Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Obama-Surveillance

Rss Feed Group items tagged

Paul Merrell

The Latest Snowden Leak Is Devastating to NSA Defenders - Conor Friedersdorf - The Atla... - 0 views

  • Consider the latest leak sourced to Edward Snowden from the perspective of his detractors. The National Security Agency's defenders would have us believe that Snowden is a thief and a criminal at best, and perhaps a traitorous Russian spy. In their telling, the NSA carries out its mission lawfully, honorably, and without unduly compromising the privacy of innocents. For that reason, they regard Snowden's actions as a wrongheaded slur campaign premised on lies and exaggerations. But their narrative now contradicts itself. The Washington Post's latest article drawing on Snowden's leaked cache of documents includes files "described as useless by the analysts but nonetheless retained" that "tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless."
  • I never thought I'd see this day: The founder of Lawfare has finally declared that a national-security-state employee perpetrated a huge civil-liberties violation! Remember this if he ever again claims that NSA critics can't point to a single serious abuse at the agency. Wittes himself now says there's been a serious abuse. The same logic applies to Keith Alexander, James Clapper, Michael Hayden, Stewart Baker, Edward Lucas, John Schindler, and every other anti-Snowden NSA defender. So long as they insist that Snowden is a narcissistic criminal and possible traitor, they have no choice but to admit that the NSA collected and stored intimate photos, emails, and chats belonging to totally innocent Americans and safeguarded them so poorly that a ne'er-do-well could copy them onto thumb drives. 
  • They have no choice but to admit that the NSA was so bad at judging who could be trusted with this sensitive data that a possible traitor could take it all to China and Russia. Yet these same people continue to insist that the NSA is deserving of our trust, that Americans should keep permitting it to collect and store massive amounts of sensitive data on innocents, and that adequate safeguards are in place to protect that data. To examine the entirety of their position is to see that it is farcical. Here's the reality. The NSA collects and stores the full content of extremely sensitive photographs, emails, chat transcripts, and other documents belong to Americans, itself a violation of the Constitution—but even if you disagree that it's illegal, there's no disputing the fact that the NSA has been proven incapable of safeguarding that data. There is not the chance the data could leak at sometime in the future. It has already been taken and given to reporters. The necessary reform is clear. Unable to safeguard this sensitive data, the NSA shouldn't be allowed to collect and store it.
  •  
    Remember Obama's famous, "No one is reading your emails" line. Either he had inadequately investigated the truth of that statement or he was lying. 
Paul Merrell

A Zombie Bill Comes Back to Life: A Look at The Senate's Cybersecurity Information Shar... - 0 views

