Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged MIT

Rss Feed Group items tagged

Paul Merrell

Turkish Intelligence's Alleged Arms Trade Emerges with ISIL Investigation - 0 views

  • An alleged telephone conversation tape proving that Turkish National Intelligence Organization (MİT) involved in arms trading, emerged from the case file regarding ISIL attack in central Anatolian province Niğde.
  • An alleged telephone conversation tape proving that Turkish National Intelligence Organization (MİT) involved in arms trading, emerged from the case file regarding ISIL attack in central Anatolian province Niğde. Masum Gök According to the court file regarding the two suspects of ISIL's terrorist action in Niğde, Ayhan Orli and Kassuma code named terrorist Muzaffer Yılmaz had a phone conversation regarding arms trading. According to the tape obtained by Turkish Gendarmarie forces, Arms dealer Ayhan Orli said "Brother, the goods are not in their hands. Intelligence (MİT) is keeping the goods," adding that the Grad rockets are in Mersin province. Here's the full text of the alleged telephone conversation between Ayhan Orli and Muzaffer Yılmaz (Kassuma) in 29 July 2014:
  • Who is Ayhan Orli? The figures such as Ayhan Orli and Heysem Topalca who have a strong contact with terrorist groups in Syria, turned the civil war into a highly beneficial business. Ayhan Orli who lives in Yayladağı district of Hatay is a Syrian Turkmen. Orli moved to Syria to join the AKP backed terrorist groups after the beginning of civil war. His brother Adil Orli is one of the leaders of the Turkmen Batallion fighting against Syrian regime. One of the prisoners staying in a Syrian prison said in an interview that Ayhan Orli is cooperating with Turkish intelligence and there is an intense deal between them. Ayhan Orli receives million dollar worth commissions from the weapons provided to terrorist groups in Syria. He not only cooperates with intelligence organizations but also a number of international mafia organizations.
  • ...2 more annotations...
  • An alleged telephone conversation tape proving that Turkish National Intelligence Organization (MİT) involved in arms trading, emerged from the case file regarding ISIL attack in central Anatolian province Niğde. Masum Gök According to the court file regarding the two suspects of ISIL's terrorist action in Niğde, Ayhan Orli and Kassuma code named terrorist Muzaffer Yılmaz had a phone conversation regarding arms trading. According to the tape obtained by Turkish Gendarmarie forces, Arms dealer Ayhan Orli said "Brother, the goods are not in their hands. Intelligence (MİT) is keeping the goods," adding that the Grad rockets are in Mersin province. Here's the full text of the alleged telephone conversation between Ayhan Orli and Muzaffer Yılmaz (Kassuma) in 29 July 2014:
  • Muzaffer Yılmaz (Kassuma): Let's say you have 300 grads (rocket) ok? Ayhan Orli: Yes. Kassuma: Let's say there are 300 grads. Can someone from our side see them? Not from the other side. Either me or Abu Ala or you. Orli: Brother, they don't have the goods. The intelligence (MİT) is keeping them. They don't let them to be transferred. They (Agents) just prepare the goods and say take it from the border gate. Kassuma: Ok. What did Abu Ala said to you? Orli: Abu Ala said alright. He wants the money in cash. Kassuma: When we gonna pay the money? Orli: Today. Kassuma: I did not understand... Orli: Half of the grads are in Mersin. If you don't pay they will not let them to be transferred. If you don't show the draft, they will not bring the goods.
Paul Merrell

Erdogan Government Arrests Turkish Generals for Stopping Syria-Bound Trucks "Filled Wit... - 0 views

  • Two Turkish generals and a colonel were detained on Saturday for intercepting Syria-bound trucks that belonged to Turkey’s National Intelligence Organization (MIT), the newspaper Today’s Zaman reported. In January 2014, Ankara Gendarmerie Major-General Ibrahim Aydin, former Adana Gendarmerie Brigadier-General Hamza Celepoglu and former Gendarmerie Criminal Laboratory Head Colonel Burhanettin Cihangiroglu stopped Syrian-bound trucks in southern Turkey after they received information from an anonymous source that the trucks were illegally carrying weapons to militants in Syria. When the information about the trucks became public, MIT officials and high-ranking Turkish politicians, including President Recep Teyyip Erdogan, who was Prime Minister back then, and Prime Minister Ahmet Davutoglu, then the country’s foreign minister, were furious that the gendarmes stopped the trucks and said the Syria-bound trucks were carrying “humanitarian aid” to Turkmen living just south of Turkey, the newspaper said: “Yes, I’m saying this without any hesitation. That aid was going to the Turkmens. There will be a war next door and we will watch our Turkmen, Arab and Turkish brothers being massacred,” Davutoglu said, as cited by Today’s Zaman.
  • However, members of opposition parties and some Turkish media said the trucks were indeed transporting weapons to Islamic extremists in Syria. The gendarmes involved in the interception confirmed that the Syria-bound trucks weren’t going to an area where the Turkmen lived, but to an area populated by radical groups, the Turkish newspaper said. When an investigation into the MIT case was launched, the ruling Justice and Development Party (AKP) called the probe as “treason and espionage” on the part of prosecutors.
  • New developments on the issue took place recently. Last Tuesday, Erdogan answered claims previously made by critics, who said the trucks were filled with weapons, by sarcastically asking them: “What if the MIT trucks were filled with weapons?” Then on Saturday, contrary to his earlier claims that the MIT trucks were carrying humanitarian aid to Turkmen, Erdogan said the trucks were actually heading on their way to help the Free Syrian Army (FSA). “They [the gendarmes who revealed the transfer] also exposed those going to the FSA in that way,” Erdogan said on Saturday while addressing his supporters in Balikesir, as cited by Today’s Zaman. Well, that’s getting pretty confusing — were the trucks delivering “humanitarian aid” to the Turkmen or the FSA then? Just make up your mind, Mr. Erdogan. Where the trucks were heading and what were they carrying after all? Meanwhile, some very high-ranking Turkish officials, including then-president Abdullah Gul, revealed that the Syria-bound trucks were a “state-secret,” leading to more speculations that the trucks were indeed filled with weapons. The recent developments are taking place in the wake of a major government crackdown on two Turkish journalists of the Cumhuriyet newspaper, Can Dunbar and Erdem Gul, who we arrested for covering a story and releasing pictures, claiming that Turkish trucks provided weapons to Syrian opposition rebels.
  • ...1 more annotation...
  • The reason why the Turkish government arrested the journalists is because Erdogan and his ruling party don’t want reporters to write about certain things, such as the government’s support of Syrian rebels, corruption and other important things that people should actually know about, human rights activist Arzu Geybulla said. Following the arrest of the journalists, who covered Erdogan’s “tender” topic, it looks like the Turkish President is trying to eliminate everyone who’s willing to speak up or reveal the fact that the Turkish government was helping out Islamic extremists in Syria.
Paul Merrell

