Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Fast

Rss Feed Group items tagged

Paul Merrell

Yellowstone Oil Spills Expose Threat to Pipelines Under Rivers Nationwide | Inside Clim... - 0 views

  • At the time the Poplar pipeline ruptured, about 110 feet of it was completely uncovered along the bottom of the Yellowstone River, exposing it to damage.
  • Bridger Pipeline LLC was so sure its Poplar oil line was safely buried below the Yellowstone River that it planned to wait five years to recheck it. But last month, 3.5 years later, the Poplar wasn't eight feet under the river anymore. It was substantially exposed on the river bottom—and leaking more than 30,000 gallons of oil upstream from Glendive, Montana. An ExxonMobil pipeline wasn't buried deeply enough for the Yellowstone River, either. High floodwaters in 2011 uncovered the Silvertip pipe, leaving it defenseless against the fast-moving current and traveling debris. It broke apart in July, and sent 63,000 gallons of oil into the river near Laurel, Montana.
  • Both companies underestimated the river's power and its penchant for scouring away the earth that's covering and protecting their pipelines. That miscalculation led to the Exxon Silvertip spill and it's likely to be declared a significant factor, at a minimum, in the Poplar spill. Such misjudgments have potentially troubling implications nationwide, since pipelines carrying crude oil and petroleum products pass beneath rivers and other bodies of water in more than 18,000 places across America. Many of them are buried only a few feet below the water. "There were a lot of people who wanted to think that the last pipeline spill in the Yellowstone River in 2011 was a freak accident that would never happen again. After this most recent spill, no one believes that anymore," said Scott Bosse, Northern Rockies director for American Rivers. "The truth is, there are probably hundreds of pipelines across the country that are at considerable risk of rupturing under our rivers."
  • ...4 more annotations...
  • While corrosion is the No. 1 cause of pipeline spills, a sizable number of pipelines at water crossings have ruptured or been endangered by river scour. Among them: ► The Poplar (Jan. 2015) and Silvertip (July 2011) pipeline failures on the Yellowstone River. ► More than 20 pipeline river crossings in Montana were found to be "dangerously close to exposure" during inspections of nearly 90 pipeline crossings in 2011, according to one report. Many of them have since been reburied significantly deeper. The Poplar pipeline was not among the crossings tagged as being close to exposure. ► Nearly half of the 55 oil and gas pipelines that cross the Missouri River were found to have sections buried 10 feet or less below the riverbed, according to the Wall Street Journal. A study by the U.S. Geological Survey, meanwhile, found that the Missouri riverbed had deepened by nine to 41 feet in 27 places because of severe scouring during the 2011 floods. ► An Enterprise Products Partners LLP pipeline that was uncovered by river scouring and ruptured in August 2011. The line spilled more than 28,350 gallons of a gasoline additive into the Missouri River in Iowa. ► A June 2012 spill in Alberta, Canada, where an oil pipeline owned by Plains Midstream Canada failed along the Red Deer River and released more than 122,000 gallons of light crude. Investigators concluded that the pipe was uncovered by scour during high flood waters and subjected to vibrations from the river flow that led a weld to fail.
  • Three Enbridge Corp. crude oil pipelines crossing Minnesota's Tamarac River were exposed by floodwater erosion years ago, and were still exposed in mid-2014. None of the pipes had failed at that point, but one was being propped up by steel legs, according to an MPR News account. Federal regulations aren't much help. The only rule that addresses pipe burial at major river crossings requires petroleum pipelines to be laid at least four feet below the riverbed at the time of construction. Once a pipeline's installed, there are no requirements regarding burial depth. There is no rule requiring exposed pipelines to be reburied, though a spill under those conditions would invite regulatory penalties for leaving the line exposed to hazards. What's more, federal rules put the pipeline companies in charge of identifying all threats that could cause a spill in highly populated or environmentally sensitive areas, and the companies get wide latitude in deciding what to do about them, according to Rebecca Craven, program manager at the Pipeline Safety Trust, a nonprofit group that tracks pipeline risks and regulations.
  • Indeed, the required four-foot minimum initial burial depth for pipelines can be completely eliminated by natural erosion over time or by a single flood event. Active free-flowing rivers can carve with enough ferocity to lower their riverbeds by 20 feet or shift the waterway onto an entirely new path, which can add new stresses to the pipeline or put the river over pipe that has less cover or lacks reinforcement or protective cement casings. The hotly debated Keystone XL oil pipeline project would cross nearly 2,000 rivers, streams and reservoirs in Montana, South Dakota and Nebraska, according to one estimate. The route takes the pipe across the Missouri and Yellowstone rivers, where owner TransCanada has pledged to install the pipeline 35 feet below the riverbeds.
  • See Also: Ruptured Yellowstone Oil Pipeline Was Built With Faulty Welding in 1950sIce Hinders Cleanup of Yellowstone Oil Pipeline SpillExxon Overlooked, Masked Safety Threats in Years Before Pegasus Pipeline BurstDilbit in Exxon's Pegasus May Have Contributed to Pipeline's Rupture
  •  
    One of the hidden costs of oil dependence. 
Paul Merrell

Islamic State militants allegedly used chlorine gas against Iraqi security forces - The... - 0 views

