Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Experts

Rss Feed Group items tagged

Paul Merrell

CISA Security Bill: An F for Security But an A+ for Spying | WIRED - 0 views

  • When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.
  • On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.” The central concern of that letter was how the same data sharing meant to bolster cybersecurity for companies and the government opens massive surveillance loopholes. The bill, as worded, lets a private company share with the Department of Homeland Security any information construed as a cybersecurity threat “notwithstanding any other provision of law.” That means CISA trumps privacy laws like the Electronic Communication Privacy Act of 1986 and the Privacy Act of 1974, which restrict eavesdropping and sharing of users’ communications. And once the DHS obtains the information, it would automatically be shared with the NSA, the Department of Defense (including Cyber Command), and the Office of the Director of National Intelligence.
  • In a statement posted to his website yesterday, Senator Burr wrote that “Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes.” But in fact, the bill’s data sharing isn’t limited to cybersecurity “threat indicators”—warnings of incoming hacker attacks, which is the central data CISA is meant to disseminate among companies and three-letter agencies. OTI’s Greene says it also gives companies a mandate to share with the government any data related to imminent terrorist attacks, weapons of mass destruction, or even other information related to violent crimes like robbery and carjacking. 
  • ...2 more annotations...
  • The latest update to the bill tacks on yet another kind of information, anything related to impending “serious economic harm.” All of those vague terms, Greene argues, widen the pipe of data that companies can send the government, expanding CISA into a surveillance system for the intelligence community and domestic law enforcement. If information-sharing legislation does not include adequate privacy protections, then...It’s a surveillance bill by another name. Senator Ron Wyden
  • “CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”
  •  
    I read the legislation. It's as bad for privacy as described in the aritcle. And its drafting is incredibly sloppy.
Paul Merrell

Information Warfare: Automated Propaganda and Social Media Bots | Global Research - 0 views

  • NATO has announced that it is launching an “information war” against Russia. The UK publicly announced a battalion of keyboard warriors to spread disinformation. It’s well-documented that the West has long used false propaganda to sway public opinion. Western military and intelligence services manipulate social media to counter criticism of Western policies. Such manipulation includes flooding social media with comments supporting the government and large corporations, using armies of sock puppets, i.e. fake social media identities. See this, this, this, this and this. In 2013, the American Congress repealed the formal ban against the deployment of propaganda against U.S. citizens living on American soil. So there’s even less to constrain propaganda than before.
  • Information warfare for propaganda purposes also includes: The Pentagon, Federal Reserve and other government entities using software to track discussion of political issues … to try to nip dissent in the bud before it goes viral “Controlling, infiltrating, manipulating and warping” online discourse Use of artificial intelligence programs to try to predict how people will react to propaganda
  • Some of the propaganda is spread by software programs. We pointed out 6 years ago that people were writing scripts to censor hard-hitting information from social media. One of America’s top cyber-propagandists – former high-level military information officer Joel Harding – wrote in December: I was in a discussion today about information being used in social media as a possible weapon.  The people I was talking with have a tool which scrapes social media sites, gauges their sentiment and gives the user the opportunity to automatically generate a persuasive response. Their tool is called a “Social Networking Influence Engine”. *** The implications seem to be profound for the information environment. *** The people who own this tool are in the civilian world and don’t even remotely touch the defense sector, so getting approval from the US Department of State might not even occur to them.
  • ...2 more annotations...
  • How Can This Real? Gizmodo reported in 2010: Software developer Nigel Leck got tired rehashing the same 140-character arguments against climate change deniers, so he programmed a bot that does the work for him. With citations! Leck’s bot, @AI_AGW, doesn’t just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source. As can be the case with these sorts of things, many of the deniers don’t know they’ve been targeted by a robot and engage AI_AGW in debate. The bot will continue to fire back canned responses that best fit the interlocutor’s line of debate—Leck says this goes on for days, in some cases—and the bot’s been outfitted with a number of responses on the topic of religion, where the arguments unsurprisingly often end up. Technology has come a long way in the past 5 years. So if a lone programmer could do this 5 years ago, imagine what he could do now. And the big players have a lot more resources at their disposal than a lone climate activist/software developer does.  For example, a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (and see this).  So if the lone programmer is doing it, it’s not unreasonable to assume that the big boys are widely doing it.
  • How Effective Are Automated Comments? Unfortunately, this is more effective than you might assume … Specifically, scientists have shown that name-calling and swearing breaks down people’s ability to think rationally … and intentionally sowing discord and posting junk comments to push down insightful comments  are common propaganda techniques. Indeed, an automated program need not even be that sophisticated … it can copy a couple of words from the main post or a comment, and then spew back one or more radioactive labels such as “terrorist”, “commie”, “Russia-lover”, “wimp”, “fascist”, “loser”, “traitor”, “conspiratard”, etc. Given that Harding and his compadres consider anyone who questions any U.S. policies as an enemy of the state  – as does the Obama administration (and see this) – many honest, patriotic writers and commenters may be targeted for automated propaganda comments.
Paul Merrell

Silicon Valley spars with Obama over 'backdoor' surveillance | TheHill - 0 views

  • Silicon Valley and a bipartisan group of lawmakers are lining up against the Obama administration, criticizing what they see as a lack of support for total online privacy.The steady rise of sophisticated privacy techniques such as encryption and anonymity software has put the government in a difficult position — trying to support the right to privacy while figuring out how to prevent people from evading law enforcement.ADVERTISEMENT“The technologies are evolving in ways that potentially make this trickier,” President Obama said during a January news conference with British Prime Minister David Cameron.The conundrum has led to a heated debate in Washington: Should law enforcement have guaranteed access to data?
  • The Obama administration — from officials with FBI and the National Security Agency (NSA) to the president himself — has come out in favor of some form of guaranteed access while still endorsing strong encryption.“If we get into a situation in which the technologies do not allow us at all to track somebody that we're confident is a terrorist,” Obama said, “that's a problem.”What shape that access takes, however, is unclear.“The dialogue that we're engaged in is designed to make sure that all of us feel confident that if there is an actual threat out there, our law enforcement and our intelligence officers can identify that threat and track that threat at the same time that our governments are not going around phishing into whatever text you might be sending on your smartphone,” Obama said. “And I think that's something that can be achieved.”Privacy hawks on Capitol Hill aren’t buying it.
  • “I don’t think much of that,” Rep. Joe Barton (R-Texas), co-founder of the Congressional Bipartisan Privacy Caucus, told The Hill. “We have a huge homeland security apparatus with almost unlimited authority to — with some sort of a reasonable suspicion — check almost any type of communication, whether it’s voice, Internet, telephonic, electronic, you name it.”“Those were positions that did not receive rave reviews here in Silicon Valley,” said Rep. Zoe Lofgren (D-Calif.), whose district includes parts of tech-heavy San Jose.Many believe the administration’s stance is inherently at odds with robust digital protection.“In order to fully implement what he's suggesting, you would need one of two things,” Lofgren said.One would be installing so-called “backdoors” in encryption — an access point known only to law enforcement agencies. Security experts find this concept abhorrent, since cyber crooks or foreign intelligence agencies would likely exploit it.
  • ...1 more annotation...
  • The second would be to have a third-party company hold all user data, with some sort of agreement to disclose information to the government, Lofgren said.“I think actually the trend line is in a different direction, which is encryption that is not accessible to the companies that provide it, either,” she added.  Major tech companies like Apple have done exactly that, claiming that even they can’t unlock data on newer devices.
Paul Merrell

