Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged CA

Rss Feed Group items tagged

Paul Merrell

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Paul Merrell

Canadians have united to reject fear and stop Bill C-51. Will the government listen? | ... - 0 views

  • It's rare in Canadian politics to see intense public interest in government legislative proposals -- let alone to see Canadians take to the streets in the tens of thousands to protest a piece of legislation by name. Yet that's exactly what has happened in the case of Bill C-51, which critics, including The Globe and Mail's editorial team, say will undermine basic democratic values and lead to the creation of a "secret police force" in Canada. In the space of a few short months since Bill C-51 was announced, hundreds of thousands of people have taken action to stop it: signing petitions, writing letters to local newspapers, phoning and writing to their member of Parliament, and hitting the streets in nationwide demonstrations in over 70 communities across Canada. It's not hard to see why so many people are concerned. Canada's top privacy and security experts warn that this legislation will undermine democratic rights Canadians have enjoyed for generations. For example, according to professors Craig Forcese and Kent Roach, who have conducted a detailed legal analysis of the legislation, Bill C-51 will:
  • Undermine Canadians' privacy by allowing widespread information disclosures among government agencies, and by giving the Canadian Security and Intelligence Service (CSIS) access to personal information held by up to 17 government departments. Even Stephen Harper has admitted that these kinds of dragnet surveillance measures are ineffective. Chill free speech online by criminalizing what is loosely defined as the promotion of "terrorism offences in general" and even showing "reckless disregard" for whether a particular post may encourage a violent act. As Forcese and Roach point out in their testimony to the Senate Standing Committee on National Security and Defence, "The new speech crime in our view violates freedom of expression because it reaches well beyond the sort of speech that threatens actual violence." Dramatically expand the powers of CSIS, without any commensurate increase in oversight or review measures. The legislation even allows CSIS to obtain a warrant permitting them to break the law and contravene the Charter rights of Canadians. Under C-51, such warrants would be granted in a secret hearing, with no representation from the target of such measures, and with no right of appeal.
  • So it's no surprise that Canadians are worried. What is unprecedented however, is the sheer number of Canadians taking part in the campaign to stop the bill. My organization, OpenMedia, has been campaigning on privacy issues for years -- but in all our time, we've never seen a public outpouring quite like this. Our joint efforts are clearly having an impact: public opinion has swung dramatically against Bill C-51 since it was announced. Support has plummeted, with a recent Forum Research poll finding that 56 per cent of Canadians now oppose Bill C-51, with just 33 per cent in favour. The business community, civic society groups, and principled conservatives have all spoken out. Sadly, there's no sign that the government is listening. At the time of writing, the government seems determined to use its majority to ram the legislation through the Commons in the coming weeks. What's even more worrying is that this reckless, dangerous, and ineffective legislation will further undermine Canadians' privacy rights -- rights that have already been seriously damaged by the government's Bill C-13, passed late last year, and by the government's failure to address the mass surveillance activities of its Canadian Security Establishment (CSE) intelligence agency.
Paul Merrell

Canada: The Ottawa Shootings and the Derogation of Constitutional Rights. Did Zebaf-Bib... - 0 views

  • The tragic shooting of Cpl. Nathan Cirillo on October 22, 2014 at the War Memorial in Ottawa, Ontario, Canada followed by a shoot-out at the House of Commons, and the death of the shooter, Michael Zebaf-Bibeau, serves as a catalyst to advance several hidden government agendas. The Canadian government wants to spread unreasonable fear of radical, violent Muslim terrorists so that it can better control all Canadians, especially those who choose to exercise their constitutionally enshrined rights. The government is also advancing a social control mechanism so that it can deny and negate domestic constitutional rights, in particular Section 35 of the Constitution Act, 1982 which recognizes and affirms aboriginal and treaty rights
  • It is very unlikely that Michael Zebaf-Bibeau acted alone. Prof. John McMurtry, author of The Cancer Stage of Capitalism From Crisis to Cure explains in “Canada: Decoding Harper’s Terror Game. Beneath the Masks and Diversions” describes Zebaf-Bibeau as a “ clinically insane, drug-addicted petty criminal living in a homeless shelter in Ottawa who had warned a judge in front of the police back in 2011:”‘If you can’t keep me in, I’m going to do something”. Furthermore, McMurtry wonders, “Who could have been a better tool for the events to come?” The notion that Zebaf-Bibeau was being exploited or set up by a handler/manager/police-informer is further reinforced by observations of investigative reporter Amy MacPherson who credibly claims in “Government Envisages Anti-Constitutional Surveillance Law During Ottawa Shooting” that U.S authorities had advance information. She wonders “… how American intelligence knew the name of a ‘possible terrorist’ as the mayhem was still unfolding. How did Americans know when Canadians didn’t, and how was this information so widespread that American media and Google had access to distribute, but domestic reporters on the scene did not?”
  • The theory that U.S agencies were somehow implicated in the tragedy is further reinforced by the fact that Operation Determined Dragon, a joint Canada/U.S counter-terrorism drill, was executed from 20 to 29 October 2014, so the murder of Cpl. Nathan Cirillo coincided with the time that Determined Dragon was being executed. Yet the Canadian government frames this tragedy as rooted in Islamic terrorism rather than the more credible alternative: that a homeless drug addict could have been used as a tool to further an already finalized agenda to participate in an illegal war in Iraq, and to restrict the rights and freedoms of all Canadians. Not surprisingly, the passing of the anti-constitutional surveillance law – Bill C-13, had also been expedited.
Paul Merrell

And The Benghazi Media Circus Plays On… | Global Research - 0 views

  • A recent article written by this writer for Global Research posted last Saturday – “The Benghazi Scandal Is Obama’s Watergate But Worse” – was written in an effort to seek and uncover the truth. Accurate reporting on major world events is a challenge in today’s world where propaganda and disinformation are mainstream media norms and where virtually all major players in American politics simply lie through their teeth every time they open their mouths in constant effort to look good and cover up the truth. The American public knows this pathetic and sobering fact that deception has come to rule in the world of both politics and the media. People today neither believe their newscasters nor their political leaders. That is why examining the content of the tidal wave of assertions and opinions spewing forth from politicians and pundits in the aftermath of the latest Benghazi revelations must be taken with a grain of salt. Again, truth in today’s world is hard to come by. But as an investigative reporter, presenting a brief overview of recent comments and statements for any informed citizen to process and digest seems a worthwhile and important enterprise.
  • A timeline of recently unfolding events: On 10/12/12 exactly one month after the Benghazi incident, the legal conservative group Judicial Watch filed a Freedom of Information Act request seeking documents related to the Benghazi attack on September 11th, 2012 that killed the US Ambassador to Libya Christopher Stevens and three other Americans. Obama, who had campaigned on a promise of transparency in the criminal wake of the Bush regime, has proven to be anything but open and transparent. Having to sue the US government for access to the records, on April 18th, 2014, a full year and a half later, the Obama administration’s stonewalling ultimately failed and Judicial Watch successfully got hold of 41 State Department Benghazi related documents. Emails between high level White House officials discussing damage control strategies in the immediate aftermath of the Benghazi assault were released last week. Jubilant Republicans are now calling one of those emails their “smoking gun,” believing it is so incriminating that it will do in their would-be opponent Hillary Clinton from potentially competing in the 2016 presidential election.
  • The newly declassified email written by Obama’s then Deputy Strategic Communications Adviser Ben Rhodes specifically directed then UN Ambassador Susan Rice in preparation for her Sunday morning talk show appearances on September 16th, 2012 to explain the administration’s take on what it knew of the Benghazi murders. Rhodes advised Rice to attribute the Benghazi uprising as “rooted in an Internet video, and not a failure of policy,” pushing talking points designed to bolster Obama’s presidential image as a cool-as-a-cucumber-under-fire kind of wise and benevolent leader and statesman. The major emphasis of the email instructed Rice to blame the bogus anti-Moslem video as inciting a spontaneous protest like in other countries in the region that apparently grew violently out of control, of course all the while knowing that that was a boldface lie. This crucial piece of evidence proves that President Obama and Secretary of State Hillary Clinton both knew that the video did not cause the attack but that they chose to willfully deceive the American public in order to protect their own political careers and hence was born the infamously never ending Benghazi cover-up. Obama and Hillary withheld this damning email evidence even from the House Oversight Committee led by Congressman Darrel Issa (R-CA) requesting all documents pertaining to Benghazi more than a year ago. With the presidential election less than two months away at the time of the attack, Obama and Hillary were determined at all cost to keep hidden from Americans the real truth of criminal Benghazi activity they were guilty of engaging in during the months leading up to the attack. Last Thursday an angry Issa subpoenaed current Secretary of State John Kerry to appear before the committee on May 21st to further explain why those critical State Department records recently given to Judicial Watch were not among the 3200 documents originally handed over to his committee well over a year ago.
  • ...9 more annotations...
  • Investigative reporter Kenneth R. Timmerman as author of a new forthcoming book entitled ‘Dark Forces: The Truth About What Happened in Benghazi’ states: We know that orders were issued, then recalled, to deploy a 50-man Special Forces unit from Croatia that could have reached Benghazi within hours.Timmerman concludes that to date no documents revealing the person who ordered that unit to stand down have yet to surface.
  • Within hours of the general’s testimony came rebukes from both the senior Republican and Democrat on the powerful House Armed Services Committee making claims backing the administration’s that the military was incapable of responding in time to assist the ill-fated Americans in Benghazi. Because they represent the military in Congress that had already drawn the conclusion that nothing tactically could have been done to save the four Americans, they were quick to rebut the general’s testimony. Yet the day before 9/11 every year since 9/11/01 including on 9/10/11, the president meets with top military and security personnel to ensure that US embassies around the globe are bolstered with much needed extra security for 9/11 readiness. Yet the Benghazi compound was so insecure despite repeated requests, both Obama and the military apparently failed to have any military units on standby that could reach Benghazi to be of service on the night of 9/11/12. And this comes after intelligence sources have been reporting insufficient security at the Benghazi embassy compound.
  • Another disclosure at last Thursday’s House Oversight Committee hearing further damaging the credibility and actions of the Obama administration came from retired Air Force General Robert Lovell who at the time of Benghazi was in Germany serving as the senior African Command deputy director for intelligence. Lovell testified, “We should have sent help,” adding that the White House decision not to attempt military assistance due to the time factor was unacceptable. Lovell also stated unequivocally that the military knew that the Benghazi attack had nothing to do with the video falsely used by the administration to explain away the tragedy. The ex-general felt his military should have intervened and was waiting all night long for the call that never came from his bosses in Washington. Clearly he feels a sense of remorse and regret over the passivity imposed on him by his commander-in-chief Obama and State Department head Clinton.
  • Meanwhile, last week in a heated exchange with ABC correspondent Jon Karl a visibly agitated White House Press Secretary Jay Carney insisted that Rhodes’ email was not related to Benghazi at all but referred to the Moslem protests generally taking place in the region in response to the video. The next day Fox reporter Ed Henry engaged Carney on the same issue, eliciting the same haranguing reaction. All this appears to be yet more desperate lies in a feeble attempt to cover his bosses’ Obama and Hillary’s asses called criminal guilt, and by so doing committing his own. Carney had been among the original recipients of Rhodes’ email. Carney further explained that the same Rhodes talking points echoed those delivered earlier to Congress and the White House by deputy CIA director Mike Morell who a month ago claimed he received no pressure or influence from anyone in the Obama administration in coming up with his version of what most likely transpired on 9/11/12 based on all CIA intelligence sources available at the time. Yet on his own Morell admitted to toning down the intelligence reports leading up to the Benghazi attack purposely so as to not appear to be an “I told you so” gesture that would offend Hillary and her State Department. That said, Hillary’s underling and rising star Victoria Nuland (the later promoted to profanity-speaking Assistant Secretary of State who played such a key role in the recent US backed fascist Ukrainan coup) objected to Morell’s talking points that in her mind leaned too heavily toward blaming her boss and their State Department for insufficient security at the Benghazi compound. Her words:
  • Why do we want Hill to start fingering Ansar Al Sharia [the known al Qaeda affiliated attackers that murdered the four Americans], when we aren’t doing that ourselves until we have the investigation results…and the penultimate point could be abused by Members to beat the State Department for not paying attention to Agency warnings so why do we want to feed that?… Concerned.Observe how the exclusive focus of all post-Benghazi interdepartmental correspondence from Rhodes’ to Morell’s to Nuland’s all center on appearance and potential perception to avoid CYA blame. Furthest down on their priority list is honest and truthful disclosure and self-accountability. Again, the name of the game in the world of politics is passing the buck whenever possible to minimize potential heat that comes with looking bad and maximizing looking good by any means or lies necessary. Benghazi perfectly illustrates all of this.
  • Based on the information finally coming to light all last week, last Friday House Speaker John Boehner (R-OH) called for a special select committee not unlike the one for Watergate to further investigate Benghazi. Representative Trey Gowdy (SC-R) has already been selected as its lead investigator. This grandstanding ploy seems a bit superfluous and redundant since the House Oversight Committee has ostensibly been trying to get to the bottom of Benghazi for nearly a year and a half, albeit thus far ineffective in its results, no help from the State Department’s prior email omissions. Not only is Benghazi the hot topic buzzing here in America, on that same day last Friday, more bullets was buzzing in Benghazi as well. Nine police security soldiers were gunned down by, you guessed it, the same murderers still remaining at large that were behind the 9/11/12 Benghazi attack – the militant group the US has for years labeled an al Qaeda affiliated terrorist organization Ansar al-Sharia. After massacring 31 peaceful demonstrators protesting outside the militants’ headquarters last June, last week’s massacre is a powerful statement showing that the terrorists are still in charge in Benghazi and immune from any accountability from the US installed puppet government either in Tripoli or Washington. They remain free men at large despite Obama’s promise to hunt them down and bring them to justice.
  • The senior Democratic House Intel Committee Representative Adam Schiff (D-CA) typifies the partisan Obama-Hillary politics games of each side racing to the media to point fingers at each other in their same old, same old blame game. On Sunday Schiff stated he does not want any Democrats to participate in the newly forming select committee that the Republican House Speaker Boehner has just recently called for, already naming its GOP chair. That is simply a game the Dems will refuse to play. Why? Because Republicans cannot make them. Sound familiar? Perhaps your 7-year old child might employ this same game strategy. Insider Dems like former White House advisor turned ABC analyst (and another original recipient of Rhodes’ infamous email) David Plouffe conveniently took to ABC’s Sunday morning On This Week with George Stephanopoulos crying foul even louder with their familiar “conspiracy” chant they customarily use to discredit any criticism leveled at the Obama administration. His cries reaching desperation this week accuse a “very loud, delusional minority” of Republicans of an obsessive politics game over Benghazi. Another all too familiar grade school tactic, whatever misbehavior you are accused of, simply accuse your enemy of the same offense, an old early childhood trick that you never need outgrow in the world of politics.
  • Still another indignant reaction hardcore defenders of Hillary and Obama are now quick to cite are the thirteen embassy attacks that occurred as so called “Benghazi’s on Bush’s watch” when not a peep was ever heard from the press. This straw house strategy is designed to show how Republicans and Fox News are hypocritical in their obsession to find dirt on Benghazi where they deny any exists. Yet this accusation seems to omit one very significant fact. Not one of those embassy attacks during the Bush regime resulted in any murdered Americans, much less four of them and one being a US Ambassador, something that has not happened in the last 32 years before Benghazi. The media circus demonizing partisan politics players on both sides epitomizes why the US government is so utterly broken, horribly dysfunctional, morally bankrupt and totally ineffective in addressing any and all of the most pressing problems facing America and the world today. The blame game is all they know. Yet in all their exaggeration, lies, name calling and finger pointing, not one of them is even addressing the pink elephant in the room.
  • Obama, Hillary and then CIA Director retired General Betrayus Petraeus were/are international gun running criminal outlaws of the worst kind, working with the very same al Qaeda terrorist bunch that murdered those four nearly forgotten Americans. US tax dollars were/are going into the pockets of Ansar al-Sharia and al Qaeda mercenaries that looted Muammar Kaddafi’s gold cache and enormous weapon arsenal that included chemical weapons as well as surface to air missiles. And Obama, Petraeus and 2016 presidential heir apparent Hillary were in deep over their heads under Hillary and Stevens’ State Department cover, shipping them from Benghazi through Turkey to Syria to covertly fight a war by proxy against Assad’s government forces. After more than three bloody years, to this day the US is still bent on destroying another sovereign nation posing absolutely no security threat to America. These are the war crimes constantly being committed by Obama, Petraeus and Hillary and their lies upon lies are unraveling at an accelerated clip with each passing month. Thus, expect to see more desperate acts of aggression from desperate despots who know that their jig is up. Yet desperate despots do not care how many humans they will take down with them. But justice for these longtime perpetrators of multiple crimes against humanity will be served in the end.
Paul Merrell

