Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Web-fights-back

Rss Feed Group items tagged

Paul Merrell

To beat ISIS, kick out US-led coalition | nsnbc international - 0 views

  • It’s been a bad time for foes of ISIS. Islamic State scored a neat hat-trick by invading strategic Ramadi in Iraq’s mainly Sunni Anbar province, occupying Syria’s historic gem Palmyra, and taking over Al-Tanf, the last remaining border crossing with Iraq. The multinational, American-led ‘Coalition’ launched last August to thwart Islamic State’s (IS, formerly ISIS) march across Syria and Iraq…did nothing.
  • The Iraqis have shot back. Key MP Hakim al-Zamili blames Ramadi’s collapse on the US’s failure to provide “good equipment, weapons and aerial support” to troops. Deputy Prime Minister Saleh Mutlaq, himself a Sunni from Anbar Province, concluded that the Americans were coming up short in all areas. “The Coalition airstrikes are not enough to eliminate IS.” Furthermore, the US policy of recruiting Sunni tribes for the fight, he added, was “too late” – it is “important but not enough.” If ever there was an understatement, this is it. Washington’s long-stated objective of rallying together a vetted Sunni fighting force – or its equivalent in the form of a National Guard – has always served as a placeholder to avoid facing realities.
  • One thing we have learned from IS gains in small and large Sunni towns alike, is that the extremist group prides itself on sleeper cells and alliances inside of these areas. Sunni tribes and families, both, are divided on their support of IS. And the militants ensure that everyone else falls in line through a brutal campaign of inflicting fear and pain indiscriminately. So the likelihood of a significant, anti-IS, well-trained and equipped Sunni fighting force emerging anytime soon is just about nil. So too is the idea of a US-led Coalition air force that can cripple Islamic State. Washington has run fewer sorties over Syria and Iraq in the nine months since inception of its air campaign, than Israel ran in its entire three-week Gaza blitz in 2008-09. Where were the American bombers when Ramadi and Palmyra were being taken? And why does the US Air Force only seem to engage in earnest when their Kurdish allies are being threatened – as in Kobani (Ain al-Arab), Syria, and Erbil in Iraq?
  • ...12 more annotations...
  • If actions speak louder than words, then Washington’s moves in the Mideast have been deafening. Forget talk of a ‘unified Iraq’ with a ‘strong central government’. And definitely forget loudly-proclaimed objectives of ‘training moderate forces’ to ‘fight off IS’ across the Jordanian and Turkish borders in Syria. That’s just talk. An objective look at US interests in the region paint an entirely different picture. The Americans seek to maintain absolute hegemony in the Mideast, even as they exit costly military occupations of Iraq and Afghanistan. Their primary interests are 1) access to low cost oil and gas, 2) propping up Israel, and more recently, 3) undermining Russian (and Chinese) influence in the region. Clinging on to hegemony would be a whole lot easier without the presence of a powerful, independent Islamic Republic of Iran, which continues to throw a wrench in many of Washington’s regional projects. So hegemony is somewhat dependent on weakening Iran – and its supportive alliances.
  • But why ignore Sunni groups who are unreservedly opposed to IS? Aren’t they America’s natural constituents inside Iraq? The Takfiri extremist groups serve a purpose for Washington. IS has had the ability – where competing Sunni factions, with their ever-growing lists of demands from Baghdad, have not – to transform the US’ ‘buffer’ project into a physical reality. And Washington has not needed to expend blood, treasure or manpower to get the job done.
  • You only have to look at recent US actions in Iraq to see this unspoken plan in action. Washington’s most intensive airstrikes to date were when Kurdish Erbil and its environs came under threat by ISIS.Washington’s most intensive airstrikes to date were when Kurdish Erbil and its environs came under threat by ISIS. Congress has breached all international norms by ushering through legislation to directly arm Sunni and Kurdish militias and bypass the central government in Baghdad. And despite endless promises and commitments, the Americans have failed at every hurdle to train and equip the Iraqi Army and security forces to do anything useful. A weak, divided Iraq can never become a regional powerhouse allied with Iran and the Resistance Axis. Likewise a weak, divided Syria. But without US control over these central governments, the only way to achieve this is 1) through the creation of sectarian and ethnic strife that could carve out pro-US buffers inside the ‘Resistance states’ and/or 2) through the creation of a hostile ‘Sunni buffer’ to break this line from Iran to Palestine.
  • General Walid Sukariyya, a Sunni, pro-resistance member of Lebanon’s parliament, agrees. “ISIS will be better for the US and Israel than having a strong Iran, Iraq and Syria…If they succeed at this, the Sunni state in Iraq will split the resistance from Palestine.” While Washington has long sought to create a buffer in Iraq on the Syrian border, it has literally spent years trying – and failing – to find, then mold, representative Sunni Iraqi leaders who will comfortably toe a pro-American line. An example of this is the Anbar delegation US General John Allen handpicked last December for a DC tour, which excluded representatives of the two most prominent Sunni tribes fighting IS in Iraq – the Albu Alwan and Albu Nimr. A spokesman for the tribes, speaking to Al-Jarida newspaper, objected at the time: “We are fighting ISIL and getting slaughtered, while suffering from a shortage of weapons. In the meantime, others are going to Washington to get funds and will later be assigned as our leaders.”
  • With the removal of Saddam Hussein in Iraq, the US inadvertently extended Iran’s arc of influence in a direct geographic line to Palestine, leaving the Israeli colonial project vulnerable. Former President George W. Bush immediately took on the task of destroying this Resistance Axis by attempting to neuter Iranian allies Hezbollah, Syria and Hamas – and failed. The Arab Spring presented a fresh opportunity to regroup: the US and its Turkish and Persian Gulf allies swung into action to create conditions for regime-change in Syria. The goal? To break this geographic line from Iran – through Iraq, Syria and Lebanon – to Palestine. When regime-change failed, the goalpost moved to the next best plan: dividing Syria into several competing chunks, which would weaken the central state and create a pro-US ‘buffer’ along the border with Israel. Weakening the central government in Iraq by dividing the state along Kurdish, Sunni and Shiite lines has also been a priority for the Americans.
  • The DIA brief makes clear that the escalation of conflict in Syria will create further sectarianism and radicalization, which will increase the likelihood of an ‘Islamic State’ on the Syrian-Iraqi border, one that would likely be manned by the Islamic State of Iraq (ISI). So what did Washington do when it received this information? It lied. Less than one month after the DIA report was published, US Secretary of State John Kerry told the Senate Foreign Relations Committee this about the Syrian opposition: “I just don’t agree that a majority are Al-Qaeda and the bad guys. That’s not true. There are about 70,000 to 100,000 oppositionists … Maybe 15 percent to 25 percent might be in one group or another who are what we would deem to be bad guys…There is a real moderate opposition that exists.” Using the fabricated storyline of ‘moderate rebels’ who need assistance to fight a ‘criminal Syrian regime’, the US government kept the Syrian conflict buzzing, knowing full well the outcome would mean the establishment of a Sunni extremist entity spanning the Syrian-Iraqi border…which could cripple, what the Americans call, “the strategic depth of the Shia expansion.”As US Council on Foreign Relations member and terrorism analyst Max Abrahms conceded on Twitter: “The August 5, 2012 DIA report confirms much of what Assad has been saying all along about his opponents both inside & outside Syria.”
  • Since last year, numerous Iraqi officials have complained about the US airdropping weapons to IS – whether deliberately or inadvertently remains disputed. Military sources, on the other hand, have made clear that the US-led Coalition ignores many of the Iraqi requests for air cover during ground operations. If the US isn’t willing to play ball in Iraq’s existential fight against IS, then why bother with the Americans at all? Iraqi Prime Minister Haider al-Abadi is viewed as a ‘weak’ head of state – a relatively pro-American official who will work diligently to keep a balance between US interests and those of Iraq’s powerful neighbor, Iran. But after the disastrous fall of Ramadi, and more bad news from inside Syria, Abadi has little choice but to mitigate these losses, and rapidly. The prime minister has now ordered the engagement of thousands of Hashd al-Shaabi (Shiite paramilitary groups, commonly known as the Popular Mobilization Forces) troops in the Anbar to wrest back control of Ramadi. And this – unusually – comes with the blessings of Anbar’s Sunni tribes who voted overwhelmingly to appeal to the Hashd for military assistance.
  • Joining the Hashd are a few thousand Sunni fighters, making this a politically palatable response. If the Ramadi operation goes well, this joint Sunni-Shiite effort (which also proved successful in Tikrit) could provide Iraq with a model to emulate far and wide. The recent losses in Syria and Iraq have galvanized IS’ opponents from Lebanon to Iran to Russia, with commitments pouring in for weapons, manpower and funds. If Ramadi is recovered, this grouping is unlikely to halt its march, and will make a push to the Syrian border through IS-heavy territory. There is good reason for this: the militants who took Ramadi came across the Syrian border – in full sight of US reconnaissance capabilities. A senior resistance state official told me earlier this year: “We will not allow the establishment of a big (extremist) demographic and geographic area between Syria and Iraq. We will work to push Syrian ISIS inside Syria and Iraqi ISIS inside Iraq.”
  • Right now, the key to pushing back Takfiri gains inside Syria’s eastern and northwestern theaters lies in the strengthening of the Iraqi military landscape. And an absolute priority will be in clearing the IS ‘buffer’ between the two states. Eighteen months ago, in an analysis about how to fight jihadist militants from the Levant to the Persian Gulf, I wrote that the solution for this battle will be found only within the region, specifically from within those states whose security is most compromised or under threat: Lebanon, Syria, Iraq and Iran. I argued that these four states would be forced to increase their military cooperation as the battles intensified, and that they would provide the only ‘boots on the ground’ in this fight. And they will. But air cover is a necessary component of successful offensive operations, even in situations of unconventional warfare. If the US and its flimsy Coalition are unable or unwilling to provide the required reconnaissance assistance and the desired aerial coverage, as guided by a central Iraqi military command, then Iraq should look elsewhere for help.
  • Iran and Russia come to mind – and we may yet get there. Iraq and Syria need to merge their military strategies more effectively – again, an area where the Iranians and Russians can provide valuable expertise. Both states have hit a dangerous wall in the past few weeks, and the motivation for immediate and decisive action is high today. Lebanese resistance group Hezbollah is coming into play increasingly as well – its Secretary-General Hassan Nasrallah has recently promised that Hezbollah will no longer limit itself geographically, and will go where necessary to thwart this Takfiri enemy. The non-state actors that make up the jihadist and Takfiri core cannot be beaten by conventional armies, which is why local militias accustomed to asymmetric warfare are best suited for these battles. Criticizing the US’s utterly nonexistent response to the Ramadi debacle yesterday, Iran’s elite Quds Force Commander Qassem Suleimani points out: “Today, there is nobody in confrontation with [IS] except the Islamic Republic of Iran, as well as nations who are next to Iran or supported by Iran.” The Iranians have become central figures in the fight against terror, and are right next door to it – as opposed to Washington, over 6,000 miles away.
  • If the US has any real commitment to the War on Terror, it should focus on non-combat priorities that are also essential to undermine extremism: 1) securing the Turkish and Jordanian borders to prevent any further infiltration of jihadists into Syria and Iraq, 2) sanctioning countries and individuals who fund and weaponize the Takfiris, most of whom are staunch US allies, now ironically part of the ‘Coalition’ to fight IS, and 3) sharing critical intelligence about jihadist movements with those countries engaged in the battle. It is time to cut these losses and bring some heavyweights into this battle against extremism. If the US-directed Coalition will not deliver airstrikes under the explicit command of sovereign states engaged at great risk in this fight, it may be time to clear Iraqi and Syrian airspace of coalition jets, and fill those skies with committed partners instead.
  • Related documentation: DIA Doc Syria and Iraq:_ Pg.-291-Pgs.-287-293-JW-v-DOD-and-State-14-812-DOD-Release-2015-04-10-final-version11.
  •  
    Woh! Things definitely coming to an inflexion point in Syria and Iraq. This is a reprint from RT.com, the Russian video and web page news service. The hint of direct and overt military action by Russia and Iran should not be ignored. The U.S. is sandbagging for ISIL and al Nusiryah. 
Paul Merrell

