Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged States-Rights

Rss Feed Group items tagged

Paul Merrell

Lt. Gen. Bogdan Hedges on Operational Testing - 0 views

  • Several weeks ago, the Project On Government Oversight announced its cautious optimism upon learning the Director of Operational Test & Evaluation (DOT&E) planned to conduct a close air support (CAS) fly-off between the proven A-10 and the yet-to-be proved F-35. The cautious aspect of that optimism has been proven to be warranted. Under questioning by Representative Martha McSally (R-AZ), a former A-10 pilot, F-35 program executive officer Lt. Gen. Christopher Bogdan (USAF) dismissed the idea of a comparative test as irrelevant. The exchange occurred during a House Armed Services subcommittee hearing on updates to the Joint Strike Fighter program. General Bogdan’s remarks echo earlier comments by Air Force Chief of Staff Gen. Mark Welsh, who described the proposed test as a “silly exercise.” Dr. Michael Gilmore, Director of Operational Test & Evaluation, said in late August, “The comparison tests on the close-air support mission will reveal how well the F-35 performs and whether there are gaps, or improvements in capability, compared to the A-10.”
  • When asked by Rep. McSally to comment about the comparative tests, Lt. Gen. Bogdan acknowledged the F-35 would not do as well as the A-10 in such a test. He smugly compared the test to a decathlete competing against a champion sprinter in a 100 meter race. “I don’t have to run that race to know who is going to win it,” he said. “What I prefer to do is test the F-35 in its close air support role as the Air Force sees the requirements for that mission for the F-35,” the General said. The test envisioned by the Air Force would be conducted in the manner it wants to conduct close air support missions in the future, not in the way decades of experience has proven it must be conducted in order to be effective on the battlefield. The Air Force wants these missions to be conducted from high altitudes using digital communications and precision munitions. In other words, it wants to accomplish the mission only through high-tech means from a distance, rather than getting low to the ground where pilots and ground controllers are able to coordinate in a way which has been used to great effect for decades.
  • In a recent documentary, an A-10 pilot talked about the sensors available to help them correlate targets on the ground to ensure a precision strike. But in nearly the same breath, he described their shortcomings as well. “That will never replace just looking right, outside of my cockpit and looking at the battlespace. What am I seeing out there, big-picture?” That level of situational awareness only develops when a pilot is able to fly low and slow over the battlefield.  That will be lost by F-35 pilots who will be restricted to much higher altitudes and speed. They will be forced there because, as Michael Gilmore said while testifying at an earlier hearing, “The (F-35) has some vulnerabilities that you would expect a high performance aircraft to have. The A-10 is going to be able to, can take, hits an F-35 couldn’t take.” The United States has already been through this process before and learned painful and expensive lessons by ignoring proven methods of designing effective weapons systems. Pierre Sprey, a veteran of many bureaucratic battles while designing effective aircraft, says the correct approach to this process is to first understand the mission the system is to perform: you’ve “got to start with what really happens in combat,” Sprey said in a recent interview.
  • ...2 more annotations...
  • Sprey, one of the principle designers of the A-10, said an effective close air support aircraft is one that can “be able to get in close enough to see [friendly troops on the ground] and what they’re opposing and what their dangers are, how they’re about to be ambushed, what tanks they’re facing, what machine gun nests they’re facing.” “You come flashing by there at 500 miles an hour, you’re hopeless and useless,” Sprey said, referring to traditional fighters designed for air-to-air combat. He and the rest of the A-10 design team began that process by interviewing many veteran pilots with experience flying CAS missions. They then matched technology with the way the aircraft would actually be used. This was a radical approach then, and now. What Lt. Gen. Bogdan admitted in his testimony was the F-35 has been engineered to incorporate favored technology. The technology is dictating how troops will be able to fight rather than battlefield experience shaping the technology incorporated in the aircraft. Rep. McSally sees dangers ahead with such an approach. “I think us envisioning that we’re never going to have close air support where guys are on the run, they’re out of ammo, they’re doing a mirror flash into your eye, they don’t have time to do stand-off CAS because of the conflict circumstances, if we think that’s never going to happen again, I think we’re lying to ourselves.”
  • The debate about the proposed tests will continue for some time. The F-35 is still years away from having the ability to go through these tests because the software needed to employ the necessary weapons will not be complete until 2017 at the earliest. In the intervening years, it is essential for Congress to continue reaffirming annually its commitment to the troops on the ground by mandating a completely intact A-10 force until another platform is proven to perform this vital mission at least as well as the Warthog.
  •  
    The A-10 has one major vulnerability; it's bought and paid for. Defense contractors don't get paid as much to manufacture spare parts for it as they are getting from the F-35 program, the most expensive weapons platform in U.S. history. But the F-35 can't do close air support, something the A-10 excels at. But Air Force generals are willing to have troops on the ground be killed to keep the F-35 boondoggle going. They've tried to retire the A-10 repeatedly, only to be blocked by members of Congress who understand the importance of the ground support mission. "By 2014, the program was "$163 billion over budget [and] seven years behind schedule."[19] Critics further contend that the program's high sunk costs and political momentum make it "too big to kill." https://en.wikipedia.org/wiki/Lockheed_Martin_F-35_Lightning_II
Paul Merrell