  • Dizzy, vomiting and struggling to breathe, 11 Iraqi police officers were rushed to a government hospital 50 miles north of the capital last month. The diagnosis: poisoning by chlorine gas. The perpetrators, according to the officers: Islamic State extremists. The chlorine attack appears to be the first confirmed use of chemical weapons by the Islamic State on the battlefield. An Iraqi Defense Ministry official corroborated the events, and doctors said survivors’ symptoms were consistent with chlorine poisoning. Iraqi forces say two other crude chlorine attacks have occurred since the extremists seized vast tracts of Iraqi territory this summer, but details on those incidents remain sketchy. The reported assaults all raise concerns that the militants are attempting to hone their chemical weapons capabilities as they push to control more ground
  • Chlorine, a common component in industry, is sold legally, but its use as a weapon violates the Chemical Weapons Convention. It was widely employed in trench warfare during World War I, including infamously at Ypres in Belgium, where German forces dispersed more than 160 tons of chlorine into the breeze, killing thousands of French and Allied soldiers.
  • One physician on the team, Hassanain Mohammed, had treated similar cases­ before. In 2006 and 2007, al-Qaeda in Iraq, a group that later morphed into the Islamic State, carried out a string of chlorine bombings in the country.
  • ...3 more annotations...
  • An Iraqi Defense Ministry official confirmed this week that a bomb rigged with chlorine canisters was used in the Duluiyah attack. “They use it just to create terror,” said the official, who spoke on the condition of anonymity because he was not authorized to provide the information publicly. “But of course we are very concerned.” In a statement, the Defense Ministry confirmed that the Islamic State has used the gas in a “primitive and ineffective way” near water-treatment plants where it has gained access to chlorine, as well as in roadside bomb attacks. It did not specify the locations of the attacks, but there are several water plants near Duluiyah on territory controlled by the Islamic State.
  • Chlorine bombs are an easy-to-create but inexact weapon, experts say. All that is needed is a small explosive charge to rupture containers filled with the substance. “It’s difficult to deliver on target in combat situations,” said Jean Pascal Zanders, an independent researcher who specializes in chemical and biological weapons and disarmament. “Chlorine dissipates fast unless someone is able to concentrate it in a confined area.” Fighters in Duluiyah say it was not the only time chlorine has been used against them. Another attack this month caused minor injuries, and the fighters were treated locally, police officials said.
  • Soldiers who escaped an Islamic State rout of a besieged army base in Saqlawiyah, where hundreds of soldiers were killed last month, also said chlorine gas was used there — though reports of where and how the gas was delivered varied and could not be confirmed. While some officers said they believed artillery- or mortar-launched canisters fired by the attackers fell short of the base, others, who claimed to have remained in the installation for a longer period, said the canisters fell within its perimeter. Another claimed that the militants detonated chlorine-filled containers.
Paul Merrell

Exclusive: TSA's Secret Behavior Checklist to Spot Terrorists - The Intercept - 0 views

  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening. The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program.
  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening.
  • The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program. The checklist ranges from the mind-numbingly obvious, like “appears to be in disguise,” which is worth three points, to the downright dubious, like a bobbing Adam’s apple. Many indicators, like “trembling” and “arriving late for flight,” appear to confirm allegations that the program picks out signs and emotions that are common to many people who fly.
  • ...5 more annotations...
  • A TSA spokesperson declined to comment on the criteria obtained by The Intercept. “Behavior detection, which is just one element of the Transportation Security Administration’s (TSA) efforts to mitigate threats against the traveling public, is vital to TSA’s layered approach to deter, detect and disrupt individuals who pose a threat to aviation,” a spokesperson said in an emailed statement.
  • Since its introduction in 2007, the SPOT program has attracted controversy for the lack of science supporting it. In 2013, the Government Accountability Office found that there was no evidence to back up the idea that “behavioral indicators … can be used to identify persons who may pose a risk to aviation security.” After analyzing hundreds of scientific studies, the GAO concluded that “the human ability to accurately identify deceptive behavior based on behavioral indicators is the same as or slightly better than chance.” The inspector general of the Department of Homeland Security found in 2013 that TSA had failed to evaluate SPOT, and “cannot ensure that passengers at United States airports are screened objectively, show that the program is cost-effective, or reasonably justify the program’s expansion.” Despite those concerns, TSA has trained and deployed thousands of Behavior Detection Officers, and the program has cost more than $900 million since it began in 2007, according to the GAO.
  • The 92-point checklist listed in the “Spot Referral Report” is divided into various categories with a point score for each. Those categories include a preliminary “observation and behavior analysis,” and then those passengers pulled over for additional inspection are scored based on two more categories: whether they have “unusual items,” like almanacs and “numerous prepaid calling cards or cell phones,” and a final category for “signs of deception,” which include “covers mouth with hand when speaking” and “fast eye blink rate. Points can also be deducted from someone’s score based on observations about the traveler that make him or her less likely, in TSA’s eyes, to be a terrorist. For example, “apparent” married couples, if both people are over 55, have two points deducted off their score. Women over the age of 55 have one pointed deducted; for men, the point deduction doesn’t come until they reach 65. Last week, the ACLU sued TSA to obtain records related to its behavior detection programs, alleging that they lead to racial profiling. The lawsuit is based on a Freedom of Information Act request the ACLU filed last November asking for numerous documents related to the program, including the scientific justification for the program, changes to the list of behavior indicators, materials used to train officers and screen passengers, and what happens to the information collected on travelers.
  • “The TSA has insisted on keeping documents about SPOT secret, but the agency can’t hide the fact that there’s no evidence the program works,” said Hugh Handeyside, staff attorney with the ACLU National Security Project, in a statement announcing the lawsuit. Being on the lookout for suspicious behavior is a “common sense approach” that is used by law enforcement, according to TSA. “No single behavior alone will cause a traveler to be referred to additional screening or will result in a call to a law enforcement officer (LEO),” the agency said in its emailed statement. “Officers are trained and audited to ensure referrals for additional screening are based only on observable behaviors and not race or ethnicity.” One former Behavior Detection Officer manager, who asked not to be identified, said that SPOT indicators are used by law enforcement to justify pulling aside anyone officers find suspicious, rather than acting as an actual checklist for specific indicators. “The SPOT sheet was designed in such a way that virtually every passenger will exhibit multiple ‘behaviors’ that can be assigned a SPOT sheet value,” the former manager said.
  • The signs of deception and fear “are ridiculous,” the source continued. “These are just ‘catch all’ behaviors to justify BDO interaction with a passenger. A license to harass.” The observations of a TSA screener or a Behavior Detection Officer shouldn’t be the basis for referring someone to law enforcement. “The program is flawed and unnecessarily delays and harasses travelers. Taxpayer dollars would be better spent funding real police at TSA checkpoints,” the former manager said. A second former Behavior Detection Officer manager, who also asked not to be identified, told The Intercept that the program suffers from lack of science and simple inconsistency, with every airport training its officers differently. “The SPOT program is bullshit,” the manager told The Intercept. “Complete bullshit.”
  •  
    I've completely boycotted airlines in the U.S. since 2002 because I refuse to submit to the outrageous treatment by government that is now required to board a commercial airliner. If the airlines want my business, they need to start lobbying to end the politics of fear and the Gestapo tactics of government. plus pushing for an honest investigation of the 9/11/2001 incidents.  
Paul Merrell