Why the United States Always Loses Its Wars | Global Research - 0 views

  • America loses all its wars because it seems we’ve always been on the wrong side of history. Morally nor legally should any nation have the right to invade and occupy another sovereign nation, much less believe it can achieve victory in long, protracted wars. Yet in violation of all ethical precepts and all international laws, the sole global superpower citing its impunity through exceptionalism hypocritically insists it can maintain its moral high ground in its relentless pursuit of regime changes anywhere it so chooses on earth. We are the global village bully that’s hated by much of the world. And it’s pure self-aggrandizing bullshit to perpetrate the myth that America is hated because of our “freedom,” another rhetorical brainwashing lie. We now live in a fascist totalitarian police state run by a globalized crime syndicate of the central banking cabal. As of last April per a Princeton-Northwestern study the US has officially been designated an oligarchy. Last year after a group of ethnic Russians living in Crimea voted to become part of Russia, the Russian military claimed control over its own naval base there that the US-NATO had been lusting to steal after the unlawful overthrow of Ukraine’s democratically elected sovereign government. Ever since it’s been nonstop lies and propaganda propagated to demonize Putin as the aggressor when in fact all along it’s the American Empire that’s been recklessly pushing what could end up World War III against nuclear powered Russia. With US-NATO missiles installed on Russia’s doorstep in virtually every former Soviet eastern bloc nation, hemming Russia in, who’s really the aggressor here?
  • Meanwhile, despite costing US taxpayers up to six trillion dollars and counting in Iraq alone and another trillion so far in Afghanistan in this age of increasing austerity, the albeit detached reverence for the US military and its abysmal losing war record fail to draw much notice or reflection, much less any real criticism or troubleshooting that might correct the same pattern of mistakes being repeated indefinitely. Another article in the same issue calls for resurrecting the draft as the feeble answer, something my ex-West Point roommate-former Afghan Ambassador-retired general and current Council on Foreign Relations (CFR) member Karl Eikenberry has also publicly advocated. They are all missing the point, unwilling or unable to address the pink elephant in the global room. Respected author-activist David Swanson wrote an incisive rebuttal also confronting the Atlantic article for not answering the obvious question of why America loses at war. He makes the excellent point: The U.S. has killed huge numbers of men, women, and children, made itself hated, made the world more dangerous, destroyed the environment, discarded civil liberties, and wasted trillions of dollars that could have done a world of good spent otherwise. A draft would do nothing to make people aware of that situation. But Swanson merely glides over as a passing fact that the ruling elite is the only entity that stands to gain from war. He fails to emphasize that it is the elite’s power, money and influence that both initiates, but then by calculated design, willfully sabotages the chance of any US military victory after World War II. The reason is simple. If the US triumphed in war it would only delay the totalitarian New World Order from materialization. Only a weakened United States would expeditiously promote a one world government.
  • As a brief historical review tracing events from the dawn of the twentieth century, media mogul Randolph Hearst used the false flag of the Spanish American War to “remember the USS Maine” sinking in the 1898 Havana harbor as its deceitful justification to ruthlessly, violently colonize Cuba and the Philippines, committing ethnic cleansing with estimates as high as near a half million dead Filipinos in that bloodbath. Then it was the “great” English statesman Winston Churchill who plotted the sinking of the Lusitania killing nearly 1200 of his own British citizens (along with 128 Americans) as the baited sacrifice secretly carrying arms to ignite the First World War that was supposed to end all wars.
  • ...6 more annotations...
  • Then several years later the US encouraged South Korean incursions into Communist North Korea in order to manipulate North Korea into responding in kind. Guaranteeing South Korea full UN support, when the baited North Koreans retaliated by moving two miles inside the South Korean border, that June 1950 “transgression” immediately became the false pretense used to initiate the Korean War.
  • in August 1964 President Johnson lied to the American people with the bogus claim that a US Navy ship was attacked by North Vietnamese gunboats in the Gulf of Tonkin to launch America’s longest running war in history (that is until this century’s everlasting war of terror). That false flag cost near 60,000 American lives and over 3 million dead Southeast Asians, in addition to being the first US humiliating war defeat in its history, marking the first of many consecutive losses.
  • The smaller, less intensive military campaigns of Grenada, Panama, Nicaragua and El Salvador, the First Gulf War, Haiti, Bosnia and Kosovo were all jingoistic saber rattling manipulations of imperialistic Empire overpowering far weaker opponents to take down former US allied dictators (or in the case of Saddam Hussein a preliminary step to the father-son neocon tag team), balkanizing a divide and conquer strategy for global hegemony and imperial war profiteering from the always lucrative drug trafficking trade.
  • Meanwhile, the only true winners of all wars is the oligarch owned and controlled central banking cabal and its Wall Street 500. Once American Empire wreaks military havoc to achieve another ravaged failed state, be it Afghanistan, Iraq, Libya, Somalia, Yemen, a second invasion that becomes the permanent occupation arrives in the form of IMF and World Bank loans. When the war destroyed nation cannot pay the bankster cabal’s loan shark extortion, privatization through transnational corporations rapidly descends as economic hit men-vultures move in for the final kill. The game’s been rigged, set up so no one but the filthy, gluttonous, bloodthirsty, psychopathic vampires comprising the ruling elite can possibly win from all this rigged warring death and destruction.
  • The Zionist neocon creation with a little help from their Saudi-Israeli evil axis friends pulled off the coup of the century on 9/11, massacring 3,000 Americans as their sacrificial lambs, setting into motion the fabricated war on terror masking their actual war on Islam to ensure that a constant fresh supply of made-by-the-USA enemy materializes to justify permanent global violence. During the near ten years that Americans fought in Iraq near a half million Iraqis lost their life, mostly innocent civilians. That toll has only since risen with war still raging. The Islamic State jihadists that the US-Saudi-Israeli unholy alliance secretly created, trained, armed and has funded (just as it did al Qaeda for decades) invaded Iraq last June and is currently in control of more area in Iraq than the weak US puppet government in Baghdad with no end of sectarian violence in sight. Afghanistan looks no better with the puppet Kabul government holding less territory than the surging Taliban that has been waiting for the US military exodus by December 2014 leaving 10,800 US military advisors still remaining behind.
  • The proxy wars leaving Libya as a corrupt and lawlessly violent failed state and Syria a stalemated quagmire with Islamic State mercenaries our not-so-secret friendly boots on the ground still unable to topple and remove Assad from power. Meanwhile, near a quarter of a million people have died in the war in Syria and an astounding 6.5 million have been displaced in that colossal human tragedy supported and caused by the United States.
Paul Merrell

New Snowden docs show U.S. spied during G20 in Toronto - Politics - CBC News - 0 views

