Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged U.S.-covert-forces

Rss Feed Group items tagged

Gary Edwards

The Qatari Deal To Hold The Taliban - The Qataris Have Been Used Before By President Ob... - 1 views

  • Three months, a naval fleet, 3,000 marines, one Billion dollars, and 450 cruise missiles later, it’s May 2011 and Obama had yet to ask for permission to engage in his offensive war from anyone but himself and the previously noted ‘club of the traveling pantsuits’. Despite the Office of Legal Council (the golfers own legal team) telling him approval is needed, he chose to violate the War Powers Act and more importantly the Constitution. It is critical to remember the political battle being waged at the time over whether President Obama had the authority to take “offensive military action”, without congressional approval,  when the threat was not against the United States. It’s critical because from that initial impetus you find the reason why arming the Libyan rebels had to be done by another method – because President Obama never consulted congress, nor sought permission.
  • Normally, in order to send arms to the rebels lawfully, President Obama would have to request approval from Congress. He did not want to do that.   Partly because he was arrogant, and partly because he did not want the politically charged fight that such a request would engage.  It would hamper his ability to take unilateral action in Libya.
  • So an alternate method of arming the rebels needed to be structured.    Enter the State Department, Hillary Clinton, and CIA David Petraeus. Weapons, specifically MANPADS or shoulder fired missiles, would be funneled to the Benghazi rebels by the State Dept, through the CIA under the auspices of ongoing NATO operations.   May, June, July, August, Sept, 2011 this covert process was taking place. It was this covert missile delivery process which later became an issue after Gaddafi was killed.    It was during the recovery of these missiles , and the redeployment/transfer to the now uprising “Syrian Rebels” when Ambassador Chris Stevens was killed on Sept. 11th 2012.
  • ...1 more annotation...
  • [O]n July 25, 2012, Taliban fighters in Kunar province successfully targeted a US Army CH-47 helicopter with a new generation Stinger missile. They thought they had a surefire kill. But instead of bursting into flames, the Chinook just disappeared into the darkness as the American pilot recovered control of the aircraft and brought it to the ground in a hard landing. The assault team jumped out the open doors and ran clear in case it exploded. Less than 30 seconds later, the Taliban gunner and his comrade erupted into flames as an American gunship overhead locked onto their position and opened fire. The next day, an explosive ordnance disposal team arrived to pick through the wreckage and found unexploded pieces of a missile casing that could only belong to a Stinger missile. Lodged in the right nacelle, they found one fragment that contained an entire serial number. The investigation took time. Arms were twisted, noses put out of joint. But when the results came back, they were stunning: The Stinger tracked back to a lot that had been signed out by the CIA recently, not during the anti-Soviet ­jihad. Reports of the Stinger reached the highest echelons of the US command in Afghanistan and became a source of intense speculation, but no action. Everyone knew the war was winding down. Revealing that the Taliban had US-made Stingers risked demoralizing coalition troops. Because there were no coalition casualties, government officials made no public announcement of the attack. My sources in the US Special Operations community believe the Stinger fired against the Chinook was part of the same lot the CIA turned over to the ­Qataris in early 2011, weapons Hillary Rodham Clinton’s State Department intended for anti-Khadafy forces in Libya. They believe the Qataris delivered between 50 and 60 of those same Stingers to the Taliban in early 2012, and an additional 200 SA-24 Igla-S surface-to-air missiles.  (link)
  •  
    The pieces of the puzzle are slowly coming together, and it isn't pretty. This article connects Qatar, Afghanistan and hero of Benghazi, to the fabulous five terrorist dream team Obama let out of the gitmo prison. Incredible story. excerpt: "How Our Stinger Missiles Wound Up In Afghanistan Being Used Against Our Own Troops: On February 15th 2011 a civil war erupted inside Libya.   Egyptian Islamists previously  freed from jail by the Muslim Brotherhood flooded into Eastern Libya and joined with their ideological counterparts.  al-Qaeda operatives hell bent on using the cover of the Arab Spring to finally rid themselves of their nemesis, Muammar Gaddafi. President Obama chose to ignore an outbreak of violence in Libya for 19 days.  Perhaps Obama was tentative from the criticism he and Hillary received over the mixed messaging in Egypt.  Regardless, eventually Obama was begged to engage himself by leaders from France, The United Kingdom, and Italy. The White House advisors (Emanuel, McDonough, Donolin, Jarrett, Axelrod, Plouffe) were more cautious this time.  Initially Obama ignored the EU requests and later chose to dispatch the Secretary of State, Hillary Clinton, to Europe to address their concerns. "Look, enough with the jokes shorty; you got us into this mess, now the turban heads are laughing at us"… "ah, bot of course, zeah av bullets, no? Vee ave to shoot" For the following 11 days American citizens, including State Dept. embassy officials, were trying to evacuate the country as vast swathes of the country erupted in bloodshed and violence, they became trapped in Tripoli.   A bloody national revolution was underway. The United Nations Security Council held urgent immediate emergency meetings to try to determine what to do.    However, the United States Ambassador to those meetings, Susan Rice, was not present.    She was attending a global warming summit in Africa. Without the U.S. present the United  Natio
Paul Merrell

US-Saudi Plan: Let 9,000 ISIS Fighters Walk Free from Mosul - to Fight in Syria - 0 views

  • Judging by both the words, and deeds of the Obama White House and its political ‘diplomatic’ appointees led by perfidious John Kerry and caustic Samantha Power – all evidence to date points to the US wanting to escalate its war on Syria – while happily baiting a military confrontation, and ‘World War‘ scenario with Russia and its allies in the process.  If this latest leak is indeed true – and time will certainly tell whether or not it is, it would constitute one of the most egregious violations of both US and international law – by the United States government and its theocratic dictator partner in Saudi Arabia. Washington’s own anti-terror legislation expressly forbids colluding to provide logistical or material support for terrorist groups, and this US-Saudi venture would be the latest in a long list of violations…
  • Here’s what makes this a potential shocker: the operation allows for safe passage for 9,000 ISIS fighters on the proviso that they are transferred from Iraq to eastern Syria in order to help US plans for “regime change” there.  “At the time of the assault, coalition aircraft would strike only on a pre-agreed detached buildings in the city, which are empty, the source said.” “According to him [the source], the plan of Washington and Riyadh also provides that the rebels move from Mosul to Syria for the attack on the government-controlled town of troops.” Essentially, Washington and Saudi Arabia, will allow 9,000 ISIS (Islamic State) fighter FREE passage into Syria if they agree to join Washington’s “regime change” operations there. This could also include, “… eastern regions of Syria to follow a major offensive operation, which involves the capture of Deir ez-Zor and Palmyra,” the source added. Before you write this story off as some ornate Russian psychological operation, consider the long trend arch. The US along with its generous Gulf sidekicks, have already established a solid track record of aiding and abetting ISIS – not just in Syria, but in Iraq too. The record shows that the US is guilty on a number of counts…
  • If the Mosul leak is true, then it wouldn’t be the first time that the US has provided cover in the military pantomime the world has come to know as “the fight against ISIS.” When large ISIS convoys crossed the Syrian desert to invade and occupy the ancient Syrian city of Palmyra in May 2015, the US ‘Coalition’ airforce did nothing, and allowed ISIS to take and destroy part of the world’s great historic cultural heritage, along with the murder of scores of innocent civilians. Professor Tim Anderson from Sydney University states: “U.S. weapons with Israeli ammunition were used by Islamic State group when taking over Palmyra. The extremists also had U.S. military rations.” “The U.S., which since 2014 claimed to be conducting a war against ISIS in Iraq and Syria, and which had air power and sophisticated surveillance of the region, did nothing to stop the huge ISIS advance on Palmyra.” The US isn’t even shy about its laissez-faire policy with ISIS in the field, with the New York Times openly boasting, “Any airstrikes against Islamic State militants in and around Palmyra would probably benefit the forces of President Bashar al-Assad. So far, United States-led airstrikes in Syria have largely focused on areas far outside government control, to avoid the perception of aiding a leader whose ouster President Obama has called for.”
  • ...4 more annotations...
  • More importantly however, is what kind of message an US statement like that sends to ISIS, as well as Al Nusra and other terrorist brigades inside Syria, which is basically, “we do not need to worry about US air strikes, only Syrian Army and Russian strikes.” This situation really sums up the utter fraud and contempt of the US deception in Syria, and it’s no surprise that the Russian Foreign Ministry are reticent to extend themselves any more where the US is concerned. Then, in March 2016, when ISIS fled Palmyra, back across the desert towards Deir ez-Zor and Raqqa – the great and powerful US ‘Coalition’ airforce actually helped ISIS in a number of ways, including allowing them free passage once more. In late August, we were told that the Turkish Army, alongside “allied Syrian rebels” (terrorist group Faylaq al-Sham) backed by the US air cover, invaded Syria in order to capture the “ISIS-held” town of Jarabulus, Syria, this supposedly to cut off ISIS’s last open route into Turkey. But what happened to ISIS? The NYT even admitted that, “… it appeared that most of the militants had fled without a fight.” Here, ISIS appears to have been given advanced warning – by either US or Turkish intelligence, as they left the contested town of Jarabulus quietly, but in droves. In reality, Turkey twisted this operation in order to attack and degrade Kurdish militias including the US-backed artificial construct called the Syrian Democratic Forces (SDF), and pro-Kurdish People’s Protection Units (YPG) and Kurdish Democratic Union Party (PYD), the Syrian affiliate of the militant Kurdistan Workers’ Party (PKK) in Iraq and Turkey – all of whom are meant to be fighting ISIS. Instead, they are now busy dodging Turkish artillery rounds. Confusing, yes, but true nonetheless.
  • It’s also common knowledge now, that top of the line US weaponry is being used by ISIS, both in Iraq, in Afghanistan and in Syria as well. In fact, if not for US weapons and supplies (along with US air intervention, or noninterventions), ISIS would have struggled to maintain many of the strategic positions it enjoys today. For the last 3 years, US officials have been dodging this issue, and when they do admit this is true, their patronizing party line is that, “this must be a mistake, if they do have US weapons, we didn’t mean it.” As if the world was born yesterday. Perhaps the most flagrant violation by the US-led forces in aiding and abetting ISIS took place on Sept 17, 2016, when the US-led Coalition bombed Syrian Army positions outside of Deir ez-Zor near al-Tharda Mountain, killing some 80 soldiers and injuring 100 more.  As if by design, an ISIS offensive began immediately following the US massacre of Syrian soldiers. Clearly, this bold move by the Pentagon paved the way for a major ISIS advance. To any normal observer, the US attack was a belligerent act of war that effective destroyed an already fragile bilateral ceasefire agreement, and yet the US response was to somehow blame Russia for calling an emergency UNSC meeting to discuss the incident. Judging by this response, it’s pretty clear that US wants to see the Syrian Conflict carry on for a while, and it will need groups like ISIS to make that happen.
  • The other problem with Washington’s hollow righteousness in the Middle East is that there are key members of the US-led “Coalition” who are financing ISIS, Al Nusra Front, Nour al Din Zinki, and Arar al Sham (all ‘moderate’ terrorists we’re told) militants in Syria, Iraq and beyond. This fact was recently admitted by former US Secretary of State and Democratic candidate Hillary Clinton, as revealed in this week’s batch of Wikileaks emails. Clinton writes: “While this military/para-military operation is moving forward, we need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region.”  Add to that the multiple exposures over the last 3 years of the US CIA illegally trafficking lethal arms to Al Nusra and other terrorists through covert operations like Timber Sycamore. Still, US and NATO member state officials and their media gatekeepers continue to deny it and play dumb, rather than come clean that the United States and its ‘partners’ in the region are helping, not hindering ISIS terrorism. Some might ask: why would they do a thing like that? By now, the answer should be simple, but threefold:
  • ISIS is still one of Washington’s best hope for continuing instability, and “regime change” in Syria. The existence of ISIS in Syria and Iraq guarantees that Washington can invite itself to the party.  The ISIS brand has been a boon for the global military industrial complex and all of its bottom-feeder businesses and ‘security’ contract firms. What’s so comical yet even more tragic, is how prominent the topic of “ISIS” factors into all of the vapid ‘national security’ debates and media panels in this year’s US Presidential election, and in the dumbed-down ‘coverage’ of the delusional US mainstream media, led by Pentagon surrogate CNN, and hopeless FOX News. Judging by their prosaic ‘coverage’, neither the networks, nor Hillary Clinton or Donald Trump have the slightest clue of what the reality on the ground is. Instead we here, “My ISIS plan is better than yours!” The US political conversation has gone beyond ridiculousness. The corps of US military and CIA media spokesman aren’t much better. The sad part is some of them do know what is really happening, but would rather lie to the American public. With so much double dealing, who can you trust? Certainly not anyone in Washington. More on the White House’s latest dangerous proposition….
Paul Merrell