As Iran Nuclear Deadline Looms, France Holding Out | Al Jazeera America - 0 views

  • With the deadline for a historic deal on Iran’s nuclear program fast approaching, analysts have begun to speculate whether the wild card after months of delicate diplomacy may not, in fact, be the usual suspects: hard-liners in Tehran, hawks on Capitol Hill or Israel's Prime Minister Benjamin Netanyahu, who has been on an eleventh-hour push to thwart the deal. Instead, they say, all eyes are on Europe's "bad cop" on Iran: France.
Paul Merrell

Tech firms and privacy groups press for curbs on NSA surveillance powers - The Washingt... - 0 views

  • The nation’s top technology firms and a coalition of privacy groups are urging Congress to place curbs on government surveillance in the face of a fast-approaching deadline for legislative action. A set of key Patriot Act surveillance authorities expire June 1, but the effective date is May 21 — the last day before Congress breaks for a Memorial Day recess. In a letter to be sent Wednesday to the Obama administration and senior lawmakers, the coalition vowed to oppose any legislation that, among other things, does not ban the “bulk collection” of Americans’ phone records and other data.
  • We know that there are some in Congress who think that they can get away with reauthorizing the expiring provisions of the Patriot Act without any reforms at all,” said Kevin Bankston, policy director of New America Foundation’s Open Technology Institute, a privacy group that organized the effort. “This letter draws a line in the sand that makes clear that the privacy community and the Internet industry do not intend to let that happen without a fight.” At issue is the bulk collection of Americans’ data by intelligence agencies such as the National Security Agency. The NSA’s daily gathering of millions of records logging phone call times, lengths and other “metadata” stirred controversy when it was revealed in June 2013 by former NSA contractor Edward Snowden. The records are placed in a database that can, with a judge’s permission, be searched for links to foreign terrorists.They do not include the content of conversations.
  • That program, placed under federal surveillance court oversight in 2006, was authorized by the court in secret under Section 215 of the Patriot Act — one of the expiring provisions. The public outcry that ensued after the program was disclosed forced President Obama in January 2014 to call for an end to the NSA’s storage of the data. He also appealed to Congress to find a way to preserve the agency’s access to the data for counterterrorism information.
  • ...3 more annotations...
  • Despite growing opposition in some quarters to ending the NSA’s program, a “clean” authorization — one that would enable its continuation without any changes — is unlikely, lawmakers from both parties say. Sen. Ron Wyden (D-Ore.), a leading opponent of the NSA’s program in its current format, said he would be “surprised if there are 60 votes” in the Senate for that. In the House, where there is bipartisan support for reining in surveillance, it’s a longer shot still. “It’s a toxic vote back in your district to reauthorize the Patriot Act, if you don’t get some reforms” with it, said Rep. Thomas Massie (R-Ky.). The House last fall passed the USA Freedom Act, which would have ended the NSA program, but the Senate failed to advance its own version.The House and Senate judiciary committees are working to come up with new bipartisan legislation to be introduced soon.
  • The tech firms and privacy groups’ demands are a baseline, they say. Besides ending bulk collection, they want companies to have the right to be more transparent in reporting on national security requests and greater declassification of opinions by the Foreign Intelligence Surveillance Court.
  • Some legal experts have pointed to a little-noticed clause in the Patriot Act that would appear to allow bulk collection to continue even if the authority is not renewed. Administration officials have conceded privately that a legal case probably could be made for that, but politically it would be a tough sell. On Tuesday, a White House spokesman indicated the administration would not seek to exploit that clause. “If Section 215 sunsets, we will not continue the bulk telephony metadata program,” National Security Council spokesman Edward Price said in a statement first reported by Reuters. Price added that allowing Section 215 to expire would result in the loss of a “critical national security tool” used in investigations that do not involve the bulk collection of data. “That is why we have underscored the imperative of Congressional action in the coming weeks, and we welcome the opportunity to work with lawmakers on such legislation,” he said.
  •  
    I omitted some stuff about opposition to sunsetting the provisions. They  seem to forget, as does Obama, that the proponents of the FISA Court's expansive reading of section 215 have not yet come up with a single instance where 215-derived data caught a single terrorist or prevented a single act of terrorism. Which means that if that data is of some use, it ain't in fighting terrorism, the purpose of the section.  Patriot Act § 215 is codified as 50 USCS § 1861, https://www.law.cornell.edu/uscode/text/50/1861 That section authorizes the FBI to obtain an iorder from the FISA Court "requiring the production of *any tangible things* (including books, records, papers, documents, and other items)."  Specific examples (a non-exclusive list) include: the production of library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person." The Court can order that the recipient of the order tell no one of its receipt of the order or its response to it.   In other words, this is about way more than your telephone metadata. Do you trust the NSA with your medical records? 
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Gary Edwards

