamentary majority. Erdoğan’s response was ingenious. He called for new elections, declared he was “going to war” with Isis, made one token symbolic attack on them and then proceeded to unleash the full force of his military against PKK forces in Turkey and Iraq, while denouncing the HDP as “terrorist supporters” for their association with them. There followed a series of increasingly bloody terrorist bombings inside Turkey – in the cities of Diyarbakir, Suruc, and, finally, Ankara – attacks attributed to Isis but which, for some mysterious reason, only ever seemed to target civilian activists associated with the HDP. Victims have repeatedly reported police preventing ambulances evacuating the wounded, or even opening fire on survivors with tear gas.
  • As a result, the HDP gave up even holding political rallies in the weeks leading up to new elections in November for fear of mass murder, and enough HDP voters failed to show up at the polls that Erdoğan’s party secured a majority in parliament. The exact relationship between Erdoğan’s government and Isis may be subject to debate; but of some things we can be relatively certain. Had Turkey placed the same kind of absolute blockade on Isis territories as they did on Kurdish-held parts of Syria, let alone shown the same sort of “benign neglect” towards the PKK and YPG that they have been offering to Isis, that blood-stained “caliphate” would long since have collapsed – and arguably, the Paris attacks may never have happened. And if Turkey were to do the same today, Isis would probably collapse in a matter of months. Yet, has a single western leader called on Erdoğan to do this? The next time you hear one of those politicians declaring the need to crack down on civil liberties or immigrant rights because of the need for absolute “war” against terrorism bear all this in mind. Their resolve is exactly as “absolute” as it is politically convenient. Turkey, after all, is a “strategic ally”. So after their declaration, they are likely to head off to share a friendly cup of tea with the very man who makes it possible for Isis to continue to exist.
Paul Merrell

U.S. Dropped 23,144 Bombs on Muslim Countries in 2015 | Global Research - Centre for Re... - 0 views

  • Council of Foreign Relations resident skeptic Micah Zenko recently tallied up how many bombs the United States has dropped on other countries and the results are as depressing as one would think. Zenko figured that since Jan. 1, 2015, the U.S. has dropped around 23,144 bombs on Iraq, Syria, Afghanistan, Pakistan, Yemen, and Somalia, all countries that are majority Muslim. The chart, provided by the generally pro-State Department think tank, puts in stark terms how much destruction the U.S. has leveled on other countries. Whether or not one thinks such bombing is justified, it’s a blunt illustration of how much raw damage the United States inflicts on the Muslim world:
  • It does not appear to be working either. Despite the fact that the U.S. dropped 947 bombs in Afghanistan in 2015, a recent analysis in Foreign Policy magazine found that the Taliban control more territory in Afghanistan than at any point since 2001. The U.S. has entered its 16th year of war in Afghanistan despite several promises by the Obama administration to withdraw. In October of last year, President Obama reversed his position and decided to keep American troops in Afghanistan until the end of 2017. The last four U.S. presidents have bombed Iraq, and that includes the current one since airstrikes were launched on Aug. 7, 2014. The war against ISIS was originally framed as a “limited,” “humanitarian“ intervention. Since then, former Defense Secretary Leon Panetta has insisted it will be a “30-year war” and the White House has spoken vaguely of a “long-term effort” in both Iraq and Syria. Another red flag Zenko noted was the complete lack of civilian deaths being tallied as a result of those 23,144 bombs. Remarkably, they also claim that alongside the 25,000 fighters killed, only 6 civilians have “likely” been killed in the seventeen-month air campaign. At the same time, officials admit that the size of the group has remained wholly unchanged. In 2014, the Central Intelligence Agency (CIA) estimated the size of the Islamic State to be between 20,000 and 31,000 fighters, while on Wednesday, Warren again repeated the 30,000 estimate. To summarize the anti-Islamic State bombing calculus: 30,000 – 25,000 = 30,000.
  • So after more than 20,000 bombs, the U.S. Defense Department only cops to the deaths of six civilians. This is a position largely accepted by the media, which rarely asks who is actually being extinguished by the airstrikes in Syria and Iraq. In October, 30 civilians died after the U.S. bombed a hospital in Kunduz, Afghanistan. The incident is still being investigated, but it has already been revealed that many elements of the original story were either false or deliberately misleading.
Paul Merrell