Secret program at secret Guantánamo prison hears everything | Miami Herald - 0 views

  • A secret Defense Department program provides unfettered eavesdropping on the accused terrorists imprisoned at Guantánamo’s clandestine Camp 7 lockup, recently released war court documents show.Army Col. James L. Pohl, the judge in 9/11 trial, discovered the existence of the secret surveillance program during a recent war court hearing. Little is publicly known about the program, not even its unclassified two-word nickname.
  • The disclosure of pervasive eavesdropping at Guantánamo’s lockup for 14 former CIA prisoners comes in before-and-after documents released by the court from the recent Oct. 19-30 pretrial hearings in the death-penalty case of five men accused of orchestrating the hijackings that killed nearly 3,000 people on Sept. 11, 2001.At issue was accused 9/11 plotter Walid bin Attash’s request for guidance on how he could function as his own attorney. Bin Attash is a Yemeni in his mid-30s who is accused of training some of the hijackers. “You must assume anything you say in Camp 7 is not confidential and will be disclosed to the U.S. Government,” warns an Oct. 23 draft of the advisory, crafted after the judge was informed of the covert program. “Only when you are in Echo 2 will anything you say be covered by the attorney-client privilege.”An Oct. 20 draft of the advisory omits those lines.
  • This is not the first time in the proceedings that a surveillance program caught Pohl by surprise. In January 2013, he ordered the CIA to unplug a button that allowed an unseen observer to cut the court’s audio feed to the public. Perhaps ironically, the lone site the judge considers safe for consultative trial preparation — the Camp Echo compound of wooden huts, each containing a cell — at one time had covert recording devices that looked like smoke detectors. The judge ordered them disabled in February 2013.Attorney Dror Ladin of the American Civil Liberties Union, who was an observer at the Guantánamo hearings last month, said the apparent disclosure of “pervasive surveillance at Camp 7” is the latest issue to challenge the possibility of a fair trial.“It is shocking that for years neither defense counsel nor the judge were made aware that the government was capturing everything said aloud by the detainees there,” he said Thursday. It also adds to mounting questions of “how these military commissions can produce a fair result,” said Ladin, especially if one of the men represents himself. “These are detainees who really can’t see the evidence against them and simultaneously have been provided no rehabilitation services for the torture they suffered for years. It would be astonishing if any of them could craft a fair defense for capital charges.”
  • ...3 more annotations...
  • A defense attorney in another case said the prosecution wants to use a surreptitiously recorded conversation between two Camp 7 captives against an alleged al-Qaida commander. And in 2012 the journalist Daniel Klaidman wrote in his book “Kill or Capture” that the U.S. government had recordings made in a Guantánamo prison recreation yard of the alleged Sept. 11 mastermind Khalid Sheik Mohammed talking about evidence that could be used against him.The latest disclosure comes at a time of decreasing transparency at the war court.On Oct. 29, the judge held a 13-minute secret session without advanced notice to the public. A day later the judge wrote in a three-page ruling that he closed the court at the request of “the Government” — war-court-speak for the prosecution — to protect state secrets whose disclosure “could result in grave danger to national security.”Pohl also ordered the court to issue a censored transcript of the parts the excluded public and accused would be allowed to see. No transcript has been released.Then the next day, Oct. 30, the judge held a daylong, open hearing on a restraining order he issued forbidding female guards from touching the 9/11 accused when they are being taken to court or legal meetings. The judge’s order has outraged members of Congress and the Pentagon brass.
  • In that public court hearing, soldiers called as witnesses from the prison discussed staffing patterns at Camp 7. Normally the Pentagon releases transcripts of open hearings the same day. Unusually, the court has not yet released the Oct. 30 transcript. A Pentagon spokesman suggested Thursday — 13 days after the open court hearing — that somebody was scrubbing the transcript of information already made public. “The security review of the Oct. 30 transcript remains ongoing,” said Navy Cmdr. Gary Ross. “We will provide an update once additional information becomes available.”Much of the October session focused on bin Attash’s question about how he’d act as his own lawyer in a system that does not let the accused terrorist see classified information in the case. The judge and attorneys devoted days to designing a script Pohl would read to any accused 9/11 terrorist who tries to take charge of his defense — and spent a full afternoon huddling in a closed meeting on the secret program.
  • In it, Pohl made clear that he never intended to let bin Attash dismiss his Pentagon-paid defense attorneys — Chicago criminal defense attorney Cheryl Bormann and Air Force Maj. Michael Schwartz. Instead, the script shows Pohl planned to appoint Bormann and Schwartz as “standby counsel” the judge could activate to carry out cross-examination of certain witnesses who might have “particular sensitivities” to being questioned by the alleged terrorist.“If you are represented by lawyers, then it is the lawyers, and not you, who will conduct the defense,” the warning says. “Correspondingly, if you represent yourself, you will be able to perform the lawyer’s core functions, but you will not necessarily be allowed to direct special appearances by counsel when it is convenient to you.”The language suggests a far more limited role by the American lawyers than those carried out in an aborted attempt to hold the Sept. 11 trial during the Bush administration. In those proceedings, alleged 9/11 terrorists serving as their own lawyer regularly had standby counsel write and argue motions in court.The script also envisions a scenario in which an accused 9/11 plotter serving as his own lawyer becomes unruly, disruptive or disobedient rather than respect “the dignity of the courtroom.” In such a case, the judge said he could deal with “obstructionist misconduct” by putting “physical restraints” on bin Attash or ejecting him from the court.Bin Attash, for his part, has not been noticeably disruptive across years of pretrial proceedings. An amputee, he was brought to his May 5, 2012 arraignment in a Guantánamo prison restraint chair routinely used for forced-feeding of hunger strikers — with guards carrying his prosthetic leg separately.
  •  
    It's long past time to recognize that the military cannot provide a fair trial for GITMOI detainees, transfer them to the U.S., and try them in a civilian Article II court. If this kind of crap were going down before an Article II judge, those conducting the surveillance would be sitting in jail. 
Paul Merrell

Five Reasons The Situation in Eastern Ukraine is About to Become Much More Dangerous | ... - 0 views

