Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Lies

Rss Feed Group items tagged

Paul Merrell

World's Largest Barrier Reef to Disappear in 5 Years | News | teleSUR English - 0 views

  • .ng-hide:not(.ng-hide-animate){display:none !important}.shr-debug{font-weight:bolder;cursor:pointer;color:#008000}.shareaholic-canvas{clear:both}.shareaholic-ui button,.shareaholic-ui .shareaholic-ui-button{border:0;box-shadow:none;text-shadow:none;font-size:12px;padding:6px 10px !important;border-radius:3px;background:transparent;display:inline-block;margin:2px;border:1px solid transparent;line-height:16px;color:#555;cursor:pointer;height:initial;text-transform:initial;}.shareaholic-ui button:hover,.shareaholic-ui .shareaholic-ui-button:hover{color:#000;font-weight:inherit}.shareaholic-ui button.button-primary,.shareaholic-ui .shareaholic-ui-button.button-primary{background-color:#52a8e8;background-image:-webkit-linear-gradient(top,#52a8e8,#377ad0);border:1px solid #3f81ae;border-color:#3f81ae #2e68a1 #1f5496;box-shadow:inset 0 1px 0 0 #72baeb,0 1px 2px 0 #c3c3c3;color:#fff;font-weight:bold;text-shadow:0 -1px 1px #3275bb;-webkit-appearance:none}.shareaholic-ui button.ui-disabled,.shareaholic-ui .shareaholic-ui-button.ui-disabled{background-color:#ccc;background-image:none;border-color:#bbb;box-shadow:none;color:#999;cursor:default;opacity:.5;text-shadow:none}.shareaholic-ui button.icon-only,.shareaholic-ui .shareaholic-ui-button.icon-only{padding:0;}.shareaholic-ui button.icon-only.icon-16,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-16{padding:4px;}.shareaholic-ui button.icon-only.icon-16 i,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-16 i{height:16px;width:16px}.shareaholic-ui button.icon-only.icon-24,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-24{padding:0;}.shareaholic-ui button.icon-only.icon-24 i,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-24 i{height:24px;width:24px}.s
  • According to the report published in the journal Estuarine, Coastal and Shelf Science, saving the reef will take a huge amount of work and money. Poor water quality was seen as the major threat as well as global warming which is causing significant coral bleaching. Chief researcher of the report, John Brodie, told the Guardian, “The current spending is totally inadequate ... You either do it properly or you give up on the reef. It’s that bad.”
Paul Merrell

Overthrowing Other People's Governments: The Master List    :  Information Cl... - 0 views

  • Instances of the United States overthrowing, or attempting to overthrow, a foreign government since the Second World War. (* indicates successful ouster of a government) China 1949 to early 1960s Albania 1949-53 East Germany 1950s Iran 1953 * Guatemala 1954 * Costa Rica mid-1950s Syria 1956-7 Egypt 1957 Indonesia 1957-8 British Guiana 1953-64 * Iraq 1963 * North Vietnam 1945-73 Cambodia 1955-70 * Laos 1958 *, 1959 *, 1960 * Ecuador 1960-63 * Congo 1960 * France 1965 Brazil 1962-64 * Dominican Republic 1963 * Cuba 1959 to present Bolivia 1964 * Indonesia 1965 * Ghana 1966 * Chile 1964-73 * Greece 1967 * Costa Rica 1970-71 Bolivia 1971 * Australia 1973-75 * Angola 1975, 1980s Zaire 1975 Portugal 1974-76 * Jamaica 1976-80 * Seychelles 1979-81 Chad 1981-82 * Grenada 1983 * South Yemen 1982-84 Suriname 1982-84 Fiji 1987 * Libya 1980s Nicaragua 1981-90 * Panama 1989 * Bulgaria 1990 * Albania 1991 * Iraq 1991 Afghanistan 1980s * Somalia 1993 Yugoslavia 1999-2000 * Ecuador 2000 * Afghanistan 2001 * Venezuela 2002 * Iraq 2003 * Haiti 2004 * Somalia 2007 to present Libya 2011* Syria 2012 Q: Why will there never be a coup d’état in Washington? A: Because there’s no American embassy there.
Paul Merrell

2013 mass surveillance disclosures - Wikipedia, the free encyclopedia - 0 views

  • 1 Historical context 1.1 Origins of clandestine surveillance in the United States (1919–78) 1.2 Mass surveillance in a global context (1988-2000) 1.3 9/11 and its implications on mass surveillance (2001–2009) 1.4 Acceleration of media leaks (2010–present) 2 Summary of NSA surveillance 2.1 Purposes 2.2 Targets 2.3 International cooperation 3 2013 Disclosures by category 3.1 Court Orders, Memos and Policy Documents 3.2 Reports 3.3 Collection and Analysis Programs or Hardware 3.4 Relationships with Corporate Partners 3.5 NSA Databases 3.6 Signals Intelligence Directorates (SIDs) 3.7 Technical Directorates 3.8 Names associated with specific targets 3.9 Uncategorized or insufficiently described codenames. 3.10 GCHQ Operations 3.11 NSA Operations 3.12 NSA Relationships with Foreign Intelligence services 3.13 Unrelated to Edward Snowden 4 Media reports 4.1 Chronology 4.2 Disclosures 4.3 Violation of civil liberties and international law 5 Fallout 5.1 Counter-terrorism and national security 5.2 Impact on foreign relations 5.3 Amash/Conyers Amendment 5.4 Public reaction 5.4.1 Petitions 5.4.2 Protests 6 Media related to the disclosures 7 See also 8 References 9 Further reading
  •  
    Wikipedia begins pulling its act together on coverage of the NSA scandal. This article is, at least for the time being, a major NSA scandal research resource. But wait to see how soon NSA sock puppets bowdlerize it. The occasional snapshot downloaded or stored in e.g., Zotero, is advisable.   
  •  
    Wow. Diigo handled the markup just fine in My Library but decided to display the raw HTML here. That's got to be a bug. Click through to Wikipedia and look at the table of contents. That's what buried in the markup above.
Gary Edwards

America Is Exhibiting All of the Signs of a Failing Empire Washington's Blog - 1 views

  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • ...2 more annotations...
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  •  
    "America Is Exhibiting All of the Signs of a Failing Empire Posted on October 10, 2015 by WashingtonsBlog The American Empire Is Quickly Declining Consummate insider Colonel Lawrence Wilkerson - former chief of staff to Colin Powell, and now distinguished adjunct professor of Government and Public Policy at William & Mary - notes that the U.S. is exhibiting all of the signs of a failing empire, including: Relying on massive military force (and using gigantic complexes to support it) as the be-all and end-all of power, and belittling diplomacy Maintaining standing armies, instead of disbanding military forces between wars Using more mercenary forces than citizen troops Spending disproportionately large amounts of blood and treasure in order to counter threats on the status quo … which simply exacerbates the threat against the empire Going ethically and morally bankrupt Ending up up having bankers and financiers end up running the real power Suffering great hiccups in finance and trade The leaders no longer really believe in or follow the ideals of the founders"
  •  
    The 1 hour-25 minute video talk is well worth listening to. Col. Wilkerson is now a professor who has deeply studied the decline of empires. He speaks from deep knowledge both as a former insider and as a scholar about the state of the American Empire. But notice that the linked page has two copies of the same talk embedded. Don't bother watching both unless you want to hear it twice. :-)
Paul Merrell