  • The Senate Intelligence Committee recently introduced the Cybersecurity Information Sharing Act of 2014. It’s the fourth time in four years that Congress has tried to pass "cybersecurity" legislation. Unfortunately, the newest Senate bill is one of the worst yet. Cybersecurity bills aim to facilitate information sharing between companies and the government, but they always seem to come with broad immunity clauses for companies, vague definitions, and aggressive spying powers. Given such calculated violence to users' privacy rights, it’s no surprise that these bills fail every year. What is a surprise is that the bills keep coming back from the dead. Last year, President Obama signed Executive Order 13636 (EO 13636) directing the Department of Homeland Security (DHS) to expand current information sharing programs that are far more privacy protective than anything seen in recent cybersecurity bills. Despite this, members of Congress like Rep. Mike Rogers and Senator Dianne Feinstein keep on introducing bills that would destroy these privacy protections and grant new spying powers to companies.
  • Aside from its redundancy, the Senate's bill grants two new authorities to companies. First, the bill authorizes companies to launch countermeasures for a "cybersecurity purpose" against a "cybersecurity threat." "Cybersecurity purpose" is so broadly defined that it means almost anything related to protecting (including physically protecting) an information system, which can be a computer or software. The same goes for a "cybersecurity threat," which includes anything that "may result" in an unauthorized effort to impact the availability of the information system. Combined, the two definitions could be read by companies to permit attacks on machines that unwittingly contribute to network congestion. The countermeasures clause will increasingly militarize the Internet—a prospect that may appeal to some "active defense" (aka offensive) cybersecurity companies, but does not favor the everyday user. Second, the bill adds a new authority for companies to monitor information systems to protect an entity's rights or property. Here again, the broad definitions could be used in conjunction with the monitoring clause to spy on users engaged in potentially innocuous activity. Once collected, companies can then share the information, which is also called “cyber threat indicators,” freely with government agencies like the NSA.
  • Such sharing will occur because under this bill, DHS would no longer be the lead agency making decisions about the cybersecurity information received, retained, or shared to companies or within the government. Its new role in the bill mandates DHS send information to agencies like the NSA—"in real-time and simultaneous[ly]." DHS is even barred from "delay[ing]" or "interfer[ing]" with the information, which ensures that DHS's current privacy protections won’t be applied to the information. The provision is ripe for improper and over-expansive information sharing. This leads to a question: What stops your sensitive personal information from being shared by companies to the government? Almost nothing. Companies must only remove personally identifiable information if the information is known to be US person information and not directly related to the threat. Such a willful blindness approach is inappropriate. Further, the bill does not even impose this weak minimization requirement on information shared by, and within, the government (including federal, state, local, and tribal governments) thereby allowing the government to share information containing personally identifiable information. The bill should require deletion of all information not directly related to a threat.
  • ...2 more annotations...
  • Once the information is sent to a government agency, it can use the information for reasons other than for cybersecurity purposes. One clause even allows the information to be used to prosecute violations of the Espionage Act—a World War I era law that was meant to prosecute spies but has been used in recent years primarily to go after journalists’ sources. The provisions grant the government far too much leeway in how to use the information for non-cybersecurity purposes. The public won’t even know what information is being collected, shared, or used because the bill will exempt all of it from disclosure under the Freedom of Information Act.
  • The bill also retains near-blanket immunity for companies to monitor information systems, to share information, and to use countermeasures. The high bar immunizes an incredible amount of activity, including negligent damage to property and may deprive private entities of legal recourse if a computer security contractor is at fault for destruction of property. Existing private rights of action for violations of the Wiretap Act, Stored Communications Act, and the Computer Fraud and Abuse Act would be precluded or at least sharply restricted by the clause. It remains to be seen why such immunity is needed when just a few months ago, the FTC and DOJ noted they would not prosecute companies for sharing such information. It's also unclear because we continue to see companies freely share information among each other and with the government both publicly via published reports and privately.
Paul Merrell