  • This past week the mainstream coverage of the Ukrainian civil war has focused on Kiev's move to encircle Donetsk. However there are reports coming out of the east right now that indicate that the Ukrainian troops may have just walked into a trap. Specifically the separatists claim to have encircled western troops and have completely stalled their advance.
  • Note that this report is coming from those who openly support the separatists, and the claim that Kiev's forces have been encircled has yet to be confirmed by any major outlets, however Reuters does confirm that the Ukrainian troops have suffered heavy casualties in the past 24 hours, and there are separate reports that the separatists have managed to gain control of a new town on the Russian border within that same time period. The big picture here is that Kiev's forces may have overextended their forces and supply lines after being lulled into a false sense of momentum by the withdrawal of separatist forces from Slavyansk. There are some who are even speculating that the retreat was a trap. It's too early to know for sure if this assessment is accurate, but it is plausible. This is a common pattern in armed confrontation (The writings of Erwin Rommel regarding modern military tactics are very educational in this regard). The response from Washington, to lay the blame on Putin and to impose a new round of sanctions against Russia, was so predictable you may have the impression that you're watching a rerun from this Spring. Russia of course, reiterated their previous response: that these economic bully tactics will just have a boomerang effect. All par for the course. This phase in the crisis, however, is far more dangerous than the previous ones for a number of reasons.
  • Reason five: If this situation continues to go south, Washington may double down and push the envelope even farther in terms of covert operations. Indeed we're seeing think tanks like The Stratfor Institute call for an all out thrust to counter Russia (specifically on the issue of Moldova) which they are very clear that covert means should be employed. Anyone who has watched the U.S. State Department at their work, knows that there are very few limits to what this may entail.
Paul Merrell

John McCain, Conductor of the "Arab Spring" and the Caliph , by Thierry Meyssan - 0 views

  • Everyone has noticed the contradiction of those who recently characterized the Islamic Emirate as "freedom fighters" in Syria and who are indignant today faced with its abuses in Iraq. But if that speech is incoherent in itself, it makes perfect sense in the strategic plan: the same individuals were to be presented as allies yesterday and must be as enemies today, even if they are still on orders from Washington. Thierry Meyssan reveals below US policy through the particular case of Senator John McCain, conductor of the "Arab Spring" and longtime partner of Caliph Ibrahim.
  • ohn McCain is known as the leader of the Republicans and unhappy 2008 US presidential candidate. This is, we will see, only the real part of his biography, which serves as a cover to conduct covert actions on behalf of his government. When I was in Libya during the "Western"attack, I was able to view a report of the foreign intelligence services. It stated that, on February 4, 2011 in Cairo, NATO organized a meeting to launch the "Arab Spring" in Libya and Syria. According to this document, the meeting was chaired by John McCain. The report detailed the list of Libyan participants, whose delegation was led by the No. 2 man of the government of the day, Mahmoud Jibril, who abruptly switched sides at the entrance of the meeting to become the opposition leader in exile. I remember that, among the French delegates present, the report quoted Bernard-Henry Lévy, although officially he had never exercised functions within the French government. Many other personalities attended the symposium, including a large delegation of Syrians living abroad.
  • Emerging from the meeting, the mysterious Syrian Revolution 2011 Facebook account called for demonstrations outside the People’s Council (National Assembly) in Damascus on February 11. Although this Facebook account at the time claimed to have more than 40,000 followers, only a dozen people responded to its call before the flashes of photographers and hundreds of police. The demonstration dispersed peacefully and clashes only began more than a month later in Deraa. [1] On February 16, 2011, a demonstration underway in Benghazi, in memory of members of the Islamic Fighting Group in Libya [2] massacred in 1996 in the Abu Selim prison, degenerated into shooting. The next day, a second event, this time in memory of those who died by attacking the Danish consulate during the Muhammad cartoons affair, also degenerated into shooting. At the same time, members of the Islamic Fighting Group in Libya ,coming from Egypt and coordinated by unidentified, hooded individuals, simultaneously attacked four military bases in four different cities. After three days of fighting and atrocities, the rebels launched the uprising of Cyrenaica against Tripolitania [3]; a terrorist attack that the western press falsely presented as a "democratic revolution" against "the regime" of Muammar el-Qaddafi.
  • ...16 more annotations...
  • On February 22nd, John McCain was in Lebanon. He met members of the Future Movement (the party of Saad Hariri) whom he charged to oversee the transfer of arms to Syria around the MP Okab Sakr [4]. Then, leaving Beirut, he inspected the Syrian border and the selected villages including Ersal, which were used as a basis to back mercenaries in the war to come. The meetings chaired by John McCain were clearly the trigger point for a long-prepared Washington plan; the plan that would have the UK and France attack Libya and Syria simultaneously, following the doctrine of "leadership from behind" and the annex of the Treaty of Lancaster House of November 2010. [5]
  • In May 2013, Senator John McCain made his way illegally to near Idleb in Syria via Turkey to meet with leaders of the "armed opposition". His trip was not made public until his return to Washington. [6] This movement was organized by the Syrian Emergency Task Force, which, contrary to its title, is a Zionist Organization led by a Palestinian employee of AIPAC [7]
  • John McCain in Syria. In the foreground at right is the director of the Syrian Emergency Task Force. In the doorway, center, Mohammad Nour.
  • In photographs released at that time, one noticed the presence of Mohammad Nour, a spokesman for the Northern Storm Brigade (of the Al-Nosra Front, that is to say, al-Qaeda in Syria), who kidnapped and held 11 Lebanese Shiite pilgrims in Azaz. [8] Asked about his proximity to al-Qaeda kidnappers, the Senator claimed not to know Mohammad Nour who would have invited himself into this photo. The affair made a great noise and the families of the abducted pilgrims lodged a complaint before the Lebanese judiciary against Senator McCain for complicity in kidnapping. Ultimately, an agreement was reached and the pilgrims were released. Let’s suppose that Senator McCain had told the truth and that he was abused by Mohammad Nour. The object of his illegal trip to Syria was to meet the chiefs of staff of the Free Syrian Army. According to him, the organization was composed "exclusively of Syrians" fighting for "their freedom" against the "Alouite dictatorship” (sic). The tour organizers published this photograph to attest to the meeting.
  • John McCain and the heads of the Free Syrian Army. In the left foreground, Ibrahim al-Badri, with which the Senator is talking. Next, Brigadier General Salim Idris (with glasses).
  • If we can see Brigadier General Idriss Salem, head of the Free Syrian Army, one can also see Ibrahim al-Badri (foreground on the left) with whom the senator is talking. Back from the surprise trip, John McCain claimed that all those responsible for the Free Syrian Army were "moderates who can be trusted" (sic).
  • he list of interventions by John McCain on behalf of the State Department is impressive. He participated in all the color revolutions of the last twenty years.
  • For my part, I have always said that there was no difference on the ground between the Free Syrian Army, Al-Nosra Front, the Islamic Emirate etc ... All these organizations are composed of the same individuals who continuously change flag. When they pose as the Free Syrian Army, they fly the flag of French colonization and speak only of overthrowing the "dog Bashar." When they say they belong to Al-Nosra Front, they carry the flag of al Qaeda and declare their intention to spread Islam in the world. Finally when they say they are the Islamic Emirate, they brandish the flag of the Caliphate and announce that they will clean the area of all infidels. But whatever the label, they proceed to the same abuses: rape, torture, beheadings, crucifixions. Yet neither Senator McCain nor his companions of the Syrian Emergency Task Force provided the information in their possession on Ibrahim al-Badri to the State Department, nor have they asked for the reward. Nor have they informed the anti-terrorism Committee of the UN.
  • But John McCain is not just the leader of the political opposition to President Obama, he is also one of his senior officials! He is in fact President of the International Republican Institute (IRI), the republican branch of NED / CIA [12], since January 1993. This so-called "NGO" was officially established by President Ronald Reagan to extend certain activities of the CIA, in connection with the British, Canadian and Australian secret services. Contrary to its claims, it is indeed an inter-governmental agency. Its budget is approved by Congress in a budget line dependent of the Secretary of State. It is also because it is a joint agency of the Anglo-Saxon secret services that several states in the world prohibit it from any activity on their territory.
  • However, since October 4, 2011, Ibrahim al-Badri (also known as Abu Du’a) was on the list of the five terrorists most wanted by the United States (Rewards for Justice). A premium of up to $ 10 million was offered to anyone who would assist in his capture. [9] The next day, October 5, 2011, Ibrahim al-Badri was included in the list of the Sanctions Committee of the UN as a member of Al Qaeda. [10] In addition, a month before receiving Senator McCain, Ibrahim al-Badri, known under his nom de guerre as Abu Bakr al-Baghdadi, created the Islamic State in Iraq and the Levant (ÉIIL) – all the while still belonging to the staff of the very "moderate" Free Syrian Army. He claimed as his own the attack on the Taj and Abu Ghraib prisons in Iraq, from which he helped between 500 and 1,000 jihadists escape who then joined his organization. This attack was coordinated with other almost simultaneous operations in eight other countries. Each time, the escapees joined the jihadist organizations fighting in Syria. This case is so strange that Interpol issued a note and requested the assistance of the 190 member countries. [11]
  • And an agent that has the best coverage imaginable: he is the official opponent of Barack Obama. As such, he can travel anywhere in the world (he is the most traveled US senator) and meet whoever he wants without fear. If his interlocutors approve Washington policy, he promised them to continue it, if they fight it, he hands over the responsibility to President Obama.
  • In 2003, France’s opposition was not enough to offset the influence of the Committee for the Liberation of Iraq. The United States attacked the country again and this time overthrew President Hussein. Of course, John McCain was a major contributor to the Committee. After handing to a private company the care of plundering the country for a year [17], they tried to partition Iraq into three separate states, but had to give it up due to the resistance of the population. They tried again in 2007, around the Biden-Brownback resolution, but again failed. [18] Hence the current strategy that attempts to achieve this by means of a non-state actor: the Islamic Emirate.
  • The operation was planned well in advance, even before the meeting between John McCain and Ibrahim al-Badri. For example, internal correspondence from the Qatari Ministry of Foreign Affairs, published by my friends James and Joanne Moriarty [19], shows that 5,000 jihadis were trained at the expense of Qatar in NATO’s Libya in 2012, and 2,5 million dollars was paid at the same time to the future Caliph. In January of 2014, the Congress of the United States held a secret meeting at which it voted, in violation of international law, to approve funding for the Al-Nosra Front (Al-Qaeda) and the Islamic emirate in Iraq and the Levant until September 2014. [20] Although it is unclear precisely what was really agreed to during this meeting revealed by the British Reuters news agency [21], and no media US media dared bypass censorship, it is highly probable that the law includes a section on arming and training jihadists.
  • Proud of this US funding, Saudi Arabia has claimed on its public television channel, Al-Arabiya, that the Islamic Emirate was headed by Prince Abdul Rahman al-Faisal, brother of Prince Saud al Faisal (Foreign Minister) and Prince Turki al-Faisal (Saudi ambassador to the United States and the United Kingdom) [22]. The Islamic Emirate represents a new step in the world of mercenaries. Unlike jihadi groups who fought in Afghanistan, Bosnia-Herzegovina and Chechnya around Osama bin Laden, it does not constitute a residual force but actually an army in itself. Unlike previous groups in Iraq, Libya and Syria, around Prince Bandar bin Sultan, they have sophisticated communication services at their disposal for recruitment and civilian officials trained in large western schools capable of instantly taking over the administration of a territory.
  • Brand new Ukrainian weapons were purchased by Saudi Arabia and conveyed by the Turkish secret services who gave them to the Islamic Emirate. Final details were coordinated with the Barzani family at a meeting of jihadist groups in Amman on 1 June 2014. [23] The joint attack on Iraq by the Islamic Emirate and the Kurdistan Regional Government began four days later. The Islamic Emirate seized the Sunni part of the country, while the Kurdistan Regional Government increased its territory by over 40%. Fleeing the atrocities of jihadists, religious minorities left the Sunni area, paving the way for the three-way partition of the country. Violating the Iraqi-US Defense agreement, the Pentagon did not intervene and allowed the Islamic Emirate to continue its conquest and massacres. A month later, while the Kurdish Peshmerga Regional Government had retreated without a fight, and when the emotions of world public opinion became too strong, President Obama gave the order to bomb some positions of the Islamic Emirate. However, according to General William Mayville, director of operations at the headquarters, "These bombings are unlikely to affect the overall capacity of the Islamic Emirate and its activities in other areas of Iraq or Syria ". [24] Obviously, they are not meant to destroy the jihadist army, but only to ensure that each player does not overlap the territory that has been assigned. Moreover, for the moment, they are symbolic and have destroyed only a handful of vehicles. It was ultimately the intervention of the Kurds of the Turkish and Syrian Kurdish PKK which halted the progress of the Islamic Emirate and opened a corridor to allow civilians to escape the massacre.
  • In the latest issue of its magazine, the Islamic Emirate devoted two pages to denounce Senator John McCain as "the enemy" and "double-crosser", recalling his support for the US invasion of Iraq. Lest this accusation remain unknown in the United States, Senator immediately issued a statement calling the Emirate the "most dangerous Islamist terrorist group in the world" [26]. This controversy is there only to distract the gallery. One would like to believe it ... if it were’t for this photograph from May 2013.
  •  
    Thierry Meysann makes the case that Sen. John McCain, working with  was the guiding force behind the Arab Spring, the overthrow of Qadaffi in Libya, and the invasion of Syria by mercenary Islamists, working with a Zionist but deliberately misnomered front group. Thierry goes on to show that McCain played a key role in the creation and deployment of ISIL.  
Paul Merrell