Erdogan Government Arrests Turkish Generals for Stopping Syria-Bound Trucks "Filled Wit... - 0 views

  • Two Turkish generals and a colonel were detained on Saturday for intercepting Syria-bound trucks that belonged to Turkey’s National Intelligence Organization (MIT), the newspaper Today’s Zaman reported. In January 2014, Ankara Gendarmerie Major-General Ibrahim Aydin, former Adana Gendarmerie Brigadier-General Hamza Celepoglu and former Gendarmerie Criminal Laboratory Head Colonel Burhanettin Cihangiroglu stopped Syrian-bound trucks in southern Turkey after they received information from an anonymous source that the trucks were illegally carrying weapons to militants in Syria. When the information about the trucks became public, MIT officials and high-ranking Turkish politicians, including President Recep Teyyip Erdogan, who was Prime Minister back then, and Prime Minister Ahmet Davutoglu, then the country’s foreign minister, were furious that the gendarmes stopped the trucks and said the Syria-bound trucks were carrying “humanitarian aid” to Turkmen living just south of Turkey, the newspaper said: “Yes, I’m saying this without any hesitation. That aid was going to the Turkmens. There will be a war next door and we will watch our Turkmen, Arab and Turkish brothers being massacred,” Davutoglu said, as cited by Today’s Zaman.
  • However, members of opposition parties and some Turkish media said the trucks were indeed transporting weapons to Islamic extremists in Syria. The gendarmes involved in the interception confirmed that the Syria-bound trucks weren’t going to an area where the Turkmen lived, but to an area populated by radical groups, the Turkish newspaper said. When an investigation into the MIT case was launched, the ruling Justice and Development Party (AKP) called the probe as “treason and espionage” on the part of prosecutors.
  • New developments on the issue took place recently. Last Tuesday, Erdogan answered claims previously made by critics, who said the trucks were filled with weapons, by sarcastically asking them: “What if the MIT trucks were filled with weapons?” Then on Saturday, contrary to his earlier claims that the MIT trucks were carrying humanitarian aid to Turkmen, Erdogan said the trucks were actually heading on their way to help the Free Syrian Army (FSA). “They [the gendarmes who revealed the transfer] also exposed those going to the FSA in that way,” Erdogan said on Saturday while addressing his supporters in Balikesir, as cited by Today’s Zaman. Well, that’s getting pretty confusing — were the trucks delivering “humanitarian aid” to the Turkmen or the FSA then? Just make up your mind, Mr. Erdogan. Where the trucks were heading and what were they carrying after all? Meanwhile, some very high-ranking Turkish officials, including then-president Abdullah Gul, revealed that the Syria-bound trucks were a “state-secret,” leading to more speculations that the trucks were indeed filled with weapons. The recent developments are taking place in the wake of a major government crackdown on two Turkish journalists of the Cumhuriyet newspaper, Can Dunbar and Erdem Gul, who we arrested for covering a story and releasing pictures, claiming that Turkish trucks provided weapons to Syrian opposition rebels.
  • ...1 more annotation...
  • The reason why the Turkish government arrested the journalists is because Erdogan and his ruling party don’t want reporters to write about certain things, such as the government’s support of Syrian rebels, corruption and other important things that people should actually know about, human rights activist Arzu Geybulla said. Following the arrest of the journalists, who covered Erdogan’s “tender” topic, it looks like the Turkish President is trying to eliminate everyone who’s willing to speak up or reveal the fact that the Turkish government was helping out Islamic extremists in Syria.
Paul Merrell