Busted Stuff: America's Disastrous Iran Policy | The National Interest - 0 views

  • Stakes in the nuclear talks between Iran and the P5+1 couldn’t be higher for the countries involved—especially for the United States. After nearly a decade and a half of disastrously self-damaging wars, “counter-terrorism campaigns,” and military occupations in the Middle East, the dysfunction and incoherence of U.S. policy is now on full display, from Iraq to Libya, Syria, and now Yemen. To recover, Washington must accept on-the-ground realities: U.S. efforts to dominate the region have failed and the Islamic Republic of Iran is now a rising power with which America must come to terms.              But President Obama has yet to explain why the United States—for its own interests, not as a favor to Iran, or simply because Americans are war-weary—needs rapprochement with the Islamic Republic. Absent such advocacy, his administration may still reach a nuclear deal with Iran. But it will lose the political fight at home over a new Iran policy, squandering the chance for a broader strategic opening with Tehran and locking the United States into increasingly steep strategic decline in the Middle East and globally.   
  • Today, America cannot achieve any of its high-priority goals in the Middle East—e.g., combatting the Islamic State, forestalling another violent Taliban takeover in Afghanistan, and resolving conflicts in Syria and Yemen—without better ties with Iran. Under any political order, Iran is a pivotal country, given its demographic and territorial size, its geostrategic location, its identity as a civilizational state with a history as long as China’s, and its hydrocarbon resources. But, under the Islamic Republic—which, since the 1979 Iranian Revolution, has worked to forge an indigenously-designed political system combining participatory politics and elections with elements of Islamic governance, and to pursue foreign policy independence—Iran enjoys a powerful legitimacy that bolsters its regional impact.
  • For too many Americans, thirty-five years of demonizing caricature mask an essential fact:  the Islamic Republic of Iran, as the Middle East’s only successful participatory Islamist order, has been able to pursue an independent foreign policy that has steadily bolstered its influence in critical arenas across the Middle East. If America is to recover its strategic position, it must devise a fundamentally different relationship with this rising power. It must do so not only because of Iran’s unique importance, but also as a first step toward coming to terms with Middle Eastern Muslims’ manifest desire—reflected in polls and in electoral outcomes whenever they get to vote in a reasonably open way—to define their political futures in terms of participatory Islamism and foreign policy independence.      Ignoring these realities, the Obama administration treats a nuclear deal as, at most, a “nice to have” option. Obama rarely identifies potential U.S. gains from realigning relations with Iran; instead, he stresses how Washington is providing Tehran with an “opportunity” to “benefit from rejoining the international community.”  
  • ...1 more annotation...
  • Flynt Leverett and Hillary Mann Leverett are co-authors of Going to Tehran: Why America Must Accept the Islamic Republic of Iran; both served as Middle East experts in the U.S. government under Presidents George H.W. Bush, Bill Clinton, and George W. Bush. Flynt is professor of international affairs at Penn State.
  •  
    A must-read.
Paul Merrell

Tech firms and privacy groups press for curbs on NSA surveillance powers - The Washingt... - 0 views

  • The nation’s top technology firms and a coalition of privacy groups are urging Congress to place curbs on government surveillance in the face of a fast-approaching deadline for legislative action. A set of key Patriot Act surveillance authorities expire June 1, but the effective date is May 21 — the last day before Congress breaks for a Memorial Day recess. In a letter to be sent Wednesday to the Obama administration and senior lawmakers, the coalition vowed to oppose any legislation that, among other things, does not ban the “bulk collection” of Americans’ phone records and other data.
  • We know that there are some in Congress who think that they can get away with reauthorizing the expiring provisions of the Patriot Act without any reforms at all,” said Kevin Bankston, policy director of New America Foundation’s Open Technology Institute, a privacy group that organized the effort. “This letter draws a line in the sand that makes clear that the privacy community and the Internet industry do not intend to let that happen without a fight.” At issue is the bulk collection of Americans’ data by intelligence agencies such as the National Security Agency. The NSA’s daily gathering of millions of records logging phone call times, lengths and other “metadata” stirred controversy when it was revealed in June 2013 by former NSA contractor Edward Snowden. The records are placed in a database that can, with a judge’s permission, be searched for links to foreign terrorists.They do not include the content of conversations.
  • That program, placed under federal surveillance court oversight in 2006, was authorized by the court in secret under Section 215 of the Patriot Act — one of the expiring provisions. The public outcry that ensued after the program was disclosed forced President Obama in January 2014 to call for an end to the NSA’s storage of the data. He also appealed to Congress to find a way to preserve the agency’s access to the data for counterterrorism information.
  • ...3 more annotations...
  • Despite growing opposition in some quarters to ending the NSA’s program, a “clean” authorization — one that would enable its continuation without any changes — is unlikely, lawmakers from both parties say. Sen. Ron Wyden (D-Ore.), a leading opponent of the NSA’s program in its current format, said he would be “surprised if there are 60 votes” in the Senate for that. In the House, where there is bipartisan support for reining in surveillance, it’s a longer shot still. “It’s a toxic vote back in your district to reauthorize the Patriot Act, if you don’t get some reforms” with it, said Rep. Thomas Massie (R-Ky.). The House last fall passed the USA Freedom Act, which would have ended the NSA program, but the Senate failed to advance its own version.The House and Senate judiciary committees are working to come up with new bipartisan legislation to be introduced soon.
  • The tech firms and privacy groups’ demands are a baseline, they say. Besides ending bulk collection, they want companies to have the right to be more transparent in reporting on national security requests and greater declassification of opinions by the Foreign Intelligence Surveillance Court.
  • Some legal experts have pointed to a little-noticed clause in the Patriot Act that would appear to allow bulk collection to continue even if the authority is not renewed. Administration officials have conceded privately that a legal case probably could be made for that, but politically it would be a tough sell. On Tuesday, a White House spokesman indicated the administration would not seek to exploit that clause. “If Section 215 sunsets, we will not continue the bulk telephony metadata program,” National Security Council spokesman Edward Price said in a statement first reported by Reuters. Price added that allowing Section 215 to expire would result in the loss of a “critical national security tool” used in investigations that do not involve the bulk collection of data. “That is why we have underscored the imperative of Congressional action in the coming weeks, and we welcome the opportunity to work with lawmakers on such legislation,” he said.
  •  
    I omitted some stuff about opposition to sunsetting the provisions. They  seem to forget, as does Obama, that the proponents of the FISA Court's expansive reading of section 215 have not yet come up with a single instance where 215-derived data caught a single terrorist or prevented a single act of terrorism. Which means that if that data is of some use, it ain't in fighting terrorism, the purpose of the section.  Patriot Act § 215 is codified as 50 USCS § 1861, https://www.law.cornell.edu/uscode/text/50/1861 That section authorizes the FBI to obtain an iorder from the FISA Court "requiring the production of *any tangible things* (including books, records, papers, documents, and other items)."  Specific examples (a non-exclusive list) include: the production of library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person." The Court can order that the recipient of the order tell no one of its receipt of the order or its response to it.   In other words, this is about way more than your telephone metadata. Do you trust the NSA with your medical records? 
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Paul Merrell