  • Top secret documents retrieved by U.S. whistleblower Edward Snowden show that Prime Minister Stephen Harper's government allowed the largest American spy agency to conduct widespread surveillance in Canada during the 2010 G8 and G20 summits.
  • The briefing notes, stamped "Top Secret," show the U.S. turned its Ottawa embassy into a security command post during a six-day spying operation by the National Security Agency while U.S. President Barack Obama and 25 other foreign heads of government were on Canadian soil in June of 2010. The covert U.S. operation was no secret to Canadian authorities.
  • Notably, the secret NSA briefing document describes part of the U.S. eavesdropping agency's mandate at the Toronto summit as "providing support to policymakers." Documents previously released by Snowden, a former NSA contractor who has sought and received asylum in Russia, suggested that support at other international gatherings included spying on the foreign delegations to get an unfair advantage in any negotiations or policy debates at the summit. It was those documents that first exposed the spying on world leaders at the London summit. More recently, Snowden's trove of classified information revealed Canada's eavesdropping agency had hacked into phones and computers in the Brazilian government's department of mines, a story that touched off a political firestorm both in that country and in Ottawa.
  • ...5 more annotations...
  • The secret documents do not reveal the precise targets of so much espionage by the NSA — and possibly its Canadian partner — during the Toronto summit. But both the U.S. and Canadian intelligence agencies have been implicated with their British counterpart in hacking the phone calls and emails of foreign politicians and diplomats attending the G20 summit in London in 2009 — a scant few months before the Toronto gathering of the same world leaders.
  • The spying at the Toronto summit in 2010 fits a pattern of economic and political espionage by the powerful U.S. intelligence agency and its partners such as Canada. That espionage was conducted to secure meeting sites and protect leaders against terrorist threats posed by al-Qaeda but also to forward the policy goals of the United States and Canada. The G20 summit in Toronto had a lot on its agenda that would have been of acute interest to the NSA and Canada.
  • The world was still struggling to climb out of the great recession of 2008. Leaders were debating a wide array of possible measures including a global tax on banks, an idea strongly opposed by both the U.S. and Canadian governments. That notion was eventually scotched. The secret NSA documents list all the main agenda items for the G20 in Toronto — international development, banking reform, countering trade protectionism, and so on — with the U.S. snooping agency promising to support "U.S. policy goals." Whatever the intelligence goals of the NSA during the Toronto summit, international security experts question whether the NSA spying operation at the G20 in Toronto was even legal.
  • "If CSEC tasked NSA to conduct spying activities on Canadians within Canada that CSEC itself was not authorized to take, then I am comfortable saying that would be an unlawful undertaking by CSEC," says Craig Forcese, an expert in national security at University of Ottawa's faculty of law. By law, CSEC cannot target anyone in Canada without a warrant, including world leaders and foreign diplomats at a G20 summit. But, the Canadian eavesdropping agency is also prohibited by international agreement from getting the NSA to do the spying or anything that would be illegal for CSEC.
  • The NSA warns the more likely security threat would come from "issue-based extremists" conducting acts of vandalism. They got that right. Protest marches by about 10,000 turned the Toronto G20 into an historic melee of arrests by more than 20,000 police in what would become one of the largest and most expensive security operations in Canadian history. By the time the tear gas had cleared and the investigations were complete, law enforcement agencies stood accused of mass-violations of civil rights. Add to that dubious legacy illegal spying by an American intelligence agency with the blessing of the Canadian government.
Paul Merrell

"Support MH17 Truth": OSCE Monitors Identify "Shrapnel and Machine Gun-Like Holes" indi... - 0 views

  • The facts speak clear and loud and are beyond the realm of speculation: The cockpit shows traces of shelling! You can see the entry and exit holes. The edge of a portion of the holes is bent inwards. These are the smaller holes, round and clean, showing the entry points most likely that of a 30 millimeter caliber projectile. (Revelations of German Pilot: Shocking Analysis of the “Shooting Down” of Malaysian MH17. “Aircraft Was Not Hit by a Missile” Global Research, July 30, 2014)
  • Based on detailed analysis Peter Haisenko reached  the conclusion that the MH17 was not downed by a missile attack: This aircraft was not hit by a missile in the central portion. The destruction is limited to the cockpit area. Now you have to factor in that this part is constructed of specially reinforced material The OSCE Mission It is worth noting that the initial statements by OSCE observers (July 31) broadly confirm the findings of Peter Haisenko: Monitors from the Organization for Security and Cooperation in Europe reported that shrapnel-like holes were found in two separate pieces of the fuselage of the ill-fated Malaysia Airlines aircraft that was believed to have been downed by a missile in eastern Ukraine. Michael Bociurkiw of the OSCE group of monitors at his daily briefing described part of the plane’s fuselage dotted with “shrapnel-like, almost machine gun-like holes.” He said the damage was inspected by Malaysian aviation-security officials .(Wall Street Journal, July 31, 2014)
  • The monitoring OSCE team has not found evidence of a missile fired from the ground as conveyed by official White House statements. As we recall, the US ambassador to the UN Samantha Power stated –pointing a finger at Russia– that the Malaysian MH17 plane was “likely downed by a surface-to-air missile operated from a separatist-held location”: The team of international investigators with the Organisation for Security and Cooperation in Europe (OSCE) are uncertain if the missile used was fired from the ground as US military experts have previously suggested, the Wall Street Journal (WSJ) reported. (Malay Mail online, emphasis added) The initial OSCE findings tend to dispel the claim that a BUK missile system brought down the plane. Evidently, inasmuch as the perforations are attributable to shelling, a shelling operation conducted from the ground could not have brought down an aircraft traveling above 30,000 feet.
  • ...6 more annotations...
  • Peter Haisenko’s study is corroborated by the Russian Ministry of Defense which pointed to a Ukrainian Su-25 jet in the flight corridor of the MH17, within proximity of the plane. Ironically, the presence of a military aircraft is also confirmed by a BBC  report conducted at the crash site on July 23. All the eyewitnesses  interviewed by the BBC confirmed the presence of a Ukrainian military aircraft flying within proximity of Malaysian Airlines MH17 at the time that it was shot down: 
  • Eyewitness #1: There were two explosions in the air. And this is how it broke apart. And [the fragments] blew apart like this, to the sides. And when … Eyewitness #2: … And there was another aircraft, a military one, beside it. Everybody saw it. Eyewitness #1: Yes, yes. It was flying under it, because it could be seen. It was proceeding underneath, below the civilian one. Eyewitness #3: There were sounds of an explosion. But they were in the sky. They came from the sky. Then this plane made a sharp turn-around like this. It changed its trajectory and headed in that direction [indicating the direction with her hands]. BBC Report below
  • The original BBC Video Report published by BBC Russian Service on July 23, 2014 has since been removed from the BBC archive.  In a bitter irony, The BBC is censoring its own news productions. Media Spin The media is now saying that a missile was indeed fired but it was not the missile that brought down the plane, it was the shrapnel from the missile which punctured the plane and then led to a loss of pressure.  According to Ukraine’s National security spokesman Andriy Lysenko in a contradictory statement, the MH17 aircraft “suffered massive explosive decompression after being hit by a shrapnel missile.”  (See IBT, Australia) In an utterly absurd report, the BBC quoting the official Ukraine statement  says that:
  • The downed Malaysia Airlines jet in eastern Ukraine suffered an explosive loss of pressure after it was punctured by shrapnel from a missile. They say the information came from the plane’s flight data recorders, which are being analysed by British experts. However, it remains unclear who fired a missile, with pro-Russia rebels and Ukraine blaming each other. Many of the 298 people killed on board flight MH17 were from the Netherlands. Dutch investigators leading the inquiry into the crash have refused to comment on the Ukrainian claims.
  • The shrapnel marks should be distinguished from the small entry and exit holes “most likely that of a 30 millimeter caliber projectile” fired from a military aircraft. These holes could not have been caused by a missile attack as hinted by the MSM. While the MSN is saying that the “shrapnel like holes” can be caused by a missile (see BBC report above), the OSCE has confirmed the existence of what it describes as “machine gun like holes”, without however acknowledging that these cannot be caused by a missile. In this regard, the GSh-302 firing gun operated by an Su-25 is able to fire 3000 rpm which explains the numerous entry and exit holes. According to the findings of Peter Haisenko: If we now consider the armament of a typical SU 25 we learn this: It is equipped with a double-barreled 30-mm gun, type GSh-302 / AO-17A, equipped with: a 250 round magazine of anti-tank incendiary shells and splinter-explosive shells (dum-dum), arranged in alternating order. The cockpit of the MH 017 has evidently been fired at from both sides: the entry and exit holes are found on the same fragment of it’s cockpit segment (op cit)
  • The accusations directed against Russia including the sanctions regime imposed by Washington are based on a lie. The evidence does not support the official US narrative to the effect that the MH17 was shot down by a BUK missile system operated by the DPR militia.
  •  
    Looks like John Kerry may be about to get caught in another major lie. 
Paul Merrell

Launching in 2015: A Certificate Authority to Encrypt the Entire Web | Electronic Front... - 0 views

  • Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, IdenTrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.Although the HTTP protocol has been hugely successful, it is inherently insecure. Whenever you use an HTTP website, you are always vulnerable to problems, including account hijacking and identity theft; surveillance and tracking by governments, companies, and both in concert; injection of malicious scripts into pages; and censorship that targets specific keywords or specific pages on sites. The HTTPS protocol, though it is not yet flawless, is a vast improvement on all of these fronts, and we need to move to a future where every website is HTTPS by default.With a launch scheduled for summer 2015, the Let’s Encrypt CA will automatically issue and manage free certificates for any website that needs them. Switching a webserver from HTTP to HTTPS with this CA will be as easy as issuing one command, or clicking one button.
  • The biggest obstacle to HTTPS deployment has been the complexity, bureaucracy, and cost of the certificates that HTTPS requires. We’re all familiar with the warnings and error messages produced by misconfigured certificates. These warnings are a hint that HTTPS (and other uses of TLS/SSL) is dependent on a horrifyingly complex and often structurally dysfunctional bureaucracy for authentication.
  • The need to obtain, install, and manage certificates from that bureaucracy is the largest reason that sites keep using HTTP instead of HTTPS. In our tests, it typically takes a web developer 1-3 hours to enable encryption for the first time. The Let’s Encrypt project is aiming to fix that by reducing setup time to 20-30 seconds. You can help test and hack on the developer preview of our Let's Encrypt agent software or watch a video of it in action here:
  • ...1 more annotation...
  • Let’s Encrypt will employ a number of new technologies to manage secure automated verification of domains and issuance of certificates. We will use a protocol we’re developing called ACME between web servers and the CA, which includes support for new and stronger forms of domain validation. We will also employ Internet-wide datasets of certificates, such as EFF’s own Decentralized SSL Observatory, the University of Michigan’s scans.io, and Google's Certificate Transparency logs, to make higher-security decisions about when a certificate is safe to issue.The Let’s Encrypt CA will be operated by a new non-profit organization called the Internet Security Research Group (ISRG). EFF helped to put together this initiative with Mozilla and the University of Michigan, and it has been joined for launch by partners including Cisco, Akamai, and Identrust.
Gary Edwards

Political Editors: Dick Morris Corrects the Record on Hillary Clinton - The Patriot Post - 0 views