CIA Tibetan program - Wikipedia, the free encyclopedia - 0 views

  • The U.S. Central Intelligence Agency's Tibetan program was a covert operation consisting of political plots, propaganda distribution, as well as paramilitary support and intelligence gathering based on U.S. commitments made to the Dalai Lama in 1951 and 1956.[1] Although the operation was formally assigned to the CIA alone, it was nevertheless closely coordinated with several other U.S. government agencies such as the Department of State and the Department of Defense.[2] Previous operations had aimed to strengthen a number of isolated Tibetan resistance groups, which eventually led to the creation of a paramilitary force on the Nepalese border with approximately 2,000 men. By February 1964, the projected annual cost for all CIA Tibetan operations had exceeded US$1.7 million.[2] The program was gradually discontinued in the late 1960s, and finally ended with President Nixon's visit to China in 1972.[3]
Paul Merrell

Iran negotiations: Is bipartisan fear-mongering helpful? - DecodeDC Story - 0 views

  • Negotiations with Iran are nearing a potential finish line, and the public lobbying in the U.S. is getting louder.  But in a surprise twist, the worst behavior isn’t necessarily partisan.
  • Perhaps the most incendiary bit of propaganda so far was bipartisan. Two former Republican senators, Saxby Chambliss of Georgia and Norm Coleman of Minnesota, and a Democrat, former Indiana Senator Evan Bayh, want Congress to pass a bill that would require any treaty or deal with Iran to be approved by Congress.That’s a reasonable proposition well worth a good debate.But this bipartisan troika boosted their cause with an outrageous, fear-mongering ad. Take a look:
  •  
    Commercial featuring a van in an American city being blown up by an atomic bomb stowed in it. Actually, I worry more about the Israelis doing it than I do about Iran doing so; the Iranians don't have an A-bomb and have no plans to acquire one according to the consensus position of all intelligence agencies in the U.S., Mossad, and a couple of recent Israeli Defense Force chiefs. And the Izzies are way into false flag attacks.  See https://en.wikipedia.org/wiki/Lavon_Affair ("The Lavon Affair refers to a failed Israeli covert operation [because one of the bombs went off prematurely in an operative's pocket], code named Operation Susannah, conducted in Egypt in the Summer of 1954. As part of the false flag operation,[1] a group of Egyptian Jews were recruited by Israeli military intelligence to plant bombs inside Egyptian, American and British-owned civilian targets, cinemas, libraries and American educational centers."
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Weapons Went From The CIA To ISIS In Less Than Two Months | Zero Hedge - 0 views

  • Years late to the party, mainstream media outlets like USA Today, Reuters, and Buzzfeed are just out with "breaking" and "exclusive" stories detailing how a vast arsenal of weapons sent to Syria by the CIA in cooperation with US allies fuelled the rapid growth of ISIS. Buzzfeed's story entitled, Blowback: ISIS Got A Powerful Missile The CIA Secretly Bought In Bulgaria, begins by referencing "a new report on how ISIS built its arsenal highlights how the US purchased munitions, intended for Syrian rebels, that ended up in the hands of the terrorist group." The original study that Buzzfeed and other media are referencing comes from a UK-based independent weapons research organization called Conflict Armament Research (CAR) which has had a team of weapons and munitions experts on the ground in the Middle East for years examining arms and equipment recovered from ISIS and other terrorist groups in Iraq and Syria. Using serial numbers, crate shipping markings, and all available forensics data, the CAR experts began finding that as early as 2013 to 2014 much of the Islamic State's advanced weapons systems as well as small arms were clearly sourced to the United States and the West. “Supplies of materiel into the Syrian conflict from foreign parties - notably the United States and Saudi Arabia - have indirectly allowed IS to obtain substantial quantities of anti-armor ammunition,” states the CAR report. “These weapons include anti-tank guided weapons and several varieties of rocket with tandem warheads, which are designed to defeat modern reactive armor.”
  • The study further reveals that in one notable instance, a weapons shipment of advanced missile systems switched hands from US intelligence to "moderate" Syrian groups to ISIS in only a two month time period. Though the report is now evoking shock and confusion among pundits, the same weapons research group has actually published similar findings and conclusions going years back into the Syrian conflict.  For example, a previous 2014 Conflict Armament Research report found that Balkan origin anti-tank rockets recovered from ISIS fighters appeared identical to those shipped in 2013 to Syrian rebel forces as part of a CIA program. And CAR's damning publications presenting such inconvenient empirical data have been consistent for years, yet were largely ignored and suppressed by analysts and mainstream media who were too busy cheerleading US support for Syrian "rebels" cast as romantic revolutionaries in their struggle to topple Assad and his secular nationalist government. Of course, it's an old story if you've been reading Zero Hedge or the profusion of independent outlets that have long reported the truth about the covert "dirty war" in Syria since nearly the beginning. 
  • Even though it's now suddenly acceptable and fashionable to admit - as does one recent BBC headline ("The Jihadis You Pay For") - that the US and Saudi covert program in Syria fuelled the rise of ISIS and various other al-Qaeda linked terror groups, it must be remembered that only a short time ago the mainstream media openly mocked analysts and writers who dared make the connection between the West's massive covert Syrian rebel aid programs and the al-Qaeda insurgents who so clearly benefited. When news of the 2012 Defense Intelligence Agency report  broke, which described what it called a "Salafist principality" or "an Islamic State" as a strategic asset or buffer in Syria that could be used by the Western coalition "in order to isolate the Syrian regime", American media outlets dismissed what was labelled a "conspiracy theory" at the time in spite of the hard evidence of a US military intelligence report being made available. The Daily Beast for example mocked what it called "The ISIS Conspiracy Theory that Ate the Web" - describing those analyzing the Pentagon intelligence document as far-right and far-left loons. This occurred even as the document was taken very seriously and analyzed in-depth by some of the world's foremost Middle East experts and investigative journalists in foreign outlets like the London Review of Books, The Guardian, Der Spiegal , as well as RT and Al Jazeera.
Paul Merrell