IMF agrees to include China's RMB in benchmark SDR currency basket - 0 views

  • The International Monetary Fund agreed Monday to add the Chinese yuan to its reserve currency basket. The decision — which marks another step in China's global economic emergence — came after the IMF evaluated the Asian nation's standing as an exporter and the yuan's role as a "freely usable" currency. In a statement, IMF Managing Director Christine Lagarde noted the yuan's inclusion is a "clear representation of the reforms" taking place in China.
  • The addition of the yuan, or renminbi, will take effect next October. Lagarde and the United States had supported its inclusion in the basket, known as Special Drawing Rights (SDR). It will join the euro, yen, pound and dollar in the reserves basket. The yuan will have about an 11 percent weighting in the SDR.
  • The IMF said the yuan's inclusion will make the SDR more diverse and representative of the international community. The basket determines the currency mix countries like Greece receive when the IMF disburses financial aid. The decision to add the yuan will likely increase demand for the currency.
Paul Merrell

US Officially Threatens To Strike Syrian Army - 0 views

  • On March 12, US ambassador to the UN Nikki Haley actually threatened that the US will strike Syrian government forces if they don’t halt their operation against terrorists in Eastern Ghouta. “We also warn any nation that is determined to impose its will through chemical attacks and inhuman suffering, most especially the outlaw Syrian regime, the United States remains prepared to act if we must,” Haley said. The US diplomat proposed a new UN ceasefire resolution that “will take effect immediately upon adoption by this Council. It contains no counterterrorism loopholes for Assad, Iran and the Russians to hide behind”.
  • According to Haley, the previous resolution “failed” because it had allowed the Syrian Arab Army (SAA) and its allies to conduct operation in Eastern Ghouta against Hayat Tahrir al-Sham (formerly Jabhat al-Nusra, the Syrian branch of al-Qaeda) and other militant groups. Russian ambassador to the UN Vassily Nebenzia reacted by saying that Syria has all the legal right to fight terrorism near its capital. The US-drafted document was not put to the vote on March 12.
  •  
    With video. Don't believe a word the U.S. says about Syrian government use of chemical weapons. It's a false flag operation coming up to justify deeper U.S. intervention in Syria to rescue al-Nusrah fighters surrounded in Ghouta. Syria has no motive for using chemical weapons and every reason not to use them when it's winning the war. Hopefully Russia's warning that it will respond with military force against U.S. warplanes and naval forces if the U.S. attacks any Syrian site where Russian troops are located will give the Feds pause.
Paul Merrell

CIA Torture Architects Settle With Survivors Avoiding Publicity Of Trial - 0 views

  • Two psychologists, James Mitchell and Bruce Jessen, who were contracted by the CIA to develop torture techniques, agreed to a confidential settlement with torture survivors. The American Civil Liberties Union (ACLU) sued Mitchell and Jessen on behalf of Suleiman Abdullah Salim, Mohamed Ahmed Ben Soud, and the family of Gul Rahman. The lawsuit alleged the CIA contractors committed crimes that included water torture, forcing prisoners into boxes, and chaining prisoners in painful stress positions to walls.
  • Mitchell, Jessen, and plaintiffs agreed to release the following joint statement: Drs. Mitchell and Jessen acknowledge that they worked with the CIA to develop a program for the CIA that contemplated the use of specific coercive methods to interrogate certain detainees.” Plaintiff Gul Rahman was subjected to abuses in the CIA program that resulted in his death and in pain and suffering for his family. Plaintiffs Suleiman Abdullah Salim and Mohamed Ahmed Ben Soud were also subjected to coercive methods in the CIA program, which resulted in pain and suffering for them and their families. Plaintiffs assert that they were subjected to some of the methods proposed by Drs. Mitchell and Jessen to the CIA and stand by their allegations regarding the responsibility of Drs. Mitchell and Jessen. Drs. Mitchell and Jessen assert that the abuses of Mr. Salim and Mr. Ben Soud occurred without their knowledge or consent and that they were not responsible for those actions. Drs. Mitchell and Jessen also assert that they were unaware of the specific abuses that ultimately caused Mr. Rahman’s death and are also not responsible for those actions.” Drs. Mitchell and Jessen state that it is regrettable that Mr. Rahman, Mr. Salim, and Mr. Ben Soud suffered these abuses.
  • The settlement comes after Judge Justin Quackenbush denied a last-ditch effort by Mitchell and Jessen to get the lawsuit dismissed. They invoked the cases of accused Nazi war criminals to argue they should not be held responsible for the torture techniques they developed. Quackenbush was not persuaded by the contractors’ arguments and suggested a “finder of fact” might conclude that since they were at secret detention sites they “exercised significant control during individual interrogations.”
  • ...2 more annotations...
  • The settlement is monumental in the sense that James Mitchell and Bruce Jessen are the first individuals to be held responsible, to some degree, for CIA torture in the “War on Terrorism.” “This is a historic victory for our clients and the rule of law,” declared ACLU attorney Dror Ladin. “This outcome shows that there are consequences for torture and that survivors can and will hold those responsible for torture accountable. It is a clear warning for anyone who thinks they can torture with impunity.” However, the CIA investigated the actions of its personnel and determined not a single person committed a crime that deserved prosecution. President Barack Obama’s administration conducted a review of detention and interrogation practices, but they shied away from prosecuting any government officials or interrogators, who were implicated in carrying out torture.
  • The high point of public “accountability” was a study conducted by the Senate Select Committee on Intelligence. A summary of the report clearly established much of the extent to which the CIA carried out brutality against detainees and then sought to conceal it from those who might provide any kind of oversight. It was the Obama administration that opposed individuals, such as Ethiopian native Binyam Mohamed and Canadian citizen Maher Arar, as they sought to hold officials in President George W. Bush’s administration accountable. They took steps to prevent survivors from having their day in court, and that’s partly why the fact that this civil lawsuit nearly made it to trial was significant. With a U.S. president in office now who has praised waterboarding and other forms of torture, this is unlikely to be much of a deterrent on government officials who engage in torture or abuse. It may impact whether private contractors participate in the detention or interrogation of captives. Or it might lead private contractors to ensure there are more clearly laid out terms in contracts to prevent them from being held liable in courts. Still, the survivors achieved some semblance of justice, and given how rare any sliver of justice is when it comes to cases against people implicated in government-sponsored torture, this settlement is inarguably a remarkable outcome.
  •  
    I was hoping to see this case go to trial. Now I'm hoping for the ACLU to turn loose of all the documents they received in discovery.
Paul Merrell