  • Then Bill discusses Hillary’s legal career at the Rose Law firm. He doesn’t mention that she made partner when he was elected governor and was only hired when he got elected as attorney general. "He makes as if it was a public service job — it wasn’t. Her main job was to get state business, and she got tens-of-millions of dollars of state business, then hid her participation and the fees by taking an extra share of non-state business to compensate for the fees on state business that she brought in. Her other job was to call the state banking commissioner any time one of her banks got into trouble to get them off.
  • "Bill speaks at length how Hillary was a mother, juggling career and family, taking Chelsea to soccer games and stuff — that’s non-sense. Hillary was a mother but Chelsea in the Arkansas governor’s mansion had a staff of nannies and agents to drive her around and people to be with her, and Hillary didn’t have to bother with any of that. All of that was paid for by the state. "He says she became the warrior in chief over the family finances and that was true, and the result is she learned how to steal. "She accepted a $100,000 bribe from the poultry industry in return for Bill going easy on regulating them, despite new standards. Jim Blair, the poultry lobbyist, gave her $1,000 to invest in the Futures Market and lined up seven to eight other investors and their winnings were all deposited into Hillary’s account. She made $100,000 in a year and she was out. That essentially was a bribe.
  • ”[She did] a phony real-estate deal for Jim McDougal and the Madison Bank to deceive the federal regulators by pretending someone else was buying the property. She was called before a grand jury in 1995 about that but, conveniently, the billing records were lost, couldn’t be found and there wasn’t proof that she worked on it.
  • ...5 more annotations...
  • “Bill talks about her work on the health care task force but doesn’t say the reason it didn’t pass was the task force was discredited because the meetings were all held in secret. A federal judge forced them open and fined the task force several hundred thousand dollars because of their secrecy. "He says that after the health care bill failed in 1994, Hillary went to work on adopting each piece of it piecemeal — mainly health insurance for children. "That is completely the opposite of the truth. The fact is when that bill failed, I called Hillary and I suggested that she support a proposal by Republican Bob Dole that we cover children, and she said, ‘We can’t just cover one part of this. You have to change everything or change nothing.’ Then in 1997 when I repeated that advice to Bill Clinton, we worked together to pass the Children’s Health Insurance Program. I found a lot of the money for that in the tobacco settlement that my friend Dick Scruggs was negotiating.
  • "Then Bill extols her record in the U.S. Senate. In fact, she did practically nothing. There were seven or eight bills that she introduced that passed; almost all of were symbolic — renaming a courthouse, congratulating a high school team on winning the championship. There was only one vaguely substantive bill, and that had a lot of co-sponsors of whom Hillary was just one.
  • "Then he goes to her record in the State Department and manages to tell that story without mentioning the word Benghazi, without mentioning her secret emails, without mentioning he was getting tens of millions — $220 million in speaking fees in return for favorable actions by the State Department.
  • "Also totally lacking in the speech was anything about the war on terror — terror is a word you don’t hear at the Democratic Convention. "Bill says that Hillary passed tough sanctions on Iran for their nuclear program. The opposite is true. "Every time a tough sanction bill was introduced by Senators Menendez or Kirk, Hillary would send Deputy Secretary Wendy Sherman to Capital Hill to testify against it and urge it not to pass, and it was over Hillary’s objections that those sanctions were put into place.
  • ”[Liberal columnist] Maureen Dowd called the speech by Bill Clinton “air brushed.” “It was a hell of a lot more than that — it was fiction. (Also see Morris’s comments after Clinton’s DNC acceptance speech. "It’s strategy and message will be interdicted by reality at every turn. … She basically has no message. … Her entire campaign is, ‘I’m a woman and I am running against Donald Trump. … She bean her speech by saying let’s compromise and work together. Is there any woman in the world less likely to compromise?”)
  •  
    "Dick Morris is a nationally recognized political campaign adviser, analyst and author. He was the senior political adviser to Bill Clinton before and after his occupation of the White House. He was campaign manager of Clinton's 1996 re-election, and the architect of his successful "triangulation" rhetorical ruse. Clinton's communications director George Stephanopoulos said of Morris, "No single person had more power over [Bill Clinton]." This week, in a message entitled "What Bill Left Out, Morris corrected the record regarding Clinton's glowing remarks about Hillary Clinton, her personal attributes and professional achievements. Morris's insights into the Clintons are priceless. What follows is a transcript of Morris's comments: "Bill Clinton talked at length about Hillary's idealistic work in college and law school, but he omits that she was defending the Black Panthers who killed security guards; they were on trial in New Haven. She monitored the trial while she was in law school to find evidence that could be grounds for reversal in the event they were convicted. "That summer she went to work for the True-Haft (SP) law firm in CA, headed by True Haft who is the head of the CA Communist Party and that's when she got involved with Saul Alinsky, who became something of a mentor for the rest of her life. "Then Bill says that she went off to Massachusetts and he went to Arkansas, and eventually Hillary followed her heart to join him in Arkansas. He omits that she went to work for the Watergate Committee and was fired from that job for taking home evidence and hiding documents that they needed in the impeachment inquiry. Then she took the DC Bar exam and flunked it, she went to Arkansas because that is the only bar exam she could pass. "He talked about how in the 1970's she took all kinds of pro-bono cases to defend women and children. In her memoirs, she cites one which was a custody case and that's it. In fact, in 1975 she represen
Paul Merrell

Snowden document shows Canada set up spy posts for NSA - Politics - CBC News - 0 views

  • A top secret document retrieved by American whistleblower Edward Snowden reveals Canada has set up covert spying posts around the world and conducted espionage against trading partners at the request of the U.S. National Security Agency. The leaked NSA document being reported exclusively by CBC News reveals Canada is involved with the huge American intelligence agency in clandestine surveillance activities in “approximately 20 high-priority countries."
  • Sections of the document with the highest classification make it clear in some instances why American spymasters are particularly keen about enlisting their Canadian counterparts, the Communications Security Establishment Canada. "CSEC shares with the NSA their unique geographic access to areas unavailable to the U.S," the document says. The briefing paper describes a "close co-operative relationship" between the NSA and its Canadian counterpart, the Communications Security Establishment Canada, or CSEC — a relationship "both sides would like to see expanded and strengthened. "The intelligence exchange with CSEC covers worldwide national and transnational targets."
  • The briefing notes make it clear that Canada plays a very robust role in intelligence-gathering around the world in a way that has won respect from its American equivalents.
  • ...5 more annotations...
  • The intimate Canada-U.S. electronic intelligence relationship dates back more than 60 years. Most recently, another Snowden document reported by CBC News showed the two agencies co-operated to allow the NSA to spy on the G20 summit of international leaders in Toronto in 2010. But what the latest secret document reveals for the first time is just how expansive Canada's international espionage activities have become.
  • The NSA document depicts CSEC as a sophisticated, capable and highly respected intelligence partner involved in all manner of joint spying missions, including setting up listening posts at the request of the Americans. "CSEC offers resources for advanced collection, processing and analysis, and has opened covert sites at the request of NSA," the document states.
  • Aside from compromising the actual intelligence operation, Wark says, an exposed spy mission can imperil Canada's other diplomatic operations — "the political contacts, the trade contacts, the generation of goodwill between the countries and any sense of co-operation." Wark says if a country feels targeted by a Canadian embassy, it can put everyone working there under a cloud of suspicion: “Are they really diplomats or are they spies?” As a result of those risks, Wark says, approval for CSEC to establish a covert spying post at the request of the NSA would have to come from the ministerial level of the Canadian government — or even from the prime minister himself.
  • Canada and the U.S. have long shared security intelligence with sister agencies in the U.K., Australia and New Zealand – the so-called "Five Eyes" partnership. But the latest secret Snowden missive shows CSEC and the NSA becoming physically intertwined. "Co-operative efforts include the exchange of liaison officers and integrees," the document reveals, a reference to CSEC operatives working inside the NSA, and vice-versa. It notes the NSA also supplies much of the computer hardware and software CSEC uses for encryption, decoding and other state-of-the-art essentials of electronic spying needed for "collection, processing and analytic efforts."
  • CSEC employs about 2,000 people, has an annual budget of roughly $450 million and will soon move into an architecturally spectacular new Ottawa headquarters costing Canadian taxpayers almost $1.2 billion. By comparison, the NSA employs an estimated 40,000 people plus thousands of private contractors, and spends over $40 billion a year NSA whistleblower Drake says the problem is that both CSEC and the NSA lack proper oversight, and without it, they have morphed into runaway surveillance. "There is a clear and compelling danger to democracy in Canada by virtue of how far these secret surveillance operations have gone."
  •  
    "'Co-operative efforts include the exchange of liaison officers and integrees,'the document reveals, a reference to CSEC operatives working inside the NSA, and vice-versa." And that fact raises potential U.S. Privacy Act issues. Under the Privacy Act, all U.S. agencies are prohibited from sharing information containing personal identifiers of U.S. citizens with any foreign government and requires that agencies make full disclosure to all persons  whose rights are thus violated. The Act also creates a cause of action for redress by the federal courts, with a minimum $1,500 damages plus attorney's fees and litigation expenses. Note that the other NSA documents show that NSA is sharing U.S. citizens' information that includes personal identifiers with Israeli intelligence. The NSA has been by another statute excused from compliance with some portions of the Privacy Act but not those discussed above.
Paul Merrell

Canada Casts Global Surveillance Dragnet Over File Downloads - The Intercept - 0 views

  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
  • The latest disclosure sheds light on Canada’s broad existing surveillance capabilities at a time when the country’s government is pushing for a further expansion of security powers following attacks in Ottawa and Quebec last year. Ron Deibert, director of University of Toronto-based Internet security think tank Citizen Lab, said LEVITATION illustrates the “giant X-ray machine over all our digital lives.” “Every single thing that you do – in this case uploading/downloading files to these sites – that act is being archived, collected and analyzed,” Deibert said, after reviewing documents about the online spying operation for CBC News. David Christopher, a spokesman for Vancouver-based open Internet advocacy group OpenMedia.ca, said the surveillance showed “robust action” was needed to rein in the Canadian agency’s operations.
  • In a top-secret PowerPoint presentation, dated from mid-2012, an analyst from the agency jokes about how, while hunting for extremists, the LEVITATION system gets clogged with information on innocuous downloads of the musical TV series Glee. CSE finds some 350 “interesting” downloads each month, the presentation notes, a number that amounts to less than 0.0001 per cent of the total collected data. The agency stores details about downloads and uploads to and from 102 different popular file-sharing websites, according to the 2012 document, which describes the collected records as “free file upload,” or FFU, “events.” Only three of the websites are named: RapidShare, SendSpace, and the now defunct MegaUpload.
  • ...3 more annotations...
  • LEVITATION does not rely on cooperation from any of the file-sharing companies. A separate secret CSE operation codenamed ATOMIC BANJO obtains the data directly from internet cables that it has tapped into, and the agency then sifts out the unique IP address of each computer that downloaded files from the targeted websites. The IP addresses are valuable pieces of information to CSE’s analysts, helping to identify people whose downloads have been flagged as suspicious. The analysts use the IP addresses as a kind of search term, entering them into other surveillance databases that they have access to, such as the vast repositories of intercepted Internet data shared with the Canadian agency by the NSA and its British counterpart Government Communications Headquarters. If successful, the searches will return a list of results showing other websites visited by the people downloading the files – in some cases revealing associations with Facebook or Google accounts. In turn, these accounts may reveal the names and the locations of individual downloaders, opening the door for further surveillance of their activities.
  • “The specific uses that they talk about in this [counter-terrorism] context may not be the problem, but it’s what else they can do,” said Tamir Israel, a lawyer with the University of Ottawa’s Canadian Internet Policy and Public Interest Clinic. Picking which downloads to monitor is essentially “completely at the discretion of CSE,” Israel added. The file-sharing surveillance also raises questions about the number of Canadians whose downloading habits could have been swept up as part of LEVITATION’s dragnet. By law, CSE isn’t allowed to target Canadians. In the LEVITATION presentation, however, two Canadian IP addresses that trace back to a web server in Montreal appear on a list of suspicious downloads found across the world. The same list includes downloads that CSE monitored in closely allied countries, including the United Kingdom, United States, Spain, Brazil, Germany and Portugal. It is unclear from the document whether LEVITATION has ever prevented any terrorist attacks. The agency cites only two successes of the program in the 2012 presentation: the discovery of a hostage video through a previously unknown target, and an uploaded document that contained the hostage strategy of a terrorist organization. The hostage in the discovered video was ultimately killed, according to public reports.
  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
Paul Merrell