US-trained Syrian rebels refuse to fight ​al-Qaida group after kidnappings | ... - 0 views

  • A group of Syrian rebels that includes fighters trained by the United States have declared their refusal to fight al-Qaida’s affiliate in the country, the Nusra Front, following a series of kidnappings by the militant group. A source in Division 30, which has endured a campaign of kidnappings by the Nusra Front, said they also oppose the American air strikes carried out in the last few days against the al-Qaida-linked fighters. The statements complicate the American strategy in Syria, which has suffered a string of setbacks and delays, deploying just over 50 fighters dedicated to fighting the terror group Islamic State in the year since its programme to train and equip rebels began. “With all the immense military power the US has at its disposal, the start to the mission is nothing short of an embarrassment and if it has any hope of succeeding, it needs to show results fast,” said Charles Lister, a visiting fellow at the Brookings Doha Center and an expert on Syrian insurgent groups. The Nusra Front launched a campaign of kidnappings and attacks against Division 30 shortly after the arrival of the first contingent of 50 to 60 US-trained fighters from Turkey, accusing the group of seeking to spread American influence.
  • The Qaida affiliate, whose fighters have pledged allegiance to Ayman al-Zawahiri, kidnapped Division 30’s overall commander last week along with six others as they planned an offensive against Isis positions in northern Aleppo. Nusra then attacked Division 30’s headquarters, killing five fighters and wounding 18 others, as the US-backed rebel group appealed for peace. The American-led coalition that has been assembled to fight Isis bombed Nusra positions in Syria in apparent retaliation. The US had previously targeted a Nusra-affiliated faction known as the Khorasan Group, which the Americans say is planning attacks against the west from inside Syria. Nusra’s leader has denied the group exists. Nusra’s campaign against the US-backed rebel unit continued this week, with the Syrian Observatory for Human Rights, a monitoring network with wide contacts inside Syria, saying Nusra kidnapped five more members of Division 30. A source in the US-backed group said those captured were actually families of the fighters.
  • “Division 30 was formed by the honorable sons of Syria to free their nation from Assad’s gangs and Daesh [Isis],” the statement said. “Division 30 pledges before the Syrian people to commit to the principles under which it was formed and to not be dragged into any side battle with any faction, and that it has not fought and will not fight the Nusra Front or any other faction regardless of name or ideology.” A source in Division 30 told the Guardian the group still has members training with the US and that they opposed American airstrikes against Nusra. “We have nothing to do with the coalition strikes, that is the truth and we are opposed to strikes against the Nusra Front’s facilities to this day,” the source said. “Our goal is clear – Daesh followed by the regime.” The latest declarations raise questions about the ability of the US to influence the rebels it has trained on the ground, and the viability of such an effort within Syria’s complex web of insurgent politics and alliances, where Isis and Nusra have emerged as two of the most powerful groups fighting on the ground.
  • ...2 more annotations...
  • It is unclear how many of the rebels actually trained by the US have been incapacitated in the campaign, with conflicting reports from activists and the rebel group itself, which says only one of its US-trained fighters has “disappeared”. In a new statement after the latest spate of kidnappings, Division 30 pledged never to fight Nusra and said it was focused on fighting Isis and the regime of President Bashar al-Assad.
  • “The group almost certainly does not believe some of the things it has said lately, including protesting at US strikes on Nusra, but you can hardly blame them for such attempts at rescuing their credibility on the ground,” said Lister. “It’s quite telling in fact that a majority of the mainstream opposition now views Division 30 and the train and equip mission with intense suspicion – not only for the lack of regime focus, but for the disastrous start the 54 fighters have had.”
  •  
    So the U.S. was planning on training 5,000 "moderate" Syrian rebels a year to first fight ISIL and then Assad. But after months of delay, they could only come up with 60 trainees. Now that "Division 60" is chewed up, leaderless, and refuses to fight. U.S. foreign poiicy seems to have issues in its implementation in the Mideast.
Paul Merrell