Basic income - Wikipedia - 0 views

  • A basic income (also called basic income guarantee, Citizen's Income, unconditional basic income, universal basic income, or universal demogrant[2]) is a form of social security[3] in which all citizens or residents of a country regularly receive an unconditional sum of money, either from a government or some other public institution, in addition to any income received from elsewhere. An unconditional income transfer of less than the poverty line is sometimes referred to as a partial basic income. Basic income systems that are financed by the profits of publicly owned enterprises (often called social dividend, also known as citizen's dividend) are major components in many proposed models of market socialism.[4] Basic income schemes have also been promoted within the context of capitalist systems, where they would be financed through various forms of taxation.[5] Similar proposals for "capital grants provided at the age of majority" date to Thomas Paine's Agrarian Justice of 1795, there paired with asset-based egalitarianism. The phrase "social dividend" was commonly used as a synonym for basic income in the English-speaking world before 1986, after which the phrase "basic income" gained widespread currency.[6
  • Contents  [hide]  1 Policy aspects 1.1 Transparency 1.2 Administrative efficiency 1.3 Poverty reduction 1.4 Basic income and growth 1.5 Freedom 1.6 Work incentives 1.7 Affordability 1.7.1 Key principles 1.7.2 Case studies 2 Pilot programs 3 Basic income and ideology 3.1 Economic perspectives 3.2 Georgist views 3.3 Right-wing views 3.4 Feminist views 3.5 Technological unemployment 4 Criticism 4.1 Economics research 4.2 Political debate 5 Worldwide 6 Advocates 6.1 Europe 6.2 The United States and Canada 6.3 Asia, Africa, Latin America, Oceania 7 Petitions and referendums 8 Public opinions 9 See also 10 References 11 Further reading 12 External links
  • Technological unemployment[edit] Concerns about automation and other causes of technological unemployment have caused many in the high-tech industry to turn to basic income proposals as a necessary implication of their business models. Journalist Nathan Schneider first highlighted the turn of the "tech elite" to these ideas with an article in Vice magazine, which cited figures such as Marc Andreessen, Sam Altman, Peter Diamandis, and others.[47] The White House, in a report to Congress, has put the probability at 83% that a worker making less than $20 an hour in 2010 will eventually lose their job to a machine. Even workers making as much as $40 an hour face odds of 31 percent.[48] To better address both the funding concerns and concerns about government control, one alternative model is that the cost and control would be distributed across the private sector instead of the public sector. Companies across the economy would be required to employ humans, but the job descriptions would be left to private innovation, and individuals would have to compete to be hired and retained. This would be a for-profit sector analog of basic income, that is, a market-based form of basic income. It differs from a job guarantee in that the government is not the employer (rather, companies are) and there is no aspect of having employees who "cannot be fired", a problem that interferes with economic dynamism. The economic salvation in this model is not that every individual is guaranteed a job, but rather just that enough jobs exist that massive unemployment is avoided and employment is no longer solely the privilege of only the very smartest or highly trained 20% of the population. Another option for a market-based form of basic income has been proposed by the Center for Economic and Social Justice (CESJ) as part of "a Just Third Way" (a Third Way with greater justice) through widely distributed power and liberty. Called the Capital Homestead Act,[49] it is reminiscent of James S. Albus's Peoples' Capitalism[50][51] in that money creation and securities ownership are widely and directly distributed to individuals rather than flowing through, or being concentrated in, centralized or elite mechanisms.
  •  
    Coming to grips with the fact that we do and will not have jobs for everyone: Can basic-income replace the failed welfare state system?
Paul Merrell

Gramm-Leach-Bliley Act - Wikipedia, the free encyclopedia - 0 views

  • The Gramm–Leach–Bliley Act (GLB), also known as the Financial Services Modernization Act of 1999, (Pub.L. 106–102, 113 Stat. 1338, enacted November 12, 1999) is an act of the 106th United States Congress (1999–2001). It repealed part of the Glass–Steagall Act of 1933, removing barriers in the market among banking companies, securities companies and insurance companies that prohibited any one institution from acting as any combination of an investment bank, a commercial bank, and an insurance company. With the passage of the Gramm–Leach–Bliley Act, commercial banks, investment banks, securities firms, and insurance companies were allowed to consolidate. The legislation was signed into law by President Bill Clinton.
  • Contents  [hide]  1 Legislative history 2 Changes caused by the Act 3 Remaining restrictions 4 Privacy 5 Financial Privacy Rule 5.1 Financial institutions 5.2 Consumer vs. customer defined 5.3 Consumer/client privacy rights 6 Safeguards Rule 7 Pretexting protection 8 Effect on usury law 9 Controversy 9.1 Criticisms 9.2 Defense 10 Amendments 10.1 Proposed 11 See also 12 Notes 13 References 14 Sources 15 External links 15.1 Compliance information 15.2 Consumer/client rights information 15.3 History of the GLB 15.4 Congressional voting records on Gramm–Leach–Bliley Act
Paul Merrell

New federal database will track Americans' credit scores, financial history | Police St... - 0 views

  • The Federal Housing Finance Agency (FHFA) has given notice of its intent to database a large number of very personal data points on every American who possesses a mortgage — which may include as many as 227 million Americans.   These points include things like financial histories, credit card balances, credit scores, personal demographics, lists of assets and property, family information, and more. Assembled with the help of the the Consumer Finance Protection Bureau, the database’s stated purpose is for research and modeling.  The agencies have been collecting data for modeling for years, but the addition of many new pieces of personally identifiable information is a reversal of previously stated policy.
  • The database will include very specific and personal information on the borrowers and co-borrowers.  According to the Federal Register Notice on April 16, 2014, the database includes: Individual’s name, address, and phone number; Individual’s Social Security Number; Individual’s gender, race, ethnicity, and religion; Individual’s marital status; Individual’s household composition (number and ages of males, females, children); Individual’s household income; Individual’s credit score; Individual’s education records; Individual’s military status/records; Individual’s employment status/records; Individual’s bank account numbers; List of individual’s “financial events in the last few years”; List of individual’s “life events in the last few years”;
  • List of individual’s other assets/wealth; Individual’s current mortgage balance; Individual’s current monthly mortgage payment; Individual’s payment delinquency records; Individual’s bankruptcy records; Individual’s credit card numbers; Individual’s credit card balances; Individual’s credit card charge limit and the highest balance charged; Individual’s minimum payments due on all loans; Attributes of the property (square footage, number of rooms, lot size…); Sale price and down payment of the property; Mortgage information (dates, interest rate, amount, loan servicer…);
  • ...1 more annotation...
  • As one could imagine, a trove of information like this would be an identity thief’s paradise.  As Rep. Randy Neugebauer said to the Washington Examiner, “If someone were to breach that system, they could very easily steal somebody’s identity.” Like so many parts of the federal government, the National Mortgage Database was never authorized by Congress and was certainly not authorized by the constitution.
  •  
    More government Big Data madness.
Paul Merrell

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • ...5 more annotations...
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
Gary Edwards

James Madison and the States Natural Right of Nullification ; Publius-Huldah's Blog - 0 views