Mastermind of The Bamako Terror Attack Mokhtar Belmokhtar: A CIA Sponsored "Intelligenc... - 0 views

  • In response to the tragic Paris events of November 13, Central Intelligence Agency director  John Brennan  warned that “ISIL is planning additional attacks… It is clear to me that ISIL has an external agenda, that they are determined to carry out these types of attacks.” (Quoted in Daily Telegraph, November 16, 2015) Five days later following the CIA Chief’s  premonition, the Bamako Radisson Hotel Blu in Mali’s capital was the object of a terrorist attack, resulting in  21 people dead. Following the attack and the taking of hostages by the terrorists, French and Malian special forces raided the hotel. US. Africa Command (AFRICOM) also confirmed that US special forces were involved.
  • The Bamako terror operation was allegedly coordinated by Mokhtar Belmokhtar (aka Khaled Abu al-Abbas), leader of an affiliate of Al Qaeda in the Islamic Maghreb (AQIM), the Islamist al-Mulathameen (Masked) Brigade, or “Those who Sign with Blood.” Belmokhtar’s group was created in 2012 in the wake of the war on Libya. His organization has also allegedly been involved in the drug trade, smuggling as well kidnapping operations of foreigners in North Africa.  While his whereabouts are said to be known, French intelligence has dubbed Belmokhtar “the uncatchable”. In June he was reported dead  as a result in a U.S. air strike in Libya. His death was subsequently denied. Based on shaky evidence, The New York Times report below (November 20) concludes that Belmokhtar’s group (together with AQIM) is unequivocally behind the Bamako attacks:
  • A member of Al Qaeda in Africa confirmed Saturday that the attack Friday on a hotel in Bamako, Mali, had been carried out by a jihadist group loyal to Mokhtar Belmokhtar, an Algerian operative for Al Qaeda. The Qaeda member, who spoke via an online chat, said that an audio message and a similar written statement in which the group claimed responsibility for the attack were authentic. The SITE Intelligence Group, which monitors jihadist groups, also confirmed the authenticity of the statement. The Qaeda member, who refused to be named for his protection, said that Mr. Belmokhtar’s men had collaborated with the Saharan Emirate of Al Qaeda in the Islamic Maghreb, … In the audio recording, the group, known as Al Mourabitoun, says it carried out the operation in conjunction with Al Qaeda’s branch in the Islamic Maghreb. The recording was released to the Al Jazeera network and simultaneously to Al Akhbar, … The recording states: “We, in the group of the Mourabitoun [Arabic Rebel Group], in cooperation with our brothers in Al Qaeda in Islamic Maghreb, the great desert area, claim responsibility for the hostage-taking operation in the Radisson hotel in Bamako.” (emphasis added)
  • ...7 more annotations...
  • In turn, the French Minister of Defense acknowledged –prior to the conduct of a police investigation– that the authors of the attack were “most likely” led by Mokhtar Belmokhtar’s group in association with Al Qaeda in the Islamic Maghreb (AQIM). What Defense Minister Jean-Yves Le Drain failed to mention was that both Belmokhtar and AQIM have longstanding links to the CIA, which in turn has a working relationship with France’s  General Directorate for External Security, Direction générale de la sécurité extérieure (DGSE).  Casually ignored by the Western media, the leaders of Al Qaeda in the Islamic Maghreb (AQIM) including Belmokhtar were trained and recruited by the CIA in Afghanistan. Acknowledged by the Washington based Council on Foreign Relations (CFR): Most of AQIM’s major leaders are believed to have trained in Afghanistan during the 1979-1989 war against the Soviets as part of a group of North African volunteers known as “Afghan Arabs” that returned to the region and radicalized Islamist movements in the years that followed. The group is divided into “katibas” or brigades, which are clustered into different and often independent cells. The group’s top leader, or emir, since 2004 has been  Abdelmalek Droukdel, also known as Abou Mossab Abdelwadoud, a trained engineer and explosives expert who has fought in Afghanistan and has roots with the GIA in Algeria. (Council on Foreign Relations, Al Qaeda in the Islamic Maghreb, cfr.org, undated)
  • Mokhtar Belmokhtar: Post Cold War CIA intelligence asset?  The Council on Foreign Relations erroneously describes “Mokhtar Belmokhtar as the one-eyed veteran of the anti-Soviet Afghan insurgency.” (CFR, op cit, emphasis added). Belmokhtar (born in 1972) did not fight in the Soviet-Afghan war (1979-1989). He was recruited in 1991 at the age of 19 in the immediate wake of the Cold War. CIA recruitment continued in the wake of the Cold War. It was in large part directed against the Russian Federation and the former Soviet Republics as well as the Middle East. The purpose of this later CIA recruitment was to establish a network of “intelligence assets” to be used in the CIA’s post-cold war insurgencies. Leaders of the Chechen Islamist insurgencies were also trained in CIA camps in Afghanistan and Pakistan, including the notorious leader of the Chechen insurrection Ibn al-Khattab (a citizen of Saudi Arabia).
  • Following his training and recruitment and a two year stint in Afghanistan (1991-1993), Mokhtar Belmokhtar was sent back to Algeria in 1993 at age 21 where he joined the  Salafist Group for Preaching and Combat (GSPC) (emblem left). The latter was initially part of the so-called Armed Islamic Group  (Groupe islamique armé (GIA)) in Algeria which sought to overthrow the secular Algerian Government with a view to installing a theocratic Islamic State. Supported covertly by the CIA, Belmokhtar fought in Southern Algeria in the civil war opposing Islamist forces and the secular government. He was also  instrumental in the integration and merging of “jihadist” forces. In January 2007,  the Armed islamic Group (GIA) which had been prominent in the 1990s, officially changed its name to the Al-Qaeda Organization in the Islamic Maghreb (AQIM). In turn, as of 2007, the newly formed AQIM established a close relationship with the Libya Islamic Fighting Group (LIFG), which was directly supported by NATO during the 2011 war on Libya, “providing weapons, training, special forces and even aircraft to support them in the overthrow of Libya’s government.” (Tony Cartalucci, The Geopolitical Reordering of Africa: US Covert Support to Al Qaeda in Northern Mali, France “Comes to the Rescue”, Global Research, January 2013). British SAS Special Forces had also been brought into Libya prior to the onset of the insurrection, acting as military advisers to the LIFG. In fact, what has unfolded since the war on Libya is the merging of LIFG and AQIM forces. In turn, many of the LIFG operatives have been dispatched to Syria to fight within the ranks of Al Nusrah and the ISIS.
  • It is worth noting that the 2007  restructuring  of jihadist forces in Algeria and the Maghreb coincided with  the appointment of Robert Stephen Ford as US ambassador to Algeria in August 2006. Ford had been reassigned by the State Department from Baghdad to Algiers. From 2004 to 2006, he worked closely with Ambassador John Negroponte at the US embassy in Baghdad in supporting the creation of  both Shia and Sunni death squads in Iraq. This project consisted in recruiting and training terrorists modelled on the so-called “Salvador Option” which had been applied by the CIA in Central America. Negroponte as we recall played a central role in supporting the Contras terrorists in Nicaragua as ambassador to Honduras from 1981-1985. For further details see Michel Chossudovsky, “The Salvador Option For Syria”: US-NATO Sponsored Death Squads Integrate “Opposition Forces”, Global Research,  May 28, 2012) The 2006 appointment of Robert Stephen Ford to head the US Embassy in Algeria was timely. It coincided with the consolidation of jihadist groups within Algeria and the Maghreb. It preceded the 2011 US-NATO sponsored insurrections in Libya and Syria. In 2010, Ford was approved by the US Congress as US Ambassador to Syria. He presented his credentials to president Bashar al Assad in January 2011, barely two months prior to the onslaught of the terrorist insurrection in the border city of Daraa in mid-March 2011. Ford played a central role in assisting the channelling of US and allied support to Syrian “opposition” groups including Al Nusrah and the ISIS.
  • Belmokhtar’s history and involvement in Afghanistan confirms that from the very outset he was an instrument of US intelligence. While, he operates with a certain degree of independence and autonomy in relation to his intelligence sponsors, he and his organization are bona fide CIA “intelligence assets”, which can be used by the CIA as part of a covert agenda. There are various definitions of  an “intelligence asset”. From the standpoint of US intelligence, “assets” linked up to terrorist organizations must not be aware that they are supported and monitored by Western intelligence. With regard to Al Qaeda, from the outset in 1979, the CIA chose to operate through various front organizations as well as indirectly through its Saudi, Qatari and Pakistani intelligence partners. CIA’s Milton Beardman who played a central role in the Soviet Afghan war confirms that members of Al Qaeda including Osama bin Laden were not aware of the role they were playing on behalf of Washington. In the words of bin Laden (quoted by Beardman): “neither I, nor my brothers saw evidence of American help”(Michel Chossudovsky, Who is Osama bin Laden, Global Research, September 12, 2001): Motivated by nationalism and religious fervor, the Islamic warriors were unaware that they were fighting the Soviet Army on behalf of Uncle Sam. While there were contacts at the upper levels of the intelligence hierarchy, Islamic rebel leaders in theatre had no contacts with Washington or the CIA.  (Ibid) Amply documented, Al Qaeda in the Islamic Maghreb (AQIM)and its affiliated groups including the Libya Islamic Fighting Group (LIFG) was serving the interests of the Western military alliance. Confirmed by the Washington Post, June 29, 2011 (See below), France was supplying weapons to the LIFG at the height of NATO’s bombing raids.
  • AQIM in turn was receiving weapons from the LIFG, which was supported by NATO. Moreover, LIFG mercenaries had integrated AQIM brigades. According to alleged Terror Mastermind Mokhtar Belmokhtar, who also coordinated the 2013 In Amenas Mali kidnapping operation: “We have been one of the main beneficiaries of the revolutions in the Arab world. As for our benefiting from the (Libyan) weapons, this is a natural thing in these kinds of circumstances.” http://www.hanford.gov/c.cfm/oci/ci_terrorist.cfm?dossier=174 Al Qaeda in the Islamic Maghreb (AQIM) is indelibly tied into a Western intelligence agenda. While it is described  as  ”one of the region’s wealthiest, best-armed militant groups”, financed covertly by Saudi Arabia and Qatar. France’s  Canard enchaîné revealed (June 2012) that Qatar (a staunch ally of the United States) has been funding various terrorist entities in Mali: The original report cites a French military intelligence report as indicating that Qatar has provided financial support to all three of the main armed groups in northern Mali: Iyad Ag Ghali’s Ansar Ed-Dine, al-Qa’ida in the Islamic Maghreb (AQIM) and the Movement for Unity and Jihad in West Africa (MUJWA). The amount of funding given to each of the groups is not mentioned but it mentions that repeated reports from the French DGSE to the Defense Ministry have mentioned Qatar’s support for ‘terrorism’ in northern Mali. (quoted by Jeune Afrique June 2012)
  • Qatar is a proxy state, a de facto Persian Gulf territory largely controlled by Washington. It hosts  a number of Western military and intelligence facilities. The Emir of Qatar does not finance terrorism without the consent of the CIA. And with regard to Mali, the CIA coordinates its activities in liaison with its French intelligence partners and counterparts, including la Direction du renseignement militaire (DRM) and the Direction générale de la sécurité extérieure (DGSE). The implications are obvious and should be carefully understood by Western public opinion. Inasmuch as Belmokhtar and AQIM are “intelligence assets”, both US and French intelligence are (indirectly) behind the Bamako attacks. Both US and French intelligence are complicit in the State sponsorship of terrorism.
Gary Edwards