What's the big deal between Russia and the Saudis? - RT Op-Edge - 0 views

  • Amidst the wilderness of mirrors surrounding the Syrian tragedy, a diamond-shaped fact persists: Despite so many degrees of separation, the Saudis are still talking to the Russians. Why? A key reason is because a perennially paranoid House of Saud feels betrayed by their American protectors who, under the Obama administration, seem to have given up on isolating Iran.
  • From the House of Saud’s point of view, three factors are paramount. 1) A general sense of ‘red alert’ as they have been deprived from an exclusive relationship with Washington, thus becoming incapable of shaping US foreign policy in the Middle East; 2) They have been mightily impressed by Moscow’s swift counter-terrorism operation in Syria; 3) They fear like the plague the current Russia-Iran alliance if they have no means of influencing it.
  • That explains why King Salman’s advisers have pressed the point that the House of Saud has a much better chance of checking Iran on all matters - from “Syraq” to Yemen - if it forges a closer relationship with Moscow. In fact, King Salman may be visiting Putin before the end of the year.
  • ...6 more annotations...
  • One of the untold stories of the recent Syria-driven diplomatic flurry is how Moscow has been silently working on mollifying both Saudi Arabia and Turkey behind the scenes. That was already the case when the foreign ministers of US, Russia, Turkey and Saudi Arabia met before Vienna.Vienna was crucial not only because Iran was on the table for the first time but also because of the presence of Egypt – incidentally, fresh from recent discovery of new oil reserves, and engaging in a reinforced relationship with Russia.The absolute key point was this paragraph included in Vienna’s final declaration: “This political process will be Syrian-led and Syrian-owned, and the Syrian people will decide the future of Syria.”It’s not by accident that only Russian and Iranian media chose to give the paragraph the appropriate relevance. Because this meant the actual death of the regime change obsession, much to the distress of US neocons, Erdogan and the House of Saud.
  • The main point is the death of the regime change option, brought about by Moscow. And that leaves Putin free to further project his extremely elaborate strategy. He called Erdogan on Wednesday to congratulate him on his and the AKP’s election landslide. This means that now Moscow clearly has someone to talk to in Ankara. Not only about Syria. But also about gas.Putin and Erdogan will have a crucial energy-related meeting at the G20 summit on November 15 in Turkey; and there’s an upcoming visit by Erdogan to Moscow. Bets are on that the Turk Stream agreement will be – finally – reached before the end of the year. And on northern Syria, Erdogan has been forced to admit by Russian facts on the ground and skies that his no-fly zone scheme will never fly.
  • That leaves us with the much larger problem: the House of Saud.There’s a wall of silence surrounding the number one reason for Saudi Arabia to bomb and invade Yemen, and that is to exploit Yemen’s virgin oil lands, side by side with Israel – no less. Not to mention the strategic foolishness of picking a fight with redoubtable warriors such as the Houthis, which have sowed panic amidst the pathetic, mercenary-crammed Saudi army.Riyadh, following its American reflexes, even resorted to recruiting Academi – formerly Blackwater - to round up the usual mercenary suspects as far away as Colombia.It was also suspected from the beginning, but now it's a done deal that the responsible actor for the costly Yemen military disaster is none other than Prince Mohammad bin Salman, the King’s son who, crucially, was sent by his father to meet Putin face-to-face.
  • Meanwhile, Qatar will keep crying because it was counting on Syria as a destination point for its much-coveted gas pipeline to serve European customers, or at least as a key transit hub on the way to Turkey.Iran on the other hand needed both Iraq and Syria for the rival Iran-Iraq-Syria gas pipeline because Tehran could not rely on Ankara while it was under US sanctions (this will now change, fast). The point is Iranian gas won’t replace Gazprom as a major source for the EU anytime soon. If it ever did, or course, that would be a savage blow to Russia.
  • In oil terms, Russia and the Saudis are natural allies. Saudi Arabia cannot export natural gas; Qatar can. To get their finances in order – after all even the IMF knows they are on a highway to hell - the Saudis would have to cut back around ten percent of production with OPEC, in concert with Russia; the oil price would more than double. A 10 percent cutback would make a fortune for the House of Saud.So for both Moscow and Riyadh, a deal on the oil price, to be eventually pushed towards $100 a barrel, would make total economic sense. Arguably, in both cases, it might even mean a matter of national security.But it won’t be easy. OPEC’s latest report assumes a basket of crude oil to be quoted at only $55 in 2015, and to rise by $5 a year reaching $80 only by 2020. This state of affairs does not suit either Moscow or Riyadh.
  • Meanwhile, fomenting all sorts of wild speculation, ISIS/ISIL/Daesh still manages to collect as much as $50 million a month from selling crude from oilfields it controls across “Syraq”, according to the best Iraq-based estimates.The fact that this mini-oil caliphate is able to bring in equipment and technical experts from “abroad” to keep its energy sector running beggars belief. “Abroad” in this context means essentially Turkey – engineers plus equipment for extraction, refinement, transport and energy production.One of the reasons this is happening is that the US-led Coalition of the Dodgy Opportunists (CDO) – which includes Saudi Arabia and Turkey - is actually bombing the Syrian state energy infrastructure, not the mini oil-Caliphate domains. So we have the proverbial “international actors” in the region de facto aiding ISIS/ISIL/Daesh to sell crude to smugglers for as low as $10 a barrel.Saudis – as much as Russian intel - have noted how ISIS/ISIL/Daesh is able to take over the most advanced US equipment that takes months to master, and instead integrate it into their ops at once. This implies they must have been extensively trained. The Pentagon, meanwhile, sent and will be sending top military across “Syraq” with an overarching message: if you choose Russia we won’t help you.ISIS/ISIL/Daesh, for their part, never talks about freeing Jerusalem. It’s always about Mecca and Medina.
  •  
    Pepe Escobar brings us up to speed on big changes in the Mideast, including the decline of U.S. influence. Not mentioned, but the Saudis' feelings of desertion by the Washington Beltway and its foreplay with Russia could bring about an end to the Saudis insistence on being paid for oil in U.S. dollars, and there goes the western economy. 
Paul Merrell

Ten years on, Iraq Lies in Ruins as New Evidence confirms U.S. used Death Squads to Man... - 0 views

  • Last week, the UK Guardian newspaper published the results of a 15-month investigation by the Guardian and BBC Arabic. Euphemistically titled ‘James Steele: America’s mystery man in Iraq‘, the video report presents fairly damning evidence that, in the immediate aftermath of the US invasion of Iraq, the US Government and military began to assemble a 10,000 strong ‘Shia militia’ that, under US command, would be used to do three things: Kidnap, torture, murder and maim members of the Iraq resistance and those members of the Iraqi population that supported them. Plants bombs that targeted predominantly Sunni and Shia areas in an effort to divide the population and thereby any unified resistance to the US occupation. Create the impression of a ‘civil war’ in Iraq that could be used by the US and European governments and militaries to justify the continued occupation of Iraq for ‘peace-keeping’ purposes. While the 50 minute documentary is proof enough that Rumsfeld, Cheney, General Petraeus, and all the other NeoCon warhawks and CIA monsters consciously employed the services of former US Army Colonel James Steele in the organisation of death squads against the Iraqi grass-roots resistance (a tactic that he, Steele, had used against resistance movements in South America in the 1970s and 90′s), it panders to the official narrative that ‘sectarianism’ in Iraq was the root cause of the carnage that unfolded.
  • The so-called ‘Shia militia’ used by the American government (with the help and advice of British and Israeli counter-insurgency ‘experts’) were recruited directly by the CIA and people like James Steele to carry out extra-judicial murders of anyone they could loosely identify as ‘resistance’. In order to cloak this strategy, indiscriminate attacks on Iraqi civilians, Shia and Sunni alike, were carried out on a massive scale. Some of these individuals, in another setting, would be called ‘al-Qaeda’. Their usefulness in the employ of US warhawks in the Pentagon was doubly valuable because they both justified continued US occupation and provided ‘proof’ for the American War on Terror mythology, ex post facto, that the US was at war with the perpetrators of 9/11. Whereas before the invasion in 2003 there was absolutely nothing to link 9/11 to Saddam Hussein’s Iraq, the creation of death squads (real) labelled ‘al Qaeda in Iraq’ (fictitious) ‘made real’ the lie that America and all Western civilization was at war against hordes of irrational and violent Muslims, and became the template for instigating terrorism to suppress popular uprisings in Yemen, Mali and elsewhere. Once they have people violent, they can wear down and manage the national popular resistance, ensuring no opposition to the real strategic objectives (namely the control of Middle Eastern oil). The US forces of occupation, along with their British counterparts, had long experience in what actually happens when you militarily invade and occupy a sovereign nation: the people resist, and not just one ethnic or religious group, but more or less the whole population. There is nothing quite like a foreign occupation for uniting a country.
  • In Iraq, these US-controlled ‘Shia’ death squads have been operating in much the same way, and while the media is content to portray them as ordinary Shias motivated by religious bias, they are in fact hired thugs who value only the money they are paid by their US masters and the promise of positions of power in a future Iraqi government. Like the rank and file of the ‘Libyan rebels’ and the ‘Free Syrian Army’, these people form the dregs of Arab and Middle Eastern societies. Led by spellbinders who veil their barbaric actions with religious prose, secular leaders in the region, like Ghaddafi and Assad, and Nasser and Arafat before them, struggled in vain to keep them at bay. The reason for this is because the US, Britain, France and Israel have consistently supported – in the form of weapons, money, training and blatant lies – the extremists against the rational voices. Throughout the US occupation of Iraq, the main representative of Shias in Iraq, Muqtada al-Sadr, has repeatedly called for unity among Shia and Sunni Iraqis in the face of foreign occupation and deception in the form of efforts to divide the resistance. These efforts included the bombing of bridges in Baghdad and other Iraqi cities in an effort to prevent communication between Iraqis, the use of widespread terror tactics to force Sunni and Shia Iraqis to flee their homes, and the bombing of religious shrines, either Shia or Sunni, in an effort to create the reality of ‘sectarian strife’. Iraq today is in ruins. The country has been ripped apart socially, mainly by way of the literal ripping apart of tens of thousands of civilians, with many being first brutally and systematically tortured by US-sponsored death squads. Hundreds of thousands more have been summarily murdered, either by the bombs of US aircraft, the bullets of US soldiers, or those ubiquitous and very effective ‘car bombs‘ planted by US and British operatives and their hired thugs.
Paul Merrell