  • What are the Two Conditions Precedent for Nullification?
  • The act of the federal government must be unconstitutional –  usually a usurpation of a power not delegated to the federal government in the Constitution; and
  • The act must be something The States or The People can “nullify”- i.e., refuse to obey:  the act must order them to do something or not do something.
  • ...38 more annotations...
  • If the federal government should overpass the just bounds of its authority and make a tyrannical use of its powers, the people, whose creature it is, must appeal to the standard [the Constitution] they have formed, and take such measures to redress the injury done to the Constitution as the exigency may suggest and prudence justify.”
  • When the act of the federal government is unconstitutional and orders The States or The People to do – or not do – something, nullification is the proper form of interposition.
  • When the act of the federal government is unconstitutional, but doesn’t order The States or The People to do – or not do – something (the alien & sedition acts), nullification is not possible. The States may interpose by objecting, as in The Virginia & Kentucky Resolutions of 1798.
  • When the act of the federal government is constitutional, but unjust (the Tariff Act of 1828), the States may not nullify it; but may interpose by objecting and trying to get the Tariff Act changed.
  • Our Founding Principles in a Nutshell
  • Rights come from God;
  • People create governments;
  • The purpose of government is to secure the rights God gave us; and
  • When a government We created seeks to take away our God given rights, We have the Right – We have the Duty – to alter, abolish, or throw off such government.
  • The former will be exercised principally on external objects, as war, peace, negotiation, and foreign commerce; with which last the power of taxation will, for the most part, be connected.
  • The powers reserved to the several States will extend to all the objects which … concern the lives, liberties, and properties of the people, and the internal order, improvement, and prosperity of the State.”
  • These enumerated powers concern: Military defense, international commerce & relations; Control of immigration and naturalization of new citizens; Creation of a uniform commercial system: Weights & measures, patents & copyrights, money based on gold & silver, bankruptcy laws, mail delivery & some road building; and With some of the Amendments, protect certain civil rights and voting rights (for blacks, women, citizens who don’t pay taxes, and citizens 18 years and older).
  • It is only with respect to the enumerated powers that the federal government has lawful authority over the Country at large. All other powers are “reserved to the several States” and The People.
  • It is to secure our rights to life and liberty by:
  • Military defense (Art. I, Sec. 8, cl. 11-16); Laws against piracy and other felonies committed on the high seas (Art. I, Sec. 8, cl. 10); Protecting us from invasion (Art IV, Sec. 4); Prosecuting traitors (Art III, Sec. 3); and Restrictive immigration policies (Art. I, Sec. 9, cl. 1).
  • It is to secure our property rights by:
  • Regulating trade & commerce so we can produce, sell & prosper (Art. I, Sec. 8, cl.3). The original intent of the interstate commerce clause is to prohibit States from levying tolls & taxes on articles of commerce as they are transported thru the States for buying & selling. Establishing uniform weights & measures and a money system based on gold & silver (Art I, Sec. 8, cl. 5) – inflation via paper currency & fractional reserve lending is theft! Punishing counterfeiters (Art I, Sec. 8, cl. 6); Making bankruptcy laws to permit the orderly dissolution or reorganization of debtors’ estates with fair treatment of creditors (Art I, Sec 8, cl. 4); and Issuing patents & copyrights to protect ownership of intellectual labors (Art I, Sec 8, cl 8)
  • It is to secure our right to liberty by:
  • Laws against slavery (13th Amendment); Providing fair trials in federal courts (4th, 5th, 6th, 7th, and 8th Amendments); and          Obeying the Constitution!
  • The fourth Founding Principle in our Declaration is this: When government takes away our God given rights, We have the Right & the Duty to alter, abolish, or throw off such government. Nullification is thus a natural right of self-defense:
  • 1. As we have just seen, Jefferson, Madison, and Hamilton saw nullification of unconstitutional acts of the federal government as a “natural right” – not a “constitutional right”. And since Rights come from God, there is no such thing as a “constitutional right”!
  • 2. The Right of Nullification, transcending as it does, the Constitution; and being nowhere prohibited by the Constitution to the States, is a reserved power.
  • The 10th Amendment says: “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”
  • Madison’s Report on the Virginia Resolutions (1799-1800)
  • Now! Note Well:  Madison actually says, in the same Report Barnett cites, that it is “a plain principle, founded in common sense” that The States are the final authority on whether the federal government has violated our Constitution! Under his discussion of the 3rd Resolution, Madison says:
  • “It appears to your committee to be a plain principle, founded in common sense, illustrated by common practice, and essential to the nature of compacts; that where resort can be had to no tribunal superior to the authority of the parties, the parties themselves must be the rightful judges in the last resort, whether the bargain made, has been pursued or violated. The Constitution of the United States was formed by the sanction of the States, given by each in its sovereign capacity. It adds to the stability and dignity, as well as to the authority of the Constitution, that it rests on this legitimate and solid foundation. The States then being the parties to the constitutional compact, and in their sovereign capacity, it follows of necessity, that there can be no tribunal above their authority, to decide in the last resort, whether the compact made by them be violated; and consequently that as the parties to it, they must themselves decide in the last resort, such questions as may be of sufficient magnitude to require their interposition.” [emphasis mine]
  • Madison explains that if, when the federal government usurps power, the States cannot act so as to stop the usurpation, and thereby preserve the Constitution as well as the safety of The States; there would be no relief from usurped power. 
  • This would subvert the Rights of the People as well as betray the fundamental principle of our Founding:
  • …If the deliberate exercise, of dangerous power, palpably withheld by the Constitution, could not justify the parties to it, in interposing even so far as to arrest the progress of the evil, and thereby to preserve the Constitution itself as well as to provide for the safety of the parties to it; there would be an end to all relief from usurped power, and a direct subversion of the rights specified or recognized under all the State constitutions, as well as a plain denial of the fundamental principle on which our independence itself was declared.” [emphasis mine]
  • Madison answers the objection “that the judicial authority is to be regarded as the sole expositor of the Constitution, in the last resort”.
  • Madison explains that when the federal government acts outside the Constitution by usurping powers, and when the Constitution affords no remedy to that usurpation; then the Sovereign States who are the Parties to the Constitution must likewise step outside the Constitution and appeal to that original natural right of self-defense.
  • Madison goes on to say that all three Branches of the federal government obtain their delegated powers from the Constitution; and they may not annul the authority of their Creator.
  • but, where powers are assumed which have not been delegated, a nullification of the act is the rightful remedy: that every State has a natural right in cases not within the compact, (casus non foederis,) to nullify of their own authority all assumptions of power by others within their limits: that without this right, they would be under the dominion, absolute and unlimited, of whosoever might exercise this right of judgment for them…” [boldface mine]
  • Application Today
  • When WE THE PEOPLE ratified our Constitution, and thereby created the federal government, WE did not delegate to our “creature” power to control our medical care, restrict guns and ammunition, dictate what is done in the public schools, dictate how we use our lands, and all the thousands of things they do WE never gave them authority in our Constitution to do.
  • Accordingly, each State has a natural right to nullify these unconstitutional dictates within its borders.  These dictates are outside the compact The Sovereign States made with each other –WE never gave our “creature” power over these objects.
  • To sum this up:
  • Nullification is a natural right of self-defense. Rights don’t come from the Constitution. Like all Rights, the right of self-defense comes from God (The Declaration of Independence, 2nd para). Nullification is a reserved power within the meaning of the 10th Amendment. The Constitution doesn’t prohibit States from nullifying, and We reserved the power to do it. God requires us to disobey civil authorities when they violate God’s Law. That’s why the 2nd para of the Declaration of Independence says we have the duty to overthrow tyrannical government. See: The Biblical Foundation of our Constitution. Nullification is required by Oath of Office:  Article VI, cl. 3 requires all State officers and judges to “support” the federal Constitution. Therefore, when the federal government violates the Constitution, the States must smack them down.
  •  
    Incredible and passionate argument concerning the States natural God given right to nullify and render unenforceable un-Constitutional actions of the Federal Government.  As "creators" of the Federal Government, the States are obligated to nullify un-Constitutional actions and interpose Constitutional alternatives.  Huldah sites Jefferson, Madison and Hamilton as the primary Constitutional authorities for her rock solid argument.   If ever you want to learn about the Constitution, Publius Huldah is clearly the place to go.  
Paul Merrell