What You Can Do About Vote Fraud | Fellowship of the Minds - 0 views

  •  
    "What You Can Do About Vote Fraud Posted on November 17, 2012 by Dr. Eowyn | 2 Comments excerpt: There is now massive compelling evidence that Democrats committed vote fraud in the 2012 presidential election, especially in the four battleground states of Colorado, Florida, Ohio, and Virginia. See FOTM's posts chronicling the extensive pervasive fraud by going to our "2012 Election" page below our FOTM masthead, and click on those post links colored neon green. But the Republican Party won't do anything about the fraud, because it is legally constrained by an agreement the Republican National Committee (RNC) made with the Democratic National Committee (DNC) in 1982, to settle a lawsuit. The agreement or Consent Decree, which is national in scope, limits the RNC's ability to engage or assist in voter fraud prevention unless the RNC obtains the court's approval in advance. Nor can the RNC engage in "ballot security activities" - defined as "ballot integrity, ballot security or other efforts to prevent or remedy vote fraud." Read more about the agreement HERE. Simply put, the GOP is neutered. But we ordinary Americans can do something about vote fraud, in our separate states. FOTM's Hardnox has been urging us to contact our state's attorney general. Here's how." Dr. Eowyn provides a list of all 50 State Attorneys Generals for the purposes of direct mail.  Mailing addresses and phone numbers!  Get writing Patriots.  It's now or never.
Paul Merrell

US Corporations Used Personal Armies To Uproot, Terrorize Colombia - 0 views

  • Some of the numerous foreign corporations accused of serious human rights abuses in Colombia include fruit companies Dole, Del Monte, and Chiquita, agribusiness giant Cargill, and other representatives of the fossil fuel industry like Texaco (formerly Texas Petroleum Company) and Exxon Mobil. Heeding corporate orders, paramilitary groups murdered union and labor rights activists, tortured and terrorized countless indigenous and Afro-Colombian people, and devastated entire villages of subsistence farmers to make way for mining, fossil fuel extraction, or plantations that would bring massive profits to foreign corporations. The Colombian military — and, in at least one high-profile massacre, the U.S. military — sometimes lent a hand in these human rights crimes. “Every human rights person I work with in Colombia believes the peace process is a necessary precondition” to ending corporate exploitation of Colombia, Dan Kovalik, a human rights and labor rights lawyer who teaches at the University of Pittsburgh School of Law, told MintPress News.
  • In court, “Chiquita admitted to paying paramilitaries and giving them 3,000 Kalashnikov rifles between 1997 and 2004,” Kovalik said. Chiquita allied with the United Auto-Defense Forces of Colombia (AUC), one of the country’s most violent paramilitary groups, Steven Cohen noted in a report for ThinkProgress in 2014. The AUC, a group once designated as a terrorist group by the U.S. government, is responsible for thousands of deaths in Colombia. It turns out that Chiquita had been playing both sides of the conflict. Cohen reported: “By its own account, Chiquita made at least 100 payments — $1.7 million in total — to the AUC between 1997 and 2004. In the decade prior to that, the company had maintained a similar arrangement with the Revolutionary Armed Forces of Colombia (FARC), the nominally leftist rebel group chased out of the region by the combined (and coordinated) efforts of the AUC and Colombian military.”
  • “There’s been some recent reports that [Chiquita’s funding of paramilitaries] may have continued until very recently through a subsidiary,” Kovalik added. While these allegations remain unproven in court, they do suggest a staggering number of victims. Multiple lawsuits were consolidated in 2011, accusing Chiquita of being involved in the killings of as many as 4,000 Colombian nationals. While the evidence is clearest in the case of Chiquita, other international banana growers are suspect as well. “According to Salvatore Mancuso, a high-ranking paramilitarian in U.S. prison, Dole and Del Monte also worked with the paramilitaries,” Kovalik said. “All the banana companies have.” Mancuso is currently serving a 15-year sentence in a federal prison and has been spoken openly about the influence that corporations like Chiquita hold in Colombia.
  • ...6 more annotations...
  • The influence of banana growers in Colombia pre-dates the ongoing civil war. In 1928, the Colombian government brutally shut down a strike by United Fruit Company banana pickers under threat from the U.S. government. Some estimates put the death toll from the military action as high as 2,000, including workers, women and children. United Fruit was once one of the most powerful corporations in the world, manipulating the governments and economies of multiple Latin American countries. Chiquita was a trademark of United Fruit until 1990, when the company renamed itself Chiquita Brands International in an effort to rehabilitate its image. (Chiquita was purchased by two Brazilian companies in 2015, and is now headquartered in Switzerland.)
  • “It should be noted under the peace agreement, at least the one that went down in October, Coca-Cola was one of the companies named [that will be] subjected to further investigation for paramilitary ties,” Kovalik said. Coca-Cola, or at least its Colombian bottlers, have also been linked to paramilitary groups and human rights abuses. The bottlers and the company’s Atlanta headquarters have faced multiple lawsuits over attacks on union organizers. A 2010 documentary, “The Coca-Cola Case,” focused on the soda giant’s role in turning Colombia into the “trade union murder capital of the world,” June Chua wrote in a review for Rabble.ca that year.
  • Colombia is rich with resources that foreign corporations are eager to exploit, particularly in the mining, agriculture, and biofuels industries. “Mining is probably the biggest threat now to indigenous people, Afro-Colombians and peasants, and will continue to be as the peace agreement goes forward,” Kovalik added. Justin Podur, an author and global political analyst, told MintPress that Colombian human rights activists frequently say that “displacement in Colombia is not a side effect of the war, it’s really the point of the war.” Whether by design or coincidence, decades of unrest created fertile ground for profit.
  • In one of the most shocking examples of fossil fuel companies supporting the death and displacement of Colombian people, Kovalik highlighted the “the Santo Domingo massacre, in which Occidental Petroleum were part of an operation to bomb the Santo Domingo community.”
  • In a 2005 article for Z Net on the massacre, Kovalik and Luis Galvis explained: “On December 13, 1998, in what has become one of the most notorious war crimes in Colombia, the hamlet of Santo Domingo was attacked by a U.S. cluster bomb from a Colombian Air Force helicopter. Seventeen civilians, including 7 children, were killed as a result of the bombing.” In 2002, the Los Angeles Times revealed that the bombing had actually been carried out at the behest of, and with the assistance of, the Houston-based oil company which had its headquarters in Los Angeles at the time. Times staff writer T. Christian Miller wrote: “Los Angeles-based Occidental Petroleum, which runs an oil complex 30 miles north of Santo Domingo, provided crucial assistance to the operation. It supplied, directly or through contractors, troop transportation, planning facilities and fuel to Colombian military aircraft, including the helicopter crew accused of dropping the bomb.”
  • And, earlier this year, Gilberto Torres, a Colombian union activist, sued BP in London. He alleges that in 2002, he was kidnapped and tortured for 42 days by paramilitaries who were following orders from the oil giant.
Paul Merrell

The Engineered Destruction and Political Fragmentation of Iraq. Towards the Creation of... - 0 views