Russian intelligence report on Turkey's current assistance to Daesh - 0 views

  • eportedly, representatives of ISIL — with help from the Turkish intelligence services — have established an extensive network in Antalya for the recruitment of individuals who have arrived in Turkey from the post-Soviet States, to enable their participation in the Syrian conflict and possible transfer to Russia.
  • In March 2014 the head of the Turkish National Intelligence Organization (MIT), Mr. H. Fidan, coordinated the transfer of a large ISIL unit headed by Mahdi al-Kharati, a Libyan national [1]. The fighters were taken by sea from Libya to Syria through the Barsai crossing on the Turkish-Syrian border. Since late December 2015, with the assistance of the Turkish intelligence services, arrangements have been made for an air route for moving ISIL fighters from Syria through Turkey to Yemen using Turkish military air transport. An alternative means of transporting fighters is by sea to the Yemeni port of Aden.
  • It is well known that wounded ISIL fighters are being provided with places to rest and receive treatment in areas of Turkey bordering Syria. At least 700 fighters were recuperating in Gaziantep in 2014. Reportedly, beginning in 2015, Turkish intelligence services assisted in the removal from Antalya to Eskişehir of what was termed a “Tatar Village”, which houses ethnic Tatar fighters and accomplices of the terrorist group Jabhat al-Nusrah who are natives of Tatarstan, Bashkortostan and Mordovia. Some of them are dual Russian-Turkish nationals.
  • ...4 more annotations...
  • In December 2014, Turkish intelligence services helped to set up camps in Turkey, particularly in Hatay Province, to gather illegal migrants and provide training in preparation for the dispatch of extremist gangs to Syria. In January 2015, the Turkish MIT was involved in the operation to merge three terrorist bands, Osman Gazi, Omer bin Abdulaziz and Omer Mukhtar, into a group called the Sultan Abdulhamid Brigade, of which Omer Abdullah was appointed commander. The members of this group are trained in a camp in Bayır-Bucak in Turkey under the leadership of instructors from special operations units of the Turkish Armed Forces general command and MIT personnel. The activities of the Sultan Abdulhamid Brigade are coordinated with the activities of Jabhat al-Nusrah fighters in the north of the Syrian province of Latakia.
  • It is well known that on 21 September 2015, in the Syrian town of Tell Rifaat, representatives of the Syrian opposition who had received military training at a camp in Kırşehir in Turkey had delivered weapons to Jabhat al-Nusrah fighters. Deliveries of weapons to terrorist groups in Syria are reportedly still taking place, profiting from the facilities of Turkish-based foundations İnsan Hak ve Hürriyetleri ve İnsani Yardım Vakfı (IHH — Foundation for Human Rights and Freedoms and Humanitarian Relief), İmkander and Öncü Nesil İnsani Yardım Derneği.
  • Supplies of various forms of weapons, military equipment and ammunition are arriving from abroad via the Turkish port of İskenderun. Military equipment and supplies are transported from there through Hatay Province (Öncüpinar border crossing) to Aleppo and Idlib in Syria using vehicles belonging to IHH, İmkander and Öncü Nesil with the following Turkish registrations: 33 SU 317, 06 DY 7807, 33 SU 540, 33 SU 960, 42 GL 074 and 31 R 5487. Within Syria, the weapons and ammunition are distributed to Turkmen gangs and Jabhat al-Nusrah units.
  • On 15 September 2014, representatives of IHH brought supplies of weapons and medicines from Bursa through the Ceylanpınar border crossing (Reyhanlı district) by vehicle into Syria for ISIL groups. This shipment was followed and escorted through Turkey by a vehicle carrying MIT personnel.
Paul Merrell

Egypt accuses Morsi Minister of Conspiracy with the U.S. and Norway | nsnbc international - 0 views

  • Ali Beshr, Egypt’s Minister of Local Development during the presidency of the ousted Mohamed Morsi, has been detained since Thursday, reports The Cairo Post, quoting Muslim Brotherhood lawyer Abdul Meneim Abdul Maqsoud. For the first time since the ouster of Morsi, Egypt’s prosecutor may implicate the U.S. and EU/NATO member Norway in conspiracy as well as possible espionage, terrorism and high-treason.
  • Ali Beshr, Egypt’s Minister of Local Development during the presidency of the ousted Mohamed Morsi, has been detained since Thursday, reports The Cairo Post, quoting Muslim Brotherhood lawyer Abdul Meneim Abdul Maqsoud. For the first time since the ouster of Morsi, Egypt’s prosecutor may implicate the U.S. and EU/NATO member Norway in conspiracy as well as possible espionage, terrorism and high-treason.
  • Most of the leading members of Egypt’s Muslim Brotherhood, a.k.a. Ikhwan, were captured shortly after the dispersal of the Rabaa al-Adweya and Nahda Square sit ins on August 14, 2014. Morsi and over thirty other leading Muslim Brotherhood members and as well as members of the Morsi administration are facing charges, including espionage, terrorism and treason, cooperation with Hamas and Hezbollah in the attempt to subvert Egypt’s security and integrity, as well as the passing on of information that is sensitive to Egypt’s national security to Qatar. Since the overthrow of the Morsi administration, following record demonstrations with an estimated 14 million people, Egypt has also accused Turkey of supporting the Muslim Brotherhood. That includes allegations that Turkey’s intelligence service MIT, under Hakan Fidan, is behind the Muslim Brotherhoods Rabaa TV channel, based in Turkey.
  • ...4 more annotations...
  • The Cairo Post notes, however, that the allegations against Beshr would be the first incident since the overthrow of the Morsi administration, in which the Egyptian government alleges that a former official has been conspiring with a European country or the United States.
  • The current President of Egypt, Abdel Fatah Al-Sisi has, however, given an interview before in which he accused the United States of having stabbed Egypt in its back with Morsi and the Muslim Brotherhood. In the 2013 interview with Larry Weissman, Al-Sisi said: “The people of Egypt are aware of the fact that the USA has stabbed Egypt in the back with the Muslim Brotherhood and Morsi. It is nothing that Egypt will easily forget, or forgive”. After receiving a Master’s degree in engineering at Cairo University in 1978, Morsi received a scholarship from the Egyptian government and received his PhD in engineering from University of Southern California, USA, in 1982.
  • Morsi was reportedly introduced into the Muslim Brotherhood in Egypt 1977. It was however, while he was at the campus of University of Southern California that Morsi began to be introduced to the inner core of the “Ikhwan” and to U.S. based, Muslim Brotherhood linked organizations with ties to major U.S. think tanks and Washington, such as WAMY, International Institute of Islamic Thought and others. WAMY and several associated organizations have since “morphed” into the  Council on American – Islamic Relations, CAIR. The transformation came after several leading WAMY members with contacts to the White House were arrested on terrorism-related charges.
  • It is noteworthy that CAIR entertains close relations with U.S. security adviser Zbigniev Brzezinski and circles around Brzezinski. Several leading members of the so-called Syrian “Transitional National Council” were linked with CAIR when the foreign-backed, attempted subversion of Syria and Libya began in 2011. nsnbc is currently unable to document whether Mohamed Morsi has had direct ties to CAIR, but it is widely assumed that Morsi received strong support from the United States, circles around the Rockefeller Family, and associated think tanks when “The Arab Spring” was unleashed against Northern Africa and the Middle East in 2011.
Paul Merrell