The Daily Bell - 9/11 Fourteen Years Later - 0 views

  • The Official Version of 9/11 goes something like this: Directed by a beardy-guy from a cave in Afghanistan, nineteen hard-drinking, coke-snorting, devout Muslims enjoy lap dances before their mission to meet Allah. Using nothing more than craft knifes, they overpower cabin crew, passengers and pilots on four planes. And hangover or not, they manage to give the world's most sophisticated air defence system the slip. Unfazed by leaving their "How to Fly a Passenger Jet" guide in the car at the airport, they master the controls in no-time and score direct hits on two towers, causing THREE to collapse completely.
  • The laws of physics fail, and the world watches in awe as asymmetrical damage and scattered low temperature fires cause steel-framed buildings to collapse symmetrically through their own mass at free-fall speed, for the first time in history. Despite their dastardly cunning and superb planning, they give their identity away by using explosion-proof passports, which survive the destruction of steel and concrete and fall to the ground where they are quickly discovered lying on top of the mass of debris.
  • Meanwhile in Washington Hani Hanjour, having previously flunked Cessna flying school, gets carried away with all the success of the day and suddenly finds incredible abilities behind the controls of a jet airliner. Instead of flying straight down into the large roof area of the Pentagon, he decides to show off a little. Executing an incredible 270 degree downward spiral, he levels off to hit the low facade of the Pentagon. Without ruining the nicely mowed lawn and at a speed just too fast to capture on video.
  • ...4 more annotations...
  • In the skies above Pennsylvania  Desperate to talk to loved ones before their death, some passengers use sheer willpower to connect mobile calls that would not be possible until several years later. And following a heroic attempt by some to retake control of Flight 93, the airliner crashes into a Pennsylvania field leaving no trace of engines, fuselage or occupants except for the standard issue Muslim terrorist bandana.
  • During these events President Bush continues to read "My Pet Goat" to a class of primary school children.
  • In New York World Trade Center leaseholder Larry Silverstein blesses his own foresight in insuring the buildings against terrorist attack only six weeks previously. 
  • In Washington The Neoconservatives are overjoyed by the arrival of the "New Pearl Harbor," the necessary catalyst for launching their pre-planned wars.
  •  
    "Millions of refugees from Washington's wars are currently over-running Europe. Washington's 14-year and ongoing slaughter of Muslims and destruction of their countries are war crimes for which the US government's official 9/11 conspiracy theory was the catalyst. Factual evidence and science do not support Washington's conspiracy theory. The 9/11 Commission did not conduct an investigation. It was not permitted to investigate. The Commission sat and listened to the government's story and wrote it down. Afterwards, the chairman and cochairman of the Commission said that the Commission "was set up to fail." For a factual explanation of 9/11, watch this film: https://www.youtube.com/watch?v=OsoY3AIRUGA&feature=youtu.be. Here is an extensive examination of many of the aspects of 9/11: http://www.luogocomune.net/site/modules/sections/index.php?op=viewarticle&artid=167. Phil Restino of the Central Florida chapter of Veterans For Peace wants to know why national antiwar organizations buy into the official 9/11 story when the official story is the basis for the wars that antiwar organizations oppose. Some are beginning to wonder if ineffectual peace groups are really Homeland Security or CIA fronts. The account below of the government's 9/11 conspiracy theory reads like a parody, but in fact is an accurate summary of the official 9/11 conspiracy theory. It was posted as a comment in the online UK Telegraph on September 12, 2009, in response to Charlie Sheen's request to President Obama to conduct a real investigation into what happened on September 11, 2001."
Paul Merrell