Emails to Hillary contradict French tale on Libya war - Al-Monitor: the Pulse of the Mi... - 0 views

  • French spies secretly organized and funded the Libyan rebels who defeated Moammar Gadhafi, according to confidential emails to Hillary Clinton that were made public on June 22.
  • “In return for their assistance,” the memo states, “the DGSE officers indicated that they expected the new government of Libya to favor French firms and national interests, particularly regarding the oil industry in Libya.” The email goes on to state that Jalil and Younis “accepted this offer” and “have maintained contact with the DGSE officers in Cairo.” The memo is titled, “How the French created the National Libyan Council, ou l’argent parle.” Another memo dated May 5 asserts that individuals close to the council stated “in strictest confidence” that as early as mid-April 2011 French humanitarian flights also included “executives from the French company TOTAL, the large construction from VINCI and the European Aeronautic Defence and Space Company N.V. (EADS).” Subsequent flights have allegedly carried representatives “from the conglomerate THALYS and other large French firms, all with close ties to [Sarkozy].” “After meeting with the [council] these French business executives leave discreetly by road, via Tobruk to Egypt,” the memo states. “These convoys are organized and protected by para-military officers [from the DGSE].” The memo adds that Levy himself came up with the idea and obtained the council’s signature on an agreement to give French firms “favorable consideration” in business matters. He is said to have used “his status as a journalist to provide cover for his activities.”
  • The memos from Clinton adviser Sidney Blumenthal contradict the popular French narrative about its intervention in Libya, raising fresh questions about a war that toppled a dictator but left chaos and radicalism in his stead. They were allegedly written by retired CIA operative Tyler Drumheller and released by a special congressional panel investigating the 2012 attack on the US mission in Benghazi. The oft-repeated media tale in France holds that then-President Nicolas Sarkozy was outraged by Gadhafi’s crackdown on protesters in February 2011 but had no clear idea who to support. Enter a swash-buckling “intellectual,” Bernard-Henri Levy, who met with Transitional National Council leader Mustafa Abdul Jalil on March 4, immediately called Sarkozy, and had the French president invite Jalil to the Elysee Palace — and recognize the council as the country’s official government by March 10. The emails to Clinton tell a distinctly less heroic story. According to one entry from March 22, 2011, “officers” with the General Directorate for External Security — the French intelligence service — “began a series of secret meetings” with Jalil and Gen. Abdul Fatah Younis in Benghazi in late February and gave them “money and guidance” to set up the council, whose formation was announced Feb. 27. The officers, “speaking under orders from [Sarkozy] promised that as soon as the [council] was organized France would recognize [it] as the new government of Libya.”
  • ...2 more annotations...
  • A later memo, from September 2011, asserts that Sarkozy urged the Libyans to reserve 35% of their oil industry for French firms — Total in particular — when he traveled to Tripoli that month. In the end, however, Italy’s Eni came out ahead with Russian and Chinese firms biding their time, even as the Libyan oil production plummeted because of the civil war. The veracity of the memos’ content is difficult if not impossible to ascertain. While Levy has long been a controversial figure in France, the council was riven by internal rivalries. Younis himself was assassinated in July 2011 — at Jalil’s urging according to an Aug. 8 memo to Clinton. And Drumheller himself has courted controversy for his role in the run-up to the 2003 Iraq war, with liberals celebrating him as a truth-teller and conservatives saying he helped concoct some of the false information he later debunked.
  • French spymasters’ role in Libya has been alluded to before, most notably in the 2012 book “The Truth About our War in Libya” by French historian Jean-Christophe Notin. That book said Henry-Levy’s role in the French decision to go to war had been overblown. “All has not been said about this war, because it has only had one narrator: Bernard-Henri Levy,” Notin told L’Express magazine. “Yes, he was one of the Libyans’ interlocutors. But his telling glosses over not only the coalition’s military exploits, but also the underground work of diplomatic and military officials on the ground, sometimes for quite some time, in Libya.” Other memos released June 22 give credence to the notion that Sarkozy was determined from the start of the uprising to get rid of Gadhafi, despite earlier efforts to court him after he abandoned his weapons program and sought closer ties with the West. A March 20 memo, for instance, states that Sarkozy “plans to have France lead the attacks on [Gadhafi] over an extended period of time” and “sees this situation as an opportunity for France to reassert itself as a military power.”
Paul Merrell