NSA Director Finally Admits Encryption Is Needed to Protect Public's Privacy - 0 views

  • NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy The new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. By Carey Wedler | AntiMedia | January 22, 2016 Share this article! https://mail.google.com/mail/?view=cm&fs=1&to&su=NSA%20Director%20Finally%20Admits%20Encryption%20Is%20Needed%20to%20Protect%20Public%E2%80%99s%20Privacy&body=http%3A%2F%2Fwww.mintpress
  • At the same hearing, Comey and Attorney General Loretta Lynch declined to comment on whether they had proof the Paris attackers used encryption. Even so, Comey recently lobbied for tech companies to do away with end-to-end encryption. However, his crusade has fallen on unsympathetic ears, both from the private companies he seeks to control — and from the NSA. Prior to Rogers’ statements in support of encryption Thursday, former NSA chief Michael Hayden said, “I disagree with Jim Comey. I actually think end-to-end encryption is good for America.” Still another former NSA chair has criticized calls for backdoor access to information. In October, Mike McConnell told a panel at an encryption summit that the United States is “better served by stronger encryption, rather than baking in weaker encryption.” Former Department of Homeland Security chief, Michael Chertoff, has also spoken out against government being able to bypass encryption.
  • Rogers cited the recent Office of Personnel Management hack of over 20 million users as a reason to increase encryption rather than scale it back. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack that compromised the personal data about 20 million people who obtained background checks. Rogers’ comments, while forward-thinking, signify an about face in his stance on encryption. In February 2015, he said he “shares [FBI] Director [James] Comey’s concern” about cell phone companies’ decision to add encryption features to their products. Comey has been one loudest critics of encryption. However, Rogers’ comments on Thursday now directly conflict with Comey’s stated position. The FBI director has publicly chastised encryption, as well as the companies that provide it. In 2014, he claimed Apple’s then-new encryption feature could lead the world to “a very dark place.” At a Department of Justice hearing in November, Comey testified that “Increasingly, the shadow that is ‘going dark’ is falling across more and more of our work.” Though he claimed, “We support encryption,” he insisted “we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, to resolve it. So, I think the conversation’s in a healthier place.”
  • ...2 more annotations...
  • Regardless of these individual defenses of encryption, the Intercept explained why these statements may be irrelevant: “Left unsaid is the fact that the FBI and NSA have the ability to circumvent encryption and get to the content too — by hacking. Hacking allows law enforcement to plant malicious code on someone’s computer in order to gain access to the photos, messages, and text before they were ever encrypted in the first place, and after they’ve been decrypted. The NSA has an entire team of advanced hackers, possibly as many as 600, camped out at Fort Meade.”
  • Rogers statements, of course, are not a full-fledged endorsement of privacy, nor can the NSA be expected to make it a priority. Even so, his new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. “So spending time arguing about ‘hey, encryption is bad and we ought to do away with it’ … that’s a waste of time to me,” Rogers said Thursday. “So what we’ve got to ask ourselves is, with that foundation, what’s the best way for us to deal with it? And how do we meet those very legitimate concerns from multiple perspectives?”
Paul Merrell

Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails "Top Secret" - 0 views

  • Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails “Top Secret” The leaking of the Clinton emails has been compared to as the next “Watergate”. By ZeroHedge.com | January 30, 2016 Share this article! targ
  • The State Department will release more emails from Clinton’s time as secretary of state later Friday. But The Associated Press has learned that 7 email chains are being withheld in full for containing “top secret” material. The 37 pages include messages recently described by a key intelligence official as concerning so-called “special access programs” — a highly restricted subset of classified material that could point to confidential sources or clandestine programs like drone strikes or government eavesdropping. Department officials wouldn’t describe the substance of the emails, or say if Clinton had sent any herself. Spokesman John Kirby tells the AP that no judgment on past classification was made. But the department is looking into that, too.
  • For those that Clinton only read, and didn’t write or forward, she still would have been required to report classification slippages that she recognized. Possible responses for classification infractions include counseling, warnings or other action, State Department officials said, though they declined to say if these applied to Clinton or senior aides who’ve since left the department. The officials weren’t authorized to speak on the matter and spoke on condition of anonymity. However, as we previously noted, the implications are tough for The DoJ – if they indict they crush their own candidate’s chances of the Presidency, if they do not – someone will leak the details and the FBI will revolt… The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days.
  • ...1 more annotation...
  • I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, which she will not be able to survive as an attorney general,” he said. “The intelligence community will not stand for that. They will fight for indictment and they are already in the process of gearing themselves to basically revolt if she refuses to bring charges.” The FBI also is looking into Clinton’s email setup, but has said nothing about the nature of its probe. Independent experts say it is highly unlikely that Clinton will be charged with wrongdoing, based on the limited details that have surfaced up to now and the lack of indications that she intended to break any laws. “What I would hope comes out of all of this is a bit of humility” and an acknowledgement from Clinton that “I made some serious mistakes,” said Bradley Moss, a Washington lawyer who regularly handles security clearance matters. Legal questions aside, it’s the potential political costs that are probably of more immediate concern for Clinton. She has struggled in surveys measuring her perceived trustworthiness and an active federal investigation, especially one buoyed by evidence that top secret material coursed through her account, could negate one of her main selling points for becoming commander in chief: Her national security resume.
Paul Merrell

Media Blackout over Syria | Global Research - 0 views

  • On April 6, The London Review of Books published in its online journal Seymour Hersh’s “The Red Line and the Rat Line.” Hersh continues to expose details surrounding the staged August 21 chemical attack incident in Syria, which apparently pretty much everyone in Washington’s intelligence bureaucracy suspected was carried out by the rebels as soon as it happened. Seymour Hersh is a Pulitzer Prize winning journalist whose 40+ years career includes the exposing of the My Lai Massacre  and its cover-up, as well as the Abu Ghraib prison scandal. His December 19 report, “Whose Sarin?” -was his first report to expose the Syria chemical attack hoax based on close contact with US Intelligence officials. While “Whose Sarin” was originally prepared for the Washington Post, the newspaper rejected it and a media blackout followed in American press. Currently, Hersh’s newest investigative findings are going unacknowledged in mainstream US media.
  • Hersh’s report confirms the following: Obama’s push for attack on Syria was halted last minute when evidence that the Syrian government had nothing to do with the August 21 chemical attack became too overwhelming It had been well known to US government officials throughout the summer of 2013 that Turkish PM Erdogan was supporting al-Nusra Front in attempts to manufacture Sarin US military knew of Turkish and Saudi program for bulk Sarin production inside Syria from the spring of 2013 UN inspectors knew the rebels were using chemical weapons on the battlefield since the spring of 2013 As a result of the staged chemical incident, the White House ordered readiness for a “monster strike” on Syria, which included “two B-22 air wings and two thousand pound bombs” -and a target list which included military and civilian infrastructure targets (note: most of these are in densely populated civilian areas)
  • Full military strike was set for September 2 UK defense officials relayed to their American counterparts in the lead up to planned attack: “We’re being set up here.” CIA, MI6, Saudi Arabia, Qatar, and Turkey set up a “rat line” back in 2012 to run Libyan weapons into Syria via Turkey, including MANPADS; the Benghazi consulate was headquarters for the operation Obama OK’ed Turkish-Iranian gold export scam (that went from March 2012 to July 2013) which erupted in a Turkish scandal that nearly brought down the Erdogan government US Intelligence community had immediate doubts about Syrian regime responsibility for Aug. 21 attack, yet “reluctant to contradict the president” US government will not expose continued Turkey support of terrorism simply because “they’re a NATO ally”
  • ...2 more annotations...
  • In addition, last Thursday freelance Middle East journalist Sara Elizabeth Williams broke the story of a CIA/US Military run training camp for Syrian rebels in the Jordanian desert. VICE UK ran her story, “I Learned to Fight Like an American at the FSA Training Camp in Jordan,” yet it too failed to make it across the Atlantic into American reporting. International Syria experts thought her story hugely significant, but it got little attention. Top Syria expert in the US, Joshua Landis, announced on his Twitter account Thursday: “Sara Williams gets the scoop on the top secret FSA Training Camp in Jordan.” This courageous young freelancer revealed, with photos, the ins and outs of this secretive facility -yet the mainstream carefully shielded Americans from knowledge of the explosive report. In email conversation with her this weekend, Williams told me: “The access was tough to get, but I think it was worth the effort: to my mind, it’s important that people know what their government is doing in their name, with their tax dollars.” According to her investigative report:
  • Confirmed: “US-run training camp” for Syrian rebels in Northern Jordan Rebel recruits go “off the grid” while in secretive training camp Rebel fighter: “The Americans who taught us wore military uniforms I did not recognize. We called them by their first names and they spoke English to us.” Camp awash with “American food and American dollars”: recruits eat Kentucky Fried Chicken and live in temporary “pre-fabricated housing” units Recruits sent through intense 40 day program, which includes exercise, training in anti-tank missiles, and boot camp style atmosphere with orders given by US military instructors Upon graduation, US trained insurgents slip back across Syria’s southern border Experts say there are more camps like this one American trained rebel insurgent says: “America is benefiting from the destruction and the killing in order to weaken both sides.”
  •  
    It really says something about mainstream media when a story as explosive as Sy Hersh's new report on Obama's decision to postpone and then cancel military strikes on Syria is ignored by mainstream media. Hersh is one of the most respected of American war and intelligence journalists. 
Paul Merrell