The academic paper that predicted the NSA scandal | War of Ideas - 0 views

  • If you've been following the fallout from last week's NSA surveillance revelations, you may have seen repeated reference to a certain "recent MIT study." "Unique in the Crowd: The Privacy Bounds of Human Mobility," published in Nature's Scientific Reports last year, has been cited by multiple media sources, including this one, as evidence for why -- contra Dianne Feinstein -- your metadata matters. Indeed, re-examined in light of the current headlines, the concerns raised by the study seem quite prescient. The paper's authors, Yves-Alexandre de Montjoye, César A. Hidalgo, Michel Verleysen, and Vincent D. Blondel of MIT and the Universite Catholique de Louvain, examined a dataset of 15 months of anonymous cell-phone data from 1.5 million people in a "small European country." (They're a bit coy about how they obtained the data.) There were no names, addresses, or phone numbers in the data, yet they argue that "if individual's patterns are unique enough, outside information can be used to link the data back to an individual." In fact, just four points of observation -- time of the call and the nearest cell-phone tower -- were enough to identify 95 percent of individuals in the database.
Gary Edwards

The Biggest Price-Fixing Scandal Ever - and the VESTS Solution - 0 views

  •  
    excerpt: Uber financial investigative journalist Matt Taibbi has discovered what we too realized when we began to scrutinize the financial industry. In his latest article, he writes, "Everything Is Rigged: The Biggest Price-Fixing Scandal Ever." The article's cut line is, "The Illuminati were amateurs. The second huge financial scandal of the year reveals the real international conspiracy: There's no price the big banks can't fix." Taibbi's incredulity is evident throughout the article, as well it should be. The interest-rate swap market is part of the larger derivatives market that totals over one billion TRILLION dollars............................... "Given the endless financial scandals that keep sweeping across the industry, it is fairly obvious that this regulatory system needs a good deal of improvement. In fact, I think that it may be no coincidence that so much is being revealed now. The idea is surely to create the conditions for another international regulatory effort that will end up further controlling what is left of free-market capital raising. It is a global game for globalists. The game is to regulate everything and then to position oneself above the regulations and above the governments that wield them. This gives you tremendous power over everyone else. One of the tools being used to whip up sentiment for a larger regulatory revisiting is scandal and more scandal. There have been revelations of so-called crooked practices in a number of areas lately, mostly in the area of industry pricing. It turns out that many standard prices are set via indications of interest rather than outright competition. We can see the same system at work in the gold market, where a small group of wise men set the price for physical gold every day. And now, as Taibbi and others have revealed, the dysfunctional system also affects interest rate swaps. This has incensed Taibbi, who opens his article as follows: Conspiracy theorists of the world, believers in the
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

Security Experts Oppose Government Access to Encrypted Communication - The New York Times - 0 views

  • An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has emerged as a major issue in the debate over privacy rights.
  • That has put Silicon Valley at the center of a tug of war. Technology companies including Apple, Microsoft and Google have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers.
  • Yet law enforcement and intelligence agency leaders argue that such efforts thwart their ability to monitor kidnappers, terrorists and other adversaries. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data, but to divide the key into pieces and secure it so that no one person or government agency could use it alone.The encryption debate has left both sides bitterly divided and in fighting mode. The group of cryptographers deliberately issued its report a day before James B. Comey Jr., the director of the Federal Bureau of Investigation, and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to testify before the Senate Judiciary Committee on the concerns that they and other government agencies have that encryption technologies will prevent them from effectively doing their jobs.
  • ...2 more annotations...
  • The new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers, including Whitfield Diffie, a pioneer of public key cryptography, and Ronald L. Rivest, the “R” in the widely used RSA public cryptography algorithm. In the report, the group said any effort to give the government “exceptional access” to encrypted communications was technically unfeasible and would leave confidential data and critical infrastructure like banks and the power grid at risk. Handing governments a key to encrypted communications would also require an extraordinary degree of trust. With government agency breaches now the norm — most recently at the United States Office of Personnel Management, the State Department and the White House — the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals. They added that if the United States and Britain mandated backdoor keys to communications, China and other governments in foreign markets would be spurred to do the same.
  • “Such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend,” the report said. “The costs would be substantial, the damage to innovation severe and the consequences to economic growth hard to predict. The costs to the developed countries’ soft power and to our moral authority would also be considerable.”
  •  
    Our system of government does not expect that every criminal will be apprehended and convicted. There are numerous values our society believes are more important. Some examples: [i] a presumption of innocence unless guilt is established beyond any reasonable doubt; [ii] the requirement that government officials convince a neutral magistrate that they have probable cause to believe that a search or seizure will produce evidence of a crime; [iii] many communications cannot be compelled to be disclosed and used in evidence, such as attorney-client communications, spousal communications, and priest-penitent communications; and [iv] etc. Moral of my story: the government needs a much stronger reason to justify interception of communications than saying, "some crooks will escape prosecution if we can't do that." We have a right to whisper to each other, concealing our communicatons from all others. Why does the right to whisper privately disappear if our whisperings are done electronically? The Supreme Court took its first step on a very slippery slope when it permitted wiretapping in Olmstead v. United States, 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944 (1928). https://goo.gl/LaZGHt It's been a long slide ever since. It's past time to revisit Olmstead and recognize that American citizens have the absolute right to communicate privately. "The President … recognizes that U.S. citizens and institutions should have a reasonable expectation of privacy from foreign or domestic intercept when using the public telephone system." - Brent Scowcroft, U.S. National Security Advisor, National Security Decision Memorandum 338 (1 September 1976) (Nixon administration), http://www.fas.org/irp/offdocs/nsdm-ford/nsdm-338.pdf   
Gary Edwards