Shell stops Arctic activity after 'disappointing' tests - BBC News - 0 views

  • Royal Dutch Shell has stopped Arctic oil and gas exploration off the coast of Alaska after "disappointing" results from a key well in the Chukchi Sea.In a surprise announcement, the company said it would end exploration off Alaska "for the foreseeable future".Shell said it did not find sufficient amounts of oil and gas in the Burger J well to warrant further exploration.The company has spent about $7bn (£4.5bn) on Arctic offshore development in the Chukchi and Beaufort seas."Shell continues to see important exploration potential in the basin, and the area is likely to ultimately be of strategic importance to Alaska and the US," said Marvin Odum, president of Shell USA. "However, this is a clearly disappointing exploration outcome for this part of the basin."
  • Indeed some analysts suggested Shell might give up on the Arctic completely. "It is possible that Shell might almost be relieved as they can stop exploration for a legitimate operational reason, rather than being seen to bow to environmental pressure," Stuart Elliott from energy information group Platts told the BBC."With the oil price around $50 a barrel, it was a risky endeavour with no guarantee of success. "You could argue that this has been bad for Shell's reputation and it wouldn't be a big surprise if they abandoned Arctic drilling altogether."
  • So, what changed?Certainly, the first findings from the Burger J exploration well 150 miles off the Alaskan coast were not promising.Second, although President Barack Obama had given the necessary permissions for drilling to start again following the problems of rig fires in 2012, Mrs Clinton's tweet revealed that political risks were still substantial.
  • ...3 more annotations...
  • The US Geological Survey estimates that the Arctic holds about 30% of the world's undiscovered natural gas, as well as 13% of its oil.According to Shell, this amounts to around 400 billion barrels of oil equivalent, 10 times the total oil and gas produced in the North Sea to date.
  • However, environmental groups oppose Arctic offshore drilling, saying it will pollute and damage a natural wilderness largely untouched by human activity. They also argue that fossil fuels such as oil and gas must be left in the ground if the world is to avoid dangerous climate change.Over the summer, protesters in kayaks unsuccessfully tried to block Arctic-bound Shell vessels in Seattle and Portland, Oregon. "Big oil has sustained an unmitigated defeat," said Greenpeace UK executive director John Sauven."The Save the Arctic movement has exacted a huge reputational price from Shell for its Arctic drilling programme, and as the company went another year without striking oil, that price finally became too high."Shell had continued to explore for oil despite the slump in the price of oil. Other oil and gas majors have shelved expensive exploration projects but, having invested billions of dollars in its Arctic project, Shell persisted, believing that Arctic oil would be competitive in the longer term.This is why the announcement came as such a surprise.
  • More on this story Video Shell calls end to Alaska oil search 52 minutes ago Shell has made a costly call to abandon Alaska 28 September 2015 'Volatile' oil price hard to predict, says Shell boss 17 September 2015 Why mega-merger is so important for Shell 8 April 2015 BP profits fall on low oil price 28 July 2015
  •  
    Not mentioned in the article, but environmental groups recently announced that they would begin a consumer boycott of Shell fuels because of its Artic drilling.  
Paul Merrell