Dennis Kucinich: New WikiLeaks reveal proof we are sliding down the slippery slope towa... - 0 views

  • The U.S. government must get a grip on the massive opening that the CIA, through its misfeasance, nonfeasance and malfeasance, has created. If Tuesday’s WikiLeaks document dump is authentic, as it appears to be, then the agency left open electronic gateways that make all Americans vulnerable to spying, eavesdropping and technological manipulation that could bring genuine harm. That the CIA has reached into the lives of all Americans through its wholesale gathering of the nation’s “haystack” of information has already been reported. It is bad enough that the government spies on its own people. It is equally bad that the CIA, through its incompetence, has opened the cyberdoor to anyone with the technological skills and connections to spy on anyone else. The constant erosion of privacy at the hands of the government and corporations has annihilated the concept of a “right to privacy,” which is embedded in the rationale of the First, Third, Fourth, Ninth and Fourteenth Amendments to the U.S. Constitution. It is becoming increasingly clear that we are sliding down the slippery slope toward totalitarianism, where private lives do not exist.
  • We have entered a condition of constitutional crisis that requires a full-throated response from the American people. I have repeatedly warned about the dangers of the Patriot Act and its successive iterations, the execrable national security letters that turn every FBI agent into a star chamberlain, the dangers of fear-based security policies eroding our republic. We have crossed the threshold of a cowardly new world, and it’s time we tell the government and the corporations who have intruded to stop it. 
Paul Merrell