Notes from the Fight Against Surveillance and Censorship: 2014 in Review | Electronic F... - 0 views

  • 2014 in Review Series Net Neutrality Takes a Wild Ride 8 Stellar Surveillance Scoops Web Encryption Gets Stronger and More Widespread Big Patent Reform Wins in Court, Defeat (For Now) in Congress International Copyright Law More Time in the Spotlight for NSLs The State of Free Expression Online What We Learned About NSA Spying in 2014—And What We're Fighting to Expose in 2015 "Fair Use Is Working!" Email Encryption Grew Tremendously, but Still Needs Work Spies Vs. Spied, Worldwide The Fight in Congress to End the NSA's Mass Spying Open Access Movement Broadens, Moves Forward Stingrays Go Mainstream Three Vulnerabilities That Rocked the Online Security World Mobile Privacy and Security Takes Two Steps Forward, One Step Back It Was a Pivotal Year in TPP Activism but the Biggest Fight Is Still to Come The Government Spent a Lot of Time in Court Defending NSA Spying Last Year Let's Encrypt (the Entire Web)
  •  
    The Electronic Freedom Foundation just dropped an incredible bunch of articles on the world in the form of their "2014 Year In Review" series. These are major contributions that place an awful lot of information in context. I thought I had been keeping a close eye on the same subject matter, but I'm only part way through the articles and am learning time after time that I had missed really important news having to do with digital freedom. I can't recommend these articles enough. So far, they are all must-read.  
Gary Edwards

"War is a Racket" by General Smedly Butler - 1 views

  • by MAJOR GENERAL SMEDLEY D. BUTLER, USMC - Retired TWO-TIME Congressional Medal of Honor Recipient FULL TEXT ON LINE FREE
  • GET THE NEW PAPERBACK EDITION including two bonus titles.
  •  
    An accidental find, the full text online of USMC Maj. Gen. Smedley Butler's 1935 book, War Is a Racket. Butler served in the Marine Corps from 1899 to 1931 and at the time of his retirement was the most-decorated Marine in history, for both valor and accomplishments. Following his retirement, he became a vehement anti-war activist and public speaker.  This book is easily his most-cited and most-quoted published work. You can capture the flavor from an article he published in a magazine that included the following lines: "I spent 33 years and four months in active military service and during that period I spent most of my time as a high class muscle man for Big Business, for Wall Street and the bankers. In short, I was a racketeer, a gangster for capitalism. I helped make Mexico and especially Tampico safe for American oil interests in 1914. I helped make Haiti and Cuba a decent place for the National City Bank boys to collect revenues in. I helped in the raping of half a dozen Central American republics for the benefit of Wall Street. I helped purify Nicaragua for the International Banking House of Brown Brothers in 1902-1912. I brought light to the Dominican Republic for the American sugar interests in 1916. I helped make Honduras right for the American fruit companies in 1903. In China in 1927 I helped see to it that Standard Oil went on its way unmolested. Looking back on it, I might have given Al Capone a few hints. The best he could do was to operate his racket in three districts. I operated on three continents." http://en.wikipedia.org/wiki/Smedley_Butler#Lectures  I look forward to reading this book. The book was reprinted in 2003 and is available from the linked web site, together with two bonus titles. 
  •  
    "WAR IS A RACKET" - free online book CHAPTER ONE WAR is a racket. It always has been. It is possibly the oldest, easily the most profitable, surely the most vicious. It is the only one international in scope. It is the only one in which the profits are reckoned in dollars and the losses in lives. A racket is best described, I believe, as something that is not what it seems to the majority of the people. Only a small "inside" group knows what it is about. It is conducted for the benefit of the very few, at the expense of the very many. Out of war a few people make huge fortunes. In the World War [I] a mere handful garnered the profits of the conflict. At least 21,000 new millionaires and billionaires were made in the United States during the World War. That many admitted their huge blood gains in their income tax returns. How many other war millionaires falsified their tax returns no one knows. How many of these war millionaires shouldered a rifle? How many of them dug a trench? How many of them knew what it meant to go hungry in a rat-infested dug-out? How many of them spent sleepless, frightened nights, ducking shells and shrapnel and machine gun bullets? How many of them parried a bayonet thrust of an enemy? How many of them were wounded or killed in battle? Out of war nations acquire additional territory, if they are victorious. They just take it. This newly acquired territory promptly is exploited by the few - the selfsame few who wrung dollars out of blood in the war. The general public shoulders the bill. And what is this bill? This bill renders a horrible accounting. Newly placed gravestones. Mangled bodies. Shattered minds. Broken hearts and homes. Economic instability. Depression and all its attendant miseries. Back-breaking taxation for generations and generations. For a great many years, as a soldier, I had a suspicion that war was a racket; not until I retired to civil life did I fully realize it. Now that I see the international war clouds g
Paul Merrell

Turkish-Uyghur Terror Inc. - America's Other Al Qaeda | nsnbc international - 0 views