Jenkins: Obama vs. the 1980s - WSJ.com - 0 views

  • "World Tax Reform: A Progress Report," his 1988 volume showed how country after country was following the U.S. in adopting Reagan-style rate-flattening and tax simplification.
  • Mr. Obama now craves a federal infrastructure bank, apparently still unable to see how growth might emerge except by bureaucrats bossing around tax dollars.
  • Simpson-Bowles Commission—proposed a Reagan-style tax reform
  •  
    excerpt:  Instead of a "stimulus" to create jobs by financing useful investments that would have paid a growth dividend in the future, we got a debt-fueled permanent expansion of entitlements and the size of government. In health care, instead of reforms to encourage competent consumers not to treat health care as a free lunch, we got a doubling down on health-care free lunchism. In banking, instead of new incentives to cause creditors to pull in the reins on risk-taking banks, we got a formalization of too big to fail. All economic crises begin differently-this one began in housing-but eventually they morph into the same old crisis of forgetting what works. Think about the last big crisis of faith in American capitalism in the early 1980s. The panic was eventually crystallized in dueling Harvard Business Review articles by George Gilder and Charles Ferguson. Mr. Ferguson, an MIT-based consultant, argued the U.S was dooming itself to vassalage unless Washington brushed aside small, poorly-funded entrepreneurs and concentrated regulatory favors and subsidies on giant firms like IBM, AT&T, Digital Equipment and Kodak. Mr. Gilder championed the then-emerging Silicon Valley paradigm. He quoted technologist Carver Mead: "We depend on the innovations of the citizens of a free economy to keep ahead of the bureaucrats and the people who make a living on control and planning. In the long term, it's the element of surprise that gives us the edge over more controlled economies." Who won hardly needs to be belabored except that it apparently does need to be belabored. Almost everything Mr. Obama understands as pro-growth consists of bets on "bureaucrats and the people who make a living on control and planning."
Paul Merrell

NSA targets the privacy-conscious (Seite 1)| Das Erste - Panorama - Meldungen - 0 views

  • The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Three authors of this investigation have personal and professional ties to the Tor Project, an American company mentioned within the following investigation.
  • Teil 1: NSA targets the privacy-conscious Teil 2: The Tor Project - anathema to the NSA Teil 3: Servers in Germany targeted Teil 4: Simple web searches are suspicious Teil 5: NSA: In strict accordance with the rule of law
  • ...3 more annotations...
  • von J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Downloads XKeyscore rules Read/download the XKeyscore rules here  | download
  • Yet despite these efforts, one of the servers is targeted by the NSA. The IP address 212.212.245.170 is explicitly specified in the rules of the powerful and invasive spy software program XKeyscore. The code is published here exclusively for the first time. After a year of NSA revelations based on documents that focus on program names and high-level Powerpoint presentations, NDR and WDR are revealing NSA source code that shows how these programs function and how they are implemented in Germany and around the world. Months of investigation by the German public television broadcasters NDR and WDR, drawing on exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government reveal that not only is the server in Nuremberg under observation by the NSA, but so is virtually anyone who has taken an interest in several well-known privacy software systems.
Paul Merrell

M of A - Ankara Bombing Fails To Achive Strategic Changes - 0 views

  • The bombing in Ankara yesterday killed 27 mostly military people. It was a big car bomb and a suicide attack.The Turkish government claims that the person who did this was one Saleh Nejar and also claims that he is connected to the Syrian Kurdish group YPG. There is no way to verify this. But the YPG has so fare never used any car bombs or done any suicide attacks. It never touched any target in Turkey. It officially denied to have taken any part in it. The Turkish group PKK has done vehicle bomb attacks and a few suicide attacks but not in Ankara or any other major west-Turkish city. Its attacks are usually operational, not strategic like this one. In the last Turkish version of its magazine the Islamic State had called for attacks in Turkey and on Turkish soldiers. It is the entity that has most to win through such an attack that would predictably be blamed on the Kurds. It is the most plausible culprit. The attack could also have been arranged by the Turkish secret service MIT. But the number and type of casualties seems to be too high and valuable for a stage-managed false flag attack.
  • The Turkish government called in the ambassadors of the permanent members of the UN Security Council to present its evidence. A "western diplomat" told the Wall Street Journal that the evidence shown was "not conclusive". That is the diplomatese expression for "bullshit". The Turkish attempt to use the attack to change the U.S. and EU relations to the YPK failed. The YPK and its associated Arab and Turkmen forces is a very valuable asset for the U.S. to fight the Islamic State. It will refrain from condemning it as long as that is the case. The YPG groups in west Syria are fighting together with others under the label Syrian Democratic Forces. These and the mysterious additional attendants are pressing Jihadi forces in the Azaz pocket at the Turkish border. They are now seeing more resistance. The Turks use artillery to protect the Jihadis in Azaz and the number of enemies has grown. One "rebel" tells Reuters that 2,000 "rebels" with some tanks came from Idleb through Turkey to Azaz. That number is dubious. The British MI6 outlet SOHR as well as a Turkish pro government daily put the numbers at 350 on Monday and another 500 on Wednesday. To transport the tanks through Turkey would likely have been too much a hassle. I doubt that any reached Azaz.
  • I suspect that many of these "rebels" in Azaz are actually Turks of some radical nationalist and Islamist faction as well as Grey Wolf fascists which have strong connections to the MIT. Pictures show such "rebels" in Latakia with Turkish and Islamic State flags and in Azaz with their typical Grey Wolf hand sign.
Paul Merrell