Securing Our Digital Economy | Internet Society - 0 views

  • Germany wants G20 leaders to agree to a concrete plan – one that includes affordable Internet access across the world by 2025, common technical standards and a focus on digital learning. Today, the G20 economies, like so many other economies around the world, are digital and interconnected. Digital services have opened up new avenues for sustainable economic growth. But, the digital economy will only continue to thrive and generate opportunities for citizens if the Internet is strong, secure, and trusted. Without this foundation, the global digital economy is at risk. Currently, there are 360 million people that take part in cross-border e-commerce. 28% of output in mature economies is digital. The Internet is set to contribute $6.6 trillion a year, or 7.1% of the total GDP in the G20 countries. And, by 2020, it’s estimated that more than 1 billion users will be added and there will be 30-50 billion additional connected devices. This level of interconnection will only boost the market. However, this cannot happen without a serious commitment by all parties to security and privacy. The truth is that economies can only function within a secure and trusted environment. Which brings us to encryption. Strong encryption is an essential piece to the future of the world’s economy and the Internet Society believes it should be the norm for all online transactions. It allows us to do our banking, conduct local and global business, run our power grids, operate, communications networks, and do almost everything else.
  • Encryption is a technical building block for securing infrastructure, communications and information. It should be made stronger and universal, not weaker. However, rather than being recognized as the way to secure our online transactions or our conversations, all too often the debate focuses on the use of encryption as a way to thwart law enforcement. To undermine the positive role of encryption in the name of security could have devastating consequences. Many great minds have already devoted considerable effort to resolving the conundrum posed by competing public policy objectives: providing security, safety and trust on the one hand, and law enforcement and legitimate policy goals on the other. But, it is time to stop kicking the encryption football up and down the field. Instead, we should recognize that encryption is key to the future digital economy and stop treating it as simply an obstacle to law enforcement. We need to deconstruct the issues faced by law enforcement and policy makers and agree together how we can achieve a trusted digital economy underpinned by encryption. This is the first time the G20 countries are holding a Ministerial on digital matters. It is also the first time that the G20 is inviting non-government stakeholders to contribute to these issues. This is a turning point that should not be missed. All views, including the technical perspective, must be at the table if we are to achieve progress on the G20’s ICT goals. If the G20 countries are serious about strengthening their economies and continuing to deliver economic and social prosperity to their citizens in future, there are three key principles they should endorse and implement immediately:
  • 1. Encryption is an important technical foundation for trust in the digital economy and should be the norm. All users (whether government, business or individual) should use encryption to protect infrastructure, communications and the privacy and integrity of their data. Encryption technologies should be strengthened, not weakened. 2. The security of the digital economy is a shared responsibility that needs the expertise and experience of all stakeholders, across border and across disciplines. It is an urgent need that will require open, inclusive collaboration. 3. Users’ rights should be at the heart of any decisions related to the digital economy. They are both the customers and the contributors to the success of the digital economy. The Internet Society calls for ubiquitous encryption for the Internet. We strongly believe that this is the best foundation for trust in the digital economy, and we urge the G20 nations to stand behind encryption.
Paul Merrell

UK government is secretly planning to break encryption and spy on people's phones, reve... - 0 views

  • The UK government is secretly planning to force technology companies to build backdoors into their products, to enable intelligence agencies to read people’s private messages. A draft document leaked by the Open Rights Group details extreme new surveillance proposals, which would enable government agencies to spy on one in 10,000 citizens – around 6,500 people – at any one time.  The document, which follows the controversial Investigatory Powers Act, reveals government plans to force mobile operators and internet service providers to provide real-time communications of customers to the government “in an intelligible form”, and within one working day.
  • This would effectively ban encryption, an important security measure used by a wide range of companies, including WhatsApp and major banks, to keep people’s private data private and to protect them from hackers and cyber criminals. 
Paul Merrell

Senator Aims to End Phone Searches at Airports and Borders | Mother Jones - 0 views