  • Because it relatively poorly understood and under-reported in comparison to other more notorious terrorist groups, the Turkish-Uyghur terror network is perhaps more dangerous and of greater utility to the United States and its allies presently versus their increasingly exposed Al Qaeda legions. The genesis of modern Turkish-sponsored terrorism, like Al Qaeda, also originates from the Cold War. Part of the wider stay-behind networks known as “Gladios” created by NATO to allegedly fight Soviet forces in the event of a Soviet invasion and occupation of Western Europe, these terrorist groups were instead turned against the population of NATO member states and engaged in violence, terrorism, mass murder, and assassinations. A group of ultra-nationalists known as the “Grey Wolves” would be cultivated for this task within Turkey. In a 1998 LA Times article titled, “Turkish Dirty War Revealed, but Papal Shooting Still Obscured,” it would be reported that (emphasis added):
  • In the late 1970s, armed bands of Gray Wolves launched a wave of bomb attacks and shootings that killed hundreds of people, including public officials, journalists, students, lawyers, labor organizers, left-wing activists and ethnic Kurds. During this period, the Gray Wolves operated with encouragement and protection of the Counter-Guerrilla Organization, a section of the Turkish Army’s Special Warfare Department. Working out of the U.S. Military Aid Mission building in Ankara, the Special Warfare Department received funds and training from U.S. advisors to establish “stay behind” squads of civilian irregulars who were set up to engage in acts of sabotage and resistance in the event of a Soviet invasion. Similar Cold War counter-guerrilla units were created in every member state of the North Atlantic Treaty Organization. But instead of preparing for foreign enemies, these operatives often set their sights on domestic targets. Another LA Times piece titled, “Turkey’s Gray Wolves Nip at Heels of Power,” would reveal the extent of the Grey Wolves reign of terror (emphasis added): At the height of the Cold War, the army used the Gray Wolves as a violent counterweight to Turkish Communists. The party’s coffers swelled with secret contributions from the government.  By the late 1970s, the Gray Wolves had spun out of state control. Their paramilitary wing fought a campaign against leftist rivals that killed nearly 6,000 people. Ali Agca, who shot Pope John Paul II in a 1981 assassination attempt, is alleged to have been affiliated with the party.
  • The article would also reveal that despite this horrific past, the Grey Wolves and their political allies were still a very potent political force in Turkey. Today, the Grey Wolves function as a paramilitary wing of the Nationalist Movement Party (MHP), which holds the third largest number of seats in Turkey’s parliament. As troubling as this should be to Turks who may find themselves on the receiving end of a politically powerful terrorist organization apparently tolerated, even sponsored by NATO for decades and in particular, supported by the United States, the Grey Wolves’ terrorism has branched out far beyond Turkey’s borders. NATO Gladio Goes Global  According to a 2009 New American Media report titled, “Behind the China Riots — Oil, Terrorism & ‘Grey Wolves’,” Turkey’s Grey Wolves have established militant training camps as far as China’s western Xinjiang region, helping produce violent terrorists who have carried out a series of deadly attacks across China. The report would state (emphasis added):
  • ...4 more annotations...
  • Enter the Grey Wolves, one of the world’s most notorious terrorist organizations. Founded in the 1960s, the Wolves are a pan-Turkic paramilitary group with 1 million followers across the Near East, Central Asia and inside Xinjiang. During the decade of political violence in Turkey in the 1980s, the military-backed activists launched a wave of assassinations, massacres of ethnic minorities, and extortions of businesses. By official count, the Turkish government holds the Wolves responsible for more than 600 murders, while leftists estimate the victims numbered in the many thousands.  Following the collapse of the Soviet Union, the Grey Wolves set up training camps in Central Asia for youths from Turkic language groups, including Uighur. Their indoctrination program embraces the goal of establishing Turan, a Turkish empire across Euro-Asia, subjugating non-Turkish races and unleashing violence to achieve their ends. Out of the limelight, the Wolves provided commando training and material support for the East Turkestan Independence Movement. In essence, NATO’s stay-behind networks had become NATO’s “go-abroad” networks, projecting the same sort of violence, terrorism, and political coercion abroad after the Cold War that these networks carried out domestically during the Cold War.
  • The alleged “struggle” by the Uyghur people in Xinjiang, referred to by the terrorists and their foreign sponsors as “East Turkistan,” consists of two essential components – a foreign harbored political front including the Washington D.C. and Munich-based World Uyghur Congress (WUC) and a militant front clearly backed by the US and NATO through intermediary groups like Turkey’s Grey Wolves. Like the Grey Wolves, the World Uyghur Congress is a creation and perpetuation of Western special interests. WUC is directly funded by the US State Department via the National Endowment for Democracy (NED) over a quarter of a million dollars (on record) a year. The NED admittedly organizes and underwrites all of WUC’s events, and their annual meetings usually feature almost exclusively US representatives reaffirming their commitment to support WUC’s objectives
  • Looking at a map of China it is clear that this campaign of separatism directly serves the long-standing plans of the United States to encircle and contain China’s rise – a campaign that has been openly and repeated outlined in US policy papers for decades – the most recent of which was published by the Council on Foreign Relations (CFR) and was titled, “Revising U.S. Grand Strategy Toward China.” It states in no uncertain terms: Because the American effort to ‘integrate’ China into the liberal international order has now generated new threats to U.S. primacy in Asia—and could result in a consequential challenge to American power globally—Washington needs a new grand strategy toward China that centers on balancing the rise of Chinese power rather than continuing to assist its ascendancy. Encouraging separatism in China’s western Xinjiang region, if successful, would carve off a substantial amount of territory. In conjunction with US-backed separatism in China’s Tibet region, an immense buffer region stands to be created that would virtually isolate China from Central Asia. And while the Grey Wolves and their Uyghur proxies are working hard to create this barrier to China’s west, with their involvement in a recent bombing in Bangkok, it appears the US is now using them to augment efforts to create a similar encirclement across Southeast Asia.
  • The Turkish-Uyghur terror network, in addition to fomenting violence across China, has more recently been trafficking terrorists from Xinjiang, through Southeast Asia, and onward to Turkey where they are staged, armed, trained, and then sent to fight NATO’s proxy war in Syria. This trafficking network apparently snaked its way through Thailand – exposed when Thailand detained over 100 Uyghurs which it then deported upon Beijing’s request back to China in July. On the same day the deportations occurred WUC and NATO’s Grey Wolves organized violent protests in Turkey both in Ankara and at the Thai consulate in Istanbul during which the consulate was invaded and destroyed. A month later, a devastating bomb would detonate in the heart of Bangkok, killing 20 mostly Chinese tourists and injuring over 100 more. In addition to the BBC already being on site before the blast, the British network would conclude even before bodies were cleared from the site that Uyghurs were likely behind the blast. This was done specifically to deflect blame from another US proxy, Thaksin Shinawatra, who has been attempting for years to regain power in Thailand. In reality, Shinawatra and the Uyghur terrorists are both functions of the same Westesrn agenda to encircle and contain China by building up a “wall” of proxy states around Beijing, and if nothing else, to create chaos in which Beijing finds it nearly impossible to prosper.
Paul Merrell

BBC Protects U.K.'s Close Ally Saudi Arabia With Incredibly Dishonest and Biased Editing - 0 views