The Assassination Complex - 0 views

  • The Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the source’s request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as “the source.” The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.
  • The articles in The Drone Papers were produced by a team of reporters and researchers from The Intercept that has spent months analyzing the documents. The series is intended to serve as a long-overdue public examination of the methods and outcomes of America’s assassination program. This campaign, carried out by two presidents through four presidential terms, has been shrouded in excessive secrecy. The public has a right to see these documents not only to engage in an informed debate about the future of U.S. wars, both overt and covert, but also to understand the circumstances under which the U.S. government arrogates to itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal.
  • How the president authorizes targets for assassination
  • ...6 more annotations...
  • Assassinations depend on unreliable intelligence and hurt intelligence gathering
  • Strikes often kill many more than the intended target
  • The military labels unknown people it kills as “enemies killed in action”
  • The number of people targeted for drone strikes and other finishing operations
  • How geography shapes the assassination campaign
  • Inconsistencies with White House statements about targeted killing
  •  
    Large group of articles based on documents leaked from very deep in the Deep State.
Paul Merrell

U.S. Military Bans The Intercept - The Intercept - 0 views

  • A portion of an email (redacted and slightly altered to protect the source) sent to staff last week at a U.S. Marine Corps installation directing employees not to read this web site. The U.S. military is banning and blocking employees from visiting The Intercept in an apparent effort to censor news reports that contain leaked government secrets. According to multiple military sources, a notice has been circulated to units within the Army, Navy, Air Force, and Marine Corps warning staff that they are prohibited from reading stories published by The Intercept on the grounds that they may contain classified information. The ban appears to apply to all employees—including those with top-secret security clearance—and is aimed at preventing classified information from being viewed on unclassified computer networks, even if it is freely available on the internet. Similar military-wide bans have been directed against news outlets in the past after leaks of classified information.
  • A directive issued to military staff at one location last week, obtained by The Intercept, threatens that any employees caught viewing classified material in the public domain will face “long term security issues.” It suggests that the call to prohibit employees from viewing the website was made by senior officials over concerns about a “potential new leaker” of secret documents. The directive states: We have received information from our higher headquarters regarding a potential new leaker of classified information.  Although no formal validation has occurred, we thought it prudent to warn all employees and subordinate commands.  Please do not go to any website entitled “The Intercept” for it may very well contain classified material. As a reminder to all personnel who have ever signed a non-disclosure agreement, we have an ongoing responsibility to protect classified material in all of its various forms.  Viewing potentially classified material (even material already wrongfully released in the public domain) from unclassified equipment will cause you long term security issues.  This is considered a security violation.
  • A military insider subject to the ban said that several employees expressed concerns after being told by commanders that it was “illegal and a violation of national security” to read publicly available news reports on The Intercept. “Even though I have a top secret security clearance, I am still forbidden to read anything on the website,” said the source, who spoke on condition of anonymity due to the sensitivity of the subject.  “I find this very disturbing that they are threatening us and telling us what websites and news publishers we are allowed to read or not.”
  • ...2 more annotations...
  • In an emailed statement, Defense Department spokeswoman Lt. Col. Valerie Henderson said that she had not been able to establish whether the DoD had been the source of “any guidance related to your website.” Henderson added, however, that “DoD personnel have an obligation to safeguard classified information. Classified information, whether made public by unauthorized disclosure, remains classified until declassified by an appropriate government authority. DoD is committed to preventing classified information from being introduced onto DoD’s unclassified networks.” Earlier this month, after the publication of two Intercept stories revealing classified details about the vast scope of the government’s watchlisting program, Reuters reported that “intelligence officials were preparing a criminal referral” over the leaks.
  • The ban on The Intercept appears to have come in the aftermath of those stories, representing the latest in a string of U.S. military crackdowns on news websites that have published classified material. Last year, the Army admitted that it was blocking parts of The Guardian’s website after it published secret documents from former National Security Agency contractor Edward Snowden. In 2010, WikiLeaks and several major news organizations were subject to similar measures after the publication of leaked State Department diplomatic files. Flanagan, the Marine Corps spokesman, told The Intercept that The Washington Post was also blocked by some military agencies last year after it published documents from Snowden revealing covert NSA surveillance operations. “Just because classified information is published on a public website, that doesn’t mean military people with security clearance have the ability to download it,” Flanagan said.
  •  
    Enforced ignorance of the U.S. military. The official reason is a bucket that doesn't hold water. Despite official "classified" status, public is public. Any enemy can read it, so why should our military be barred from doing so. The real reason, I suspect, is protecting morale. 
Paul Merrell

Smoking gun emails reveal 'deal in blood' George Bush and Tony Blair made as they secre... - 0 views