What's the big deal between Russia and the Saudis? - RT Op-Edge - 0 views

  • Amidst the wilderness of mirrors surrounding the Syrian tragedy, a diamond-shaped fact persists: Despite so many degrees of separation, the Saudis are still talking to the Russians. Why? A key reason is because a perennially paranoid House of Saud feels betrayed by their American protectors who, under the Obama administration, seem to have given up on isolating Iran.
  • From the House of Saud’s point of view, three factors are paramount. 1) A general sense of ‘red alert’ as they have been deprived from an exclusive relationship with Washington, thus becoming incapable of shaping US foreign policy in the Middle East; 2) They have been mightily impressed by Moscow’s swift counter-terrorism operation in Syria; 3) They fear like the plague the current Russia-Iran alliance if they have no means of influencing it.
  • That explains why King Salman’s advisers have pressed the point that the House of Saud has a much better chance of checking Iran on all matters - from “Syraq” to Yemen - if it forges a closer relationship with Moscow. In fact, King Salman may be visiting Putin before the end of the year.
  • ...6 more annotations...
  • One of the untold stories of the recent Syria-driven diplomatic flurry is how Moscow has been silently working on mollifying both Saudi Arabia and Turkey behind the scenes. That was already the case when the foreign ministers of US, Russia, Turkey and Saudi Arabia met before Vienna.Vienna was crucial not only because Iran was on the table for the first time but also because of the presence of Egypt – incidentally, fresh from recent discovery of new oil reserves, and engaging in a reinforced relationship with Russia.The absolute key point was this paragraph included in Vienna’s final declaration: “This political process will be Syrian-led and Syrian-owned, and the Syrian people will decide the future of Syria.”It’s not by accident that only Russian and Iranian media chose to give the paragraph the appropriate relevance. Because this meant the actual death of the regime change obsession, much to the distress of US neocons, Erdogan and the House of Saud.
  • The main point is the death of the regime change option, brought about by Moscow. And that leaves Putin free to further project his extremely elaborate strategy. He called Erdogan on Wednesday to congratulate him on his and the AKP’s election landslide. This means that now Moscow clearly has someone to talk to in Ankara. Not only about Syria. But also about gas.Putin and Erdogan will have a crucial energy-related meeting at the G20 summit on November 15 in Turkey; and there’s an upcoming visit by Erdogan to Moscow. Bets are on that the Turk Stream agreement will be – finally – reached before the end of the year. And on northern Syria, Erdogan has been forced to admit by Russian facts on the ground and skies that his no-fly zone scheme will never fly.
  • That leaves us with the much larger problem: the House of Saud.There’s a wall of silence surrounding the number one reason for Saudi Arabia to bomb and invade Yemen, and that is to exploit Yemen’s virgin oil lands, side by side with Israel – no less. Not to mention the strategic foolishness of picking a fight with redoubtable warriors such as the Houthis, which have sowed panic amidst the pathetic, mercenary-crammed Saudi army.Riyadh, following its American reflexes, even resorted to recruiting Academi – formerly Blackwater - to round up the usual mercenary suspects as far away as Colombia.It was also suspected from the beginning, but now it's a done deal that the responsible actor for the costly Yemen military disaster is none other than Prince Mohammad bin Salman, the King’s son who, crucially, was sent by his father to meet Putin face-to-face.
  • Meanwhile, Qatar will keep crying because it was counting on Syria as a destination point for its much-coveted gas pipeline to serve European customers, or at least as a key transit hub on the way to Turkey.Iran on the other hand needed both Iraq and Syria for the rival Iran-Iraq-Syria gas pipeline because Tehran could not rely on Ankara while it was under US sanctions (this will now change, fast). The point is Iranian gas won’t replace Gazprom as a major source for the EU anytime soon. If it ever did, or course, that would be a savage blow to Russia.
  • In oil terms, Russia and the Saudis are natural allies. Saudi Arabia cannot export natural gas; Qatar can. To get their finances in order – after all even the IMF knows they are on a highway to hell - the Saudis would have to cut back around ten percent of production with OPEC, in concert with Russia; the oil price would more than double. A 10 percent cutback would make a fortune for the House of Saud.So for both Moscow and Riyadh, a deal on the oil price, to be eventually pushed towards $100 a barrel, would make total economic sense. Arguably, in both cases, it might even mean a matter of national security.But it won’t be easy. OPEC’s latest report assumes a basket of crude oil to be quoted at only $55 in 2015, and to rise by $5 a year reaching $80 only by 2020. This state of affairs does not suit either Moscow or Riyadh.
  • Meanwhile, fomenting all sorts of wild speculation, ISIS/ISIL/Daesh still manages to collect as much as $50 million a month from selling crude from oilfields it controls across “Syraq”, according to the best Iraq-based estimates.The fact that this mini-oil caliphate is able to bring in equipment and technical experts from “abroad” to keep its energy sector running beggars belief. “Abroad” in this context means essentially Turkey – engineers plus equipment for extraction, refinement, transport and energy production.One of the reasons this is happening is that the US-led Coalition of the Dodgy Opportunists (CDO) – which includes Saudi Arabia and Turkey - is actually bombing the Syrian state energy infrastructure, not the mini oil-Caliphate domains. So we have the proverbial “international actors” in the region de facto aiding ISIS/ISIL/Daesh to sell crude to smugglers for as low as $10 a barrel.Saudis – as much as Russian intel - have noted how ISIS/ISIL/Daesh is able to take over the most advanced US equipment that takes months to master, and instead integrate it into their ops at once. This implies they must have been extensively trained. The Pentagon, meanwhile, sent and will be sending top military across “Syraq” with an overarching message: if you choose Russia we won’t help you.ISIS/ISIL/Daesh, for their part, never talks about freeing Jerusalem. It’s always about Mecca and Medina.
  •  
    Pepe Escobar brings us up to speed on big changes in the Mideast, including the decline of U.S. influence. Not mentioned, but the Saudis' feelings of desertion by the Washington Beltway and its foreplay with Russia could bring about an end to the Saudis insistence on being paid for oil in U.S. dollars, and there goes the western economy. 
Paul Merrell

PoppyLeaks, Part 1 - WhoWhatWhy - 0 views

  • The Story of Bush 41 the Establishment Won’t Publish
  • A particular memo caught his eye, and he leaned in for a closer look. Practically jumping off the screen was a memorandum from FBI director J. Edgar Hoover, dated November 29, 1963. Under the subject heading “Assassination of President John F. Kennedy,” Hoover reported that, on the day after JFK’s murder, the bureau had provided two individuals with briefings. One was “Captain William Edwards of the Defense Intelligence Agency.” The other: “Mr. George Bush of the Central Intelligence Agency.”
  • McBride shook his head. George H.W. Bush? In the CIA in 1963? Dealing with Cubans and the JFK assassination? Could this be the same man who was now vice president of the United States? Even when Bush was named CIA director in 1976 amid much agency-bashing, his primary asset had been the fact that he was not a part of the agency during the coups, attempted coups, and murder plots in Iran, Cuba, Chile, and other hot spots about which embarrassing information was being disclosed every day in Senate hearings.
  • ...3 more annotations...
  • Bush served at the CIA for one year, from early 1976 to early 1977. He worked quietly to reverse the Watergate-era reforms of CIA practices, moving as many operations as possible offshore and beyond accountability. Although a short stint, it nevertheless created an image problem in 1980 when Bush ran unsuccessfully for the Republican presidential nomination against former California governor Ronald Reagan. Some critics warned of the dangerous precedent in elevating someone who had led the CIA, with its legacy of dark secrets and covert plots, blackmail and murder, to preside over the United States government.
  •  George H.W. Bush: Spy from the age of 18 Almost a decade would pass between Bush’s election in 1988 and the declassification and release in 1996 of another government document that shed further light on the matter. This declassified document would help to answer some of the questions raised by the ’63 Hoover memo — questions such as, “If George Herbert Walker Bush was already connected with the CIA in 1963, how far back did the relationship go?”But yet another decade would pass before this second document would be found, read, and revealed to the public. Fast-forward to December 2006, on a day when JFK researcher Jerry Shinley sat, as he did on so many days, glued to his computer, browsing through the digitized database of documents on the Web site of the Mary Ferrell Foundation.On that December day, Shinley came upon an internal CIA memo that mentioned George H.W. Bush [the Bush designated Director of Central Intelligence (DCI)]. Dated November 29, 1975, it reported, in typically spare terms, the revelation that the man who was about to become the head of the CIA actually had prior ties to the agency. And the connection discussed here, unlike that unearthed by McBride, went back not to 1963, but to 1953 — a full decade earlier. Writing to the chief of the spy section of the analysis and espionage agency, the chief of the “cover and commercial staff” noted:
  • Through Mr. Gale Allen … I learned that Mr. George Bush, DCI designate has prior knowledge of the now terminated project WUBRINY/LPDICTUM which was involved in proprietary commercial operations in Europe. He became aware of this project through Mr. Thomas J. Devine, a former CIA Staff Employee and later, oil-wildcatting associate with Mr. Bush. Their joint activities culminated in the establishment of Zapata Oil [sic] [in 1953] which they eventually sold. After the sale of Zapata Oil, Mr. Bush went into politics, and Mr. Devine became a member of the investment firm of Train, Cabot and Associates, New York … The attached memorandum describes the close relationship between Messrs. Devine and Bush in 1967-1968 which, according to Mr. Allen, continued while Mr. Bush was our ambassador to the United Nations.In typical fashion for the highly compartmentalized and secretive intelligence organization, the memo did not make clear how Bush knew Devine, or whether Devine was simply dropping out of the spy business to become a true entrepreneur. For Devine, who would have been about twenty-seven years old at the time, to “resign” at such a young age, so soon after the CIA had spent a great deal of time and money training him was, at minimum, highly unusual. It would turn out, however, that Devine had a special relationship allowing him to come and go from the agency, enabling him to do other things without really leaving its employ. In fact, CIA history is littered with instances where CIA officers have tendered their “resignation” as a means of creating deniability while continuing to work closely with the agency …
Gary Edwards