  • The BBC loves to boast about how “objective” and “neutral” it is. But a recent article, which it was forced to change, illustrates the lengths to which the British state-funded media outlet will go to protect one of the U.K. government’s closest allies, Saudi Arabia, which also happens to be one of the country’s largest arms purchasers (just this morning, the Saudi ambassador to the U.K. threatened in an op-ed that any further criticism of the Riyadh regime by Jeremy Corbyn could jeopardize the multi-layered U.K./Saudi alliance). Earlier this month, the BBC published an article describing the increase in weapons and money sent by Saudi Arabia and other Gulf regimes to anti-Assad fighters in Syria. All of that “reporting” was based on the claims of what the BBC called “a Saudi government official,” who — because he works for a government closely allied with the U.K. — was granted anonymity by the BBC and then had his claims mindlessly and uncritically presented as fact (it is the rare exception when the BBC reports adversarially on the Saudis). This anonymous “Saudi official” wasn’t whistleblowing or presenting information contrary to the interests of the regime; to the contrary, he was disseminating official information the regime wanted publicized. This was the key claim of the anonymous Saudi official (emphasis added):
  • The well-placed official, who asked not to be named, said supplies of modern, high-powered weaponry including guided anti-tank weapons would be increased to the Arab- and western-backed rebel groups fighting the forces of Syria’s President Bashar al-Assad and his Russian, Iranian and Lebanese allies. He said those groups being supplied did not include either Islamic State (IS) or al-Nusra Front, both of which are proscribed terrorist organizations. Instead, he said the weapons would go to three rebel alliances — Jaish al-Fatah (Army of Conquest), the Free Syrian Army (FSA) and the Southern Front.
  • So the Saudis, says the anonymous official, are only arming groups such as the “Army of Conquest,” but not the al Qaeda affiliate the Nusra Front. What’s the problem with this claim? It’s obvious, though the BBC would not be so impolite as to point it out: The Army of Conquest includes the Nusra Front as one of its most potent components. This is not even in remote dispute; the New York Times’ elementary explainer on the Army of Conquest from three weeks ago states:
  • ...4 more annotations...
  • The alliance consists of a number of mostly Islamist factions, including the Nusra Front, al Qaeda’s Syrian affiliate; Ahrar al-Sham, another large group; and more moderate rebel factions that have received covert arms support from the intelligence services of the United States and its allies. The Telegraph, in an early October article complaining that Russia was bombing “non-ISIL rebels,” similarly noted that the Army of Conquest (bombed by Russia) “includes a number of Islamist groups, most powerful among them Ahrar al-Sham and Jabhat al-Nusra. Jabhat al-Nusra is the local affiliate of al-Qaeda.” Even the Voice of America noted that “Russia’s main target has been the Army of Conquest, an alliance of insurgent groups that includes the al-Nusra Front, al-Qaida’s affiliate in Syria, and the hard-line Islamist group Ahrar al-Sham, as well as some less extreme Islamist groups.”
  • In other words, the claim from the anonymous Saudi official that the BBC uncritically regurgitated — that the Saudis are only arming the Army of Conquest but no groups that “include” the Nusra Front — is self-negating. A BBC reader, Ricardo Vaz, brought this contradiction to the BBC’s attention. As he told The Intercept: “The problem is that the Nusra Front is the most important faction inside the Army of Conquest. So either the Saudi official expected the BBC journalist not to know this, or he expects us to believe they can deliver weapons to factions fighting side by side with an al Qaeda affiliate and that those weapons will not make their way into Nusra’s hands. In any case, this is very close to an official admission that the Saudis (along with Qataris and Turkish) are supplying weapons to an al Qaeda affiliate. This of course is not a secret to anyone who’s paying attention.” In response to Vaz’s complaint, the BBC did not tell its readers about this vital admission. Instead, it simply edited that Saudi admission out of its article. In doing so, it made the already-misleading article so much worse, as the BBC went even further out of its way to protect the Saudis. This is what that passage now states on the current version of the article on the BBC’s site (emphasis added): He said those groups being supplied did not include either Islamic State (IS) or al-Nusra Front, both of which are proscribed terrorist organizations. Instead, he said the weapons would go to the Free Syrian Army and other small rebel groups.
  • So originally, the BBC stated that the “Saudi official” announced that the regime was arming the Army of Conquest. Once it was brought to the BBC’s attention that the Army of Conquest includes the al Qaeda affiliate Nusra Front — a direct contradiction of the Saudi official’s other claim that the Saudis are not arming Nusra — the BBC literally changed the Saudi official’s own statement, whitewashed it, to eliminate his admission that they were arming Army of Conquest. Instead, the BBC now states that the Saudis are arming “the Free Syrian Army and other small rebel groups.” The BBC simply deleted the key admission that the Saudis are arming al Qaeda.
  • But what this does highlight is just how ludicrous — how beyond parody — the 14-year-old war on terror has become, how little it has to do with its original ostensible justification. The regime with the greatest plausible proximity to the 9/11 attack — Saudi Arabia — is the closest U.S. ally in the region next to Israel. The country that had absolutely nothing to do with that attack, and which is at least as threatened as the U.S. by the religious ideology that spurred it — Iran — is the U.S.’s greatest war-on-terror adversary. Now we have a virtual admission from the Saudis that they are arming a group that centrally includes al Qaeda, while the U.S. itself has at least indirectly done the same (just as was true in Libya). And we’re actually at the point where western media outlets are vehemently denouncing Russia for bombing al Qaeda elements, which those outlets are  manipulatively referring to as “non-ISIS groups.” It’s not a stretch to say that the faction that provides the greatest material support to al Qaeda at this point is the U.S. and its closest allies. That is true even as al Qaeda continues to be paraded around as the prime need for the ongoing war. But whatever one’s views are on Syria, it’s telling indeed to watch the BBC desperately protect Saudi officials, not only by granting them anonymity to spout official propaganda, but worse, by using blatant editing games to whitewash the Saudis’ own damaging admissions, ones the BBC unwittingly published. There are many adjectives one can apply to the BBC’s behavior here: “Objective” and “neutral” are most assuredly not among them.
  •  
    Glenn Greenwald riffs on BBC's latest cover-up on behalf of the U.S. allies backing for al-Nusrah.
Paul Merrell

Information Warfare: Automated Propaganda and Social Media Bots | Global Research - 0 views

  • NATO has announced that it is launching an “information war” against Russia. The UK publicly announced a battalion of keyboard warriors to spread disinformation. It’s well-documented that the West has long used false propaganda to sway public opinion. Western military and intelligence services manipulate social media to counter criticism of Western policies. Such manipulation includes flooding social media with comments supporting the government and large corporations, using armies of sock puppets, i.e. fake social media identities. See this, this, this, this and this. In 2013, the American Congress repealed the formal ban against the deployment of propaganda against U.S. citizens living on American soil. So there’s even less to constrain propaganda than before.
  • Information warfare for propaganda purposes also includes: The Pentagon, Federal Reserve and other government entities using software to track discussion of political issues … to try to nip dissent in the bud before it goes viral “Controlling, infiltrating, manipulating and warping” online discourse Use of artificial intelligence programs to try to predict how people will react to propaganda
  • Some of the propaganda is spread by software programs. We pointed out 6 years ago that people were writing scripts to censor hard-hitting information from social media. One of America’s top cyber-propagandists – former high-level military information officer Joel Harding – wrote in December: I was in a discussion today about information being used in social media as a possible weapon.  The people I was talking with have a tool which scrapes social media sites, gauges their sentiment and gives the user the opportunity to automatically generate a persuasive response. Their tool is called a “Social Networking Influence Engine”. *** The implications seem to be profound for the information environment. *** The people who own this tool are in the civilian world and don’t even remotely touch the defense sector, so getting approval from the US Department of State might not even occur to them.
  • ...2 more annotations...
  • How Can This Real? Gizmodo reported in 2010: Software developer Nigel Leck got tired rehashing the same 140-character arguments against climate change deniers, so he programmed a bot that does the work for him. With citations! Leck’s bot, @AI_AGW, doesn’t just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source. As can be the case with these sorts of things, many of the deniers don’t know they’ve been targeted by a robot and engage AI_AGW in debate. The bot will continue to fire back canned responses that best fit the interlocutor’s line of debate—Leck says this goes on for days, in some cases—and the bot’s been outfitted with a number of responses on the topic of religion, where the arguments unsurprisingly often end up. Technology has come a long way in the past 5 years. So if a lone programmer could do this 5 years ago, imagine what he could do now. And the big players have a lot more resources at their disposal than a lone climate activist/software developer does.  For example, a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (and see this).  So if the lone programmer is doing it, it’s not unreasonable to assume that the big boys are widely doing it.
  • How Effective Are Automated Comments? Unfortunately, this is more effective than you might assume … Specifically, scientists have shown that name-calling and swearing breaks down people’s ability to think rationally … and intentionally sowing discord and posting junk comments to push down insightful comments  are common propaganda techniques. Indeed, an automated program need not even be that sophisticated … it can copy a couple of words from the main post or a comment, and then spew back one or more radioactive labels such as “terrorist”, “commie”, “Russia-lover”, “wimp”, “fascist”, “loser”, “traitor”, “conspiratard”, etc. Given that Harding and his compadres consider anyone who questions any U.S. policies as an enemy of the state  – as does the Obama administration (and see this) – many honest, patriotic writers and commenters may be targeted for automated propaganda comments.
Paul Merrell

Launching in 2015: A Certificate Authority to Encrypt the Entire Web | Electronic Front... - 0 views

  • Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, IdenTrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.Although the HTTP protocol has been hugely successful, it is inherently insecure. Whenever you use an HTTP website, you are always vulnerable to problems, including account hijacking and identity theft; surveillance and tracking by governments, companies, and both in concert; injection of malicious scripts into pages; and censorship that targets specific keywords or specific pages on sites. The HTTPS protocol, though it is not yet flawless, is a vast improvement on all of these fronts, and we need to move to a future where every website is HTTPS by default.With a launch scheduled for summer 2015, the Let’s Encrypt CA will automatically issue and manage free certificates for any website that needs them. Switching a webserver from HTTP to HTTPS with this CA will be as easy as issuing one command, or clicking one button.
  • The biggest obstacle to HTTPS deployment has been the complexity, bureaucracy, and cost of the certificates that HTTPS requires. We’re all familiar with the warnings and error messages produced by misconfigured certificates. These warnings are a hint that HTTPS (and other uses of TLS/SSL) is dependent on a horrifyingly complex and often structurally dysfunctional bureaucracy for authentication.
  • The need to obtain, install, and manage certificates from that bureaucracy is the largest reason that sites keep using HTTP instead of HTTPS. In our tests, it typically takes a web developer 1-3 hours to enable encryption for the first time. The Let’s Encrypt project is aiming to fix that by reducing setup time to 20-30 seconds. You can help test and hack on the developer preview of our Let's Encrypt agent software or watch a video of it in action here:
  • ...1 more annotation...
  • Let’s Encrypt will employ a number of new technologies to manage secure automated verification of domains and issuance of certificates. We will use a protocol we’re developing called ACME between web servers and the CA, which includes support for new and stronger forms of domain validation. We will also employ Internet-wide datasets of certificates, such as EFF’s own Decentralized SSL Observatory, the University of Michigan’s scans.io, and Google's Certificate Transparency logs, to make higher-security decisions about when a certificate is safe to issue.The Let’s Encrypt CA will be operated by a new non-profit organization called the Internet Security Research Group (ISRG). EFF helped to put together this initiative with Mozilla and the University of Michigan, and it has been joined for launch by partners including Cisco, Akamai, and Identrust.
Paul Merrell

Obama's Novel Lawyering to Bomb Syria | Consortiumnews - 0 views

  • The Obama administration has devised an extraordinary legal justification for carrying out bombing attacks inside Syria: that the United States and its Persian Gulf allies have the right to defend Iraq against the Islamic State because the Syrian government is unable to stop the cross-border terror group. “The Syrian regime has shown that it cannot and will not confront these safe havens effectively itself,” said the U.S. letter delivered by Ambassador Samantha Power to United Nations officials. “Accordingly, the United States has initiated necessary and proportionate military actions in Syria in order to eliminate the ongoing ISIL [Islamic State] threat to Iraq, including by protecting Iraqi citizens from further attacks and by enabling Iraqi forces to regain control of Iraq’s borders.”
  • Yet, beyond the danger to world order if such an expansive theory is embraced by the international community (does anyone remember how World War One got started?), there is the hypocrisy of the U.S. government and many of those same Gulf allies arming, training and funding Syrian rebels for the purpose of preventing the Syrian military from controlling its territory and then citing that lack of control as the rationale to ignore Syria’s sovereignty. In other words, the United States, Saudi Arabia, Qatar, Jordan and other enemies of Syria covertly backed the rebels inside Syria and watched as many of them – including thousands of the U.S.-preferred “moderates” – took their newly acquired military skills to al-Qaeda affiliates and other terrorist organizations. Then, the U.S. and its allies have the audacity to point to the existence of those terror groups inside Syria as a rationale for flying bombing raids into Syria.
  • Another alarming part of the U.S. legal theory is that among this new “coalition of the willing” – the U.S., Saudi Arabia, the United Arab Emirates, Qatar, Bahrain and Jordan – only Jordan shares a border with Syria. So, this novel principle would mean that distant countries have the right to destabilize a country from afar and then claim the destabilization justifies mounting military attacks inside that country. Such a theory – if accepted as a new standard of behavior – could wreak havoc on international order which is based on the principle of national sovereignty. The U.S. theory also stands in marked contrast to Washington’s pious embrace of strict readings of international law when denouncing Russia just this summer for trying to protect ethnic Russians in eastern Ukraine from brutal assaults by the U.S.-backed coup regime in Kiev.
  • ...6 more annotations...
  • An entirely different set of rules were applied to Syria, where President Barack Obama decided that Syrian President Bashar al-Assad “must go” and where Obama authorized the CIA to provide arms, training and money for supposedly “moderate” rebels. Other U.S. “allies,” such as Saudi Arabia and Qatar, supported some of the more extreme anti-Assad groups. Israel’s right-wing Likud government also was eager for “regime change” in Syria as were America’s influential neoconservatives who saw Assad’s overthrow as a continuation of their strategy of removing Middle East leaders regarded as hostile to Israel. Saddam Hussein’s Iraq was the first on the list with Syria and Iran to follow. In those cases, the application of international law was entirely optional.
  • In 2011, the Obama administration’s “liberal interventionists” threw their weight behind a Sunni-led uprising to oust Assad, who runs a harsh but largely secular government with key support from Alawites, Shiites, Christians and other minorities who feared Sunni extremism. As with Iraq, Syria’s sectarian violence drew in many Sunni extremists, including jihadists associated with al-Qaeda, particularly the Nusra Front but also “al-Qaeda in Iraq” which rebranded itself the Islamic State of Iraq and Syria or simply the Islamic State. Eventually, al-Qaeda leaders rejected the Islamic State because it had become a rival of the Nusra Front and because its brutality was  too graphic even for al-Qaeda. Despite the growing radicalism of Syrian rebels, Official Washington’s influential neocons and the “liberal interventionists” continued the drumbeat for ousting Assad, a position also shared by Israeli leaders who went so far as to indicate they would prefer Damascus to fall to al-Qaeda extremists rather than have Iranian ally Assad retain control. [See Consortiumnews.com’s “Israel Sides with Syrian Jihadists.”]
  • Yet, with al-Qaeda-connected terrorists controlling part of the Israeli border along the Golan Heights, the Israeli government began to reverse its position on demanding Assad’s removal. As the Israeli investigative Web site, Debka Files, reported on Sept. 9, citing military and intelligence sources: “The Israeli government has radically changed tack on Syria, reversing a policy and military strategy that were long geared to opposing Syrian President Bashar Assad … This reversal has come about in the light of the growing preponderance of radical Islamists in the Syrian rebel force fighting Assad’s army in the Quneitra area since June. Al Qaeda’s Syrian Nusra front … is estimated to account by now for 40-50 percent – or roughly, 4,000-5,000 Islamists – of the rebel force deployed just across Israel’s Golan border. … “Nusra Front jihadis fighting alongside insurgents on the various Syrian battlefronts made a practice of surreptitiously infiltrating their non-Islamist brothers-at-arms, a process which the latter’s foreign allies, the US, Israel, Saudi Arabia, Qatar and Jordan, either ignored or were unaware of. These tactics began to pay off in the past month, when large numbers of moderate rebels suddenly knocked on the Nusra Front’s door and asked to join.”
  • I have confirmed this Israeli shift with my own sourcing. But it’s unclear whether Israel’s change of heart will cause any second thoughts among U.S. neocons who typically conform their policy recommendations to Israeli interests. However, on the Syrian case, the neocons and their “liberal interventionists” friends might be too dug in on ousting Assad to adjust. Indeed, all of Official Washington seems incapable of admitting that its wishful thinking about Syrian “moderates” may have caused another major strategic error in the Mideast. The unrealistic “group think” about “moderates” contributed to a power vacuum in Syria that has pulled in some of the most vicious Islamic extremists on earth and turned parts of Syria into a new base of operation for international terrorism.
  • For his part, President Obama recognized the folly of training Syrian “moderates” – just last month he dismissed the notion as a “fantasy” that was “never in the cards” as a workable strategy – but he nevertheless resurrected it last week as a key part of his new Syrian initiative. He won solid congressional majorities in support of spending some $500 million on the training scheme. The most charitable view of Obama’s strange flip-flop is that he feared being accused of aiding Assad if the U.S. bombing campaign against the Islamic State indirectly strengthened Assad’s hold on Damascus. So, Obama tacked on what he knew to be a useless appendage, a tough-sounding plan to “ramp up” the “moderate” rebel forces.
  • Yet, Obama may find it politically impossible to state the truth – that a “realist” approach to foreign affairs sometimes requires working with disreputable governments. So, instead of simply saying that Syria has no objection to these bombing raids, Obama has invented a dangerous new legal theory to justify the violation of a country’s sovereignty.
Paul Merrell