  • The Capture of Mosul:  US-NATO Covert Support to the Islamic State of Iraq and Syria (ISIS) Something unusual occurred in Mosul which cannot be explained in strictly military terms. On June 10, the insurgent forces of the Islamic State of Iraq and the Levant (ISIS) captured Mosul, Iraq’s second largest city, with a population of close to 1.5 million people.  While these developments were “unexpected” according to the Obama administration, they were known to the Pentagon and US intelligence, which were not only providing weapons, logistics and financial support to the ISIS rebels, they were also coordinating, behind the scenes, the ISIS attack on the city of Mosul. While ISIS is a well equipped and disciplined rebel army when compared to other Al Qaeda affiliated formations, the capture of Mosul, did not hinge upon ISIS’s military capabilities. Quite the opposite: Iraqi forces which outnumbered the rebels by far, equipped with advanced weapons systems could have easily repelled the ISIS rebels. There were 30,000 government forces in Mosul as opposed to 1000 ISIS rebels, according to reports. The Iraqi army chose not to intervene. The media reports explained without evidence that the decision of the Iraqi armed forces not to intervene was spontaneous characterized by mass defections.
  • Iraqi officials told the Guardian that two divisions of Iraqi soldiers – roughly 30,000 men – simply turned and ran in the face of the assault by an insurgent force of just 800 fighters. Isis extremists roamed freely on Wednesday through the streets of Mosul, openly surprised at the ease with which they took Iraq’s second largest city after three days of sporadic fighting. (Guardian, June 12, 2014, emphasis added) The reports point to the fact that Iraqi military commanders were sympathetic with the Sunni led ISIS insurgency: Speaking from the Kurdish city of Erbil, the defectors accused their officers of cowardice and betrayal, saying generals in Mosul “handed over” the city over to Sunni insurgents, with whom they shared sectarian and historical ties. (Daily Telegraph,  13 June 2014) What is important to understand, is that both sides, namely the regular Iraqi forces and the ISIS rebel army are supported by US-NATO. There were US military advisers and special forces including operatives from private military companies on location in Mosul working with Iraq’s regular armed forces. In turn, there are Western special forces or mercenaries within ISIS (acting on contract to the CIA or the Pentagon) who are in liaison with US-NATO (e.g. through satellite phones).
  • Under these circumstances, with US intelligence amply involved, there would have been routine communication, coordination, logistics and exchange of intelligence between a US-NATO military and intelligence command center, US-NATO military advisers forces or private military contractors on the ground assigned to the Iraqi Army and Western special forces attached to the ISIS brigades. These Western special forces operating covertly within the ISIS could have been dispatched by a private security company on contract to US-NATO.
  • ...14 more annotations...
  • In this regard, the capture of Mosul appears to have been a carefully engineered operation, planned well in advance. With the exception of a few skirmishes, no fighting took place. Entire divisions of the Iraqi National Army –trained by the US military with advanced weapons systems at their disposal– could have easily repelled the ISIS rebels. Reports suggest that they were ordered by their commanders not to intervene. According to witnesses, “Not a single shot was fired”. The forces that had been in Mosul have fled — some of which abandoned their uniforms as well as their posts as the ISIS forces swarmed into the city. Fighters with the Islamic State of Iraq and Syria (ISIS), an al-Qaeda offshoot, overran the entire western bank of the city overnight after Iraqi soldiers and police apparently fled their posts, in some instances discarding their uniforms as they sought to escape the advance of the militants. http://hotair.com/archives/2014/06/10/mosul-falls-to-al-qaeda-as-us-trained-security-forces-flee/
  • A contingent of one thousand ISIS rebels take over a city of more than one million? Without prior knowledge that the US controlled Iraqi Army (30,000 strong) would not intervene, the Mosul operation would have fallen flat, the rebels would have been decimated. Who was behind the decision to let the ISIS terrorists take control of Mosul? Had the senior Iraqi commanders been instructed by their Western military advisers to hand over the city to the ISIS terrorists? Were they co-opted?
  • The formation of the caliphate may be the first step towards a broader conflict in the Middle East, bearing in mind that Iran is supportive of the Al Maliki government and the US ploy may indeed be to encourage the intervention of Iran. The proposed redivision of Iraq is broadly modeled on that of the Federation of Yugoslavia which was split up into seven “independent states” (Serbia, Croatia, Bosnia-Herzegovina, Macedonia (FYRM), Slovenia, Montenegro, Kosovo). According to Mahdi Darius Nazemroaya, the re division of Iraq into three separate states is part of a broader process of redrawing the Map of the Middle East.
  • US forces could have intervened. They had been instructed to let it happen. It was part of a carefully planned agenda to facilitate the advance of the ISIS rebel forces and the installation of the ISIS caliphate. The whole operation appears to have been carefully staged.
  • In Mosul, government buildings, police stations, schools, hospitals, etc are formally now under the control of the Islamic State of Iraq and Syria (ISIS). In turn, ISIS has taken control of military hardware including helicopters and tanks which were abandoned by the Iraqi armed forces. What is unfolding is the installation of a US sponsored Islamist ISIS caliphate alongside the rapid demise of the Baghdad government. Meanwhile, the Northern Kurdistan region has de facto declared its independence from Baghdad. Kurdish peshmerga rebel forces (which are supported by Israel) have taken control of the cities of Arbil and Kirkuk. (See map above) Concluding Remarks There were no Al Qaeda rebels in Iraq prior to the 2003 invasion. Moreover, Al Qaeda was non-existent in Syria until the outset of the US-NATO-Israeli supported insurgency in March 2011. The ISIS is not an independent entity. It is a creation of US intelligence. It is a US intelligence asset, an instrument of non-conventional warfare.
  • The ultimate objective of this ongoing US-NATO engineered conflict opposing Maliki government forces to the ISIS insurgency is to destroy and destabilize Iraq as a Nation State. It is part of an intelligence operation, an engineered process of  transforming countries into territories. The break up of Iraq along sectarian lines is a longstanding policy of the US and its allies. The ISIS is a caliphate project of creating a Sunni Islamist state. It is not a project of the Sunni population of Iraq which historically has been committed to a secular system of government. The caliphate project is a US design. The advances of ISIS forces is intended to garnish broad support within the Sunni population directed against the Al Maliki government The division of Iraq along sectarian-ethnic lines has been on the drawing board of the Pentagon for more than 10 years.
  • Was the handing over of Mosul to ISIS part of a US intelligence agenda? Were the Iraqi military commanders manipulated or paid off into allowing the city to fall into the hands of the ISIS rebels without “a single shot being fired”. Shiite General Mehdi Sabih al-Gharawi who was in charge of the Mosul Army divisions “had left the city”. Al Gharawi had worked hand in glove with the US military. He took over the command of Mosul in September 2011, from US Col Scott McKean. Had he been co-opted, instructed by his US counterparts to abandon his command?
  • The above map was prepared by Lieutenant-Colonel Ralph Peters. It was published in the Armed Forces Journal in June 2006, Peters is a retired colonel of the U.S. National War Academy. (Map Copyright Lieutenant-Colonel Ralph Peters 2006). Although the map does not officially reflect Pentagon doctrine, it has been used in a training program at NATO’s Defense College for senior military officers”. (See Plans for Redrawing the Middle East: The Project for a “New Middle East” By Mahdi Darius Nazemroaya, Global Research, November 2006)
  • The Western media in chorus have described the unfolding conflict in Iraq as a “civil war” opposing the Islamic State of Iraq and al-Sham against the Armed forces of the Al-Maliki government. (Also referred to as Islamic State of Iraq and the Levant (ISIL) or Islamic State of Iraq and Syria (ISIS)) The conflict is casually described as “sectarian warfare” between Radical Sunni and Shia without addressing “who is behind the various factions”.  What is at stake is a carefully staged US military-intelligence agenda. Known and documented, Al Qaeda affiliated entities have been used by US-NATO in numerous conflicts as “intelligence assets” since the heyday of the Soviet-Afghan war. In Syria, the Al Nusrah and ISIS rebels are the foot-soldiers of the Western military alliance, which oversees and controls the recruitment and training of paramilitary forces.
  • The Al Qaeda affiliated Islamic State of Iraq (ISI) re-emerged in April 2013 with a different name and acronym, commonly referred to as the Islamic State of Iraq and Syria (ISIS). The formation of a terrorist entity encompassing both Iraq and Syria was part of a US intelligence agenda. It responded to geopolitical objectives. It also coincided with the advances of Syrian government forces against the US sponsored insurgency in Syria and the failures of both the Free Syrian Army (FSA) and its various “opposition” terror brigades. The decision was taken by Washington to channel its support (covertly) in favor of a terrorist entity which operates in both Syria and Iraq and which has logistical bases in both countries. The Islamic State of Iraq and al-Sham’s Sunni caliphate project coincides with a longstanding US agenda to carve up both Iraq and Syria into three separate territories: A Sunni Islamist Caliphate, an Arab Shia Republic, and a Republic of Kurdistan.
  • Whereas the (US proxy) government in Baghdad purchases advanced weapons systems from the US including F16 fighter jets from Lockheed Martin, the Islamic State of Iraq and al-Sham –which is fighting Iraqi government forces– is supported covertly by Western intelligence. The objective is to engineer a civil war in Iraq, in which both sides are controlled indirectly by US-NATO. The scenario is to arm and equip them, on both sides, finance them with advanced weapons systems and then “let them fight”.
  • The Islamic caliphate is supported covertly by the CIA in liaison with Saudi Arabia, Qatar and Turkish intelligence. Israel is also involved in channeling support to both Al Qaeda rebels in Syria (out of the Golan Heights) as well to the Kurdish separatist movement in Syria and Iraq.
  • First published by GR on June 14, 2014.  President Barack Obama has initiated a series of US bombing raids in Iraq allegedly directed towards the rebel army of the Islamic State (IS). The Islamic State terrorists are portrayed as an enemy of America and the Western world. Amply documented, the Islamic State is a creation of Western intelligence, supported by the CIA and Israel’s Mossad and financed by Saudi Arabia and Qatar. We are dealing with a diabolical military agenda whereby the United States is targeting a rebel army which is directly funded by the US and its allies. The incursion into Iraq of the Islamic State rebels in late June was part of a carefully planned intelligence operation. The rebels of the Islamic state, formerly known as the ISIS, were covertly supported by US-NATO-Israel  to wage a terrorist insurgency against the Syrian government of Bashar Al Assad.  The atrocities committed in Iraq are similar to those committed in Syria. The sponsors of IS including Barack Obama have blood on their hands.
  • The killings of innocent civilians by the Islamic state terrorists create a pretext and the justification for US military intervention on humanitarian grounds. Lest we forget, the rebels who committed these atrocities and who are a target of US military action are supported by the United States. The bombing raids ordered by Obama are not intended to eliminate the terrorists. Quite the opposite, the US is targeting the civilian population as well as the Iraqi resistance movement. The endgame is to destabilize Iraq as a nation state and trigger its partition into three separate entities.
  •  
    The destabilization and fragmentation of Israel's neighboring nations has indeed been on the Zionist/Neocon drawing board for a very long time. http://goo.gl/Z1gdoA In the Mideast, it's important to remember that there are no significant Islamist forces that are not under the control of the U.S. or its allies Saudi Arabia and Qatar. The Iraqi Army's withdrawal of the two divisions from the defense of Mosul is indeed curious. In that regard, Col. Peters' map of a future Mideast is almost certainly more than a coincidence. 
Paul Merrell

Dangerous Crossroads: US-NATO To Deploy Ground Troops, Conduct Large Scale Naval Exerci... - 0 views

  • The World is at a dangerous Crossroads. The Western military alliance is in an advanced state of readiness. And so is Russia. Russia is heralded as the “Aggressor”. US-NATO military confrontation with Russia is contemplated. Enabling legislation in the US Senate under “The Russian Aggression Prevention Act” (RAPA) has “set the US on a path towards direct military conflict with Russia in Ukraine.”  Any US-Russian war is likely to quickly escalate into a nuclear war, since neither the US nor Russia would be willing to admit defeat, both have many thousands of nuclear weapons ready for instant use, and both rely upon Counterforce military doctrine that tasks their military, in the event of war, to preemptively destroy the nuclear forces of the enemy. (See Steven Starr, Global Research, August 22, 2014) The Russian Aggression Prevention Act (RAPA) is the culmination of more than twenty years of US-NATO war preparations, which consist in the military encirclement of both Russia and China:
  • On July 24, in consultation with the Pentagon, NATO’s Europe commander General Philip Breedlove called for “stockpiling a base in Poland with enough weapons, ammunition and other supplies to support a rapid deployment of thousands of troops against Russia”.(RT, July 24, 2014). According to General Breedlove, NATO needs “pre-positioned supplies, pre-positioned capabilities and a basing area ready to rapidly accept follow-on forces”: “He plans to recommend placing supplies — weapons, ammunition and ration packs — at the headquarters to enable a sudden influx of thousands of Nato troops” (Times, August 22, 2014, emphasis added) Breedlove’s “Blitzkrieg scenario” is to be presented at NATO’s summit in Wales in early September, according to The London Times.  It is a “copy and paste” text broadly consistent with the  Russian Aggression Prevention Act (RAPA) which directs President Obama to:
  • “(1) implement a plan for increasing U.S. and NATO support for the armed forces of Poland, Estonia, Lithuania, and Latvia, and other NATO member-states; and (2) direct the U.S. Permanent Representative to NATO to seek consideration for permanently basing NATO forces in such countries.” (S.2277 — 113th Congress (2013-2014)) More generally, a scenario of military escalation prevails with both sides involved in extensive war games. In turn, the structure of US sponsored military alliances plays a crucial role in war planning. We are dealing with a formidable military force involving a global alliance of 28 NATO member states. In turn, the US as well as NATO have established beyond the “Atlantic Region” a network of bilateral military alliances with “partner” countries directed against Russia, China, Iran and North Korea.
  • ...11 more annotations...
  • t is worth noting that FLEETEX is one among several US-NATO naval war games directed against an unnamed enemy. In July, NATO conducted naval exercises in the Black sea, in an area contiguous to Russia’s maritime borders.
  • NATO’s “Breeze” formally hosted by Bulgaria took place from July 4 to July 13, with the participation of naval vessels from Greece, Italy, Romania, Turkey, the U.K. and the U.S. The underlying scenario was the “”destruction of enemy ships in the sea and organization of air defense of naval groups and coastal infrastructure.” The exercises were “aimed at improving the tactical compatibility and collaboration among naval forces of the alliance’s member states…” (See Atlantic Council , see also Russia, U.S. ships sail in competing Black Sea exercises, July 7, Navy Times 2014) Ironically, NATO’s July Black Sea games started on exactly the same day as those of the “unnamed enemy”[Russia], involving its Crimea Black sea fleet of some 20 war ships and aircraft:
  • Russia has made it clear they don’t welcome NATO’s presence in the Black Sea. Russia’s navy let it be known that it is following the exercises with reconnaissance aircraft and surveillance ships. “The aviation of the Black Sea Fleet is paying special attention to the missile cruiser USS Vella Gulf which, though not formally the flagship of the ‘Breeze’ exercises, effectively is leading them,” a Russian naval source told NTV. (Ibid)
  • Since 2006, the US has been building up its weapons arsenal in Poland on Russia’s Western border (Kalingrad). The deployment of US forces in Poland was initiated  in July 2010 (within 40 miles from the border), with a view to training Polish forces in the use of US made Patriot missiles. (Stars and Stripes, 23 July 2010). In recent developments, the Pentagon announced in early August the deployment of US troops and National Guard forces to Ukraine as part of a military training operation. US-NATO is also planning further deployments of ground forces (as described by NATO General Breedlove) in Poland, Latvia, Estonia and Lithuania as well as in Georgia and Azerbaijan on Russia’s southern border. These deployments which are envisaged in the draft text of the “Russian Aggression Prevention Act” (RAPA) (S.2277 — 113th Congress (2013-2014)) are also part of a NATO “defensive” strategy in the case of a “Russian invasion”: Russia’s annexation of Crimea and the conflict in eastern Ukraine have alarmed Latvia, Estonia and Lithuania – like Ukraine, former Soviet republics with Russian-speaking minorities. NATO’s 28 leaders are expected to discuss plans to reassure Poland and the Baltics at a summit in Wales on Sept. 4-5.
  • Deployment on Russia’s Southern border is to be coordinated under a three country agreement signed on August 22, 2014 by Turkey, Georgia and Azerbaijan: Following the trilateral meeting of Azerbaijani, Turkish and Georgian defense ministers, Tbilisi announced that the three countries are interested in working out a plan to strengthen the defense capability. “The representatives of the governments of these three countries start to think about working out a plan to strengthen the defense capability,” Alasania said, adding that this is in the interests of Europe and NATO.“Because, this transit route [Baku-Tbilisi-Kars] is used to transport the alliance’s cargo to Afghanistan,” he said. Alasania also noted that these actions are not directed against anyone. (See Azeri News, August 22, 2014, emphasis added)
  • In the Far-east, Russia’s borders are also threatened by Obama’s “Pivot to Asia”. The “Pivot to Asia” from a military standpoint consists in extending US military deployments in the Asia-Pacific as well as harnessing the participation of Washington’s allies in the region, including Japan, South Korea and Australia. These countries have signed bilateral military cooperation agreements with Washington. As US allies, they are slated to be involved in Pentagon war plans directed against Russia, China and North Korea: Japan and South Korea are also both part of a grand U.S. military project involving the global stationing of missile systems and rapid military forces, as envisioned during the Reagan Administration. (Mahdi Darius Nazemroaya, Global Military Alliance: Encircling Russia and China, Global Research, October 5, 2007) This Pentagon strategy of military encirclement requires both centralized military decision making (Pentagon, USSTRATCOM) as well coordination with NATO and the various US regional commands.
  • On August 12, the US and Australia signed a military agreement allowing for the deployment of US troops in Australia. This agreement is part of Obama’s Pivot to Asia: The U.S. and Australia signed an agreement Tuesday [August 12] that will allow the two countries’ militaries to train and work better together as U.S. Marines and airmen deploy in and out of the country. “This long-term agreement will broaden and deepen our alliance’s contributions to regional security,” U.S. Defense Secretary Chuck Hagel said Tuesday. He described the U.S.-Australia alliance as the “bedrock” for stability in the Asia-Pacific region.
  • Ironically, coinciding with the announcement of the US-Australia agreement (August 12), Moscow announced that it would be conducting naval exercises in the Kuril Islands of the Pacific Ocean (which are claimed by Japan): “Exercises began involving military units in the region, which have been deployed to the Kuril Islands,” Colonel Alexander Gordeyev, a spokesman for Russia’s Eastern Military District, told news agency Interfax. (Moscow Times, August 12, 2014)
  • While this renewed East-West confrontation has mistakenly been labelled a “New Cold War”, none of the safeguards of The Cold War era prevail. International diplomacy has collapsed. Russia has been excluded from the Group of Eight (G-8), which has reverted to the G-7 (Group of Seven Nations). There is no “Cold War East-West dialogue” between competing superpowers geared towards avoiding military confrontation. In turn, the United Nations Security Council has become a de facto mouthpiece of the U.S. State Department. US-NATO will not, however, be able to win a conventional war against Russia, with the danger that military confrontation will lead to a nuclear war. In the post-Cold war era, however, nuclear weapons are no longer considered as a  “weapon of last resort” under the Cold War doctrine of “Mutual Assured Destruction” (MAD).  Quite the opposite. nuclear weapons are heralded by the Pentagon as “harmless to the surrounding civilian population because the explosion is underground”. In 2002, the U.S. Senate gave the green light for the use of nuclear weapons in the conventional war theater.  Nukes are part of the “military toolbox” to be used alongside conventional weapons.
  • When war becomes peace, the world is turned upside down.  In a bitter irony, nukes are now upheld by Washington as “instruments of peace”. In addition to nuclear weapons, the use of chemical weapons is also envisaged. Methods of non-conventional warfare are also contemplated by US-NATO including financial warfare, trade sanctions, covert ops, cyberwarfare, geoengineering and environmental modification technologies (ENMOD). But Russia also has  extensive capabilities in these areas.
  • The timeline towards war with Russia has been set. The Wales NATO venue on September 4-5, 2014 is of crucial importance. What we are dealing with is a World War III Scenario, which is the object of the Wales NATO Summit, hosted by Britain’s Prime Minister David Cameron. The agenda of this meeting has already been set by Washington, NATO and the British government. It requires, according to PM David Cameron in a letter addressed to heads of State and heads of government of NATO member states ahead of the Summit that: “Leaders [of NATO countries] must review NATO’s long term relationship with Russia at the summit in response to Russia’s illegal actions in Ukraine. And the PM wants to use the summit to agree how NATO will sustain a robust presence in Eastern Europe in the coming months to provide reassurance to allies there, building on work already underway in NATO.” (See PM writes to NATO leaders ahead of NATO Summit Wales 2014)
Paul Merrell