On this Veterans Day, suicide has caused more American casualties than wars in Iraq and... - 0 views

  • One of the most tragic problems afflicting those who served their country is the specter of suicide, often the fallout of post traumatic stress disorder (PTSD). After more than a year of intense lobbying by veterans groups, Congress this year passed the Clay Hunt Suicide Prevention for American Veterans Act, named for a Marine veteran who took his own life even after working as an advocate for suicide prevention. The law is designed to reduce military and veteran suicides, and improve access to quality mental health care. But veterans experts estimate that 17 of the 22 daily suicides involve vets not enrolled in the VA’s healthcare system, suggesting more research — and far greater funding — will be necessary to get a handle on the problem.
  • With U.S. combat operations winding down in Afghanistan and Iraq, the suicide rate among ex-military members has risen from 18 a day in 2010, although studies undertaken by the Veterans Administration have failed to pinpoint a direct cause. Only about a third of all vets use the VA for healthcare, which leaves a wide swath of people who once wore the uniform outside the reach of the military’s data gathering.“Common sense would have us expect a correlation between number of deployments and combat with suicide risk,” says Fred MacRae, lead suicide prevention coordinator at the VA hospital in Palo Alto. But recent research suggests that’s not necessarily the case. #AD_text{ font-size: 11px; color: #999999; } Advertisement Not even the horrors of battle are a proven cause. “More and more,” says Jackie Maffucci, research director for Iraq and Afghanistan Veterans of America (IAVA), “the data are suggesting that exposure to combat is not one of the high-risk factors.”
  • Almost everyone who has served in the military now knows someone — often several someones — who suffers from disabling depression. Some end their own lives. Members of the IAVA were asked in a survey last year if they knew at least one post-9/11 veteran who had attempted suicide, and 47 percent answered yes. Another 40 percent knew at least one veteran who had died by suicide. “And 31 percent indicated they had thought about taking their own life since joining the military,” says Maffucci. “Those are startling numbers.”Daniel Faddis told another veteran in his family that he felt he had let down his military buddies when he was booted out. “He carried around a lot of guilt about that,” Stan Faddis says. “Some guys he knew ended up dying in combat, and he felt bad he wasn’t there to save them, or to die with them.”The current wait time for a mental health appointment at the VA in Palo Alto is about 12 days, and in a recent national study by the Government Accountability Office it averaged 26 days. Still, that’s considerably shorter than when the country went on a wartime footing following 9/11. “In 2001, your chances of dying by suicide were greater if you got your care in the VA system than if you got it elsewhere,” MacRae acknowledges. The new federal legislation is creating a program to help the VA recruit psychiatrists by assisting with their tuition payments, and it also requires an annual evaluation of VA mental health and suicide-prevention programs.
Paul Merrell

UN Sponsored Evacuation of Insurgents from Damascus to Raqqa Delayed - nsnbc internatio... - 0 views

  • The UN brokered evacuation of about 2,000 Jihadi insurgents from the Syrian capital Damascus to Raqqa, the de facto capital of the self-proclaimed Islamic State, has been delayed after an air strike of the Syrian Air Force took out the commander of Jays al-Islam, Zahran Alloush. On August 21, 2013, Alloush, in his function as supreme commander of Liwa-al-Islam, gave to order to launch the chemical weapons attack on the East Ghouta suburb of Damascus.
  • The exterminated Zahran Alloush was, until he became the commander of Jaysh al-Islam the supreme commander of Liwa-al-Islam; a position he continued to hold until his death. An in depth investigative report published by nsnbc international in 2013 shows that Zahran Alloush was the field commander who, on August 21, 2013, gave the order to launch the chemical weapons attack against the East Ghouta suburb of Damascus. Zahran Alloush has been on the payroll of the Saudi intelligence service since the 1980s. Despite certain media reports to the contrary it must be noted that the air strike that ended the life of Zahran Alloush was carried out before a ceasefire that should allow the evacuation of the 2,000 insurgents to Raqqa came into effect. Jobar is of immense strategic importance for foreign backed insurgents’ logistic support from Turkey, Lebanon, Israel and Jordan.
  • Liwa_al-Islam Commander and Chemical Weapon Expert Zahran Alloush has been working for Saudi Intelligence since the 1980s
  •  
    The Syrian Arab Army takes vengeance against the commander of the forces that launched the Ghouta, Syria false flag sarin gas attack that led to Obama nearly issuing the order to rain shock and awe on the Syrian Army and government. Although Turkey is being given credit for the false flag attack these days, the unit that carried out the attack was under the direct command of Saudi Intelligence. Turkey played a role in smuggling the sarin into Syria, but it was the Saudis who pulled the trigger. 
Paul Merrell

Japan's Fukushima Prefecture Shows Wave of Mutations - nsnbc international | nsnbc inte... - 0 views

  • Japanese researchers are reluctant to comment, but more than 90 percent of fir trees in forests close to the crippled Fukushima Daiichi Nuclear Power Plant (NPP) show signs of mutations and abnormalities while plant lice species sampled in a town more than 30 kilometers from the disaster site either have deformed legs or are missing legs. The mutations are a probable precursor of what is in store for Japanese people who are being resettled in allegedly de-contaminated towns and villages.
  • Japanese scientists are reluctant to comment on the record. Several attempts by nsnbc to reach out resulted in off-protocol confirmations of suspicions and references to Japanese law that makes revealing of unauthorized information about the Fukushima disaster a criminal offense that can be punishable with up to ten years in prison. The official line is that Japanese scientists are trying to figure out whether there is a causal relation between the wave of mutations and the still ongoing release of radiation and radionucleides into the environment. Studies focus primarily on hos radioactive cesium spread in forests and forest soil after the catastrophic triple meltdown at the TEPCO operated Fukushima Daiichi NPP after it was struck by an earthquake and a subsequent tsunami in 2011. Results of a 2013 study already revealed that levels of the radioactive isotope cesium from the crippled Fukushima Daiichi power plant in northern Japanese forests had almost doubled within one year and that it will continue increasing as the forests bioaccumulate the isotope. The 2013 study and ongoing studies have major ramifications even though these studies largely ignore a cohort of other, potentially more dangerous isotopes such as plutonium.
  • The wave of mutations in insects, fir trees and other animals is according to Japanese experts who are relutant to speak on the record a precursor for what populations who live within a 100 km radius of the crippled power-plant can expect to see in human populations. The Japanese government’s push for resettling populations that were evacuated to so-called de-contaminated villages and towns is particularly problematic and controversial. The Japanese government’s definition of a de-contaminated village, for example, means that the village itself and an area of a few hundred meters leading to these villages have been de-contaminated by e.g. top-sol removal. Water and airborne isotopes will, however, move with the waters and winds and easily re-contaminate these so-called safe zones. Evacuees who refuse to be resettled risk losing government support. Another serious issue is that radioactive contaminated waste from the region is incinerated in facilities throughout Japan, thus spreading airborne contamination throughout the entire country. Some critics stress that this program may aim at making it extremely difficult to conduct epidemiological studies.
  • ...1 more annotation...
  • In November 2015 the former Japanese Ambassador to Switzerland, Mitshei Murata, called on the President of the International Olympic Committee to move the 2020 Olympics from Tokyo or to cancel the games. Murata noted that he, as many others feel the Olympic Summer Games under these circumstances should be canceled and the preparations abandoned. Murata wrote: Not only do we have a continued contamination of the groundwater and the Pacific Ocean by the unstable plant, but the brittle structure of the damaged plant represents itself a serious threat, in particular in our earthquake prone region. Given the relative proximity of Tokyo, just some 200km South of Fukushima, represents in my view an ongoing risk for our largest city, for its citizens and all visitors. You might agree that one more alarming development as the recent earthquake of magnitude 8.1 just some weeks ago might indeed increase the pressure to stop the planning process of the 2020 games all together.
Paul Merrell

Goldman Sachs Makes Oil Prices Drop | Global Research - Centre for Research on Globaliz... - 0 views