There Are No Coincidences - 3 views

This commentary is currently making the rounds of the Bay Area Patriots circles: ITS ALL TRUE :: Any one of these 'coincidences' when taken singularly appear to not mean much, but when taken as a ...

Obama-coincidences Marxism Marxist-Muslim

started by Gary Edwards on 02 Jul 13 no follow-up yet
Paul Merrell

Speaker Ryan: Not enough votes for TPP trade deal - CBS News - 0 views

  • House Speaker Paul Ryan, R-Wisconsin, said Thursday that the landmark Trans-Pacific Partnership trade deal doesn't have enough votes to pass Congress right now."I don't think the votes are there right now because of the concerns about what's in the TPP," Ryan told reporters at his weekly press conference. "The point is we shouldn't bring something up if we're not confident that we have the support there for it so I think the president and the administration has a lot more work to do to get support for this document because there are some legitimate concerns about it."
  • The president formally signed the deal on February 3, calling it a "forward-looking trade deal that sets new, high standards for trade and investment in one of the world's fastest growing and most important regions." He highlighted the deal's elimination of more than 18,000 taxes that various countries levy on American products, said it promotes a "free and open Internet" and includes "the strongest labor standards and environmental commitments in history."But there are still major concerns about the deal inside and out of Congress, including a carve-out that will prevent tobacco companies from suing nations with regulations aimed at reducing smoking, intellectual property issues relating to biologics, and some provisions dealing with dairy and financial services. There are also still major concerns among labor groups about whether the labor standards are up to snuff.Mr. Obama broke with many members of his own party this year when he asked Congress for authority to fast-track a massive Asia-Pacific free trade deal called the Trans-Pacific Partnership (TPP).
Paul Merrell