Tomgram: Engelhardt, Who Rules Washington? | TomDispatch - 0 views

  • As every schoolchild knows, there are three check-and-balance branches of the U.S. government: the executive, Congress, and the judiciary. That’s bedrock Americanism and the most basic high school civics material. Only one problem: it’s just not so. During the Cold War years and far more strikingly in the twenty-first century, the U.S. government has evolved.  It sprouted a fourth branch: the national security state, whose main characteristic may be an unquenchable urge to expand its power and reach.  Admittedly, it still lacks certain formal prerogatives of governmental power.  Nonetheless, at a time when Congress and the presidency are in a check-and-balance ballet of inactivity that would have been unimaginable to Americans of earlier eras, the Fourth Branch is an ever more unchecked and unbalanced power center in Washington.  Curtained off from accountability by a penumbra of secrecy, its leaders increasingly are making nitty-gritty policy decisions and largely doing what they want, a situation illuminated by a recent controversy over the possible release of a Senate report on CIA rendition and torture practices.
  • All of this is or should be obvious, but remains surprisingly unacknowledged in our American world. The rise of the Fourth Branch began at a moment of mobilization for a global conflict, World War II.  It gained heft and staying power in the Cold War of the second half of the twentieth century, when that other superpower, the Soviet Union, provided the excuse for expansion of every sort.  Its officials bided their time in the years after the fall of the Soviet Union, when “terrorism” had yet to claim the landscape and enemies were in short supply.  In the post-9/11 era, in a phony “wartime” atmosphere, fed by trillions of taxpayer dollars, and under the banner of American “safety,” it has grown to unparalleled size and power.  So much so that it sparked a building boom in and around the national capital (as well as elsewhere in the country).  In their 2010 Washington Post series “Top Secret America,” Dana Priest and William Arkin offered this thumbnail summary of the extent of that boom for the U.S. Intelligence Community: “In Washington and the surrounding area,” they wrote, “33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings -- about 17 million square feet of space.”  And in 2014, the expansion is ongoing.
  • In this century, a full-scale second “Defense Department,” the Department of Homeland Security, was created.  Around it has grown up a mini-version of the military-industrial complex, with the usual set of consultants, K Street lobbyists, political contributions, and power relations: just the sort of edifice that President Eisenhower warned Americans about in his famed farewell address  in 1961.  In the meantime, the original military-industrial complex has only gained strength and influence. Increasingly, post-9/11, under the rubric of “privatization,” though it should more accurately have been called “corporatization,” the Pentagon took a series of crony companies off to war with it.  In the process, it gave “capitalist war” a more literal meaning, thanks to its wholesale financial support of, and the shrugging off of previously military tasks onto, a series of warrior corporations. Meanwhile, the 17 members of the U.S. Intelligence Community -- yes, there are 17 major intelligence outfits in the national security state -- have been growing, some at prodigious rates.  A number of them have undergone their own versions of corporatization, outsourcing many of their operations to private contractors in staggering numbers, so that we now have “capitalist intelligence” as well.  With the fears from 9/11 injected into society and the wind of terrorism at their backs, the Intelligence Community has had a remarkably free hand to develop surveillance systems that are now essentially “watching” everyone -- including, it seems, other branches of the government.
  • ...4 more annotations...
  • From the Pentagon to the Department of Homeland Security to the labyrinthine world of intelligence, the rise to power of the national security state has been a spectacle of our time.  Whenever news of its secret operations begins to ooze out, threatening to unnerve the public, the White House and Congress discuss “reforms” which will, at best, modestly impede the expansive powers of that state within a state.  Generally speaking, its powers and prerogatives remain beyond constraint by that third branch of government, the non-secret judiciary.  It is deferred to with remarkable frequency by the executive branch and, with the rarest of exceptions, it has been supported handsomely with much obeisance and few doubts by Congress. And also keep in mind that, of the four branches of government, only two of them -- an activist Supreme Court and the national security state -- seem capable of functioning in a genuine policymaking capacity at the moment.
  • In that light, let’s turn to a set of intertwined events in Washington that have largely been dealt with in the media as your typical tempest in a teapot, a catfight among the vested and powerful.  I’m talking about the various charges and countercharges, anger, outrage, and irritation, as well as news of acts of seeming illegality now swirling around a 6,300-page CIA “torture report” produced but not yet made public by the Senate Intelligence Committee.  This ongoing controversy reveals a great deal about the nature of the checks and balances on the Fourth Branch of government in 2014.
  • Fourteen years into the twenty-first century, we’re so used to this sort of thing that we seldom think about what it means to let the CIA -- accused of a variety of crimes -- be the agency to decide what exactly can be known by the public, in conjunction with a deferential White House.  The Agency’s present director, it should be noted, has been a close confidant and friend of the president and was for years his key counterterrorism advisor.  To get a sense of what all this really means, you need perhaps to imagine that, in 2004, the 9/11 Commission was forced to turn its report over to Osama bin Laden for vetting and redaction before releasing it to the public.  Extreme as that may sound, the CIA is no less a self-interested party. And this interminable process has yet to end, although the White House is supposed to release something, possibly heavily redacted, as early as this coming week or perhaps in the dog days of August.
  • The fact is that, for the Fourth Branch, this remains the age of impunity.  Hidden in a veil of secrecy, bolstered by secret law and secret courts, surrounded by its chosen corporations and politicians, its power to define policy and act as it sees fit in the name of American safety is visibly on the rise.  No matter what setbacks it experiences along the way, its urge to expand and control seems, at the moment, beyond staunching.  In the context of the Senate’s torture report, the question at hand remains: Who rules Washington?
  •  
    The indefatigable and perceptive Tom Englehardt finds formally secret features of the Dark State revealed in the ongoing political jockeying involving the CIA's torture, black prisons, and extarordinary rendition program. 
metroskor

Casilas Kecewa Dengan Ancelotti - Berita Bola Metro - 0 views

  •  
    Berita Bola Metro - Setelah mengalahkan Basel pada Matchday ke lima dalam ajang Liga Champions di beritakan Casilas kecewa dengan Ancelotti
Paul Merrell