Ending Syria's Nightmare will Take Pressure From Below  - 0 views

  • On Wednesday, the US airlifted hundreds of mainly-Kurdish fighters to an area behind ISIS lines where they were dropped near the town of al-Tabqa. The troops– who are part of the US-backed Syrian Democratic Forces or SDF– were accompanied by an undisclosed number of US Marines serving as advisors. Ostensibly, the deployment was intended to encircle ISIS positions and retake the area around the strategic Tabqa Dam. But the operation had the added effect of blocking the Syrian Arab Army (SAA) from advancing  along the main road towards Raqqa, the so called Capital of ISIS.  While the blocking move might have been coincidental, there’s a strong possibility that Washington is in the opening phase of a broader strategy to splinter the war-torn country and prevent the reemergence of a united secular Syria. According to Almasdar News: “The Coalition supported the offensive with air movement and logistical support, precision airstrikes, Apache helicopters in close air support, Marine artillery, and special operations advice and assistance to SDF leadership,” the US-led coalition said in a statement.” (AMN News) In a matter of weeks, Washington’s approach to the war in Syria has changed dramatically. While the US has reportedly ended its support for the Sunni militias that have torn the country apart and killed over 400,000 people, the US has increased its aid to the SDF that is making impressive territorial gains across the eastern corridor. The ultimate goal for the SDF fighters is an autonomous Kurdish homeland carved out of West Iraq and East Syria, while US objectives focus primarily on the breakup of the Syrian state, the removal of the elected government, the control over critical pipelines routes, and the redrawing of national borders to better serve the interests of the US and Israel.
  • The most recent adaptation of Yinon’s plan was articulated by Brookings Institute analyst Michael O’ Hanlon in a piece that appeared in the Wall Street Journal titled “A Trump Strategy to End Syria’s Nightmare”.  In the article, O’ Hanlon states bluntly: “To achieve peace, Syria will need self-governance within a number of autonomous zones. One option is a confederal system by which the whole country is divided into such zones. A less desirable but minimally acceptable alternative could be several autonomous zones within an otherwise still-centralized state—similar to how Iraqi Kurdistan has functioned for a quarter-century…. Security in the Sunni Arab and Kurdish autonomous zones would be provided by local police and perhaps paramilitary forces raised, trained and equipped with the direct support of the international community. …(“A Trump Strategy to End Syria’s Nightmare”, Wall Street Journal) In an earlier piece, O’ Hanlon referred to his scheme as “Deconstructing Syria” a plan that “would produce autonomous zones that would never again have to face the prospect of rule by either Assad or ISIL.” Many of the details in O’ Hanlon’s piece are identical to those in Trump’s plan which was announced by Secretary of State Tillerson just last week. The Brookings strategy appears to be the script from which the administration is operating.
  • In his presentation, Tillerson announced that US troops would not leave Iraq after the siege of Mosul was concluded which has led many to speculate that the same policy will be used in Syria. Here’s an excerpt from an article at the WSWS that explains this point: “US Secretary of State Rex Tillerson declared Washington’s intention to keep troops deployed more or less indefinitely in the territories now occupied by Islamic State in Iraq and Syria in remarks delivered at the beginning of a two-day meeting of the US-organized anti-ISIS coalition in Washington. “The military power of the coalition will remain where this fraudulent caliphate has existed in order to set the conditions for a full recovery from the tyranny of ISIS,” he told an audience that included Iraqi Prime Minister Haider al-Abadi. He gave no indication of when, if ever, US troops could be withdrawn from a war zone extending across Iraq and Syria, where there has been fighting of greater or lesser intensity throughout the 14 years since the US first invaded Iraq.” (Tillerson pledges long-term US military role in Iraq and Syria, World Socialist web Site) US Defense Secretary James “Mad Dog” Mattis reinforced Tillerson’s comments adding that the US plans a indefinite occupation of Iraq (and, possibly, Syria) stating that it was in America’s “national interest.”
  • ...3 more annotations...
  • “We will pursue a new foreign policy that finally learns from the mistakes of the past…We will stop looking to topple regimes and overthrow governments…. Our goal is stability not chaos, because we want to rebuild our country [the United States] …In our dealings with other countries, we will seek shared interests wherever possible and pursue a new era of peace, understanding, and good will.” There won’t be any peace under Mattis or McMaster, that’s for sure. Both men are anti-Moscow hardliners who think Russia is an emerging rival that must be confronted and defeated. Even more worrisome is the fact that uber-hawk John McCain recently stated that he talks with both men “almost daily” (even though he has avoided talking to Trump since he was elected in November.) According to German Marshall Fund’s Derek Chollet, a former Obama Pentagon official. “(McCain) is trying to run U.S. defense policy through Mattis and effectively ignore Trump.” (Kimberly Dozier, Daily Beast contributing editor)  Chollet’s comments square with our belief that Trump has relinquished his control over foreign policy to placate his critics.
  • In response to Mattis’s comments, Syrian President Bashar al Assad said: “Any military operation in Syria without the approval of the Syrian government is illegal, and  any troops on the Syrian soil,  is an invasion, whether to liberate Raqqa or any other place. …The (US-led) coalition has never been serious about fighting ISIS or the terrorists.” Clearly, Washington is using the fight against ISIS as a pretext for capturing and holding territory in a critical, energy-rich area of the world. The plan to seize parts of East Syria for military bases and pipeline corridors fits neatly within this same basic strategy.   But it also throws a wrench in Moscow’s plan to restore the country’s borders and put an end to the six year-long conflict. And what does Tillerson mean when he talks about “interim zones of stability” a moniker that the Trump administration carefully crafted to avoid the more portentous-sounding “safe zones”. (Readers will recall that Hillary Clinton was the biggest proponent of safe zones in Syria, even though they would require a huge commitment of US troops as well as the costly imposition of a no-fly zone.) Tillerson’s comments suggest that the Trump administration is deepening its involvement in Syria despite the risks of a catastrophic clash with Moscow. Ever since General Michael Flynn was forced to step down from his position as National Security Advisor, (Flynn wanted to “normalize” relations with Russia), Trump has filled his foreign policy team with Russophobic hawks who see Moscow as “hostile revisionist power” that “annex(es) territory, intimidates our allies, develops nuclear weapons, and uses proxies under the cover of modernized conventional militaries.” Those are the words of  the man who replaced Flynn as NSA,  Lt. General HR McMaster. While the media applauded the McMaster appointment as an “outstanding choice”, his critics think it signals a departure from Trump’s campaign promise:
  • Washington’s Syria policy is now in the hands of a small group of right-wing extremists who think Russia is the biggest threat the nation has faced since WW2. That’s why there’s been a sharp uptick in the number of troops deployed to the region. 
Paul Merrell