In Britain, Spy Chief Calls for More Power for Agency - NYTimes.com - 0 views

  • Britain’s domestic intelligence chief has demanded greater authority for spies to help fight the threat of Islamist extremism, a sign that the attack on a satirical newspaper in Paris is likely to sharpen the security-versus-privacy debate in Western countries.Andrew Parker, the director general of MI5, said militants were planning attacks in Britain similar to the one that killed 12 people at the newspaper, Charlie Hebdo.
  • Amid a backlash against digital surveillance after disclosures by the former National Security Agency contractor Edward J. Snowden in 2013, Mr. Parker said there was a growing imbalance between the number of terrorist plots against Britain and the ability of spies to track their communications. Continue reading the main story Related Coverage Charlie Hebdo Suspects Dead in Raid; Hostage Taker in Paris Is Also KilledJAN. 9, 2015 Why Reams of Intelligence Did Not Thwart the Paris AttacksJAN. 9, 2015 Speaking at MI5 headquarters late on Thursday, he warned against an atmosphere in which privacy was “so absolute and sacrosanct that terrorists and others who mean us harm can confidently operate from behind those walls without fear of detection.”
  • “If we are to do our job, MI5 will continue to need to be able to penetrate their communications as we have always done,” he said. “That means having the right tools, legal powers and the assistance of companies which hold relevant data.”“Currently,” he added, “this picture is patchy.”
  • ...1 more annotation...
  • In recent months, intelligence services in Britain and the United States have publicly been campaigning against pressure to rein in their surveillance operations, notably pitting them against the American technology companies that dominate the Internet, like Google, Facebook and Apple.Robert Hannigan, the recently appointed director of GCHQ, Britain’s electronic intelligence agency, castigated Internet companies in November for providing the “command-and-control networks of choice for terrorists and criminals” and challenged them to find a better balance between privacy and security.Companies are stepping up efforts to strengthen encryption, saying they are responding to demands for more privacy from their users.
  •  
    "Our government has kept us in a perpetual state of fear - kept us in a continuous stampede of patriotic fervor - with the cry of grave national emergency. Always, there has been some terrible evil at home, or some monstrous foreign power that was going to gobble us up if we did not blindly rally behind it. Yet, in retrospect, these disasters seem never to have happened, seem never to have been quite real." - General Douglas MacArthur (1880-1964); source: Whan, ed. "A Soldier Speaks: Public Papers and Speeches of General of the Army Douglas MacArthur," (1965); Nation, August 17, 1957.
Paul Merrell

Maybe Obama's Sanctions on Venezuela are Not Really About His "Deep Concern" Over Suppr... - 0 views