Asia Times Online :: Orwell does America - 0 views

  • Welcome to the sweet abyss of an Orwellian vortex. 2013 increasingly looks like 1984. In two previous articles, for RT RT and for Asia Times Online I have looked into the superimposed levels of blowback implied by the Boston bombing. With still so many unanswered questions regarding what took place on the ground in Boston after the bombing, it's time to look at an extra, possible Top Ten list of lingering absurdities. And this without sidestepping other unanswered crucial questions, such as why a bomb drill - organized by Craft - was going on during the marathon at which the bombing took place; and why it was <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> vehemently denied that a bomb drill was going on. For this current set of questions, I'm grateful for the help of Asia Times Online's Bostonian readers.
  • 2. Since 9/11, the preferred FBI modus operandi is to use informants to lure ''potential'' terra-rists to act. See for example the Fast and Furious<-style Iran cum Mexican cartel plot. There's a strong possibility the Tsarnaev brothers were set up. In this case, is there anyone anywhere among the vast US intel apparatus investigating the FBI investigators?
  • 4. A Saudi student, injured at the bombing, who was in the US via a legal student visa, is suddenly deported on ''national security grounds'', even as investigators found ''unusual burns'' on his hand inconsistent with the injuries of other victims. He may have been a member of a Saudi clan notorious for its al-Qaeda connections. The FBI ''investigation'' is suddenly dropped shortly after the Saudi ambassador in the US held an unscheduled meeting with President Barack Obama. Add to it that even before the smoke had cleared, the Israel Lobby and the notorious disinformation website DEBKA were pointing their fingers at ''domestic terrorists with Middle East connections''.
  • ...3 more annotations...
  • 5. The description of the car hijacked by the brothers, a Mercedes E350 SUV, matches the description of their car left at a service station in Cambridge for two weeks prior to the bombing. A mechanic in Cambridge said Dzhokhar, Tamerlan's brother, picked up his "black Mercedes SUV" on Tuesday, the day after the marathon. The two cars may be one and the same; that blows up the whole official ''carjacking'' narrative. 6. Additionally, there's a media blackout on the owner of the allegedly hijacked Mercedes, who in theory managed to escape and call the police, who maintains that the brothers went to three ATMs and withdrew US$800 from his account - not before telling him they were the ''marathon bombers and had killed an MIT police''. The driver said he was let off at a gas station on Memorial Drive in Cambridge. But some witnesses saw Dzhokhar at the station's convenience store - without any driver. Then the narrative of the brothers robbing a convenience store was revealed to be false. Police scanners referred to a "black top" person. Still, the official narrative is that the Tsarnaev brothers were at the same place and the same time of the robbery.
  • 9. The whole law enforcement apparatus insisted that there was a heavy exchange of gunfire with Dzokhar while he was hiding in a boat, before his arrest. That is false. He was unarmed, barely moving and the hail of bullets towards the boat came from the police.
  • Do the martial dance What the day-long delay in Dzhokhar's arrest indeed made possible was to turn Watertown into a monster dry run for urban martial law - euphemized as ''lockdown'' - in a very near future. As total militarization of civilian life goes - featuring, for instance, Homeland Security running amok with hundreds of armored vehicles - this was a major success. Meanwhile, on the ''legal'' front, the White House and the Justice Department are firmly on track to finally suppress the Miranda warning; that went into effect already two years ago, when an Obama secret executive order ruled the Miranda warning would not apply to suspected terrorists. Dzhokhar is a ''suspected'' terrorist - now charged with using and conspiring to use a weapon of mass destruction, yet already convicted by corporate media. Welcome to Police State USA - where at least everyone still has the right to go out shopping. For now.
Paul Merrell

Technology, Not Law, Limits Mass Surveillance | MIT Technology Review - 0 views

  • Recent revelations about the extent of surveillance by the U.S. National Security Agency come as no surprise to those with a technical background in the workings of digital communications. The leaked documents show how the NSA has taken advantage of the increased use of digital communications and cloud services, coupled with outdated privacy laws, to expand and streamline their surveillance programs. This is a predictable response to the shrinking cost and growing efficiency of surveillance brought about by new technology. The extent to which technology has reduced the time and cost necessary to conduct surveillance should play an important role in our national discussion of this issue.
  • What we have learned about the NSA’s capabilities suggests a move toward programmatic, automated surveillance previously unfathomable due to limitations of computing speed, scale, and cost. Technical advances have both reduced the barriers to surveillance and increased the NSA’s capacity for it. We need to remember that this is a trend with a firm lower bound. Once the cost of surveillance reaches zero we will be left with our outdated laws as the only protection. Whatever policy actions are taken as a result of the recent leaks should address the fact that technical barriers such as cost and speed offer dwindling protection from unwarranted government surveillance domestically and abroad.
  •  
    A concise and convincing case that technological limitations have ruled what surveillance practices the government employs and that as technology advances, so do the surveillance practices.  Do we as a society continue to tell government that it is free to employ advanced surveillance technologies until caught and outlawed, or do we outlaw all surveillance techniques except for a defined list of methods with defined restrictions?  
Paul Merrell

Baltimore Police Have Been Secretly Spying On Entire City From The Air - 0 views

  • Baltimore Police didn’t bother to inform the public (or anyone, for that matter) when they implemented a privately-funded mass surveillance program in January using a wide-angle camera-equipped plane flying above the city — which instantly uploaded and stored everything it recorded, just in case they needed it later. As Bloomberg’s Monte Reel reports, a small Cessna plane equipped with “a sophisticated array of cameras” capable of capturing “an area of roughly 30 square miles,” funded by an a private donor and provided by Dayton, Ohio-based Persistent Surveillance Systems, sometimes circled above the city for up to 10 hours per day recording and storing everything without anyone being privy to its presence. Since January, Reel noted, the Baltimore Police Department has been using this covert Big Brother’s eye-in-the-sky “to investigate all sorts of crimes, from property thefts to shootings.” Gone, apparently, are the days when the government’s surveillance state drew ire for attempting to ferret out potential terrorists — residents of Baltimore have been guinea pigs for an altogether more insidious spy dragnet. Persistent Surveillance Systems’ technology automatically stores all the footage on massive hard drives, making it available to law enforcement long afterward — but the idea police could access this information to solve a simple property crime is no less than alarming.
  • Particularly considering the company’s founder has an intense military background. Ross McNutt, Bloomberg reports, “is an Air Force Academy graduate, physicist, and MIT-trained astronautical engineer who in 2004 founded the Air Force’s Center for Rapid Product Development. The Pentagon asked him if he could develop something to figure out who was planting the roadside bombs that were killing and maiming American soldiers in Iraq. In 2006 he gave the military Angel Fire, a wide-area, live-feed surveillance system that could cast an unblinking eye on an entire city.” Though the technology had imperfections — even determining the gender of a person on the ground was impossible — its TiVo-like capabilities more than made up for any shortcomings. A person of interest could be followed by rewinding footage after, say, an IED exploded roadside, to track their movements — even if the cameras weren’t focused directly on the explosion at the moment it occurred. If the cameras were in the air at the time, anything that happened was fully trackable both back and forward in time. McNutt’s pitch for his technology concisely summarized, “Imagine Google Earth with TiVo capability.” Angel Fire truly evolved at the Los Alamos National Laboratory in New Mexico after 2007, when upgrades allowed for “all-weather and nighttime capabilities and then was used as the basis for another system, called Blue Devil, which coupled wide-area cameras with narrow-focus zoom lenses in the same package.”
  • Over time, after McNutt retired from the military, he worked to further improve the camera array and attended security conferences in hopes of garnering clients. After a brief but effective test run over the skies of Ciudad Juárez, Los Angeles became the first U.S. city to employ Persistent Surveillance’ system — and just as covertly as what has been taking place in Baltimore for the last eight months.
  • ...1 more annotation...
  • McNutt believes in the legitimacy of the services Persistent Surveillance can provide, and insists the technology isn’t as invasive as it might sound since individual identifying details, among other aspects, aren’t discernible, and because the every keystroke and action taken by analysts — like video footage — are logged and archived.
  •  
    Just imagine what it will be like when the bugs in the focal system are gone, which undoubtedly is a goal. Couple it with facial recognition and what do we have?
Paul Merrell