  • A bombshell White House memo has revealed for the first time details of the ‘deal in blood’ forged by George Bush and Tony Blair over the Iraq War.The damning memo, from secretary of state Colin Powell to president George Bush, was written on March 28, 2002, a week before Bush’s famous summit with Blair at his Crawford ranch in Texas.The Powell document, headed ‘Secret... Memorandum for the President’, lifts the lid on how Blair and Bush secretly plotted the war behind closed doors at Crawford. In it, Powell tells Bush that Blair ‘will be with us’ on military action. Powell assures the president: ‘The UK will follow our lead’.The classified document also discloses that Blair agreed to act as a glorified spin doctor for the president by presenting ‘public affairs lines’ to convince a skeptical public that Saddam had Weapons of Mass Destruction - when none existed.In return, the president would flatter Blair’s ego and give the impression that Britain was not America’s poodle but an equal partner in the ‘special relationship’. 
  • The sensational leak shows that Blair had given an unqualified pledge to sign up to the conflict a year before the invasion started.It flies in the face of the UK Prime Minister’s public claims at the time that he was seeking a diplomatic solution to the crisis.He told voters: ‘We’re not proposing military action’ - in direct contrast to what the secret email now reveals. 
  • The disclosure is certain to lead for calls for Sir John Chilcot to reopen his inquiry into the Iraq War if, as is believed, he has not seen the Powell memo.A second explosive memo from the same cache also reveals how Bush used ‘spies’ in the Labour Party to help him to manipulate British public opinion in favor of the war.The documents, obtained by The Mail on Sunday, are part of a batch of secret emails held on the private server of Democratic presidential candidate Hillary Clinton which U.S. courts have forced her to reveal.Former UK Conservative shadow home secretary David Davis said: ‘The memos prove in explicit terms what many of us have believed all along: Tony Blair effectively agreed to act as a frontman for American foreign policy in advance of any decision by the House of Commons or the British Cabinet.
  • ...8 more annotations...
  • ‘He was happy to launder George Bush’s policy on Iraq and sub-contract British foreign policy to another country without having the remotest ability to have any real influence over it. And in return for what?'For George Bush pretending Blair was a player on the world stage to impress voters in the UK when the Americans didn’t even believe it themselves’.Davis was backed by a senior diplomat with close knowledge of Blair-Bush relations who said: ‘This memo shows beyond doubt for the first time Blair was committed to the Iraq War before he even set foot in Crawford.'And it shows how the Americans planned to make Blair look an equal partner in the special relationship to bolster his position in the UK.’Blair’s spokesman insisted last night that Powell’s memo was ‘consistent with what he was saying publicly at the time’.The former Prime Minister has always hotly denied the claim that the two men signed a deal ‘in blood’ at Crawford to embark on the war, which started on March 20, 2003. Powell says to Bush: ‘He will present to you the strategic, tactical and public affairs lines that he believes will strengthen global support for our common cause,’ adding that Blair has the presentational skills to ‘make a credible public case on current Iraqi threats to international peace’.Five months after the summit, Downing Street produced the notorious ‘45 minutes from doom’ dossier on Saddam Hussein’s supposed Weapons of Mass Destruction. After Saddam was toppled, the dossier’s claims were exposed as bogus.Nowhere in the memo is a diplomatic route suggested as the preferred option.
  • Instead, Powell says that Blair will also advise on how to ‘handle calls’ for the ‘blessing’ of the United Nations Security Council, and to ‘demonstrate that we have thought through “the day after” ’ – in other words, made adequate provision for a post-Saddam Iraq.Critics of the war say that the lack of post-conflict planning has contributed to the loss of more than 100,000 lives since the invasion – and a power vacuum which has contributed to the rise of Islamic State terrorism.Significantly, Powell warns Bush that Blair has hit ‘domestic turbulence’ for being ‘too pro-U.S. in foreign and security policy, too arrogant and “presidential” ’, which Powell points out is ‘not a compliment in the British context’.Powell also reveals that the splits in Blair’s Cabinet were deeper than was realized: he says that apart from Foreign Secretary Jack Straw and Defence Secretary Geoff Hoon, ‘Blair’s Cabinet shows signs of division, and the British public are unconvinced that military action is warranted now’.Powell says that although Blair will ‘stick with us on the big issues’, he wants to minimisze the ‘political price’ he would have to pay: ‘His voters will look for signs that Britain and America are truly equity partners in the special relationship.’The president certainly did his best to flatter Blair’s ego during the Crawford summit, where he was the first world leader to be invited into Bush’s sanctuary for two nights.
  • Mystery has long surrounded what was discussed at Crawford as advisers were kept out of a key meeting between the two men.Sir Christopher Meyer, who was present in Crawford as Britain’s ambassador to the U.S., told Chilcot that his exclusion meant he was ‘not entirely clear to this day... what degree of convergence was, if you like, signed in blood at the Crawford ranch’.But in public comments during his time at Crawford, Blair denied that Britain was on an unstoppable path to war.‘This is a matter for considering all the options’, he said. ‘We’re not proposing military action at this point in time’.
  • During his appearance before the Chilcot inquiry in January 2010, Blair denied that he had struck a secret deal with Bush at Crawford to overthrow Saddam. Blair said the two men had agreed on the need to confront the Iraqi dictator, but insisted they did not get into ‘specifics’.‘The one thing I was not doing was dissembling in that position,’ he told Chilcot.‘The position was not a covert position, it was an open position. This isn’t about a lie or a conspiracy or a deceit or a deception. It’s a decision. What I was saying... was “We are going to be with you in confronting and dealing with this threat.” ’Pressed on what he thought Bush took from their meeting, he said the president had realized Britain would support military action if the diplomatic route had been exhausted.In his memoirs, Blair again said it was ‘a myth’ he had signed a promise ‘in blood’ to go to war, insisting: ‘I made no such commitment’.Critics who claimed that Blair acted as the ‘poodle’ of the US will point to a reference in Mr Powell’s memo to the fact Mr Blair ‘readily committed to deploy 1,700 commandos’ to Afghanistan ‘even though his experts warn that British forces are overstretched’.The decision made the previous October in the wake of the September 11 attacks led to widespread concern that the UK was entering an open-ended commitment to a bloody conflict in Afghanistan – a concern many critics now say was well-founded.
  • Mr Powell’s memo goes on to say that a recent move by the U.S. to protect its steel industry with tariffs, which had damaged UK exports, was a ‘bitter blow’ for Blair, but he was prepared to ‘insulate our broader relationship from this and other trade disputes’.The memo was included in a batch of 30,000 emails which were received by Mrs Clinton on her private server when she was US Secretary of State between 2009 and 2013.Another document included in the email batch is a confidential briefing for Powell prepared by the U.S. Embassy in London, shortly before the Crawford summit.The memo, dated ‘April 02’, includes a detailed assessment of the effect on Blair’s domestic position if he backs US military action.The document says: ‘A sizeable number of his [Blair’s] MPs remain at present opposed to military action against Iraq... some would favor shifting from a policy of containment of Iraq if they had recent (and publicly usable) proof that Iraq is developing WMD/missiles... most seem to want some sort of UN endorsement for military action.‘Blair’s challenge now is to judge the timing and evolution of America’s Iraq policy and to bring his party and the British people on board.'There have been a few speculative pieces in the more feverish press about Labor [sic] unease re Iraq policy… which have gone on to identify the beginnings of a challenge to Blair’s leadership of the party.
  • 'Former Cabinet member Peter Mandelson, still an insider, called it all "froth". Nonetheless, this is the first time since the 1997 election that such a story is even being printed’.The paper draws on information given to it by Labour ‘spies’, whose identities have been hidden.It states: ‘[name redacted] told us the intention of those feeding the story is not to bring down Blair but to influence him on the Iraq issue’.‘Some MPs would endorse action if they had proof that Iraq has continued to develop WMD since UN inspectors left.‘More would follow if convinced that Iraq has succeeded in developing significant WMD capability and the missiles to deliver it.'Many more would follow if they see compelling evidence that Iraq intends and plans to use such weapons. A clear majority would support military action if Saddam is implicated in the 9/11 attacks or other egregious acts of terrorism’.‘Blair has proved an excellent judge of political timing, and he will need to be especially careful about when to launch a ramped-up campaign to build support for action against Iraq.'He will want neither to be too far in front or behind US policy... if he waits too long, then the keystone of any coalition we wish to build may not be firmly in place. No doubt these are the calculations that Blair hopes to firm up when he meets the President’.A spokesperson for Blair said: ‘This is consistent with what Blair was saying publicly at the time and with Blair’s evidence given to the Chilcot Inquiry’.
  • Stunning memo proves Blair signed up for Iraq even before Americans - comment by former shadow home secretary David DavisThis is one of the most astonishing documents I have ever read.It proves in explicit terms what many of us have believed all along: Tony Blair effectively agreed to act as a front man for American foreign policy in advance of any decision by the House of Commons or the British Cabinet.He was happy to launder George Bush’s policy on Iraq and sub-contract British foreign policy to another country without having the remotest ability to have any real influence over it.And in return for what? For George Bush pretending Blair was a player on the world stage to impress voters in the UK when the Americans didn’t even believe it themselves.Blair was content to cynically use Britain’s international reputation for honest dealing in diplomacy, built up over many years, as a shield against worldwide opprobrium for Bush’s ill-considered policy.Judging from this memorandum, Blair signed up for the Iraq War even before the Americans themselves did. It beggars belief.
  • Blair was telling MPs and voters back home that he was still pursuing a diplomatic solution while Colin Powell was telling President Bush: ‘Don’t worry, George, Tony is signed up for the war come what may – he’ll handle the PR for you, just make him look big in return.’It should never be forgotten that a minimum of 120,000 people died as a direct result of the Iraq War.What is truly shocking is the casualness of it all, such as the reference in the memo to ‘the day after’ – meaning the day after Saddam would be toppled.The offhand tone gives the game away: it is patently obvious nobody thought about ‘the day after’ when Bush and Blair met in Crawford.And they gave it no more thought right through to the moment ‘the day after’ came about a year later when Saddam’s statue fell to the ground.We saw the catastrophic so-called ‘de-Baathification’ of Iraq, with the country’s entire civil and military structure dismantled, leading to years of bloodshed and chaos. It has infected surrounding countries to this day and created the vacuum into which Islamic State has stepped.This may well be the Iraq ‘smoking gun’ we have all been looking for.
Paul Merrell

Alleged Colombian Paramilitary Wanted for Murder of Robert Serra Arrives in Venezuela |... - 0 views

  • Alleged Colombian paramilitary Leiva Padilla, alias “El Colombia,” arrived in Venezuela on Saturday where he will face trial for the murders of socialist politician, Robert Serra (27), and his comrade and political assistant, Maria Herrera (26).  Leiva is considered by Venezuelan authorities to be the head of an eight man group responsible for assassinating the two young political activists on October 1st last year. He was arrested on November 5th 2014 by Colombian authorities in Cartagena after Venezuela issued an Interpol request for his capture. The extradition of the alleged paramilitary, who has dual Venezuela-Colombia nationality, was approved by Colombian president, Manuel Santos, early in May. 
  • In the days following the assassination of Serra and Herrera, the Venezuelan government released CCTV footage of six men entering Serra’s house in the working class barrio of Caracas, La Pastora. Authorities maintain that the group immediately “neutralised” an unsuspecting Herrera, who answered the door, and then proceeded to go upstairs where they violently assassinated Serra before leaving just several minutes later.  The legislator was tied, gagged and stabbed somewhere between twenty to fifty times in the chest and four times in the back. At the time, then-Venezuelan Minister of Justice, Peace and the Interior, Miguel Rodriguez Torres, affirmed that the attack bore all the hallmarks of a politically motivated assassination. 
  • In the months prior to his death, he was conducting a parliamentary investigation into the activities of Lorent Saleh, a young rightwing activist arrested in 2014 for allegedly plotting alongside Colombian paramilitaries to carry out a series of terrorist attacks and political murders in Venezuela. Also extradited from Colombia, Saleh is a chief ally of former Colombian president, Alvaro Uribe, currently under investigation for his alleged links to paramilitary networks. Uribe had also been accused of being linked to Saleh by Serra less than two weeks before his death.  According to Venezuelan President Nicolas Maduro, the murders were planned and financed by an unknown person in Colombia. They have been widely interpreted as an attempt to intimidate those who support the country’s leftwing Bolivarian Revolution.  Many have also cited the crime as a sign of the increasing presence of rightwing paramilitary forces operating in the country.
  • ...2 more annotations...
  • Key in the upcoming trial, which promises to be kept highly confidential, will be the testimony of Serra’s chief bodyguard, Edwin Torres Camacho. Camacho was arrested soon after the murders and admitted to having been approached by “El Colombia” and paid to betray the socialist legislator. The confession is one of the strongest pieces of evidence against Leiva, who is also reported by Venezuelan press to have been aided and abetted by his wife and accompanied by his son on the night of the murder.  The high profile case has seen ten other people arrested in connection to the plot and international arrest warrants issued for another three. 
  • Leiva’s capture is perhaps the most significant development in the case so far. His testimony could provide a clue as to the identity of the financial backer in Colombia, responsible for ordering the assassination, as well as shed light on one of the most high profile political assassinations of the last fifteen years in Venezuela. 
  •  
    The right-wing paramilitaries have been closely involved in 3 coup attempts in Venezuela, all of which traced back to covert U.S. intervention.
Paul Merrell

U.S.-backed Syrian rebels appeal for antiaircraft missiles - The Washington Post - 0 views

  • U.S.-backed rebels in Syria appealed to the Obama administration Friday for anti­aircraft missiles to defend their positions against relentless Russian airstrikes that have so far mostly targeted the moderate opposition to President Bashar al-Assad’s rule. A joint statement issued by the United States and other Western allies who have collectively aided moderate rebel units urged Russia to stop targeting moderate rebels and “to focus its efforts on fighting ISIL,” the acronym referring to the Islamic State. U.S. officials indicated that there is no immediate plan to offer additional assistance to the rebel units that have been armed and trained under a covert CIA-led program aimed at supporting moderate groups and weakening Assad’s hold on power.
  • The covert operation is separate from a much-publicized Pentagon program to train a force to fight the Islamic State that has so far produced no more than four or five loyal fighters, and it is widely credited with having helped rebel advances­ over the past six months in the areas now being targeted by the Russians.
Paul Merrell