What's Scarier: Terrorism, or Governments Blocking Websites in its Name? - The Intercept - 0 views

  • Forcibly taking down websites deemed to be supportive of terrorism, or criminalizing speech deemed to “advocate” terrorism, is a major trend in both Europe and the West generally. Last month in Brussels, the European Union’s counter-terrorism coordinator issued a memo proclaiming that “Europe is facing an unprecedented, diverse and serious terrorist threat,” and argued that increased state control over the Internet is crucial to combating it. The memo noted that “the EU and its Member States have developed several initiatives related to countering radicalisation and terrorism on the Internet,” yet argued that more must be done. It argued that the focus should be on “working with the main players in the Internet industry [a]s the best way to limit the circulation of terrorist material online.” It specifically hailed the tactics of the U.K. Counter-Terrorism Internet Referral Unit (CTIRU), which has succeeded in causing the removal of large amounts of material it deems “extremist”:
  • In addition to recommending the dissemination of “counter-narratives” by governments, the memo also urged EU member states to “examine the legal and technical possibilities to remove illegal content.” Exploiting terrorism fears to control speech has been a common practice in the West since 9/11, but it is becoming increasingly popular even in countries that have experienced exceedingly few attacks. A new extremist bill advocated by the right-wing Harper government in Canada (also supported by Liberal Party leader Justin Trudeau even as he recognizes its dangers) would create new crimes for “advocating terrorism”; specifically: “every person who, by communicating statements, knowingly advocates or promotes the commission of terrorism offences in general” would be a guilty and can be sent to prison for five years for each offense. In justifying the new proposal, the Canadian government admits that “under the current criminal law, it is [already] a crime to counsel or actively encourage others to commit a specific terrorism offence.” This new proposal is about criminalizing ideas and opinions. In the government’s words, it “prohibits the intentional advocacy or promotion of terrorism, knowing or reckless as to whether it would result in terrorism.”
  • If someone argues that continuous Western violence and interference in the Muslim world for decades justifies violence being returned to the West, or even advocates that governments arm various insurgents considered by some to be “terrorists,” such speech could easily be viewed as constituting a crime. To calm concerns, Canadian authorities point out that “the proposed new offence is similar to one recently enacted by Australia, that prohibits advocating a terrorist act or the commission of a terrorism offence-all while being reckless as to whether another person will engage in this kind of activity.” Indeed, Australia enacted a new law late last year that indisputably targets political speech and ideas, as well as criminalizing journalism considered threatening by the government. Punishing people for their speech deemed extremist or dangerous has been a vibrant practice in both the U.K. and U.S. for some time now, as I detailed (coincidentally) just a couple days before free speech marches broke out in the West after the Charlie Hebdo attacks. Those criminalization-of-speech attacks overwhelmingly target Muslims, and have resulted in the punishment of such classic free speech activities as posting anti-war commentary on Facebook, tweeting links to “extremist” videos, translating and posting “radicalizing” videos to the Internet, writing scholarly articles in defense of Palestinian groups and expressing harsh criticism of Israel, and even including a Hezbollah channel in a cable package.
  • ...2 more annotations...
  • Beyond the technical issues, trying to legislate ideas out of existence is a fool’s game: those sufficiently determined will always find ways to make themselves heard. Indeed, as U.S. pop star Barbra Streisand famously learned, attempts to suppress ideas usually result in the greatest publicity possible for their advocates and/or elevate them by turning fringe ideas into martyrs for free speech (I have zero doubt that all five of the targeted sites enjoyed among their highest traffic dates ever today as a result of the French targeting). But the comical futility of these efforts is exceeded by their profound dangers. Who wants governments to be able to unilaterally block websites? Isn’t the exercise of this website-blocking power what has long been cited as reasons we should regard the Bad Countries — such as China and Iran — as tyrannies (which also usually cite “counterterrorism” to justify their censorship efforts)?
  • s those and countless other examples prove, the concepts of “extremism” and “radicalizing” (like “terrorism” itself) are incredibly vague and elastic, and in the hands of those who wield power, almost always expand far beyond what you think it should mean (plotting to blow up innocent people) to mean: anyone who disseminates ideas that are threatening to the exercise of our power. That’s why powers justified in the name of combating “radicalism” or “extremism” are invariably — not often or usually, but invariably — applied to activists, dissidents, protesters and those who challenge prevailing orthodoxies and power centers. My arguments for distrusting governments to exercise powers of censorship are set forth here (in the context of a prior attempt by a different French minister to control the content of Twitter). In sum, far more damage has been inflicted historically by efforts to censor and criminalize political ideas than by the kind of “terrorism” these governments are invoking to justify these censorship powers. And whatever else may be true, few things are more inimical to, or threatening of, Internet freedom than allowing functionaries inside governments to unilaterally block websites from functioning on the ground that the ideas those sites advocate are objectionable or “dangerous.” That’s every bit as true when the censors are in Paris, London, and Ottawa, and Washington as when they are in Tehran, Moscow or Beijing.
Paul Merrell

The Snipers Massacre on the Maidan in Ukraine | Johnson's Russia List - 0 views

  • The Snipers Massacre on the Maidan in Ukraine By Ivan Katchanovski, Ph.D. School of Political Studies & Department of Communication University of Ottawa Ottawa, ON K1N 6N5, Canada ikatchan@uottawa.ca Paper presented at the Chair of Ukrainian Studies Seminar at the University of Ottawa, Ottawa, October 1, 2014 [With visuals and footnotes here academia.edu/8776021/The_Snipers_Massacre_on_the_Maidan_in_Ukraine]
  • Conclusion The analysis and the evidence presented in this academic investigation put the Euromaidan and the conflict in Ukraine into a new perspective. The seemingly irrational mass shooting and killing of the protesters and the police on February 20 appear to be rational from self-interest based perspectives of rational choice and Weberian theories of instrumentally-rational action. This includes the following: the Maidan leaders gaining power as a result of the massacre, President Yanukovych and his other top government officials fleeing on February 21, 2014 from Kyiv and then from Ukraine, and the retreat by the police.
  • The same concerns Maidan protesters being sent under deadly fire into positions of no important value and then being killed wave by wave from unexpected directions. Similarly, snipers killing unarmed protesters and targeting foreign journalists but not Maidan leaders, the Maidan Self-Defense and the Right Sector headquarters, the Maidan stage, and pro-Maidan photographs become rational. While such actions are rational from a rational choice or instrumentally-rational theoretical perspective, the massacre not only ended many human lives but also undermined democracy, human rights, and the rule of law in Ukraine. The massacre of the protesters and the police represented a violent overthrow of the government in Ukraine and a major human rights crime. This violent overthrow constituted an undemocratic change of government. It gave start to a large-scale violent conflict that turned into a civil war in Eastern Ukraine, to a Russian military intervention in support of separatists in Crimea and Donbas, and to a de-facto break-up of Ukraine.
  • ...1 more annotation...
  • It also escalated an international conflict between the West and Russia over Ukraine. The evidence indicates that an alliance of elements of the Maidan opposition and the far right was involved in the mass killing of both protesters and the police, while the involvement of the special police units in killings of some of the protesters cannot be entirely ruled out based on publicly available evidence. The new government that came to power largely as a result of the massacre falsified its investigation, while the Ukrainian media helped to misrepresent the mass killing of the protesters and the police. The evidence indicates that the far right played a key role in the violent overthrow of the government in Ukraine. This academic investigation also brings new important questions that need to be addressed.
Paul Merrell

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
1 - 20 of 303 Next › Last »
Showing 20 items per page