US looks at ways to prevent spying on its spying - 0 views

  • (AP) — The U.S. government is looking at ways to prevent anyone from spying on its own surveillance of Americans' phone records. As the Obama administration considers shifting the collection of those records from the National Security Agency to requiring that they be stored at phone companies or elsewhere, it's quietly funding research to prevent phone company employees or eavesdroppers from seeing whom the U.S. is spying on, The Associated Press has learned. The Office of the Director of National Intelligence has paid at least five research teams across the country to develop a system for high-volume, encrypted searches of electronic records kept outside the government's possession. The project is among several ideas that would allow the government to discontinue storing Americans' phone records, but still search them as needed.
  • Under the research, U.S. data mining would be shielded by secret coding that could conceal identifying details from outsiders and even the owners of the targeted databases, according to public documents obtained by The Associated Press and AP interviews with researchers, corporate executives and government officials.
  • Internal documents describing the Security and Privacy Assurance Research project do not cite the NSA or its phone surveillance program. But if the project were to prove successful, its encrypted search technology could pave the way for the government to shift storage of the records from NSA computers to either phone companies or a third-party organization. A DNI spokesman, Michael Birmingham, confirmed that the research was relevant to the NSA's phone records program. He cited "interest throughout the intelligence community" but cautioned that it may be some time before the technology is used. The intelligence director's office is by law exempt from disclosing detailed budget figures, so it's unclear how much money the government has spent on the SPAR project, which is overseen by the DNI's Intelligence Advanced Research Projects Activity office. Birmingham said the research is aimed for use in a "situation where a large sensitive data set is held by one party which another seeks to query, preserving privacy and enforcing access policies."
  • ...3 more annotations...
  • A Columbia University computer sciences expert who heads one of the DNI-funded teams, Steven M. Bellovin, estimates the government could start conducting encrypted searches within the next year or two. "If the NSA wanted to deploy something like this it would take one to two years to get the hardware and software in place to start collecting data this way either from phone companies or whatever other entity they decide on," said Bellovin, who is also a former chief technologist for the Federal Trade Commission.
  • An encrypted search system would permit the NSA to shift storage of phone records to either phone providers or a third party, and conduct secure searches remotely through their databases. The coding could shield both the extracted metadata and identities of those conducting the searches, Bellovin said. The government could use encrypted searches to ensure its analysts were not leaking information or abusing anyone's privacy during their data searches. And the technique could also be used by the NSA to securely search out and retrieve Internet metadata, such as emails and other electronic records. Some computer science experts are less sanguine about the prospects for encrypted search techniques. Searches could bog down because of the encryption computations needed, said Daniel Weitzner, principal research scientist at MIT's Computer Science and Artificial Intelligence Laboratory and former deputy U.S. chief technology officer for the Obama administration. "There's no silver bullet that guarantees the intelligence community will only have access to the records they're supposed to have access to," Weitzner said. "We also need oversight of the actual use of the data."
  • The encrypted search techniques could make it more difficult for hackers to access the phone records and could prevent phone companies from knowing which records the government was searching. "It would remove one of the big objections to having the phone companies hold the data," Bellovin said. Similar research is underway by researchers at University of California at Irvine; a group from the University of Wisconsin-Madison and the University of Texas at Austin; another group from MIT, Yale and Rensselaer Polytechnic Institute; and a fourth from Stealth Software Technologies, a Los Angeles-based technology company.
Paul Merrell

Group Thinks Anonymity Should Be Baked Into the Internet Itself Using Tor - Slashdot - 0 views

  • "David Talbot writes at MIT Technology review that engineers on the Internet Engineering Task Force (IETF), an informal organization of engineers that changes Internet code and operates by rough consensus, have asked the architects of Tor to consider turning the technology into an Internet standard. If widely adopted, such a standard would make it easy to include the technology in consumer and business products ranging from routers to apps and would allow far more people to browse the Web without being identified by anyone who might be spying on Internet traffic. The IETF is already working to make encryption standard in all web traffic. Stephen Farrell believes that forging Tor into a standard that interoperates with other parts of the Internet could be better than leaving Tor as a separate tool that requires people to take special action to implement. 'I think there are benefits that might flow in both directions,' says Farrell. 'I think other IETF participants could learn useful things about protocol design from the Tor people, who've faced interesting challenges that aren't often seen in practice. And the Tor people might well get interest and involvement from IETF folks who've got a lot of experience with large-scale systems.' Andrew Lewman, executive director of Tor, says the group is considering it. 'We're basically at the stage of 'Do we even want to go on a date together?' It's not clear we are going to do it, but it's worth exploring to see what is involved. It adds legitimacy, it adds validation of all the research we've done.'"
Paul Merrell

Leak reveals US plans for Syria no-fly-zone | Middle East Eye - 0 views

  • The United States has drawn up plans for enforcing a no-fly-zone over Syria and shared them with allied governments, in a move that parallels the stages of NATO intervention that ended with the overthrow of Libyan leader Muammar Gaddafi three years ago.   The US plans were mentioned in leaked tapes of a meeting in the Turkish foreign minister’s office on March 13. Ahmet Davutoglu is heard conferring on the matter with his Under-Secretary Feridun Sinirlioglu, Armed Forces’ Deputy Chief of Staff Lieutenant General Yasar Guler and the Director of the National Intelligence Organisation (Milli Istihbarat Teskilati (MIT)) Hakan Fidan.
  •  
    Obama just doesn't get that war with Syria would be no cake walk and could easily mushroom into WWIII.
Paul Merrell