  • The White House on Monday announced the imposition of new sanctions on various Venezuelan officials, pronouncing itself “deeply concerned by the Venezuelan government’s efforts to escalate intimidation of its political opponents”: deeply concerned. President Obama also, reportedly with a straight face, officially declared that Venezuela poses “an extraordinary threat to the national security” of the U.S. — a declaration necessary to legally justify the sanctions. Today, one of the Obama administration’s closest allies on the planet, Saudi Arabia, sentenced one of that country’s few independent human rights activists, Mohammed al-Bajad, to 10 years in prison on “terrorism” charges. That is completely consistent with that regime’s systematic and extreme repression, which includes gruesome state beheadings at a record-setting rate, floggings and long prison terms for anti-regime bloggers, executions of those with minority religious views, and exploitation of terror laws to imprison even the mildest regime critics. Absolutely nobody expects the “deeply concerned” President Obama to impose sanctions on the Saudis — nor on any of the other loyal U.S. allies from Egypt to the UAE whose repression is far worse than Venezuela’s. Perhaps those who actually believe U.S. proclamations about imposing sanctions on Venezuela in objection to suppression of political opposition might spend some time thinking about what accounts for that disparity.
  • That nothing is more insincere than purported U.S. concerns over political repression is too self-evident to debate. Supporting the most repressive regimes on the planet in order to suppress and control their populations is and long has been a staple of U.S. (and British) foreign policy. “Human rights” is the weapon invoked by the U.S. Government and its loyal media to cynically demonize regimes that refuse to follow U.S. dictates, while far worse tyranny is steadfastly overlooked, or expressly cheered, when undertaken by compliant regimes, such as those in Riyadh and Cairo (see this USA Today article, one of many, recently hailing the Saudis as one of the “moderate” countries in the region). This is exactly the tactic that leads neocons to feign concern for Afghan women or the plight of Iranian gays when doing so helps to gin up war-rage against those regimes, while they snuggle up to far worse but far more compliant regimes. Any rational person who watched the entire top echelon of the U.S. government drop what they were doing to make a pilgrimage to Riyadh to pay homage to the Saudi monarchs (Obama cut short a state visit to India to do so), or who watches the mountain of arms and money flow to the regime in Cairo, would do nothing other than cackle when hearing U.S. officials announce that they are imposing sanctions to punish repression of political opposition. And indeed, that’s what most of the world outside of the U.S. and Europe do when they hear such claims. But from the perspective of U.S. officials, that’s fine, because such pretenses to noble intentions are primarily intended for domestic consumption.
  • As for Obama’s decree that Venezuela now poses an “extraordinary threat to the national security” of the United States, is there anyone, anywhere, that wants to defend the reasonability of that claim? Think about what it says about our discourse that Obama officials know they can issue such insultingly false tripe with no consequences. But what’s not too obvious to point out is what the U.S is actually doing in Venezuela. It’s truly remarkable how the very same people who demand U.S. actions against the democratically elected government in Caracas are the ones who most aggressively mock Venezuelan leaders when they point out that the U.S. is working to undermine their government. The worst media offender in this regard is The New York Times, which explicitly celebrated the 2002 U.S.-supported coup of Hugo Chavez as a victory for democracy, but which now regularly derides the notion that the U.S. would ever do something as untoward as undermine the Venezuelan government. Watch this short video from Monday where the always-excellent Matt Lee of Associated Press questions a State Department spokesperson this week after she said it was “ludicrous” to think that the U.S. would ever do such a thing:
  • ...2 more annotations...
  • The real question is this: if concern over suppression of political rights is not the real reason the U.S. is imposing new sanctions on Venezuela (perish the thought!), what is? Among the most insightful commentators on U.S. policy in Latin America is Mark Weisbrot of Just Foreign Policy. Read his excellent article for Al Jazeera on the recent Obama decree on Venezuela. In essence, Venezuela is one of the very few countries with significant oil reserves which does not submit to U.S. dictates, and this simply cannot be permitted (such countries are always at the top of the U.S. government and media list of Countries To Be Demonized). Beyond that, the popularity of Chavez and the relative improvement of Venezuela’s poor under his redistributionist policies petrifies neoliberal institutions for its ability to serve as an example; just as the Cuban economy was choked by decades of U.S. sanctions and then held up by the U.S. as a failure of Communism, subverting the Venezuelan economy is crucial to destroying this success. As Weisbrot notes, every country in the hemisphere except for the U.S. and Canada have united to oppose U.S. sanctions on Venezuela. The Community of Latin American and Caribbean States (CELAC) issued a statement in February in response to the prior round of U.S. sanctions on Venezuela that “reiterates its strong repudiation of the application of unilateral coercive measures that are contrary to international law.” This week, the chief of the Union of South American Nations (UNASUR) issued a statement announcing that “UNASUR rejects any external or internal attempt at interference that seeks to disrupt the democratic process in Venezuela.” Weisbrot compares Obama’s decree this week on Venezuela to President Reagan’s quite similar 1985 decree that Nicaragua was a national security threat to the U.S., and notes: “The Obama administration is more isolated today in Latin America than even George W. Bush’s administration was.”
  • If Obama and supporters want the government of Venezuela to be punished and/or toppled because they refuse to comply with U.S. dictates, they should at least be honest about their beliefs so that their true character can be seen. Pretending that any of this has to do with the U.S. Government’s anger over suppression of political opponents — when their closest allies are the world champions at that — should be too insulting of everyone’s intelligence to even be an option.
1 - 20 of 1353 Next › Last »
Showing 20 items per page