Erdogan Blackmails NATO Allies - 0 views

  • You know the country has really gone to the dogs when Washington’s main allies in its war on Syria are the two biggest terrorist incubators on the planet. I’m talking about Saudi Arabia and Turkey, both of which are run by fanatical Islamic zealots devoted to spreading violent jihad to the four corners of the earth. Not that the US doesn’t have blood on its hands too. It does, but that’s beside the point.
  • Four and half years later, the place is a worse mess than Iraq.  Half the population is either dead or internally displaced, the civilian infrastructure is a shambles, and nothing has been achieved. Nothing.  Assad is safely tucked away in Damascus, the jihadi proxies are on the run, and everyone hates the US more than ever. Great plan, eh? Where’s the downside? The downside is that now Washington finds itself backed against the wall with precious  few options that don’t involve a direct confrontation with Moscow.
  • These developments have forced Washington into a fallback position that will likely entail air-support for Turkish ground forces who will be deployed to Northern Syria to take and hold area sufficient for a “safe zone”, which is an innocuous sounding moniker the media invokes to conceal the fact that Turkey plans to annex sovereign Syrian territory which, by the way, is an act of war. Now fast-forward to last week:
  • ...6 more annotations...
  • Some readers may have noticed disturbing headlines like this in the Wall Street Journal: “U.S. Urges Turkey to Seal Border” Or this Reuters piece that popped up on Monday:  “NATO allies act to strengthen Turkey’s air defenses” Why, you may ask, does Obama want Turkey to close the border now when the horse has already left the barn? What I mean is that the White House has known for over 3 years that the bulk of the jihadis were transiting Turkey on their way  to Syria, just like they knew that ISIS’s oil was being transported across Turkey.
  • So why is it so urgent to close the border now, after all, the damage is already done, right? Could it have something to do with the fact that Putin’s legions are moving north to seal the border? Could there be an alternate objective, for example, could the US and Turkey be setting the stage for an incursion into Syria that would secure the land needed for the glorious safe zone? That’s what most of the analysts seem to think, at least the ones that haven’t been coopted by the mainstream media. But why is NATO suddenly getting involved? What’s that all about? After all, Putin was reluctant to even commit his airforce to the Syrian conflict. It’s not like he’s planning to invade Turkey or something, right?
  • So, what’s really going on? For that, we turn to Moon of Alabama that provides this excellent summary in a recent post titled:  “The Real “Terrorist Sympathizers” Want To Wage War On Syria … And Russia”. Here’s an excerpt:  “Who initiated this sudden rush within major NATO governments to get parliamentary blank checks for waging a long war on Syria? Not only in the UK but also in France and Germany? The German government turned on a dime from “no military intervention in Syria ever” to “lets wage a war of terror on Syria” without any backing from the UN or international law. .. Who initiated this? A simple, medium size terror attack in Paris by some Belgians and French can not be the sole reason for this stampede. Did Obama call and demand support for his plans? What are these? I smell that a trap is being laid, likely via a treacherous Turkey, to somehow threaten Russia with, or involve it in, a wider war. This would include military attacks in east-Ukraine or Crimea as well as in Syria. Obama demanded European backing in case the issue gets out of hand. No other reason I have found explains the current panic. The terrorists the “west” supports in Syria are in trouble. The real terrorist sympathizers need to rush to their help. It is a start of all-out war on Syria and its Russian protectors.” (“Terrorist Sympathizers” Want To Wage War On Syria … And Russia“, Moon of Alabama)
  • Is that what’s going on? Has Turkish President Erdogan figured out how to hoodwink the NATO allies into a confrontation with Russia that will help him achieve his goal of toppling  Assad and stealing Syrian territory? It’s hard to say, but clearly something has changed,  after all, neither France, nor Germany nor the UK were nearly as gung-ho just a few weeks ago. Now they’re all hyped-up and ready for WW3. Why is that? Ahh, Grasshopper, that is the mystery, a mystery that was unraveled in an op-ed that appeared in the Tuesday edition of the Turkish newspaper Hurriyet Daily News. Here’s the excerpt: “The increase in military cooperation within NATO countries against ISIL and the piling up of NATO forces near Turkey’s border with Syria take place in parallel with the recent deal between Ankara and the Brussels over Syrian refugees and the re-activation of Turkey’s EU accession bid.” ….(“Western forces pile up on Turkey-Syria border“, Hurriyet)
  • Okay, so Erdogan worked out a deal with the other NATO countries. Why is that such a big deal? Well, check out this blurb from the Today’s Zaman:  “Erdogan’s advisor, Burhan Kuzu, summed it up even more succinctly saying: “The EU finally got Turkey’s message and opened its purse strings. What did we say? ‘We’ll open our borders and unleash all the Syrian refugees on you,’” Kuzu stated in his controversial tweet… ” (“EU bows to Turkey’s threat on refugees says Erdoğan advisor“, Today’s Zaman) Blackmail? Is that what we’re talking about, blackmail? It sure sounds like it. Let’s summarize: Erdogan intentionally releases tens of thousands of Syrian refugees into Europe to put pressure on EU politicians who quickly lose the support of their people and face the meteoric rise of right wing parties. And then, the next thing you know, Merkel, Hollande and every other EU leader is looking to cut a deal with Erdogan to keep the refugees in Turkey. Isn’t that how it all went down? Except we’re missing one important factoid here, because according to the first op-ed “The increase in military cooperation within NATO… and the piling up of NATO forces near Turkey’s border”…took  place in parallel with the deal between Ankara and the Brussels.”
  • Get it? So there was a quid pro quo that no one wants to talk about.  In other words, Germany, France and the UK agreed to support Erdogan’s loony plan to conduct military operations in Syria, risking a serious dust-up with Russia, in order to save their own miserable political careers. Boy, if that doesn’t take the cake, than I don’t know what does.
  •  
    A must-read. Mike Whitney usually gets things right, although I'm not certain he's called this one correctly. On the other hand, he's not alone among close watchers who are predicting imminent war against Russia in Syria. The neocons and neolibs in Congress are screaming for it to happen because they see the U.S. getting edged out the Mideast by Russia. And NATO is definitely moving its forces in a direction that would enable that war and a second one in Ukraine. So as I see it, it's either posturing or a serious plan to go to war with Russia outside Russian territory. Think along the lines of a Korean War scenario, with Russia taking the place of China.   
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance |... - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the Court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the Court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
Paul Merrell