Tomgram: Engelhardt, A Record of Unparalleled Failure | TomDispatch - 0 views

  • The United States has been at war -- major boots-on-the-ground conflicts and minor interventions, firefights, air strikes, drone assassination campaigns, occupations, special ops raids, proxy conflicts, and covert actions -- nearly nonstop since the Vietnam War began.  That’s more than half a century of experience with war, American-style, and yet few in our world bother to draw the obvious conclusions. Given the historical record, those conclusions should be staring us in the face.  They are, however, the words that can’t be said in a country committed to a military-first approach to the world, a continual build-up of its forces, an emphasis on pioneering work in the development and deployment of the latest destructive technology, and a repetitious cycling through styles of war from full-scale invasions and occupations to counterinsurgency, proxy wars, and back again. So here are five straightforward lessons -- none acceptable in what passes for discussion and debate in this country -- that could be drawn from that last half century of every kind of American warfare:
  • 1. No matter how you define American-style war or its goals, it doesn’t work. Ever. 2. No matter how you pose the problems of our world, it doesn’t solve them. Never. 3. No matter how often you cite the use of military force to “stabilize” or “protect” or “liberate” countries or regions, it is a destabilizing force. 4. No matter how regularly you praise the American way of war and its “warriors,” the U.S. military is incapable of winning its wars. 5. No matter how often American presidents claim that the U.S. military is “the finest fighting force in history,” the evidence is in: it isn’t.
  • And here’s a bonus lesson: if as a polity we were to take these five no-brainers to heart and stop fighting endless wars, which drain us of national treasure, we would also have a long-term solution to the Veterans Administration health-care crisis.  It’s not the sort of thing said in our world, but the VA is in a crisis of financing and caregiving that, in the present context, cannot be solved, no matter whom you hire or fire.  The only long-term solution would be to stop fighting losing wars that the American people will pay for decades into the future, as the cost in broken bodies and broken lives is translated into medical care and dumped on the VA.
Paul Merrell

Now the truth emerges: how the US fuelled the rise of Isis in Syria and Iraq | Seumas M... - 0 views

  • The war on terror, that campaign without end launched 14 years ago by George Bush, is tying itself up in ever more grotesque contortions. On Monday the trial in London of a Swedish man, Bherlin Gildo, accused of terrorism in Syria, collapsed after it became clear British intelligence had been arming the same rebel groups the defendant was charged with supporting. The prosecution abandoned the case, apparently to avoid embarrassing the intelligence services. The defence argued that going ahead withthe trial would have been an “affront to justice” when there was plenty of evidence the British state was itself providing “extensive support” to the armed Syrian opposition. That didn’t only include the “non-lethal assistance” boasted of by the government (including body armour and military vehicles), but training, logistical support and the secret supply of “arms on a massive scale”. Reports were cited that MI6 had cooperated with the CIA on a “rat line” of arms transfers from Libyan stockpiles to the Syrian rebels in 2012 after the fall of the Gaddafi regime. Clearly, the absurdity of sending someone to prison for doing what ministers and their security officials were up to themselves became too much. But it’s only the latest of a string of such cases. Less fortunate was a London cab driver Anis Sardar, who was given a life sentence a fortnight earlier for taking part in 2007 in resistance to the occupation of Iraq by US and British forces. Armed opposition to illegal invasion and occupation clearly doesn’t constitute terrorism or murder on most definitions, including the Geneva convention.
  • But terrorism is now squarely in the eye of the beholder. And nowhere is that more so than in the Middle East, where today’s terrorists are tomorrow’s fighters against tyranny – and allies are enemies – often at the bewildering whim of a western policymaker’s conference call.
  • A revealing light on how we got here has now been shone by a recently declassified secret US intelligence report, written in August 2012, which uncannily predicts – and effectively welcomes – the prospect of a “Salafist principality” in eastern Syria and an al-Qaida-controlled Islamic state in Syria and Iraq. In stark contrast to western claims at the time, the Defense Intelligence Agency document identifies al-Qaida in Iraq (which became Isis) and fellow Salafists as the “major forces driving the insurgency in Syria” – and states that “western countries, the Gulf states and Turkey” were supporting the opposition’s efforts to take control of eastern Syria. Raising the “possibility of establishing a declared or undeclared Salafist principality”, the Pentagon report goes on, “this is exactly what the supporting powers to the opposition want, in order to isolate the Syrian regime, which is considered the strategic depth of the Shia expansion (Iraq and Iran)”.
  • ...3 more annotations...
  • Which is pretty well exactly what happened two years later. The report isn’t a policy document. It’s heavily redacted and there are ambiguities in the language. But the implications are clear enough. A year into the Syrian rebellion, the US and its allies weren’t only supporting and arming an opposition they knew to be dominated by extreme sectarian groups; they were prepared to countenance the creation of some sort of “Islamic state” – despite the “grave danger” to Iraq’s unity – as a Sunni buffer to weaken Syria. That doesn’t mean the US created Isis, of course, though some of its Gulf allies certainly played a role in it – as the US vice-president, Joe Biden, acknowledged last year. But there was no al-Qaida in Iraq until the US and Britain invaded. And the US has certainly exploited the existence of Isis against other forces in the region as part of a wider drive to maintain western control.
  • The calculus changed when Isis started beheading westerners and posting atrocities online, and the Gulf states are now backing other groups in the Syrian war, such as the Nusra Front. But this US and western habit of playing with jihadi groups, which then come back to bite them, goes back at least to the 1980s war against the Soviet Union in Afghanistan, which fostered the original al-Qaida under CIA tutelage. It was recalibrated during the occupation of Iraq, when US forces led by General Petraeus sponsored an El Salvador-style dirty war of sectarian death squads to weaken the Iraqi resistance. And it was reprised in 2011 in the Nato-orchestrated war in Libya, where Isis last week took control of Gaddafi’s home town of Sirte. In reality, US and western policy in the conflagration that is now the Middle East is in the classic mould of imperial divide-and-rule. American forces bomb one set of rebels while backing another in Syria, and mount what are effectively joint military operations with Iran against Isis in Iraq while supporting Saudi Arabia’s military campaign against Iranian-backed Houthi forces in Yemen. However confused US policy may often be, a weak, partitioned Iraq and Syria fit such an approach perfectly.
  • What’s clear is that Isis and its monstrosities won’t be defeated by the same powers that brought it to Iraq and Syria in the first place, or whose open and covert war-making has fostered it in the years since. Endless western military interventions in the Middle East have brought only destruction and division. It’s the people of the region who can cure this disease – not those who incubated the virus.
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
Paul Merrell

Syria: US Success Would Only Be the End of the Beginning | nsnbc international - 0 views