  • Schedule of falling oil prices, adjusted in relation to the current fluctuations, has essentially been a straight line since last September, when prices fell from $ 50 per barrel to the current $ 29. What was so momentous that happened in the world market in September? In September, “Goldman Sachs” lowered expectations for the average oil price for 2016, assuming that it will drop to $ 20 a barrel. “Expectations” of “Goldman Sachs” were “whole-heartedly” supported by “Merrill Lynch”, “Bank of America” and others. There you have it – $ 20, quoted by “Goldman Sachs”, was not a forecast. It was the target. Only our own Ministry of Economy is the one that makes forecasts, “Goldman Sachs” , on the other hand, makes the markets. The oil market – is not the market of raw materials. Supply contracts for actual oil makes only 2% percent of the market, the rest – speculative securities, futures and other derivatives. Prices for futures are not determined by supply and demand, but by “expectations”. The futures market is completely controlled by the largest US banks. This is the market of expectations, which creates a real “Industry of expectations” using the notorious rating agencies, “independent” experts and the media.
Paul Merrell

EFF Pries More Information on Zero Days from the Government's Grasp | Electronic Fronti... - 0 views

  • Until just last week, the U.S. government kept up the charade that its use of a stockpile of security vulnerabilities for hacking was a closely held secret.1 In fact, in response to EFF’s FOIA suit to get access to the official U.S. policy on zero days, the government redacted every single reference to “offensive” use of vulnerabilities. To add insult to injury, the government’s claim was that even admitting to offensive use would cause damage to national security. Now, in the face of EFF’s brief marshaling overwhelming evidence to the contrary, the charade is over. In response to EFF’s motion for summary judgment, the government has disclosed a new version of the Vulnerabilities Equities Process, minus many of the worst redactions. First and foremost, it now admits that the “discovery of vulnerabilities in commercial information technology may present competing ‘equities’ for the [government’s] offensive and defensive mission.” That might seem painfully obvious—a flaw or backdoor in a Juniper router is dangerous for anyone running a network, whether that network is in the U.S. or Iran. But the government’s failure to adequately weigh these “competing equities” was so severe that in 2013 a group of experts appointed by President Obama recommended that the policy favor disclosure “in almost all instances for widely used code.” [.pdf].
  • The newly disclosed version of the Vulnerabilities Equities Process (VEP) also officially confirms what everyone already knew: the use of zero days isn’t confined to the spies. Rather, the policy states that the “law enforcement community may want to use information pertaining to a vulnerability for similar offensive or defensive purposes but for the ultimate end of law enforcement.” Similarly it explains that “counterintelligence equities can be defensive, offensive, and/or law enforcement-related” and may “also have prosecutorial responsibilities.” Given that the government is currently prosecuting users for committing crimes over Tor hidden services, and that it identified these individuals using vulnerabilities called a “Network Investigative Technique”, this too doesn’t exactly come as a shocker. Just a few weeks ago, the government swore that even acknowledging the mere fact that it uses vulnerabilities offensively “could be expected to cause serious damage to the national security.” That’s a standard move in FOIA cases involving classified information, even though the government unnecessarily classifies documents at an astounding rate. In this case, the government relented only after nearly a year and a half of litigation by EFF. The government would be well advised to stop relying on such weak secrecy claims—it only risks undermining its own credibility.
  • The new version of the VEP also reveals significantly more information about the general process the government follows when a vulnerability is identified. In a nutshell, an agency that discovers a zero day is responsible for invoking the VEP, which then provides for centralized coordination and weighing of equities among all affected agencies. Along with a declaration from an official at the Office of the Director of National Intelligence, this new information provides more background on the reasons why the government decided to develop an overarching zero day policy in the first place: it “recognized that not all organizations see the entire picture of vulnerabilities, and each organization may have its own equities and concerns regarding the prioritization of patches and fixes, as well as its own distinct mission obligations.” We now know the VEP was finalized in February 2010, but the government apparently failed to implement it in any substantial way, prompting the presidential review group’s recommendation to prioritize disclosure over offensive hacking. We’re glad to have forced a little more transparency on this important issue, but the government is still foolishly holding on to a few last redactions, including refusing to name which agencies participate in the VEP. That’s just not supportable, and we’ll be in court next month to argue that the names of these agencies must be disclosed. 
Paul Merrell

Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails "Top Secret" - 0 views

  • Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails “Top Secret” The leaking of the Clinton emails has been compared to as the next “Watergate”. By ZeroHedge.com | January 30, 2016 Share this article! targ
  • The State Department will release more emails from Clinton’s time as secretary of state later Friday. But The Associated Press has learned that 7 email chains are being withheld in full for containing “top secret” material. The 37 pages include messages recently described by a key intelligence official as concerning so-called “special access programs” — a highly restricted subset of classified material that could point to confidential sources or clandestine programs like drone strikes or government eavesdropping. Department officials wouldn’t describe the substance of the emails, or say if Clinton had sent any herself. Spokesman John Kirby tells the AP that no judgment on past classification was made. But the department is looking into that, too.
  • For those that Clinton only read, and didn’t write or forward, she still would have been required to report classification slippages that she recognized. Possible responses for classification infractions include counseling, warnings or other action, State Department officials said, though they declined to say if these applied to Clinton or senior aides who’ve since left the department. The officials weren’t authorized to speak on the matter and spoke on condition of anonymity. However, as we previously noted, the implications are tough for The DoJ – if they indict they crush their own candidate’s chances of the Presidency, if they do not – someone will leak the details and the FBI will revolt… The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days.
  • ...1 more annotation...
  • I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, which she will not be able to survive as an attorney general,” he said. “The intelligence community will not stand for that. They will fight for indictment and they are already in the process of gearing themselves to basically revolt if she refuses to bring charges.” The FBI also is looking into Clinton’s email setup, but has said nothing about the nature of its probe. Independent experts say it is highly unlikely that Clinton will be charged with wrongdoing, based on the limited details that have surfaced up to now and the lack of indications that she intended to break any laws. “What I would hope comes out of all of this is a bit of humility” and an acknowledgement from Clinton that “I made some serious mistakes,” said Bradley Moss, a Washington lawyer who regularly handles security clearance matters. Legal questions aside, it’s the potential political costs that are probably of more immediate concern for Clinton. She has struggled in surveys measuring her perceived trustworthiness and an active federal investigation, especially one buoyed by evidence that top secret material coursed through her account, could negate one of her main selling points for becoming commander in chief: Her national security resume.
Paul Merrell