Putin Forces Obama to Capitulate on Syria - 0 views

  • The Russian-led military coalition is badly beating Washington’s proxies in Syria which is why John Kerry is calling for a “Time Out”. On Monday, U.S. Secretary of State John Kerry called for an emergency summit later in the week so that leaders from Russia, Turkey, Saudi Arabia and Jordan could discuss ways to avoid the “total destruction” of Syria. According to Kerry, “Everybody, including the Russians and the Iranians, have said there is no military solution, so we need to make an effort to find a political solution. This is a human catastrophe that now threatens the integrity of a whole group of countries around the region,” Kerry added. Of course, it was never a “catastrophe” when the terrorists were destroying cities and villages across the country, uprooting half the population and transforming the once-unified and secure nation into an anarchic failed state. It only became a catastrophe when Vladimir Putin synchronized the Russian bombing campaign with allied forces on the ground who started wiping out hundreds of US-backed militants and recapturing critical cities across Western corridor. Now that the Russian airforce is pounding the living daylights out of jihadi ammo dumps, weapons depots and rebel strongholds, and the Syrian Arab Army (SAA) is tightening their grip on Aleppo, and Hezbollah is inflicting heavy casualties on Jabhat al Nusra militants and other Al Qaida-linked vermin; Kerry’s decided it’s a catastrophe. Now that the momentum of the war has shifted in favor of Syrian president Bashar al Assad, Kerry wants a “Time out”.
  • Keep in mind, that Putin worked tirelessly throughout the summer months to try to bring the warring parties together (including Assad’s political opposition) to see if deal could be worked out to stabilize Syria and fight ISIS. But Washington wanted no part of any Russian-led coalition. Having exhausted all the possibilities for resolving the conflict through a broader consensus, Putin decided to get directly involved by committing the Russian airforce to lead the fight against the Sunni extremists and other anti-government forces that have been tearing the country apart and paving the way for Al Qaida-linked forces to take control of the Capital. Putin’s intervention stopped the emergence of a terrorist Caliphate in Damascus. He turned the tide in the four year-long war, and delivered a body-blow to Washington’s malign strategy Now he’s going to finish the job. Putin is not gullible enough to fall for Kerry’s stalling tactic. He’s going to kill or capture as many of the terrorists as possible and he’s not going to let Uncle Sam get in the way. These terrorists–over 2,000 of who are from Chechnya–pose an existential threat to Russia, as does the US plan to use Islamic extremists to advance their foreign policy objectives. Putin takes the threat seriously. He knows that if Washington’s strategy succeeds in Syria, it will be used in Iran and then again in Russia. That’s why he’s decided to dump tons of money and resources into the project. That’s why his Generals have worked out all the details and come up with a rock-solid strategy for annihilating this clatter of juvenile delinquents and for restoring Syria’s sovereign borders. And that’s why he’s not going to be waved-away by the likes of mealy-mouth John Kerry. Putin is going to see this thing through to the bitter end. He’s not going to stop for anyone or anything. Winning in Syria is a matter of national security, Russia’s national security.
  • “Syrian President Bashar Assad “does not have to leave tomorrow or the next day,” the US State Department (spokesman Mark Toner) has stated. Washington allows that Assad may take part in transitional process, but can’t be part of Syria’s next government… “… this isn’t the US dictating this. This is the feeling of many governments around the world, and frankly, the majority of the Syrian people,” Toner said.
  • ...5 more annotations...
  • Putin has offered solutions from the very onset, it was Washington that rejected those remedies. Putin supported the so called Geneva communique dating back to 2012. In fact, it was then-Secretary of State Hillary Clinton who threw a wrench in the proceedings by demanding that Assad not be part of any transitional governing body. (Note: Now Obama has caved on this demand.) Russia saw her demand as tantamount to regime change, which it was since Assad is the internationally-recognized head of state and fully entitled to be a part of any transitional government. US rejectionism sabotaged efforts for internationally-monitored “free and fair multi-party elections” and ended any chance for a speedy end to the war. Washington was more determined to get its own way (“Assad must go”) then to save the lives of tens of thousands of civilians who have died since Clinton walked away from Geneva. And now Kerry is extending the olive branch? Now Washington pretends to care about the “total destruction” of Syria? I’m not buying it. What Kerry cares about is his hoodlum “head-chopper” buddies that are being turned into shredded wheat by Russian Daisy Cutters. That’s what he cares about. Take a look at this from RT:
  • Toner is backpeddling so fast he’s not even sure what he’s saying. Clearly, the administration is so flustered by developments on the ground in Syria, and so eager to stop the killing of US-backed jihadis, that they sent poor Toner out to talk to the media before he’d even gotten his talking points figured out. What a joke. The administration has gone from refusing to meet with a high-level Russian delegation just last week (to talk about coordinating airstrikes in Syria), to completely capitulating on their ridiculous “Assad must go” position today. That’s quite a reversal, don’t you think? I’m surprised they didn’t just run a big white Flag up over 1600 Pennsylvania Ave. while the Marine Band played Taps. But don’t think that this latest humiliation will derail Washington’s plan for destroying Syria as a functioning, sovereign state and carving it into a million powerless statelets that pose no threat to Big Oil’s pipeline corridors, or US military bases, or Israel’s sprawling Zionist Valhalla. Because it won’t. That plan is still right on track despite Putin’s efforts to crush the militants and defend the borders.
  • Topple Assad and partition the country. Destroy Syria once and for all. That is Washington’s operating strategy. It’s a plan that was first proposed by Brooking’s analyst Michael O’Hanlon who recently said: “…a future Syria could be a confederation of several sectors: one largely Alawite (Assad’s own sect), spread along the Mediterranean coast; another Kurdish, along the north and northeast corridors near the Turkish border; a third primarily Druse, in the southwest; a fourth largely made up of Sunni Muslims; and then a central zone of intermixed groups in the country’s main population belt from Damascus to Aleppo… Under such an arrangement, Assad would ultimately have to step down from power in Damascus… A weak central government would replace him. But most of the power, as well as most of the armed forces. would reside within the individual autonomous sectors — and belong to the various regional governments… American and other foreign trainers would need to deploy inside Syria, where the would-be recruits actually live — and must stay, if they are to protect their families. (Syria’s one hope may be as dim as Bosnia’s once was, Michael O’ Hanlon, Reuters)
  • Once again, the same theme repeated: Topple Assad and partition the country. Of course, the US will have to train “would-be recruits” to police the natives and prevent the buildup of any coalition or militia that might threaten US imperial ambitions in the region. But that goes without saying. (By the way, Hillary Clinton has already thrown her support behind the O’Hanlon plan emphasizing the importance of “safe zones” that could be used to harbor Sunni militants and other enemies of the state.)
  • (Note: As this article was going to press, the Turkish Daily Zaman reported that: “….the US and several European and Gulf states…have agreed to a plan under which Syria’s embattled President Bashar al-Assad will remain in power for the next six months during a transition period….Turkey has abandoned its determination [to get rid of Assad] and has agreed on an interim period with Assad in place,” former Foreign Minister Yaşar Yakış told Today’s Zaman on Tuesday….If the Syrian people decide to continue with Assad, then there is not much Turkey can object to.” (Report: Turkey agrees to Syria political transition involving Assad, Today’s Zaman) This story has not yet appeared in any western media. Obama’s Syrian policy has completely collapsed.
  •  
    Mike Whitney paints a picture of the Obama Administration's desperation to saeve its jihadi mercenaries in Syria from complete destruction. 
« First ‹ Previous 141 - 156 of 156
Showing 20 items per page