Turkey Cooks the Books in Syria | The American Conservative - 0 views

  • If you had been a reader of The American Conservative magazine back in December 2011, you might have learned from an article written by me that “Unmarked NATO warplanes are arriving at Turkish military bases close to Iskenderum on the Syrian border, delivering weapons [to the Free Syrian Army] derived from Colonel Muammar Gaddafi’s arsenals…” Well, it seems that the rest of the media is beginning to catch up with the old news, supplemented with significant details by Sy Hersh in the latest issue of the London Review of Books in an article entitled “The Red Line and the Rat Line.” The reality is that numerous former intelligence officials, like myself, have long known most of the story surrounding the on-again off-again intervention by the United States and others in Syria, but what was needed was a Sy Hersh, with his unmatched range of contacts deep in both the Pentagon as well as at CIA and State Department, to stitch it all together with corroboration from multiple sources. In a sense it was a secret that wasn’t really very well hidden but which the mainstream media wouldn’t touch with a barge pole because it revealed that the Obama Administration, just like the Bushies who preceded it, has been actively though clandestinely conspiring to overthrow yet another government in the Middle East. One might well conclude that the White House is like the Bourbon Kings of France in that it never forgets anything but never learns anything either.
  • The few media outlets that are willing to pick up the Syria story even now are gingerly treating it as something new, jumping in based on their own editorial biases, sometimes emphasizing the CIA and MI6 role in cooperating with the Turks to undermine Bashar al-Assad. But Hersh’s tale is only surprising if one had not been reading between the lines over the past three years, where the clandestine role of the British and American governments was evident and frequently reported on over the internet and, most particularly, in the local media in the Middle East. Far from being either rogue or deliberately deceptive, operations by the U.S. and UK intelligence services, the so-called “ratlines” feeding weapons into Syria, were fully vetted and approved by both the White House and Number 10 Downing Street. The more recent exposure of the Benghazi CIA base’s possible involvement in obtaining Libyan arms as part of the process of equipping the Syrian insurgents almost blew the lid off of the arrangement but somehow the media attention was diverted by a partisan attack on the Obama Administration over who said what and when to explain the security breakdown and the real story sank out of sight.
  • So this is what happened, roughly speaking: the United States had been seeking the ouster of President Bashar al-Assad of Syria since at least 2003, joining with Saudi Arabia, which had been funding efforts to destabilize his regime even earlier. Why? Because from the Saudi viewpoint Syria was an ally of Iran and was also a heretical state led by a secular government dominated by Alawite Muslims, viewed as being uncomfortably close to Shi’ites in their apostasy. From the U.S. viewpoint, the ties to Iran and reports of Syrian interference in Lebanon were a sufficient casus belli coupled with a geostrategic assessment shared with the Saudis that Syria served as the essential land bridge connecting Hezbollah in Lebanon to Iran. The subsequent Congressional Syria Accountability Acts of 2004 and 2010, like similar legislation directed against Iran, have resulted in little accountability and have instead stifled diplomacy. They punished Syria with sanctions for supporting Hezbollah in Lebanon and for its links to Tehran, making any possible improvement in relations problematical. The 2010 Act even calls for steps to bring about regime change in Damascus. The United States also engaged in a program eerily reminiscent of its recent moves to destabilize the government in Ukraine, i.e., sending in ambassadors and charges who deliberately provoked the Syrian government by meeting with opposition leaders and openly making demands for greater democracy. The last U.S. Ambassador to Syria Robert Ford spoke openly in support of the protesters while serving in Damascus in 2010. On one occasion he was pelted with tomatoes and was eventually removed over safety concerns.
  • ...4 more annotations...
  • Lost in translation is the fact that Washington’s growing support for radical insurgency in Syria would also inevitably destabilize all its neighbors, most notably including Iraq, which has indeed been the case, making a shambles of U.S. claims that it was seeking to introduce stable democracies into the region. Some also saw irony in the fact that a few years before Washington decided al-Assad was an enemy it had been sending victims of the CIA’s rendition program to Syria, suggesting that at least some short-term and long-term strategies were on a collision course from the start, if indeed the advocates of the two policies were actually communicating with each other at all. Prime Minister Recep Tayyip Erdogan of Turkey, whose country shared a long border with Syria and who had legitimate security concerns relating to Kurdish separatists operating out of the border region, became the proxy in the secret war for Washington and its principal European allies, the British and French. When the U.S.-Saudi supported insurgency began to heat up and turn violent, Turkey became the key front line state in pushing for aggressive action against Damascus. Erdogan miscalculated, thinking that al-Assad was on his last legs, needing only a push to force him out, and Ankara saw itself as ultimately benefiting from a weak Syria with a Turkish-controlled buffer zone along the border to keep the Kurds in check.
  • Hersh reports how President Barack Obama had to back down from attacking Syria when the Anglo-American intelligence community informed him flatly and unambiguously that Damascus was not responsible for the poison gas attack that took place in Damascus on August 21, 2013 that was being exploited as a casus belli. The information supporting that assertion was known to many like myself who move around the fringes of the intelligence community, but the real revelation from Hersh is the depth of Turkish involvement in the incident in order to have the atrocity be exploitable as a pretext for American armed intervention, which, at that point, Erdogan strongly desired. As the use of weapons of mass destruction against civilians was one of the red lines that Obama had foolishly promoted regarding Syria Erdogan was eager to deliver just that to force the U.S.’s hand. Relying on unidentified senior U.S. intelligence sources, Hersh demonstrates how Turkey’s own preferred militant group Jabhat al-Nusra, which is generally regarded as an al-Qaeda affiliate, apparently used Turkish-provided chemicals and instructions to stage the attack.
  • Is it all true? Unless one has access to the same raw information as Sy Hersh it is difficult to say with any certainty, but I believe I know who some of the sources are and they both have good access to intelligence and are reliable. Plus, the whole narrative has an undeniable plausibility, particularly if one also considers other evidence of Erdogan’s willingness to take large risks coupled with a more general Turkish underhandedness relating to Syria. On March 23rd, one week before local elections in Turkey that Erdogan feared would go badly for him, a Turkish air force F-16 shot down a Syrian Mig-23, claiming that it had strayed half a mile into Turkish airspace. The pilot who bailed out, claimed that he was attacking insurgent targets at least four miles inside the border when he was shot down, an assertion borne out by physical evidence as the plane’s remains landed inside Syria. Was Erdogan demonstrating how tough he could be just before elections? Possibly.
  • Critics of Hersh claim that the Turks would be incapable of carrying out such a grand subterfuge, but I would argue that putting together some technicians, chemicals, and a couple of trucks to carry the load are well within the capability of MIT, an organization that I have worked with and whose abilities I respect. And one must regard with dismay the “tangled webs we weave,” with due credit to Bobby Burns, for what has subsequently evolved in Syria. Allies like Turkey that are willing to cook the books to bring about military action are exploiting the uncertainty of a White House that continues to search for foreign policy successes while simultaneously being unable to define any genuine American interests. Syria is far from an innocent in the ensuing mayhem, but it has become the fall guy for a whole series of failed policies. Turkey meanwhile has exploited the confusion to clamp down on dissent and to institutionalize Erdogan’s authoritarian inclinations. Ten years of American-licensed meddling combined with obliviousness to possible consequences has led to in excess of 100,000 dead Syrians and the introduction of large terrorist infrastructures into the Arab heartland, yet another foreign policy disaster in the making with no clear way out.
  •  
    Former CIA officer Philip Giraldi adds valuable context to revelations of Turkey's involvement in the false flag Sarin gas attack in Syria and in Turkey's follow-up plan to stage a false flag attack on a Turkish tomb in Syria as a pretext for Turkish invasion of Syria. 
Paul Merrell