Israeli Drone Feeds Hacked By British and American Intelligence - 0 views

  • MERICAN AND BRITISH INTELLIGENCE secretly tapped into live video feeds from Israeli drones and fighter jets, monitoring military operations in Gaza, watching for a potential strike against Iran, and keeping tabs on the drone technology Israel exports around the world. Under a classified program code-named “Anarchist,” the U.K.’s Government Communications Headquarters, or GCHQ, working with the National Security Agency, systematically targeted Israeli drones from a mountaintop on the Mediterranean island of Cyprus. GCHQ files provided by former NSA contractor Edward Snowden include a series of “Anarchist snapshots” — thumbnail images from videos recorded by drone cameras. The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones.
  • Several of the snapshots, a subset collected in 2009 and 2010, appear to show drones carrying missiles. Although they are not clear enough to be conclusive, the images offer rare visual evidence to support reports that Israel flies attack drones — an open secret that the Israeli government won’t acknowledge. “There’s a good chance that we are looking at the first images of an armed Israeli drone in the public domain,” said Chris Woods, author of Sudden Justice, a history of drone warfare. “They’ve gone to extraordinary lengths to suppress information on weaponized drones.” The Intercept is publishing a selection of the drone snapshots in an accompanying article.
  • Additionally, in 2012, a GCHQ analyst reported “regular collects of Heron TP carrying weapons,” referring to a giant drone made by the state-owned Israel Aerospace Industries, known as IAI. Anarchist operated from a Royal Air Force installation in the Troodos Mountains, near Mount Olympus, the highest point on Cyprus. The Troodos site “has long been regarded as a ‘Jewel in the Crown’ by NSA as it offers unique access to the Levant, North Africa, and Turkey,” according to an article from GCHQ’s internal wiki. Last August, The Intercept published a portion of a GCHQ document that revealed that NSA and GCHQ tracked weapons signals from Troodos, and earlier reporting on the Snowden documents indicated that the NSA targeted Israeli drones and an Israeli missile system for tracking, but the details of the operations have not been previously disclosed. “This access is indispensable for maintaining an understanding of Israeli military training and operations and thus an insight to possible future developments in the region,” a GCHQ report from 2008 enthused. “In times of crisis this access is critical and one of the only avenues to provide up to the minute information and support to U.S. and Allied operations in the area.”
  • ...1 more annotation...
  • The documents highlight the conflicted relationship between the United States and Israel and U.S. concerns about Israel’s potentially destabilizing actions in the region. The two nations are close counterterrorism partners, and have a memorandum of understanding, dating back to 2009, that allows Israel access to raw communications data collected by the NSA. Yet they are nonetheless constantly engaged in a game of spy versus spy. Last month, the Wall Street Journal reported that, although President Obama had pledged to stop spying on friendly heads of state, the White House carved out an exception for Israeli Prime Minister Benjamin Netanyahu and other top Israeli officials. Michael Hayden, former head of the CIA and NSA, told the Journal that the intelligence relationship with Israel was “the most combustible mixture of intimacy and caution that we have.”
Paul Merrell