M of A - Germany Getting Ready To Divorce U.S. Ally - 0 views

  • From recent talks and discussions in Germany I conclude that the U.S. is losing more and more support and sympathies. The admiration of earlier times has turned into disgust. While a lot of higher politicians and some journalists still cling to some (well paid) myth of U.S. friendship the party base in all political parties as well as the general public has changed its opinion. The NSA spying headlines are only one, though important issue. Consider how you would feel about such an intrusive "ally": German intelligence employee arrested on suspicion of spying for US on Bundestag NSA committee NSA whistleblowers testify in Bundestag inquiry, disclose ‘totalitarian’ surveillance Germany NSA's main target, claims ex-staffer Irked by N.S.A., Germany Cancels Deal With Verizon German parliament drops US telecom firm Verizon over links to NSA spying NSA Turned Germany Into Its Largest Listening Post in Europe Report: NSA targeted German privacy activist NSA targets Tor administrators and people searching for privacy tools, reports claim The German constitution, as interpreted by the constitutional court, defines privacy as a basic human right. That the U.S. is so casually violating the basic human rights of all German citizens is met with utter disgust. Even the paid and trained Atlantic Council (a U.S. lobby) trolls in German news-site comments have problem defending this issue.
  • From recent talks and discussions in Germany I conclude that the U.S. is losing more and more support and sympathies. The admiration of earlier times has turned into disgust. While a lot of higher politicians and some journalists still cling to some (well paid) myth of U.S. friendship the party base in all political parties as well as the general public has changed its opinion. The NSA spying headlines are only one, though important issue. Consider how you would feel about such an intrusive "ally": German intelligence employee arrested on suspicion of spying for US on Bundestag NSA committee NSA whistleblowers testify in Bundestag inquiry, disclose ‘totalitarian’ surveillance Germany NSA's main target, claims ex-staffer Irked by N.S.A., Germany Cancels Deal With Verizon German parliament drops US telecom firm Verizon over links to NSA spying NSA Turned Germany Into Its Largest Listening Post in Europe Report: NSA targeted German privacy activist NSA targets Tor administrators and people searching for privacy tools, reports claim The German constitution, as interpreted by the constitutional court, defines privacy as a basic human right. That the U.S. is so casually violating the basic human rights of all German citizens is met with utter disgust. Even the paid and trained Atlantic Council (a U.S. lobby) trolls in German news-site comments have problem defending this issue.
  • But the NSA spying is not the only problem. The economic breakdown after 2008 clearly had its roots in the United States and is, in Germany, blamed on lax U.S. regulations. And while Germany itself pressed for a change in government in Ukraine the outbreak of violence, the bloody coup and the fighting in the east is considered as "Fuck the EU" U.S. intervention in European affairs. It may still take a decade or more but my sense is that the U.S.-German alliance in on its way to an unfriendly divorce. Something that 15 years ago seemed unthinkable.
Paul Merrell

M of A - Syria - How Long Will The New Cessation of Hostilities Hold? - 1 views

  • Tonight Russia and the U.S. agreed to some new Cessation of Hostilities (CoH) in Syria. The general negative points: This CoH, like the first one in February, comes at a moment where the Syrian government forces have an advantage in the field and are on the verge of renewed offensives. It gives the opposition the time to reorganize and rearm. It severely restricts Syrian sovereignty. The general positive points: The Syrian government lacks the capacity for a fully military solution of the conflict. The agreement is a possible path to a political solution. It gives the government time to rebuild its army and to issue and train on new equipment. It has enough flexibility to allow for local escalation when and where needed. On the agreement itself. The Syrian government has, according to the Russians, agreed to it. The parties agreed to keep many details secret to prevent other actors from spoiling it. The agreement will start on sundown of September 12
  • The timeline, as far as announced or known: A general CoH for with a trial period of 48 hours. If the CoH holds during the trial period it will be prolonged to one week. After one week successfully passed, the U.S. and Russia will start common action against al-Qaeda in Syria. Some Details as AP describes them (there is some doubt that this is 100% correct): The military deal would go into effect after both sides abide by the truce for a week and allow unimpeded humanitarian deliveries. Then, the U.S. and Russia would begin intelligence sharing and targeting coordination, while Assad's air and ground forces would no longer be permitted to target Nusra any longer; they would be restricted to operations against the Islamic State. The arrangement would ultimately aim to step up and concentrate the firepower of two of the world's most powerful militaries against Islamic State and Nusra, listed by the United Nations as terrorist groups.
  • The agreement excludes the area in south-west Aleppo where the recent attempt by al-Nusra and others to lift the siege on east-Aleppo failed. The Castello road in north-west Aleppo will be demilitarized to carry aid. (It is yet unknown who will supervise and enforce this by what means.) It looks as if there has been unseemly resistance to this agreement by parts of the U.S. government. This may have been just for show. But it may also be a sign that Obama lost control of the bureaucracy: The proposed level of U.S.-Russian interaction has upset several leading national security officials in Washington, including Defense Secretary Ash Carter and National Intelligence Director James Clapper, and Kerry only appeared at the news conference after several hours of internal U.S. discussions. After the Geneva announcement, Pentagon secretary Peter Cook offered a guarded endorsement of the arrangement and cautioned, "We will be watching closely the implementation of this understanding in the days ahead."
  • ...1 more annotation...
  • If this deal falls apart, as it is likely to eventually do, all responsibility will be put onto Secretary of State Kerry. Indeed the military and intelligence parts of the U.S. government may well work to sabotage the deal while Kerry will be presented as convenient scapegoat whenever it fails. This new CoH is unlikely to hold for more than a few weeks: Too much is left undefined. This allows any party to claim the other side broke it whenever convenient. The powers who agreed on the deal do not have control over main elements on the ground. There are too many parties, inside and outside of Syria, who have an interest in spoiling the CoH.
Paul Merrell