Kurdish Question - ISIS: We negotiated with Turkey - 0 views

  • Takva Haber, a news agency known to be close to ISIS, said that the release of 49 Turkish consular hostages yesterday was the result of negotiations between ISIS and the Turkish state. According to Takva Haber, ISIS held three months of talks with Turkey. Takva Haber claimed that "no ransom had been paid", and that the releases occurred "after agreement had been reached in negotiations between the two states." Takva Haber gave details of the 3-month long negotiations, saying the National Intelligence Organisation (MIT) and the Foreign Operations Directorate (DOP) had represented Turkey, while a body called the "Foreign Ministry of the Islamic State" had represented ISIS. Takva Haber wrote that Turkey had made its intentions clear by refusing to take part in the "anti-ISIS coalition" proposed by the US, and that Turkey had thus: "even if indirectly", recognised ISIS.
Paul Merrell

Erdogan's Dirty Dangerous ISIS Games | nsnbc international - 0 views

  • Turkey is a beautiful land, rich in resources, with many highly intelligent and warm people. It also happens to have a President who seems intent on destroying his once-proud nation. More and more details are coming to light revealing that the Islamic State in Iraq and Syria, variously known as ISIS, IS or Daesh, is being fed and kept alive by Recep Tayyip Erdoğan, the Turkish President and by his Turkish intelligence service, including MIT, the Turkish CIA. Turkey, as a result of Erdoğan’s pursuit of what some call a Neo-Ottoman Empire fantasies that stretch all the way to China, Syria and Iraq, threatens not only to destroy Turkey but much of the Middle East if he continues on his present path.
  • In October 2014 US Vice President Joe Biden told a Harvard gathering that Erdoğan’s regime was backing ISIS / ISIL with “hundreds of millions of dollars and thousands of tons of weapons…” Biden later apologized clearly for tactical reasons to get Erdogan’s permission to use Turkey’s Incirlik Air Base for airstrikes against ISIS in Syria, but the dimensions of Erdoğan’s backing for ISIS since revealed is far, far more than Biden hinted. ISIS militants were trained by US, Israeli and now it emerges, by Turkish special forces at secret bases in Konya Province inside the Turkish border to Syria, over the past three years. Erdoğan’s involvement in ISIS goes much deeper. At a time when Washington, Saudi Arabia and even Qatar appear to have cut off their support for ISIS, they remaining amazingly durable. The reason appears to be the scale of the backing from Erdoğan and his fellow neo-Ottoman Sunni Islam Prime Minister, Ahmet Davutoğlu. Nice Family Business The prime source of money feeding ISIS these days is sale of Iraqi oil from the Mosul region oilfields where they maintain a stronghold. The son of Erdoğan it seems is the man who makes the export sales of ISIS-controlled oil possible. Bilal Erdoğan owns several maritime companies. He has allegedly signed contracts with European operating companies to carry Iraqi stolen oil to different Asian countries. The Turkish government buys Iraqi plundered oil which is being produced from the Iraqi seized oil wells. Bilal Erdoğan’s maritime companies own special wharfs in Beirut and Ceyhan ports that are transporting ISIS’ smuggled crude oil in Japan-bound oil tankers.
  • In addition to son Bilal’s illegal and lucrative oil trading for ISIS, Sümeyye Erdoğan, the daughter of the Turkish President apparently runs a secret hospital camp inside Turkey just over the Syrian border where Turkish army trucks daily being in scores of wounded ISIS Jihadists to be patched up and sent back to wage the bloody Jihad in Syria, according to the testimony of a nurse who was recruited to work there until it was discovered she was a member of the Alawite branch of Islam, the same as Syrian President Bashar al-Assad who Erdoğan seems hell-bent on toppling. Turkish citizen Ramazan Başol, captured this month by Kurdish People’s Defence Units,YPG, as he attempted to join ISIS from Konya province, told his captors that said he was sent to ISIS by the ‘İsmail Ağa Sect,’ a strict Turkish Islam sect reported to be tied to Recep Erdoğan. Başol said the sect recruits members and provides logistic support to the radical Islamist organization. He added that the Sect gives jihad training in neighborhoods of Konya and sends those trained here to join ISIS gangs in Syria. According to French geopolitical analyst, Thierry Meyssan, Recep Erdoğan “organised the pillage of Syria, dismantled all the factories in Aleppo, the economic capital, and stole the machine-tools. Similarly, he organised the theft of archeological treasures and set up an international market in Antioch…with the help of General Benoît Puga, Chief of Staff for the Elysée, he organised a false-flag operation intended to provoke the launching of a war by the Atlantic Alliance – the chemical bombing of la Ghoutta in Damascus, in August 2013. “
  • ...1 more annotation...
  • Meyssan claims that the Syria strategy of Erdoğan was initially secretly developed in coordination with former French Foreign Minister Alain Juppé and Erdoğan’s then Foreign Minister Ahmet Davutoğlu, in 2011, after Juppe won a hesitant Erdoğan to the idea of supporting the attack on traditional Turkish ally Syria in return for a promise of French support for Turkish membership in the EU. France later backed out, leaving Erdoğan to continue the Syrian bloodbath largely on his own using ISIS. Gen. John R. Allen, an opponent of Obama’s Iran peace strategy, now US diplomatic envoy coordinating the coalition against the Islamic State, exceeded his authorized role after meeting with Erdoğan and “promised to create a « no-fly zone » ninety miles wide, over Syrian territory, along the whole border with Turkey, supposedly intended to help Syrian refugees fleeing from their government, but in reality to apply the « Juppé-Wright plan ». The Turkish Prime Minister, Ahmet Davutoğlu, revealed US support for the project on the TV channel A Haber by launching a bombing raid against the PKK.” Meyssan adds. There are never winners in war and Erdoğan’s war against Syria’s Assad demonstrates that in bold. Turkey and the world deserve better. Ahmet Davutoğlu’s famous “Zero Problems With Neighbors” foreign policy has been turned into massive problems with all neighbors due to the foolish ambitions of Erdoğan and his gang.
1 - 20 of 27 Next ›
Showing 20 items per page