Putin Throws Down the Gauntlet - 0 views

  • Would you be willing to defend your country against a foreign invasion? That’s all Putin is doing in Syria. He’s just preempting the tidal wave of jihadis that’ll be coming his way once the current fracas is over.  He figures it’s better to exterminate these US-backed maniacs in Syria now than face them in Chechnya, St Petersburg and Moscow sometime in the future.  Can you blame him? After all, if Washington’s strategy works in Syria, then you can bet they’ll try the same thing in Beirut, Tehran and Moscow. So what choice does Putin have? None. He has no choice.  His back is against the wall. He has to fight.  No one in Washington seems to get this. They think Putin can throw in the towel and call it “quits” at the first sign of getting bogged down. But he can’t throw in the towel because Russia’s facing an existential crisis.  If he loses, then Russia’s going to wind up on the same scrap heap as Afghanistan, Iraq or Libya. You can bet on it. So the only thing he can do is win. Period. Victory isn’t an option, it’s a necessity.
  • Of course they’ve noticed. Everyone’s noticed. Everyone knows Washington is on the warpath and its leaders have gone stark raving mad. How could they not notice? But all that’s done is focus the mind on the task at hand, and the task at hand is to whoop the tar out of the terrorists, put an end to Washington’s sick little jihadi game, and go home. That’s Russia’s plan in a nutshell.  No one is trying to cobble together the long-lost Soviet empire. That’s pure bunkum.  Russia just wants to clean up this nest of vipers and call it a day. There’s nothing more to it than that. But what if the going gets tough and Syria becomes a quagmire? That doesn’t change anything, because Russia still has to win. If that means sending ground troops to Syria, then that’s what Putin will do. If that means asymmetrical warfare, like arming the Kurds or the Yemenis, or the Taliban or even disparate anti-regime Shiites in Saudi Arabia, then he’ll do that too. Whatever it takes. This isn’t a game, it’s a fight for survival; Russia’s survival as a sovereign country. That’s what the stakes are. That’s not something Putin takes lightly.
  • The reason I ask this now is because, on Tuesday, Secretary of State John Kerry is scheduled to attend an emergency meeting in Moscow with his Russian counterpart Sergei Lavrov to discuss issues that are too sensitive to reveal to the public. There’s a lot of speculation about what the two men will talk about, but the urgency and the secrecy of the meeting suggests that the topic will be one of great importance. So allow me to make a guess about what the topic will be. When Kerry arrives in Moscow tomorrow he’ll be rushed to meeting room at the Kremlin where he’ll be joined by Lavrov, Putin, Minister of Defense Sergey Shoygu and high-ranking members from military intelligence. Then, following the initial introductions, Kerry will be shown the evidence Russian intelligence has gathered on last Sunday’s attack on a Syrian military base east of Raqqa that killed three Syrian soldiers and wounded thirteen others. The Syrian government immediately condemned the attack and accused US warplanes of conducting the operation. Later in the day,  Putin delivered an uncharacteristically-harsh and threatening statement that left no doubt that he thought the attack was a grave violation of the accepted rules of engagement and, perhaps, a declaration of war.
  • ...4 more annotations...
  • Why would an incident in the village of Ayyash in far-flung Deir Ezzor Province be so important that it would bring the two nuclear-armed adversaries to the brink of war? I’ll tell you why: It’s because there were other incidents prior to the bombing in Ayyash that laid the groundwork for the current clash. There was the ISIS downing of the Russian airliner that killed 224 Russian civilians. Two weeks after that tragedy, Putin announced at the G-20 meetings that he had gathered intelligence proving that 40 countries –including some in the G-20 itself–were involved in the funding and supporting of ISIS. This story was completely blacked out in the western media and, so far, Russia has not revealed the names of any of the countries involved. So, I ask you, dear reader, do you think the United States is on that list of ISIS supporters?