Distrust of US surveillance threatens data deal | TheHill - 0 views

  • European privacy regulators are putting U.S. surveillance practices under the microscope, this time with a crucial transatlantic data deal hanging in the balance.Legal and privacy advocates say European nations are poised to strike down the deal if they decide the U.S. hasn't done enough to reform its spying programs.The new test comes after the European Commission and the Commerce Department — after months of tense negotiations — reached a deal this week permitting Facebook, Google and thousands of other companies to continue legally handling Europeans’ personal data.ADVERTISEMENTCritics though have long warned that unless the U.S. overhauls its privacy and national security laws, there is no legal framework that can stand up in European court, where privacy is considered a fundamental right under the EU Charter.A working group of 28 EU nations’ data protection authorities — domestic entities separate from the Commission that will be in charge of enforcing the new agreement — may now cast the deciding vote.The group is spending the next few months picking through the so-called Privacy Shield agreement to determine if it adequately protects the personal data of European citizens.
  • “The Commission has said, ‘We’re satisfied. We believe them. We believe the U.S. has substantially changed its practices,’ and they are no longer going off the [Edward] Snowden revelations in the media,” said Susan Foster, a privacy attorney at Mintz Levin who works in both the EU and the U.S.“Whether the working group will go along with it is another question.”The privacy advocate whose complaint against Facebook brought down the Privacy Shield’s 15-year-old predecessor agreement is already questioning the new deal’s validity.“With all due respect ... a couple of letters by the outgoing Obama administration is by no means a legal basis to guarantee the fundamental rights of 500 million European users in the long run, when there is explicit U.S. law allowing mass surveillance,” Max Schrems of Austria said in a statement Tuesday.The United States has been fighting against the perception that it tramples on civil liberties after ex-National Security Agency contractor Edward Snowden revealed the breadth of the agency’s snooping.One sticking point in the Privacy Shield negotiations was over the scope of an exception allowing surveillance for national security purposes.
  • In announcing the deal, Commission officials insisted that the U.S. had provided “detailed written assurances” that surveillance of Europeans’ data by intelligence agencies would be subject to appropriate limitations.“The U.S. has clarified that they do not carry out indiscriminate surveillance of Europeans,” Andrus Ansip, Vice President for the Digital Single Market on the European Commission, said Tuesday.The U.S. has also agreed to create an office in the State Department, to address complaints from EU citizens who feel their data has been inappropriately accessed by intelligence authorities.Complicating the working group’s approval of the deal is the hodgepodge of competing regulators in Europe. Each nation has an agency in charge of its own country’s regulation. Some countries — such as Germany — are seen as tougher on privacy than others, like France or the U.K.While some countries consider U.S. privacy protections to be satisfactory, in others they are seen as woefully inadequate.
  • ...2 more annotations...
  • Defenders of U.S. intelligence practices often point to France and the U.K., arguing they are equally intrusive with their citizens' data.A recent public report “pretty clearly documented that the protections are patchy, vary hugely and are nonexistent in some of the countries,” Foster noted.Privacy advocates dismiss those arguments.“You cannot pick the worst member state, like the U.K., and claim you are ‘equivalent’ to that,” Schrems said Tuesday. “First, this is not a price [sic] you want to win, secondly you have to meet the standards of the European Court of Justice, EU law and the EU Charter of Fundamental Rights — not the standard of the worst member state.”The U.S. has made significant reforms to federal spying powers under the Obama administration.The Privacy and Civil Liberties Oversight Board — a small bipartisan watchdog — on Friday said the government has begun addressing each of the nearly two-dozen recommendations it made following Snowden's revelations.“[I]mportant measures have been taken to enhance the protection of Americans’ privacy and civil liberties and to strengthen the transparency of the government’s surveillance efforts, without jeopardizing our counterterrorism efforts,” the five-member board said.
  • But whether European countries believe those changes are sufficient to sign off on the Privacy Shield is uncertain. Each of the EU’s 28 member states must approve the deal before it can be finalized.“A lot of this is going to come down to whether the data protection authorities are persuaded by the U.S.’s portrayal of the cumulative protections given to European citizens and the cumulative carving back on the NSA surveillance programs,” Foster said.If the European working group is not satisfied with the assurances from the Commerce Department, the consequences could be dire. Businesses fear a chilling of transatlantic trade, valued at $1 trillion in 2014.The most likely outcome, experts say, would be a patchwork of country-to-country regulations that would make it extremely expensive for companies to comply.Legislative changes in the U.S. seem unlikely. Congress is close to passing a privacy law considered crucial to getting seeing the Privacy Shield approved. But the bill — which gives EU citizens the right to sue in U.S. courts over the misuse of personal data — has sparked controversy on Capitol Hill.Some lawmakers are expressing frustration that the EU has used the threat of enforcement action against U.S. companies to push Congress to make more concessions.“It’s been hard enough to get the Judicial Redress Act passed — if they’re going to make more demands on Congress, there won’t be a lot of willing listeners here,” Sen. Chris Murphy (D-Conn.) told The Hill on Thursday.
Paul Merrell

Iraqi officials: US captured top ISIS chemical arms engineer | News , Middle East | THE... - 0 views

  • U.S. special forces captured the head of ISIS's unit trying to develop chemical weapons in a raid last month in northern Iraq, two senior Iraqi intelligence officials told the Associated Press, the first known major success of Washington's more aggressive policy of pursuing the jihadis on the ground. The Obama administration launched the new strategy in December, deploying a commando force to Iraq that it said would be dedicated to capturing and killing ISIS leaders in clandestine operations, as well as generating intelligence leading to more raids.
  • U.S. officials said last week that the expeditionary team had captured an ISIS leader but had refused to identify him, saying only that he had been held for two or three weeks and was being questioned. The two Iraqi officials identified the man as Sleiman Daoud al-Afari, who worked for Saddam Hussein's now-dissolved Military Industrialization Authority where he specialized in chemical and biological weapons. They said al-Afari, who is about 50 years old, heads ISIS's recently established branch for the research and development of chemical weapons.
  • Beyond intelligence value, the capture could strike a blow to what Iraqi and American officials have described as a determined effort by ISIS to develop chemical weapons. The jihadi group was believed to have set up a special unit dedicated to chemical weapons research, made up of Iraqi scientists from the Saddam-era weapons program as well as foreign experts who joined the group. Iraqi officials expressed particular worry over the campaign because ISIS gained so much room to operate and hide chemical laboratories after overrunning around a third of the country in the summer of 2014, joined with territory they controlled in neighboring Syria.
  • ...1 more annotation...
  • The group is believed to have created limited stocks of mustard gas. Iraqi officials say it has ambitions to develop more dangerous agents like nerve gas, though the U.S. has said it appears still far from that goal. Tests confirmed mustard gas was used in a town in Syria when ISIS was launching attacks there in August 2015. Other unverified reports in both Iraq and Syria accuse ISIS of using chemical agents on the battlefield.
Paul Merrell

Belgium on "Red Alert": Gov Suspects Terrorist Attack including Chemical Weapon - nsnbc... - 0 views

  • The Belgian OCAM Crisis Center and the government raised the country’s “terror alert” to the highest level, warning about the imminent risk for a terrorist attack. The measure comes one week after the attacks in Paris that claimed 129 lives and injured hundreds. Experts warn about the possible use of a chemical weapon.
  • The OCAM and the Belgian government announced a “red alert” for Brussels and the region around Brussels, warning that a serious terrorist attack may be imminent. The Belgian Interior Ministry issued a statement, saying: “The analysis shows a serious and imminent threat requiring specific security measures as well as detailed recommendations to the population.” The Belgian capital resembles a city under siege with police and military deployed while a large number of citizens have been scared into staying at home and avoiding public places as much as possible. The OCAM, in fact, called on residents in Brussels and the region around the city to avoid crowded places including transport hubs.
  • Several Belgian security analysts warned about the risk of the possible use of an improvised chemical weapon. Within this context it is noteworthy that chemical weapons attacks in Syria, especially that in the Damascus suburb East Ghouta, has been proven to have been carried out by the Saudi Arabian intelligence asset Liwa-al-Islam. The attack implicated the highest levels of Saudi and US governments, military and intelligence services. Belgium hosts the headquarters of the North Atlantic Treaty Organization (NATO / OTAN) as well as the European Union (EU). Belgian officials declined to provide additional information about the alleged imminent threat, stating that there was a need for time to allow for the ongoing police and judicial investigation to take its course. Hours before the announcement of the “red alert” authorities charged a third “unnamed” suspect who had been arrested the day before for involvement in the terrorist attacks in Paris on Friday, November 13.
Paul Merrell

Links between Turkey and ISIS are now 'undeniable' | Global Research - Centre for Resea... - 0 views