  • More than a month after Sen. Ron Wyden (D-Ore.) requested information about US Customs and Border Protection's practice of searching cell phones at US borders and airports, he's still waiting for answers—but he's not waiting to introduce legislation to end the practice. "It's very concerning that [the Department of Homeland Security] hasn't managed to answer my questions about the number of digital searches at the border, five weeks after I requested that basic information," Wyden, a leading congressional advocate for civil liberties and privacy, told Mother Jones on Tuesday through a spokesman. "If CBP were to undertake a system of indiscriminate digital searches, that would distract CBP from its core mission, dragging time and attention away from catching the bad guys." Wyden's request to DHS and CBP came on the heels of a February 18 report from the Associated Press of a "fivefold increase" in electronic media searches in fiscal year 2016 over the previous year, from fewer than 5,000 to nearly 24,000. It also followed Homeland Security Secretary John Kelly's suggestion that visitors from a select group of countries, mainly Muslim, might be required to hand over passwords to their social media accounts as a condition of entry. (That comment came a week after President Donald Trump first unveiled his executive order⁠ banning travel from seven majority-Muslim countries.) The Knight First Amendment Institute, which advocates for freedom of speech, sued DHS on Monday for records relating to the seizure of electronic devices at border checkpoints. Wyden requested similar data on CBP device searches and demands for travelers' passwords. "There are well-established legal rules governing how law enforcement agencies may obtain data from social media companies and email providers," Wyden wrote in the February 20 letter to DHS and CBP. "By requesting a traveler's credentials and then directly accessing their data, CBP would be short-circuiting the vital checks and balances that exist in our current system." The senator wrote that the searches not only violate civil liberties but could reduce international business travel or force companies to outfit employees with "burner" laptops and mobile devices, "which some firms already use when employees visit nations like China."
  • "Folks are going to be less likely to travel freely to the US with the devices they need if they don't feel their sensitive business information is going to be safe at the border," Wyden said Tuesday, noting that CBP can copy the information it views on a device. "Then they can store that information and search it without a warrant." Wyden will soon introduce legislation to force law enforcement to obtain warrants before searching devices at the border. His bill would also prevent CBP from compelling travelers to reveal passwords to their accounts. A DHS spokesman said in a statement that "all travelers arriving to the US are subject to CBP inspection," which includes inspection of any electronic devices they may be carrying. Access to these devices, the spokesman said, helps CBP agents ascertain the identity and admissibility of people from other countries and "deter the entry of possible terrorists, terrorist weapons, controlled substances," and other prohibited items. "CBP electronic media searches," the spokesman said, "have resulted in arrests for child pornography, evidence helpful in combating terrorist activity, violations of export controls, convictions for intellectual property rights violations, and visa fraud discoveries." In a March 27 USA Today op-ed, Joseph B. Maher, DHS acting general counsel, compared device searches to searching luggage. "Just as Customs is charged with inspecting luggage, vehicles and cargo containers upon arrival to the USA, there are circumstances in this digital age when we must inspect an electronic device for violations of the law," Maher wrote.
  • But in a unanimous 2014 ruling, the Supreme Court found that police need warrants to search cell phones. Chief Justice John Roberts wrote in the opinion that cell phones are "such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy." In response to a Justice Department argument that cell phones were akin to wallets, purses, and address books, Roberts wrote: "That is like saying a ride on horseback is materially indistinguishable from a flight to the moon." The law, however, applies differently at the border because of the "border search doctrine," which has traditionally given law enforcement wider latitude under the Fourth Amendment to perform searches at borders and international airports. CBP says it keeps tight controls on its searches and is sensitive to personal privacy. Wyden isn't convinced. "Given Trump's worrying track record so far, and the ease with which CBP could change its guidelines, it's important we create common-sense statutory protections for Americans' liberty and security," he says.
  • ...1 more annotation...
  • Sophia Cope, a staff attorney with the Electronic Frontier Foundation who has written extensively about searches of electronic devices, says that searches of mobile devices appear to be on the rise. "They realized that people are carrying these devices with them all the time, it's just another thing for them to search," she says. "But also it does seem that after the executive order that they've been emboldened to do this even more." Wyden says that the data collection creates an opportunity for hackers. "Given how frequently hackers have stolen government information," he says, "I think a lot of Americans would be worried to know their whole lives could be sitting in a government database that's got a huge bull's-eye on it for hackers."
Paul Merrell

Syria: U.S. aircraft downs drone operated by "pro-regime forces" in al-Tanf - nsnbc int... - 0 views

  • A U.S. aircraft reportedly shot down an armed unmanned aerial vehicle after it fired on “coalition forces” in al-Tanf, in southern Syria, in the Iraq – Jordan – Syria tri-border region on June 8. The U.S. Defense Department considers the area with undefined parameters as a deconfliction zone, not to be confused with the de-escalation zones established after Russian, Turkish, Iranian and “opposition” talks in Astana.
  • A U.S. aircraft reportedly shot down an armed unmanned aerial vehicle after it fired on “coalition forces” in al-Tanf, in southern Syria, in the Iraq – Jordan – Syria tri-border region on June 8. The U.S. Defense Department considers the area with undefined parameters as a deconfliction zone, not to be confused with the de-escalation zones established after Russian, Turkish, Iranian and “opposition” talks in Astana.
  • The “coalition” stated that the air strike was conducted to protect Syrian rebels and coalition forces against Syrian Arab Army and allied forces. A statement was released, saying “The pro-regime UAV, similar in size to a U.S. MQ-1 Predator, was shot down by a U.S. aircraft after it dropped one of several weapons it was carrying near a position occupied by Coalition personnel who are training and advising partner ground forces in the fight against ISIS.” The engagement follows incidents on May 18 and on June 6. On May 18, according to USCENTCOM, the coalition carried out air strikes against an “Iranian controlled unit” that was “threatening coalition forces” in Al-Tanf, Syria. On June 6, at 17:40 a similar incident occurred, and USCENTCOM claimed again the right to “self-defense”.
« First ‹ Previous 1221 - 1230 of 1230
Showing 20 items per page