  • Then there was the downing of the Russian Su-24, a Russian bomber that was shot down by Turkish F-16s while it was carrying out its mission to exterminate terrorists in Syria. Many analysts do not believe that the   Su-24 could have been destroyed without surveillance and logistical support provided by US AWACs or US satellites. Many others scoff at the idea that Turkey would engage in such a risky plan without the go-ahead from Washington. Either way, the belief that Washington was directly involved in the downing of a Russian warplane is widespread. So, I ask you, dear reader, do you think Washington gave Turkey the greenlight? Finally, we have the aerial attack on the Syrian military base in Deir Ezzor, an attack that was either executed by US warplanes or US-coalition warplanes. Not only does the attack constitute a direct assault on the Russian-led coalition (an act of war) but the bombing raid was also carried out in tandem  with a “a full-scale ISIS offensive on the villages of Ayyash and Bgelia.”  The coordination suggests that either the US or US allies were providing  air-cover for ISIS terrorists to carry out their ground operations.  Author Alexander Mercouris– who is certainly no conspiracy nut–expands on this idea in a recent piece at Russia Insider which provides more detail on the incident. The article begins like this:
  • “Did Members of the US-Led Coalition Carry Out an Air Strike to Help ISIS? Russia Implies They Did. Russian statement appears to implicate aircraft from two member states of the US led coalition in the air strike on the Syrian military base in Deir az-Zor….This information – if it is true – begs a host of questions. Firstly, the Syrian military base that was hit by the air strike was apparently the scene of a bitter battle between the Syrian military and the Islamic State.  It seems that shortly after the air strike – and most probably as a result of it – the Islamic State’s fighters were able to storm it. Inevitably, that begs the question of whether the aircraft that carried out the air strike were providing air support to the fighters of the Islamic State. On the face of it, it looks like they were. After all, if what happened was simply a mistake, it might have been expected that the US and its allies would say as much.  If so, it is an extremely serious and worrying development, suggesting that some members of the US-led anti-Islamic State coalition are actually in league with the Islamic State.  (“Did Members of the US-Led Coalition Carry Out an Air Strike to Help ISIS?” Alexander Mercouris, Russia Insider)
  • So there it is in black and white. The Russians think someone in the US-led coalition is teaming up with ISIS. That should make for some interesting conversation when Kerry sashays into the Kremlin today. Does Kerry have any clue that Putin and his lieutenants are probably going to produce evidence that coalition warplanes were involved in the bombing of the Syrian military base?  How do you think he’ll respond to that news? Will he apologize or just stand there dumbstruck? And how will he react when Putin tells him that if a similar incident takes place in the future, Russian warplanes and anti-aircraft units are going to shoot the perpetrator down? If I am not mistaken, Kerry is in for a big surprise on Tuesday. He’s about to learn that Putin takes war very seriously and is not going to let Washington sabotage his plans for success. If Kerry’s smart, he’ll pass along that message to Obama and tell him he needs to dial it down a notch if he wants to avoid a war with Russia.
  •  
    Article published just before Kerry's meeting with Lavrov, et al, after which Kerry announced that Assad stepping down is no longer a U.S. pre-condition of negotiating peace in Syria. It's important to keep in mind here that non-interference in the internal affairs of foreign nations is a fundamental tenet of international law, one that the U.S. regime change position on Syria openly flouted, as it did in Afghanistan, Iraq, and Libya. So what is behind Kerry's suddenly-acquired respect for the right of the people of Syria to choose their own leader? Mike Whitney offers us a smorgasbord of reasons in this article, all of which boil down to Russian blackmail, a threat to go public with incredibly damning information on what the U.S. and allies have been up to in Syria. This may be a turning point in the Syrian War, since the positions of the Gulf Coast Council (Saudi Arabia, Qatar, UAE, etc.) and the salafist jihadis they have supplied to take down Assad has been unequivocal insistence that Assad agree to step down as a precondition of negotiation.  I.e., the U.S. is forking away from the Gulf Coast Council/jihadi position. How will they react? 
Paul Merrell