  • A US-led raid on the compound housing the Islamic State’s ‘chief financial officer’ produced evidence that Turkish officials directly dealt with ranking ISIS members, Martin Chulov ofthe Guardian reported recently. Islamic State official Abu Sayyaf was responsible for directing the terror army’s oil and gas operations in Syria. Islamic State (aka ISIS, ISIL, or Daesh) earns up to $US10 million per month selling oil on black markets. Documents and flash drives seized during the Sayyaf raid reportedly revealed links “so clear” and “undeniable” between Turkey and ISIS “that they could end up having profound policy implications for the relationship between us and Ankara,” a senior western official familiar with the captured intelligence told the Guardian. NATO member Turkey has long been accused by experts, Kurds, and even Joe Biden of enabling ISIS by turning a blind eye to the vast smuggling networks of weapons and fighters during the ongoing Syrian war.
  • The move by the ruling AKP party was apparently part of ongoing attempts to trigger the downfall of Syrian President Bashar al-Assad’s regime. Ankara officially ended its loose border policy last year, but not before its southern frontier became a transit point for cheap oil, weapons, foreign fighters, and pillaged antiquities.
  • In November, a former ISIS member told Newsweek that the group was essentially given free reign by Turkey’s army. “ISIS commanders told us to fear nothing at all because there was full cooperation with the Turks,” the fighter said. “ISIS saw the Turkish army as its ally especially when it came to attacking the Kurds in Syria.” But as the alleged arrangements progressed, Turkey allowed the group to establish a major presence within the country — and created a huge problem for itself. “The longer this has persisted, the more difficult it has become for the Turks to crack down [on ISIS] because there is the risk of a counter strike, of blowback,” Jonathan Schanzer, a former counterterrorism analyst for the US Treasury Department, explained to Business Insider in November. “You have a lot of people now that are invested in the business of extremism in Turkey,” Schanzer added. “If you start to challenge that, it raises significant questions of whether” the militants, their benefactors, and other war profiteers would tolerate the crackdown.
  • ...2 more annotations...
  • A Western diplomat, speaking to the Wall Street Journal in February, expressed a similar sentiment: “Turkey is trapped now — it created a monster and doesn’t know how to deal with it.” Ankara had begun to address the problem in earnest — arresting 500 suspected extremists over the past six months as they crossed the border and raiding the homes of others — when an ISIS-affiliated suicide bomber killed 32 activists in Turkey’s southeast on July 20. Turks subsequently took to the streets to protest the government policies they felt had enabled the attack.
  • Amidst protestors’ chants of “Murderous ISIL, collaborator AKP,” Erdogan finally agreed last Thursday to enter the US-led campaign against ISIS, sending fighter jets into Syria and granting the US strategic use of a key airbase in the southeast to launch airstrikes. At the same time, Turkey began bombing Kurdish PKK shelters and storage facilities in northern Iraq, the AP reported, indicating that the AKP still sees Kurdish advances as a major — if not the biggest — threat, despite the Kurds’ battlefield successes against ISIS in northern Syria. “This isn’t an overhaul of their thinking,” a Western official in Ankara told the Guardian. “It’s more a reaction to what they have been confronted with by the Americans and others. There is at least a recognition now that ISIS isn’t leverage against Assad. They have to be dealt with.”
Paul Merrell

Mastermind of The Bamako Terror Attack Mokhtar Belmokhtar: A CIA Sponsored "Intelligenc... - 0 views

  • In response to the tragic Paris events of November 13, Central Intelligence Agency director  John Brennan  warned that “ISIL is planning additional attacks… It is clear to me that ISIL has an external agenda, that they are determined to carry out these types of attacks.” (Quoted in Daily Telegraph, November 16, 2015) Five days later following the CIA Chief’s  premonition, the Bamako Radisson Hotel Blu in Mali’s capital was the object of a terrorist attack, resulting in  21 people dead. Following the attack and the taking of hostages by the terrorists, French and Malian special forces raided the hotel. US. Africa Command (AFRICOM) also confirmed that US special forces were involved.
  • The Bamako terror operation was allegedly coordinated by Mokhtar Belmokhtar (aka Khaled Abu al-Abbas), leader of an affiliate of Al Qaeda in the Islamic Maghreb (AQIM), the Islamist al-Mulathameen (Masked) Brigade, or “Those who Sign with Blood.” Belmokhtar’s group was created in 2012 in the wake of the war on Libya. His organization has also allegedly been involved in the drug trade, smuggling as well kidnapping operations of foreigners in North Africa.  While his whereabouts are said to be known, French intelligence has dubbed Belmokhtar “the uncatchable”. In June he was reported dead  as a result in a U.S. air strike in Libya. His death was subsequently denied. Based on shaky evidence, The New York Times report below (November 20) concludes that Belmokhtar’s group (together with AQIM) is unequivocally behind the Bamako attacks:
  • A member of Al Qaeda in Africa confirmed Saturday that the attack Friday on a hotel in Bamako, Mali, had been carried out by a jihadist group loyal to Mokhtar Belmokhtar, an Algerian operative for Al Qaeda. The Qaeda member, who spoke via an online chat, said that an audio message and a similar written statement in which the group claimed responsibility for the attack were authentic. The SITE Intelligence Group, which monitors jihadist groups, also confirmed the authenticity of the statement. The Qaeda member, who refused to be named for his protection, said that Mr. Belmokhtar’s men had collaborated with the Saharan Emirate of Al Qaeda in the Islamic Maghreb, … In the audio recording, the group, known as Al Mourabitoun, says it carried out the operation in conjunction with Al Qaeda’s branch in the Islamic Maghreb. The recording was released to the Al Jazeera network and simultaneously to Al Akhbar, … The recording states: “We, in the group of the Mourabitoun [Arabic Rebel Group], in cooperation with our brothers in Al Qaeda in Islamic Maghreb, the great desert area, claim responsibility for the hostage-taking operation in the Radisson hotel in Bamako.” (emphasis added)
  • ...7 more annotations...
  • In turn, the French Minister of Defense acknowledged –prior to the conduct of a police investigation– that the authors of the attack were “most likely” led by Mokhtar Belmokhtar’s group in association with Al Qaeda in the Islamic Maghreb (AQIM). What Defense Minister Jean-Yves Le Drain failed to mention was that both Belmokhtar and AQIM have longstanding links to the CIA, which in turn has a working relationship with France’s  General Directorate for External Security, Direction générale de la sécurité extérieure (DGSE).  Casually ignored by the Western media, the leaders of Al Qaeda in the Islamic Maghreb (AQIM) including Belmokhtar were trained and recruited by the CIA in Afghanistan. Acknowledged by the Washington based Council on Foreign Relations (CFR): Most of AQIM’s major leaders are believed to have trained in Afghanistan during the 1979-1989 war against the Soviets as part of a group of North African volunteers known as “Afghan Arabs” that returned to the region and radicalized Islamist movements in the years that followed. The group is divided into “katibas” or brigades, which are clustered into different and often independent cells. The group’s top leader, or emir, since 2004 has been  Abdelmalek Droukdel, also known as Abou Mossab Abdelwadoud, a trained engineer and explosives expert who has fought in Afghanistan and has roots with the GIA in Algeria. (Council on Foreign Relations, Al Qaeda in the Islamic Maghreb, cfr.org, undated)
  • Mokhtar Belmokhtar: Post Cold War CIA intelligence asset?  The Council on Foreign Relations erroneously describes “Mokhtar Belmokhtar as the one-eyed veteran of the anti-Soviet Afghan insurgency.” (CFR, op cit, emphasis added). Belmokhtar (born in 1972) did not fight in the Soviet-Afghan war (1979-1989). He was recruited in 1991 at the age of 19 in the immediate wake of the Cold War. CIA recruitment continued in the wake of the Cold War. It was in large part directed against the Russian Federation and the former Soviet Republics as well as the Middle East. The purpose of this later CIA recruitment was to establish a network of “intelligence assets” to be used in the CIA’s post-cold war insurgencies. Leaders of the Chechen Islamist insurgencies were also trained in CIA camps in Afghanistan and Pakistan, including the notorious leader of the Chechen insurrection Ibn al-Khattab (a citizen of Saudi Arabia).
  • Following his training and recruitment and a two year stint in Afghanistan (1991-1993), Mokhtar Belmokhtar was sent back to Algeria in 1993 at age 21 where he joined the  Salafist Group for Preaching and Combat (GSPC) (emblem left). The latter was initially part of the so-called Armed Islamic Group  (Groupe islamique armé (GIA)) in Algeria which sought to overthrow the secular Algerian Government with a view to installing a theocratic Islamic State. Supported covertly by the CIA, Belmokhtar fought in Southern Algeria in the civil war opposing Islamist forces and the secular government. He was also  instrumental in the integration and merging of “jihadist” forces. In January 2007,  the Armed islamic Group (GIA) which had been prominent in the 1990s, officially changed its name to the Al-Qaeda Organization in the Islamic Maghreb (AQIM). In turn, as of 2007, the newly formed AQIM established a close relationship with the Libya Islamic Fighting Group (LIFG), which was directly supported by NATO during the 2011 war on Libya, “providing weapons, training, special forces and even aircraft to support them in the overthrow of Libya’s government.” (Tony Cartalucci, The Geopolitical Reordering of Africa: US Covert Support to Al Qaeda in Northern Mali, France “Comes to the Rescue”, Global Research, January 2013). British SAS Special Forces had also been brought into Libya prior to the onset of the insurrection, acting as military advisers to the LIFG. In fact, what has unfolded since the war on Libya is the merging of LIFG and AQIM forces. In turn, many of the LIFG operatives have been dispatched to Syria to fight within the ranks of Al Nusrah and the ISIS.
  • It is worth noting that the 2007  restructuring  of jihadist forces in Algeria and the Maghreb coincided with  the appointment of Robert Stephen Ford as US ambassador to Algeria in August 2006. Ford had been reassigned by the State Department from Baghdad to Algiers. From 2004 to 2006, he worked closely with Ambassador John Negroponte at the US embassy in Baghdad in supporting the creation of  both Shia and Sunni death squads in Iraq. This project consisted in recruiting and training terrorists modelled on the so-called “Salvador Option” which had been applied by the CIA in Central America. Negroponte as we recall played a central role in supporting the Contras terrorists in Nicaragua as ambassador to Honduras from 1981-1985. For further details see Michel Chossudovsky, “The Salvador Option For Syria”: US-NATO Sponsored Death Squads Integrate “Opposition Forces”, Global Research,  May 28, 2012) The 2006 appointment of Robert Stephen Ford to head the US Embassy in Algeria was timely. It coincided with the consolidation of jihadist groups within Algeria and the Maghreb. It preceded the 2011 US-NATO sponsored insurrections in Libya and Syria. In 2010, Ford was approved by the US Congress as US Ambassador to Syria. He presented his credentials to president Bashar al Assad in January 2011, barely two months prior to the onslaught of the terrorist insurrection in the border city of Daraa in mid-March 2011. Ford played a central role in assisting the channelling of US and allied support to Syrian “opposition” groups including Al Nusrah and the ISIS.
  • Belmokhtar’s history and involvement in Afghanistan confirms that from the very outset he was an instrument of US intelligence. While, he operates with a certain degree of independence and autonomy in relation to his intelligence sponsors, he and his organization are bona fide CIA “intelligence assets”, which can be used by the CIA as part of a covert agenda. There are various definitions of  an “intelligence asset”. From the standpoint of US intelligence, “assets” linked up to terrorist organizations must not be aware that they are supported and monitored by Western intelligence. With regard to Al Qaeda, from the outset in 1979, the CIA chose to operate through various front organizations as well as indirectly through its Saudi, Qatari and Pakistani intelligence partners. CIA’s Milton Beardman who played a central role in the Soviet Afghan war confirms that members of Al Qaeda including Osama bin Laden were not aware of the role they were playing on behalf of Washington. In the words of bin Laden (quoted by Beardman): “neither I, nor my brothers saw evidence of American help”(Michel Chossudovsky, Who is Osama bin Laden, Global Research, September 12, 2001): Motivated by nationalism and religious fervor, the Islamic warriors were unaware that they were fighting the Soviet Army on behalf of Uncle Sam. While there were contacts at the upper levels of the intelligence hierarchy, Islamic rebel leaders in theatre had no contacts with Washington or the CIA.  (Ibid) Amply documented, Al Qaeda in the Islamic Maghreb (AQIM)and its affiliated groups including the Libya Islamic Fighting Group (LIFG) was serving the interests of the Western military alliance. Confirmed by the Washington Post, June 29, 2011 (See below), France was supplying weapons to the LIFG at the height of NATO’s bombing raids.
  • AQIM in turn was receiving weapons from the LIFG, which was supported by NATO. Moreover, LIFG mercenaries had integrated AQIM brigades. According to alleged Terror Mastermind Mokhtar Belmokhtar, who also coordinated the 2013 In Amenas Mali kidnapping operation: “We have been one of the main beneficiaries of the revolutions in the Arab world. As for our benefiting from the (Libyan) weapons, this is a natural thing in these kinds of circumstances.” http://www.hanford.gov/c.cfm/oci/ci_terrorist.cfm?dossier=174 Al Qaeda in the Islamic Maghreb (AQIM) is indelibly tied into a Western intelligence agenda. While it is described  as  ”one of the region’s wealthiest, best-armed militant groups”, financed covertly by Saudi Arabia and Qatar. France’s  Canard enchaîné revealed (June 2012) that Qatar (a staunch ally of the United States) has been funding various terrorist entities in Mali: The original report cites a French military intelligence report as indicating that Qatar has provided financial support to all three of the main armed groups in northern Mali: Iyad Ag Ghali’s Ansar Ed-Dine, al-Qa’ida in the Islamic Maghreb (AQIM) and the Movement for Unity and Jihad in West Africa (MUJWA). The amount of funding given to each of the groups is not mentioned but it mentions that repeated reports from the French DGSE to the Defense Ministry have mentioned Qatar’s support for ‘terrorism’ in northern Mali. (quoted by Jeune Afrique June 2012)
  • Qatar is a proxy state, a de facto Persian Gulf territory largely controlled by Washington. It hosts  a number of Western military and intelligence facilities. The Emir of Qatar does not finance terrorism without the consent of the CIA. And with regard to Mali, the CIA coordinates its activities in liaison with its French intelligence partners and counterparts, including la Direction du renseignement militaire (DRM) and the Direction générale de la sécurité extérieure (DGSE). The implications are obvious and should be carefully understood by Western public opinion. Inasmuch as Belmokhtar and AQIM are “intelligence assets”, both US and French intelligence are (indirectly) behind the Bamako attacks. Both US and French intelligence are complicit in the State sponsorship of terrorism.
Paul Merrell