  • An October 7, 2015 hearing before the US Senate Committee on Armed Forces (SASC) titled, “Iranian Influence in Iraq and the Case of Camp Liberty,” served as a reaffirmation of America’s commitment to back the terrorist organization Mujahedeen e-Khalq (MEK) and specifically 2,400 members of the organization being harbored on a former US military base in Iraq.
  • Providing testimony was former US Senator Joseph I. Lieberman, former US Marine Corps Commandant and former Supreme Allied Commander Europe General James Jones, USMC (Ret.), and Colonel Wesley Martin, US Army (Ret.). All three witnesses made passionate pleas before a room full of nodding senators for America to continue backing not only MEK terrorists currently harbored on a former US military base in Iraq, but to back groups like MEK inside of Iran itself to threaten the very survival of the government in Tehran. In the opening remarks by Lieberman, he stated: It was not only right and just that we took them off the foreign terrorist organization list, but the truth is now that we ought to be supportive of them and others in opposition to the government in Iran more than we have been.
  • MEK is described by Council on Foreign Relations Senior Fellow Ray Takeyh as a “cult-like organization” with “totalitarian tendencies.” While Takeyh fails to expand on what he meant by “cult-like” and “totalitarian,” an interview with US State Department-run Radio Free Europe-Radio Liberty reported that a MEK Camp Ashraf escapee claimed the terrorist organization bans marriage, using radios, the Internet, and holds many members against their will with the threat of death if ever they are caught attempting to escape. Not once is any of this backstory mentioned in the testimony of any of the witnesses before the senate hearing, defiling the memories of those who have been murdered and otherwise victimized by this terrorist organization. The de-listing of MEK in 2012 as a foreign terrorist organization by the US State Department is another indictment of the utter lack of principles the US clearly hides behind rather than in any way upholds as a matter of executing foreign policy.
  • ...6 more annotations...
  • MEK has carried out decades of brutal terrorist attacks, assassinations, and espionage against the Iranian government and its people, as well as targeting Americans including the attempted kidnapping of US Ambassador Douglas MacArthur II, the attempted assassination of USAF Brigadier General Harold Price, the successful assassination of Lieutenant Colonel Louis Lee Hawkins, the double assassinations of Colonel Paul Shaffer and Lieutenant Colonel Jack Turner, and the successful ambush and killing of American Rockwell International employees William Cottrell, Donald Smith, and Robert Krongard. Admissions to the deaths of the Rockwell International employees can be found within a report written by former US State Department and Department of Defense official Lincoln Bloomfield Jr. on behalf of the lobbying firm Akin Gump in an attempt to dismiss concerns over MEK’s violent past and how it connects to its current campaign of armed terror – a testament to the depths of depravity from which Washington and London lobbyists operate. To this day MEK terrorists have been carrying out attacks inside of Iran killing political opponents, attacking civilian targets, as well as carrying out the US-Israeli program of targeting and assassinating Iranian scientists. MEK terrorists are also suspected of handling patsies in recent false flag operations carried out in India, Georgia, and Thailand, which have been ham-handedly blamed on the Iranian government.
  • Lieberman would also state (emphasis added): Here’s my point Mr. Chairman, we ought to compartmentalize that agreement also, that nuclear agreement. We ought to put it over there, and not let it stop us from confronting what they’re doing in Syria. Continuing the sanctions for human rights violations in Iran in support of terrorism. And here’s the point I want to make about the National Council of Resistance of Iran and other democratic opposition groups that are Iranian – we ought to be supporting them.  This regime in Tehran is hopeless. It’s not going to change. There’s no evidence … every piece of evidence says the contrary. So I hope we can find a way, we used to do this not so long ago, supporting opposition groups in Iran. They deserve our support, and actually they would constitute a form of pressure on the government in Tehran that would unsettle them as much as anything else we could do because it would threaten the survival of the regime which from every objective indicator I can see is a very unpopular regime in Iran.  The United States, unrepentant regarding the arc of chaos, mass murder, terrorism, civilizational destruction it has created stretching from Libya to Syria, now seeks openly to extend it further into Iran using precisely the same tactics – the use of terrorist proxies – to dismantle and destroy Iranian society.
  • MEK has already afforded the US the ability to wage a low-intensity conflict with Iran. MEK’s role in doing so was eagerly discussed in 2009, several years before it was even de-listed as a terrorist organization by the US State Department in the Brooking Institution’s policy paper “Which Path to Persia? Options for a New American Strategy Toward Iran” (PDF). The report stated (emphasis added): Perhaps the most prominent (and certainly the most controversial) opposition group that has attracted attention as a potential U.S. proxy is the NCRI (National Council of Resistance of Iran), the political movement established by the MEK (Mujahedin-e Khalq). Critics believe the group to be undemocratic and unpopular, and indeed anti-American.
  • In contrast, the group’s champions contend that the movement’s long-standing opposition to the Iranian regime and record of successful attacks on and intelligence-gathering operations against the regime make it worthy of U.S. support. They also argue that the group is no longer anti-American and question the merit of earlier accusations. Raymond Tanter, one of the group’s supporters in the United States, contends that the MEK and the NCRI are allies for regime change in Tehran and also act as a useful proxy for gathering intelligence. The MEK’s greatest intelligence coup was the provision of intelligence in 2002 that led to the discovery of a secret site in Iran for enriching uranium.   Despite its defenders’ claims, the MEK remains on the U.S. government list of foreign terrorist organizations. In the 1970s, the group killed three U.S. officers and three civilian contractors in Iran. During the 1979-1980 hostage crisis, the group praised the decision to take America hostages and Elaine Sciolino reported that while group leaders publicly condemned the 9/11 attacks, within the group celebrations were widespread. Undeniably, the group has conducted terrorist attacks—often excused by the MEK’s advocates because they are directed against the Iranian government. For example, in 1981, the group bombed the headquarters of the Islamic Republic Party, which was then the clerical leadership’s main political organization, killing an estimated 70 senior officials. More recently, the group has claimed credit for over a dozen mortar attacks, assassinations, and other assaults on Iranian civilian and military targets between 1998 and 2001. At the very least, to work more closely with the group (at least in an overt manner), Washington would need to remove it from the list of foreign terrorist organizations.
  • Proof that Brookings’ policy paper was more than a mere theoretical exercise, in 2012 MEK would indeed be de-listed by the US State Department with support for the terrorist organization expanded. The fact that former senators and retired generals representing well-funded corporate think tanks even just this week are plotting to use MEK to overthrow the Iranian government should raise alarms that other criminality conspired within the pages of this policy paper may still well be in play. Lieberman himself suggests that proxy war and regime-change should proceed regardless of the so-called “nuclear deal” – with the 2009 Brookings report itself having stated that (emphasis added): …any military operation against Iran will likely be very unpopular around the world and require the proper international context—both to ensure the logistical support the operation would require and to minimize the blowback from it. The best way to minimize international opprobrium and maximize support (however, grudging or covert) is to strike only when there is a widespread conviction that the Iranians were given but then rejected a superb offer—one so good that only a regime determined to acquire nuclear weapons and acquire them for the wrong reasons would turn it down. Under those circumstances, the United States (or Israel) could portray its operations as taken in sorrow, not anger, and at least some in the international community would conclude that the Iranians “brought it on themselves” by refusing a very good deal.  Clearly, both Brookings in 2009, and Lieberman this week have conspired to use the so-called “Iranian Nuclear Deal” as cover for betrayal and regime change.
  • For those wondering why Russia has intervened in Syria in the matter that it has, it should be plainly obvious. The US has no intention to stop in Syria. With Iraq, Afghanistan, and Libya behind it, and Syria within its clutches, it is clear that Iran is next, and inevitably this global blitzkrieg will not stop until it reaches Moscow and Beijing. Even as the US adamantly denies the obvious – that is has intentionally created and is currently perpetuating Al Qaeda, the so-called “Islamic State,” and other terrorist groups in Syria, it is openly conspiring to use another army of terrorists against neighboring Iran, live before a US Senate hearing. Should the US succeed in Syria, it would not be the end of the conflict, but only the end of the beginning of a much wider world war.
Paul Merrell

Obama's Flawed Vision of the World - The Daily Beast - 0 views

  • At West Point, Obama takes the U.S. out of the Afghan frying pan only to leap back into the Mideast fire, where a crucial shift in Syria policy may be in store.
  • Obama is now moving to provide moderate rebels in Syria with overt training from U.S. special operation forces in addition to the covert aid presently fed by the CIA. That move will make sense only if the White House formulates a viable strategy for Syria. Right now, its strategy of upending President Bashar Assad makes no sense. If he’s not winning, he’s certainly not losing. And no amount of projected aid to the moderate rebels will change that unfortunate but unarguable fact.
  • Thus, Obama either will have to change his means and provide massive aid to these rebels, which he will not do, or he will have to change his goal of eliminating Assad. This may well surprise experts, but senior administration officials tell me that Obama has been modifying his objective and is now prepared to work with Assad, to some degree, along with the moderate rebels, against what the White House finally has come to see as the real and major threat—the jihadists. These senior officials further say that they expect support in this new policy from previous opponents, i.e. from Saudi Arabia and other Gulf states. Let us hope that this is true.
  •  
    By the former president of the Foreign Policy Council. Are we dizzy yet?  He says that Obama has decided to work with Syrian President Assad to root out the real threat, the jihadists. Might it not have saved tens of thousands of Syrian lives to have refused in the first place to assist the Sauds and Qatar in arming the same jihadists and sending them as an invading force to Syria? And yes, it's true; the Sauds have also done a 180-degree turn here. 
Paul Merrell

ISTANBUL: Iraq unraveling as top Shiite cleric issues call to arms - World Wires - Miam... - 0 views

  • The likely breakup of Iraq into feuding ethnic and sectarian bastions accelerated Friday as Iraq’s senior Shiite Muslim cleric broke years of support for the central government and decreed that every able-bodied Shiite man had a religious obligation to defend the sect’s holy sites from rebellious Sunni Muslims led by fighters from the extremist Islamic State of Iraq and Syria.In answer to the call, thousands of Shiites _ many with militia experience from the sectarian war that pitted Sunnis against Shiites and killed thousands from 2006 to 2008 _ flooded the cities of Baghdad, Najaf and Karbala to receive weapons, enlist in organized units and receive their orders.
  • Hours later, President Barack Obama made it clear that the United States was unwilling to commit itself to the defense of a government that had been unable to resolve Iraq’s ethnic and sectarian differences. “We're not going to allow ourselves to be dragged back into a situation in which, while we're there, we're keeping a lid on things, and after enormous sacrifices by us, as soon as we're not there, suddenly people end up acting in ways that are not conducive to the long-term stability and prosperity of the country,” Obama said.With Sunni Islamists in control of much of the north and west, Kurds expanding their control of the long-contested Kirkuk region and Shiites gathering for sectarian war, the likelihood of any accommodation seemed remote. Emma Sky, a fellow at Yale University who advised U.S. forces in Iraq until 2010, called the events “the slow death” of the Iraqi state in an interview with McClatchy.
  • Iranian and Iraqi news organizations were filled with reports that the commander of the Iranian Revolutionary Guard Corps’ al Quds Force, the cross between an intelligence agency and special forces that’s often deployed to pursue Iranian foreign and security policy, had arrived in Baghdad to direct the fight against ISIS after four days that saw the army crumble.Iranian Gen. Qassem Suleimani was, according to numerous credible reports, said to be directing the defenses of Baghdad personally. Suleimani, a well-known figure in Middle East security circles, is said to control Iranian operations in Iraq, Syria, Lebanon and the Gaza Strip. Supporters of Iran often credit him with devising the strategy that’s salvaged the Syrian government of President Bashar Assad during the past year of civil war there.On Friday, CNN reported that a senior Iraqi official had said that as many as 500 troops from the al Quds Force had begun arriving to help protect Baghdad. CNN said the official had said the Iranians would be deployed to Diyala province, a mixed Sunni and Shiite area, where their presence would generate less anger than in the mostly Sunni areas now under ISIS control.A former European intelligence official, who runs a consultancy in the region and regularly deals with Iranian government representatives in the Persian Gulf and Afghanistan, said in an interview that he expected any Iranian troops sent to Iraq would augment what was already a robust covert presence.
  • ...1 more annotation...
  • “Hajj Qassem does not get taken by surprise, not next door to his own country,” the consultant said, asking that his own name not be used on such a sensitive subject. “Hajj” is an Islamic honorific. The consultant said he suspected that ISIS’s rapid advance hadn’t surprised the Iranians. “I’ve been hearing about the problems with ISIS in the desert outside Mosul for a year and have been told the Iranians were warning Maliki about this,” he said.The claim that the government of Prime Minister Nouri al Maliki had had ample warning of a serious problem, beyond the loss of the western desert of al Anbar nearly six months ago, also was made by a top security official of the peshmerga, the Kurdish militia.
« First ‹ Previous 41 - 60 of 82 Next › Last »
Showing 20 items per page