WorldLII - WorldLII: About WorldLII - 0 views

  • You are here: WorldLII >> About WorldLII   What is WorldLII? The World Legal Information Institute (WorldLII) is a free, independent and non-profit global legal research facility developed collaboratively by the following Legal Information Institutes and other organisations. Australasian Legal Information Institute (AustLII) British and Irish Legal Information Institute (BAILII) Canadian Legal Information Institute (CanLII) Hong Kong Legal Information Institute (HKLII) Legal Information Institute (Cornell) (LII (Cornell)) Pacific Islands Legal Information Institute (PacLII) Wits University School of Law (Wits Law School) For further details, see the WorldLII brochure. The LIIs, meeting in Montreal in October 2002, adopted the Montreal Declaration on public access to law. WorldLII comprises three main facilities: Databases, Catalog and Websearch.
  • WorldLII Databases WorldLII provides a single search facility for databases located on the following Legal Information Institutes: AustLII; BAILII; CanLII; HKLII; LII (Cornell); and PacLII. WorldLII also includes as part of this searchable collection its own databases not found on other LIIs. These include databases of decisions of international Courts and Tribunals, databases from a number of Asian countries, and databases from South Africa (provided by Wits Law School). Over 270 databases from 48 jurisdictions in 20 countries are included in the initial release of WorldLII. Databases of case-law, legislation, treaties, law reform reports, law journals, and other materials are included. WorldLII welcomes enquiries concerning the possible inclusion of other databases on WorldLII or on one of its collaborating LIIs. WorldLII Catalog and Websearch The WorldLII Catalog provides links to over 15,000 law-related web sites in every country in the world. WorldLII's Websearch makes searchable the full text of as many of these sites as WorldLII's web-spider can reach. WorldLII welcomes enquiries from law librarians and other legal experts who are interested to become Contributing Editors to the WorldLII Catalog.
  • Operation of WorldLII The provision of the WorldLII service is coordinated by the Australasian Legal Information Institute (AustLII), which maintains WorldLII's user interface, the WorldLII Catalog and Websearch, and the databases located only on WorldLII. Technical enhancements to WorldLII are being developed jointly by the cooperating Legal Information Institutes. Contacting WorldLII General contact: feedback@worldlii.org AustLII/WorldLII Co-Directors: Professor Andrew Mowbray, UTS <andrew@austlii.edu.au> Professor Graham Greenleaf, UNSW <graham@austlii.edu.au> Philip Chung, AustLII Executive Director <philip@austlii.edu.au> Mail: WorldLII, c/- AustLII, UTS Faculty of Law, PO Box 123 Broadway NSW 2007 Australia Telephone: +61 2 9514 4921 Fax: +61 2 9514 4908 We hope that you enjoy using WorldLII and find it to be a useful service. Feedback (particularly words of encouragement or constructive criticism) are welcome and may be sent to feedback@worldlii.org. WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback URL: http://www.worldlii.org/worldlii/
  •  
    The various Legal information Institutes that collaborate on WorldLII have the most advanced, integrated, and largest public legal research databases available on the Internet, searchable through a common interface. Still nothing like a complete university law library because so many legal source materials are copyrighted, this is the combined effort of many law schools. A companion browser extension is available for Chrome and Firefox called Jureeka. That extension causes your pages rendered in the browser to contain hyperlinks to all legal authorities cited on the page that are recognized by the extension, with the links going to case law, regulations, and statues that are in the public domain. https://chrome.google.com/webstore/detail/jureeka/ediidjmindkcaflpfjgabfaibhngadbb?utm_source=chrome-app-launcher-info-dialog Thus far, Jureeka is integrated with all legal materials published by the Legal Information Institute long located at Cornell Law School, as well as the Justia archives of U.S. case law. Rumor has it that the extension will be extended to cover materials published by other Legal Information Institutes at various law schools around the globe.
Paul Merrell

BBC News - Farage: UKIP has 'momentum' and is targeting more victories - 0 views

  • The UK Independence Party is a truly national force and has "momentum" behind it, Nigel Farage has said after its victory in the European elections. Hailing a "breakthrough" in Scotland and a strong showing in Wales, he said UKIP would target its first Westminster seat in next week's Newark by-election. Lib Dem leader Nick Clegg has said he will not resign after his party lost all but one of its 12 MEPs. He said he was not going to "walk away" from the job despite the poor results. Mr Farage has been celebrating his party's triumph in the European polls, the first time a party other than the Conservatives or Labour has won a national election for 100 years.
  • The UK Independence Party is a truly national force and has "momentum" behind it, Nigel Farage has said after its victory in the European elections. Hailing a "breakthrough" in Scotland and a strong showing in Wales, he said UKIP would target its first Westminster seat in next week's Newark by-election. Lib Dem leader Nick Clegg has said he will not resign after his party lost all but one of its 12 MEPs.
  • The UK Independence Party is a truly national force and has "momentum" behind it, Nigel Farage has said after its victory in the European elections. Hailing a "breakthrough" in Scotland and a strong showing in Wales, he said UKIP would target its first Westminster seat in next week's Newark by-election. Lib Dem leader Nick Clegg has said he will not resign after his party lost all but one of its 12 MEPs. He said he was not going to "walk away" from the job despite the poor results.
  • ...13 more annotations...
  • Mr Farage said Labour would come under "enormous pressure" to offer the voters a referendum on Europe, and he said he did not believe Nick Clegg would still be Lib Dem leader at the general election. "The three party leaders are like goldfish that have been tipped out of their bowl onto the floor and are gasping for air," he said.
  • The Conservatives have so far secured 24% of the vote nationally and lost seven seats The Lib Dems slumped to fifth place The Green Party came fourth and has got three MEPs - one more than it achieved in 2009. BNP leader Nick Griffin lost his seat as the party was wiped out, the English Democrats also saw their vote share fall
  • Mr Farage has said his party intends to build on what he has described as "the most extraordinary result" in British politics in the past century.
  • Speaking in London at an election rally, he said his party now appealed to all social classes and had made significant inroads in Wales and Scotland as well as winning the most votes in England.
  • He said the party was aiming to win the Newark by-election next week, to try and "turn the heat" up on David Cameron. They would target a dozen or more seats in next year's general election, he added. "Our game is to get this right, to find the right candidates, and focus our resources on getting a good number of seats in Westminster next year. "If UKIP do hold the balance of power, then indeed there will be a (EU) referendum."
  • UKIP won 27.5% of the vote and had 24 MEPs elected. Labour, on 25.4%, has narrowly beaten the Tories into third place while the Lib Dems lost all but one of their seats and came sixth behind the Greens. With Northern Ireland yet to declare its results, the election highlights so far have been: Far-right, anti-EU parties, including the Front National in France, made gains across Europe, as did anti-austerity groups from the left Labour has 20 MEPs so far, an increase of seven on 2009, which was a record low point for the party It topped the poll in Wales by a narrow margin from UKIP. The SNP won two seats in Scotland, where UKIP also won its first MEP
  • Mr Clegg is facing calls to stand down after Sunday night's results, with MP John Pugh saying the "abysmal" performance meant the Lib Dem leader should make way for Vince Cable. But Mr Clegg said he had no intention of stepping down despite the "gut-wrenching" loss of most of the party's representatives in Brussels. "Of course it's right to have searching questions after such a bad set of results," he said. "But the easiest thing in politics when the going gets really really tough is to wash your hands of it and walk away, but I'm not going to do that and neither is my party."
  • Lib Dem Business Secretary Vince Cable added: "These were exceptionally disappointing results for the party. Many hard-working Liberal Democrats, who gave this fight everything they had and then lost their seats, are feeling frustrated and disheartened and we all understand that." Mr Clegg "deserves tremendous credit" for having been bold enough to stand up to "the Eurosceptic wave which has engulfed much of continental Europe", he said. The party had taken a "kicking for being in government with the Conservatives", but must now "hold its nerve", he said.
  • Reacting to his third place, David Cameron said the public was "disillusioned" with the EU and their message had been "received and understood", but he rejected calls to bring forward his proposed in/out EU referendum to 2016.
  • After UKIP's success, the Tory leadership is facing renewed calls for an electoral pact with their rivals to avoid a split in the right of British politics at next year's general election. Daniel Hannan, who was returned as a Tory MEP in the South East region, said it would be "sad" if the two parties "were not able to find some way, at least in marginal seats, of reaching an accommodation so that anti-referendum candidates don't get in with a minority of votes". But Mr Cameron said it was a "myth" that the two parties had a shared agenda. Labour was looking at one stage as if it might be beaten into third place by the Tories - a potentially disastrous result for Ed Miliband as he seeks to show he can win next year's general election. But the party was rescued by another strong showing in London - and it took heart from local election results in battleground seats, which party spokesmen suggested were a better guide to general election performance.
  • Mr Miliband said the party was "making progress" but had "further to go" if it was to prevail in next year's general election. He said the outcome of the elections was about more than Europe and his party must respond to a "desire for change" over a wide range of issues. BNP leader Nick Griffin lost his seat and saw his party's vote collapse by 6% in the North West of England. Anti-EU parties from the left and right have gained significant numbers of MEPs across all 28 member states in the wake of the eurozone crisis and severe financial squeeze. However, pro-EU parties will still hold the majority in parliament. Turnout across the EU is up slightly at 43.1%, according to estimates. Turnout in the UK was 33.8%, down slightly on last time.
  • In the European elections five years ago, the Conservatives got 27.7% of the total vote, ahead of UKIP on 16.5%, Labour on 15.7%, the Lib Dems on 13.7%, the Green Party on 8.6% and the BNP on 6.2%.
  • Eurosceptic 'earthquake' rocks EU Under pressure Clegg: I won't quit Miliband: Labour 'making progress' Cameron: We can still win in 2015 BNP wiped out in Euro elections UKIP looks to Westminster after win Calls for Clegg to quit 'ridiculous' Immigration target
  •  
    UKIP sets the wheels to rocking on apple carts in the UK and EU, winning 24 of UK's 73 seats in the European Parliament and hundreds of seats in UK community governments, all at the expense of the front-running three parties in the UK's 2009 election.   Wikipedia: The UK Independence Party (UKIP) is a [hard] Eurosceptic, right-wing populist political party in the United Kingdom, founded in 1993. The party describes itself in its constitution as a "democratic, libertarian party." Now if we could just begin to see a NATO-sceptic party emerging across Europe ...  
Paul Merrell