Turkey Smuggled Sarin Gas to Al Qaeda Terrorists in Syria? Turkish MP | Global Research... - 0 views

  • Turkey is allegedly complicit in the smuggled use of various types of banned chemical weapons for which the Assad government was wrongfully blamed. Turkish Republican People’s Party (CHP) opposition member Eren Erdem accused Ankara of covering up a major war crime, likely direct high-level involvement in smuggling materials used to make deadly sarin gas to ISIS and other terrorists – US proxy foot soldiers waging war on Syria.
  • On December 10, Erdem addressed Turkish parliamentarians, discussing criminal case number 2013/120, opened by Ankara’s General Prosecutor’s Office in Adana. Evidence shows various Turkish nationals were involved in direct dealings with ISIS and other terrorist groups, supplying them with sarin gas. Recorded wiretapped conversations exposed dealings with Al Qaeda terrorist Hayyam Kasap. RT International interviewed Erdem. He explained “(t)here is data in this indictment. Chemical weapon materials are being brought to Turkey and being put together in Syria in camps of ISIS which was known as Iraqi Al Qaeda during that time.” “These are all detected. There are phone recordings of this shipment like ‘don’t worry about the border. We’ll take care of it,’ and we also see the bureaucracy is being used.” According to Erden, once word got out, 13 arrests were made. Days later, suspects were released, charges dropped – after a new Adana public prosecutor replaced the original one. Individuals accused then moved cross-border unobstructed to Syria. “The phone recordings in the indictment showed all the details from how the shipment was going to be made to how it was prepared, from the content of the labs to the source of the materials,”
  • Erden explained. “Which trucks were going to be used, all dates etc. From A to Z, everything was discussed and recorded. Despite all of this evidence, the suspects were released,” the case closed, showing high-level coverup, perhaps ordered by Erdogan. Materials to make sarin gas and perhaps other toxic chemicals moved freely cross-border from Turkey to Syria. Erden indicated a high-level regime coverup, evidence revealing Justice Minister Bekir Bozdag’s involvement. Toxic chemicals were purchased from Europe,” he said. US-led Western countries “should question themselves about these relations. Western sources know very well who carried out the sarin gas attack in Syria.” “They know these people. They know who (they) are working with. They know that these people are working for Al-Qaeda…Western (countries) are hypocrites about the situation.” It bears repeating. No evidence showed Syrian use of chemical or other toxic substances throughout years of conflict.
  • ...1 more annotation...
  • Earlier, Saudi Arabia was caught red-handed providing them with chemical agents in containers marked “made in KSA (Kingdom of Saudi Arabia).” In early November, Organization for the Prohibition of Chemical Weapons (OPCW) experts confirmed terrorists’ use of mustard gas and chlorine in Syria with “utmost confidence” – calling perpetrators “non-state actor(s).” Blaming Assad for incidents of chemical weapons’ use is part of the US-led propaganda campaign to wrongfully vilify him.
  •  
    This is consistent with other major reports indicating that the Ghouta sarin gas attack was a false flag attack staged by Turkey and the Saudis with the assistance of the U.S. 
« First ‹ Previous 361 - 380 of 403 Next › Last »
Showing 20 items per page