Hersh Vindicated? Turkish Whistleblowers Corroborate Story on False Flag Sarin Attack i... - 0 views

  • This is quite the bombshell delivered by two CHP deputies in the Turkish parliament and reported by Today’s Zaman, one of the top dailies in Turkey. It supports Seymour Hersh’s reporting that the notorious sarin gas attack at Ghouta was a false flag orchestrated by Turkish intelligence in order to cross President Obama’s chemical weapons “red line” and draw the United States into the Syria war to topple Assad. If so, President Obama deserves credit for “holding the line” against the attack despite the grumbling and incitement of the Syria hawks at home and abroad. And it also presents the unsavory picture of an al-Qaeda operatives colluding with ISIL in a war crime that killed 1300 civilians.
  • I find the report credible, taking into full account the fact that the CHP (Erdogan’s center-left Kemalist rivals) and Today’s Zaman (whose editor-in-chief, Bulent Kenes was recently detained on live TV for insulting Erdogan in a tweet) are on the outs with Erdogan. Considering the furious reaction it can be expected to elicit from Erdogan and the Turkish government, the temerity of CHP and Today’s Zaman in running with this story is a sign of how desperate their struggle against Erdogan has become.  Note that the author is shown only as “Columnist: Today’s Zaman”. I expect the anti-Erodgan forces hope this will be a game changer in terms of U.S.and European support for Erdogan. It will be very interesting to see if and how the media in the U.S. covers this story.  In case it doesn’t acquire enough “legs” to make into US media, I attach the full Zaman piece below:
  • CHP deputies: Gov’t rejects probe into Turkey’s role in Syrian chemical attack Two deputies from the main opposition Republican People’s Party (CHP) have claimed that the government is against investigating Turkey’s role in sending toxic sarin gas which was used in an attack on civilians in Syria in 2013 and in which over 1,300 Syrians were killed. CHP deputies Eren Erdem and Ali Şeker held a press conference in İstanbul on Wednesday in which they claimed the investigation into allegations regarding Turkey’s involvement in the procurement of sarin gas which was used in the chemical attack on a civil population and delivered to the terrorist Islamic State in Iraq and the Levant (ISIL) to enable the attack was derailed. Taking the floor first, Erdem stated that the Adana Chief Prosecutor’s Office launched an investigation into allegations that sarin was sent to Syria from Turkey via several businessmen. An indictment followed regarding the accusations targeting the government.
  • ...4 more annotations...
  • “The MKE [Turkish Mechanical and Chemical Industry Corporation] is also an actor that is mentioned in the investigation file. Here is the indictment. All the details about how sarin was procured in Turkey and delivered to the terrorists, along with audio recordings, are inside the file,” Erdem said while waving the file. Erdem also noted that the prosecutor’s office conducted detailed technical surveillance and found that an al-Qaeda militant, Hayyam Kasap, acquired sarin, adding: “Wiretapped phone conversations reveal the process of procuring the gas at specific addresses as well as the process of procuring the rockets that would fire the capsules containing the toxic gas. However, despite such solid evidence there has been no arrest in the case. Thirteen individuals were arrested during the first stage of the investigation but were later released, refuting government claims that it is fighting terrorism,” Erdem noted. Over 1,300 people were killed in the sarin gas attack in Ghouta and several other neighborhoods near the Syrian capital of Damascus, with the West quickly blaming the regime of Bashar al-Assad and Russia claiming it was a “false flag” operation aimed at making US military intervention in Syria possible.
  • Suburbs near Damascus were struck by rockets containing the toxic sarin gas in August 2013. The purpose of the attack was allegedly to provoke a US military operation in Syria which would topple the Assad regime in line with the political agenda of then-Prime Minister Recep Tayyip Erdoğan and his government. CHP deputy Şeker spoke after Erdem, pointing out that the government misled the public on the issue by asserting that sarin was provided by Russia. The purpose was to create the perception that, according to Şeker, “Assad killed his people with sarin and that requires a US military intervention in Syria.”
  • He also underlined that all of the files and evidence from the investigation show a war crime was committed within the borders of the Turkish Republic. “The investigation clearly indicates that those people who smuggled the chemicals required to procure sarin faced no difficulties, proving that Turkish intelligence was aware of their activities. While these people had to be in prison for their illegal acts, not a single person is in jail. Former prime ministers and the interior minister should be held accountable for their negligence in the incident,” Şeker further commented. Erdem also added that he will launch a criminal complaint against those responsible, including those who issued a verdict of non-prosecution in the case, those who did not prevent the transfer of chemicals and those who first ordered the arrest of the suspects who were later released.
  • UN Secretary-General Ban Ki-moon announced in late August that an inquiry had been launched into the gas attacks allegedly perpetuated by both Assad’s Syrian regime and rebel groups fighting in Syria since the civil war erupted in 2011. However, Erdem is not the only figure who has accused Turkey of possible involvement in the gas attack. Pulitzer Prize winner and journalist, Seymour M. Hersh, argued in an article published in 2014 that MİT was involved with extremist Syrian groups fighting against the Assad regime. In his article, Hersh said Assad was not behind the attack, as claimed by the US and Europe, but that Turkish-Syrian opposition collaboration was trying to provoke a US intervention in Syria in order to bring down the Assad regime.
Paul Merrell

FBI Can Neither Confirm Nor Deny Trump Tower Wiretap - 0 views

  • In response to a Freedom of Information Act (FOIA) request filed by Shadowproof, the Federal Bureau of Investigation (FBI) said it “can neither confirm nor deny the existence of records” regarding a wiretap of Trump Tower. The FBI sent its response via email earlier this afternoon, hours before news broke that the United States government wiretapped President Trump’s former campaign chairman, Paul Manafort. The Bureau’s response appears to be a reversal from its response to an earlier FOIA request, in which the Department of Justice stated that “Both FBI and NSD confirm that they have no records related to wiretaps as described by the March 4, 2017 tweets [in which Trump alleged President Obama had wiretapped Trump Tower]”. CNN reported today that U.S. investigators employed secret court orders to wiretap Manafort, both prior to and following the election. Though Manafort owns an apartment in Trump Tower, the report by CNN did not make clear whether that was the location or subject of the wiretap.
« First ‹ Previous 361 - 368 of 368
Showing 20 items per page