The Spy Cables: A glimpse into the world of espionage - Al Jazeera English - 0 views

  • A digital leak to Al Jazeera of hundreds of secret intelligence documents from the world's spy agencies has offered an unprecedented insight into operational dealings of the shadowy and highly politicised realm of global espionage. Over the coming days, Al Jazeera's Investigative Unit is publishing The Spy Cables, in collaboration with The Guardian newspaper.
  • Spanning a period from 2006 until December 2014, they include detailed briefings and internal analyses written by operatives of South Africa's State Security Agency (SSA). They also reveal the South Africans' secret correspondence with the US intelligence agency, the CIA, Britain's MI6, Israel's Mossad, Russia's FSB and Iran's operatives, as well as dozens of other services from Asia to the Middle East and Africa.
  • Among the revelations, the Spy Cables disclose how: Israel's Mossad told its allies that Iran was not working to produce nuclear weapons just a month after Prime Minister Benjamin Netanyahu warned it was barely a year from being able to do so; The CIA made attempts to contact Hamas directly despite the US government listing the Palestinian group as a "terrorist organisation"; Britain's MI6 sought South African help in an operation to recruit a North Korean official who had previously refused their cash; and South African and Ethiopian spies struggled to "neutralise" an assassination plot targeting a leading African diplomat.
  • ...6 more annotations...
  • Mossad contradicted Netanyahu on Iran nuclear programme The Spy Cables A glimpse into the world of espionage Spy Cables South African spies wary of Iran operations Spy Cables expose 'desperate' US approach to Hamas Israeli cable reveals S Africa missile theft cover-up The Spy Cables - Al Jazeera English Yazidis battle ISIL Disaster 'made us stronger' Spy Cables Abbas and Israel ally against 2009 UN probe Cables describe British attempt to recruit N Korean spy The Rise of the Oligarchs
  • Unlike the Edward Snowden documents that focus on electronic signals intelligence, commonly referred to in intelligence circles as "SIGINT", the Spy Cables deal with human intelligence, or "HUMINT".
  • Rather than chronicling spy-movie style tales of  ruthless efficiency of intelligence agencies, they offer an unprecedented glimpse into the daily working lives of people whose jobs are kept secret from the public.
  • The Spy Cables also reveal that in many cases, intelligence agencies are over-classifying information and hiding behind an unnecessary veil of secrecy. This harms the ability of a democratic society to either consent to the activities of their intelligence agencies or provide adequate checks and balances to their powers.
  • Spy Cables expose 'desperate' US approach to Hamas Leaked documents also show Mossad lobbying South Africa against Goldstone Report, claiming Abbas shared their stance.
  • Spy Cables: South African spies wary of Iran operations Leaked documents describe Tehran working to counter sanctions by using front companies and official channels.
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

NSA targets the privacy-conscious (Seite 1)| Das Erste - Panorama - Meldungen - 0 views

  • The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Three authors of this investigation have personal and professional ties to the Tor Project, an American company mentioned within the following investigation.
  • Teil 1: NSA targets the privacy-conscious Teil 2: The Tor Project - anathema to the NSA Teil 3: Servers in Germany targeted Teil 4: Simple web searches are suspicious Teil 5: NSA: In strict accordance with the rule of law
  • ...3 more annotations...
  • von J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Downloads XKeyscore rules Read/download the XKeyscore rules here  | download
  • Yet despite these efforts, one of the servers is targeted by the NSA. The IP address 212.212.245.170 is explicitly specified in the rules of the powerful and invasive spy software program XKeyscore. The code is published here exclusively for the first time. After a year of NSA revelations based on documents that focus on program names and high-level Powerpoint presentations, NDR and WDR are revealing NSA source code that shows how these programs function and how they are implemented in Germany and around the world. Months of investigation by the German public television broadcasters NDR and WDR, drawing on exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government reveal that not only is the server in Nuremberg under observation by the NSA, but so is virtually anyone who has taken an interest in several well-known privacy software systems.
Paul Merrell

Russian options against a US attack on Syria | The Vineyard of the Saker - 0 views

  • The tensions between Russia and the USA have reached an unprecedented level. I fully agree with the participants of this CrossTalk show – the situation is even worse and more dangerous than during the Cuban Missile Crisis. Both sides are now going to the so-called “Plan B” which, simply put, stand for, at best, no negotiations and, at worst, a war between Russia and the USA.
  • In theory, these are, very roughly, the possible levels of confrontation: A military standoff à la Berlin in 1961. One could argue that this is what is already taking place right now, albeit in a more long-distance and less visible way. A single military incident, such as what happened recently when Turkey shot down a Russian SU-24 and Russia chose not to retaliate. A series of localized clashes similar to what is currently happening between India and Pakistan. A conflict limited to the Syrian theater of war (say like the war between the UK and Argentina over the Malvinas Islands). A regional or global military confrontation between the USA and Russia. A full scale thermonuclear war between the USA and Russia During my years as a student of military strategy I have participated in many exercises on escalation and de-escalation and I can attest that while it is very easy to come up with escalatory scenarios, I have yet to see a credible scenario for de-escalation. What is possible, however, is the so-called “horizontal escalation” or “asymmetrical escalation” in which one side choses not to up the ante or directly escalate, but instead choses a different target for retaliation, not necessarily a more valuable one, just a different one on the same level of conceptual importance (in the USA Joshua M. Epstein and Spencer D. Bakich did most of the groundbreaking work on this topic).
  • The main reason why we can expect the Kremlin to try to find asymmetrical options to respond to a US attack is that in the Syrian context Russia is hopelessly outgunned by the US/NATO, at least in quantitative terms. The logical solutions for the Russians is to use their qualitative advantage or to seek “horizontal targets” as possible retaliatory options. This week, something very interesting and highly uncharacteristic happened: Major General Igor Konashenkov, the Chief of the Directorate of Media service and Information of the Ministry of Defence of the Russian Federation, openly mentioned one such option. Here is what he said: “As for Kirby’s threats about possible Russian aircraft losses and the sending of Russian servicemen back to Russia in body bags, I would say that we know exactly where and how many “unofficial specialists” operate in Syria and in the Aleppo province and we know that they are involved in the operational planning and that they supervise the operations of the militants. Of course, one can continue to insist that they are unsuccessfully involved in trying to separate the al-Nusra terrorists from the “opposition” forces. But if somebody tries to implement these threats, it is by no means certain that these militants will have to time to get the hell out of there.” Nice, no? Konashenkov appears to be threatening the “militants” but he is sure to mention that there are plenty of “unofficial specialists” amongst these militants and that Russia knows exactly where they are and how many of them there are. Of course, officially, Obama has declared that there are a few hundred such US special advisors in Syria. A well-informed Russian source suggests that there are up to 5’000 foreign ‘advisors’ to the Takfiris including about 4’000 Americans. I suppose that the truth is somewhere between these two figures.
  • ...4 more annotations...
  • So the Russian threat is simple: you attack us and we will attack US forces in Syria. Of course, Russia will vehemently deny targeting US servicemen and insist that the strike was only against terrorists, but both sides understand what is happening here. Interestingly, just last week the Iranian Fars news agency reported that such a Russian attack had already happened: 30 Israeli, Foreign Intelligence Officers Killed in Russia’s Caliber Missile Attack in Aleppo: “The Russian warships fired three Caliber missiles at the foreign officers’ coordination operations room in Dar Ezza region in the Western part of Aleppo near Sam’an mountain, killing 30 Israeli and western officers,” the Arabic-language service of Russia’s Sputnik news agency quoted battlefield source in Aleppo as saying on Wednesday. The operations room was located in the Western part of Aleppo province in the middle of sky-high Sam’an mountain and old caves. The region is deep into a chain of mountains. Several US, Turkish, Saudi, Qatari and British officers were also killed along with the Israeli officers. The foreign officers who were killed in the Aleppo operations room were directing the terrorists’ attacks in Aleppo and Idlib.” Whether this really happened or whether the Russians are leaking such stories to indicate that this could happen, the fact remains that US forces in Syria could become an obvious target for Russian retaliation, whether by cruise missile, gravity bombs or direct action operation by Russian special forces. The US also has several covert military installations in Syria, including at least one airfield with V-22 Osprey multi-mission tiltrotor aircraft.
  • Another interesting recent development has been the Fox News report that Russians are deploying S-300V (aka “SA-23 Gladiator anti-missile and anti-aircraft system”) in Syria. Check out this excellent article for a detailed discussion of the capabilities of this missile system. I will summarize it by saying that the S-300V can engage ballistic missiles, cruise missiles, very low RCS (“stealth”) aircraft and AWACS aircraft. This is an Army/Army Corps -level air defense system, well capable of defending most of the Syrian airspace, but also reach well into Turkey, Cyprus, the eastern Mediterranean and Lebanon. The powerful radars of this system could not only detect and engage US aircraft (including “stealth”) at a long distance, but they could also provide a tremendous help for the few Russian air superiority fighters by giving them a clear pictures of the skies and enemy aircraft by using encrypted datalinks. Finally, US air doctrine is extremely dependent on the use of AWACS aircraft to guide and support US fighters. The S-300V will forces US/NATO AWACS to operate at a most uncomfortable distance. Between the longer-range radars of the Russian Sukhois, the radars on the Russian cruisers off the Syrian coast, and the S-300 and S-300V radars on the ground, the Russians will have a much better situational awareness than their US counterparts. It appears that the Russians are trying hard to compensate for their numerical inferiority by deploying high-end systems for which the US has no real equivalent or good counter-measures.
  • There are basically two options of deterrence: denial, when you prevent your enemy from hitting his targets and retaliation, when you make the costs of an enemy attack unacceptably high for him. The Russians appear to be pursuing both tracks at the same time. We can thus summarize the Russian approach as such Delay a confrontation as much as possible (buy time). Try to keep any confrontation at the lowest possible escalatory level. If possible, reply with asymmetrical/horizontal escalations. Rather then “prevail” against the US/NATO – make the costs of attack too high. Try to put pressure on US “allies” in order to create tensions inside the Empire. Try to paralyze the USA on a political level by making the political costs of an attack too high-end. Try to gradually create the conditions on the ground (Aleppo) to make a US attack futile To those raised on Hollywood movies and who still watch TV, this kind of strategy will elicit only frustration and condemnation. There are millions of armchair strategists who are sure that they could do a much better job than Putin to counter the US Empire. These folks have now been telling us for *years* that Putin “sold out” the Syrians (and the Novorussians) and that the Russians ought to do X, Y and Z to defeat the AngloZionist Empire. The good news is that none of these armchair strategists sit in the Kremlin and that the Russians have stuck to their strategy over the past years, one day at a time, even when criticized by those who want quick and “easy” solutions. But the main good news is that the Russian strategy is working. Not only is the Nazi-occupied Ukraine quite literally falling apart, but the US has basically run out of options in Syria (see this excellent analysis by my friend Alexander Mercouris in the Duran).
  • The only remaining logical steps left for the USA in Syria is to accept Russia’s terms or leave. The problem is that I am not at all convinced that the Neocons, who run the White House, Congress and the US corporate media, are “rational” at all. This is why the Russians employed so many delaying tactics and why they have acted with such utmost caution: they are dealing with professional incompetent ideologues who simply do not play by the unwritten but clear rules of civilized international relations. This is what makes the current crisis so much worse than even the Cuban Missile Crisis: one superpower has clearly gone insane. Are the Americans crazy enough to risk WWIII over Aleppo? Maybe, maybe not. But what if we rephrase that question and ask Are the Americans crazy enough to risk WWIII to maintain their status as the “world’s indispensable nation”, the “leader of the free world”, the “city on the hill” and all the rest of this imperialistic nonsense? Here I would submit that yes, they potentially are.
  •  
    This is a must-read. We are at a perilous moment in history.
1 - 20 of 548 Next › Last »
Showing 20 items per page