The White House Has Been Covering Up the Presidency's Role in Torture for Years - The I... - 0 views

  • On May 10, 2013, John Brennan presented CIA’s response to the Senate Intelligence Committee Torture Report to the President. Official White House Photo by Pete Souza. The fight between the CIA and the Senate Intelligence Committee over the Committee’s Torture Report – which Dan Froomkin covered here – has now zeroed in on the White House. Did the White House order the CIA to withdraw 920 documents from a server made available to Committee staffers, as Senator Dianne Feinstein says the agency claimed in 2010? Were those documents – perhaps thousands of them – pulled in deference to a White House claim of executive privilege, as Senator Mark Udall and then CIA General Counsel Stephen Preston suggested last fall? And is the White House continuing to withhold 9,000 pages of documents without invoking privilege, as McClatchy reported yesterday? We can be sure about one thing: The Obama White House has covered up the Bush presidency’s role in the torture program for years. Specifically, from 2009 to 2012, the administration went to extraordinary lengths to keep a single short phrase, describing President Bush’s authorization of the torture program, secret.
  • As Steven Aftergood, director of the Federation of American Scientists Project on Government Secrecy, noted  in 2009 – shortly after Hayden revealed that torture started as a covert operation – this means there should be a paper trail implicating President Bush in the torture program. “[T]here should be a Presidential ‘finding’ authorizing the program,” he said, “and [] such a finding should have been provided to Congressional overseers.” The National Security Act dictates that every covert operation must be supported by a written declaration finding that the action is necessary and important to the national security. The Congressional Intelligence committees – or at least the Chair and Ranking Member – should receive notice of the finding. But there is evidence that those Congressional overseers were never told that the finding the president signed on September 17, 2001 authorized torture. For example, a letter from then ranking member of the House Intelligence Committee, Jane Harman, to the CIA’s General Counsel following her first briefing on torture asked: “Have enhanced techniques been authorized and approved by the President?” The CIA’s response at the time was simply that “policy as well as legal matters have been addressed within the Executive Branch.”
  • Nevertheless, the finding does exist. The CIA even disclosed its existence in response to the ACLU FOIA, describing it as “a 14-page memorandum dated 17 September 2001 from President Bush to the Director of the CIA pertaining to the CIA’s authorization to detain terrorists.” In an order in the ACLU suit, Judge Alvin K. Hellerstein confirmed that the declaration was “intertwined with” the administration’s effort to keep the language in the Tenet document hidden. When the administration succeeded in keeping that short phrase secret, all effort to release the declaration also ended.
  • ...4 more annotations...
  • The White House’s fight to keep the short phrase describing Bush’s authorization of the torture program hidden speaks to its apparent ambivalence over the torture program. Even after President Obama released the DOJ memos authorizing torture – along with a damning CIA Inspector General Report and a wide range of documents revealing bureaucratic discussions within the CIA about torture – the White House still fought the release of the phrase that would have made it clear that the CIA conducted this torture at the order of the president. And it did so with a classified declaration from Jones that would have remained secret had Judge Hellerstein not insisted it be made public. As Aftergood noted, such White House intervention in a FOIA suit is rare. “The number of times that a national security advisor has filed a declaration in a FOIA lawsuit is vanishingly small,” he said. “It almost never happens.” But as ACLU Deputy Legal Director Jameel Jaffer noted of the finding, “It was the original authority for the CIA’s secret prisons and for the agency’s rendition and torture program, and apparently it was the authority for the targeted killing program as well.  It was the urtext.  It’s remarkable that after all this time it’s still secret.”
  • Enduring confusion about this particular finding surely exists because of its flexible nature. As Bob Woodward described in Bush at War, CIA Director Tenet asked President Bush to sign “a broad intelligence order permitting the CIA to conduct covert operations without having to come back for formal approval for each specific operation.” As Jane Mayer described in The Dark Side, such an order not only gave the CIA flexibility, it also protected the President. “To give the President deniability, and to keep him from getting his hands dirty, the finding called for the President to delegate blanket authority to Tenet to decide on a case-by-case basis whom to kill, whom to kidnap, whom to detain and interrogate, and how.” When George Tenet signed written guidelines for the CIA’s torture program in 2003, however, he appeared to have deliberately deprived the President of that deniability by including the source of CIA’s authorization – presumably naming the President – in a document interrogators would see. You can’t blame the CIA Director, after all; Tenet signed the Guidelines just as CIA’s Inspector General and DOJ started to review the legality of the torture tactics used against detainees like Abd al-Rahim al-Nashiri, who was threatened with a drill and a gun in violation of DOJ’s ban on mock executions.
  • President Obama’s willingness to go to such lengths to hide this short phrase may explain the White House’s curious treatment of potentially privileged documents with the Senate now – describing President Bush’s authorization of the torture program and its seemingly contradictory stance supporting publishing the Torture Report while thwarting its completion by withholding privileged documents. After all, the documents in question, like the reference to the presidential finding, may deprive the President of plausible deniability. Furthermore, those documents may undermine one of the conclusions of the Torture Report. According to Senator Ron Wyden, the Senate Torture Report found that “the CIA repeatedly provided inaccurate information about its interrogation program to the White House.” Perhaps the documents reportedly withheld by the White House undermine this conclusion, and instead show that the CIA operated with the full consent and knowledge of at least some people within the White House. Finally, the White House’s sensitivity about documents involved in the torture program may stem from the structure of the finding. As John Rizzo made clear, the finding authorizes not just torturing, but killing, senior al Qaeda figures. Bob Woodward even reported that that CIA would carry out that killing using Predator drones, a program CIA still conducts. And in fact, when the Second Circuit ultimately ruled to let the White House to keep the authorization phrase secret, it did so because the phrase also relates to “a highly classified, active intelligence activity” and “pertains to intelligence activities unrelated to the discontinued [torture] program.” Given what we know about the September 17, 2001 finding, that may well refer to President Obama’s still active drone program.
  • In any case, the White House’s seemingly contradictory statements about the Torture Report might best be understood by its past treatment of CIA documents. By releasing the DOJ memos and other materials, the White House provided what seemed to be unprecedented transparency about what the CIA had done. But all the while it was secretly hiding language describing what the White House has done.
  •  
    See also U.N. Convention Against Torture, which the U.S. is a party to. http://www.un.org/documents/ga/res/39/a39r046.htm
Paul Merrell

The NYPD's X-Ray Vans - The Atlantic - 0 views

  • In New York City, the police now maintain an unknown number of military-grade vans outfitted with X-ray radiation, enabling cops to look through the walls of buildings or the sides of trucks. The technology was used in Afghanistan before being loosed on U.S. streets. Each X-ray van costs an estimated $729,000 to $825,000.The NYPD will not reveal when, where, or how often they are used.
  • Here are some specific questions that New York City refuses to answer:How is the NYPD ensuring that innocent New Yorkers are not subject to harmful X-ray radiation? How long is the NYPD keeping the images that it takes and who can look at them? Is the NYPD obtaining judicial authorization prior to taking images, and if so, what type of authorization? Is the technology funded by taxpayer money, and has the use of the vans justified the price tag? Those specifics are taken from a New York Civil Liberties Union court filing. The legal organization is seeking to assist a lawsuit filed by Pro Publica journalist Michael Grabell, who has been fighting New York City for answers about X-ray vans for 3 years.“ProPublica filed the request as part of its investigation into the proliferation of security equipment, including airport body scanners, that expose people to ionizing radiation, which can mutate DNA and increase the risk of cancer,” he explained. (For fear of a terrorist “dirty bomb,” America’s security apparatus is exposing its population to radiation as a matter of course.)
  • A state court has already ruled that the NYPD has to turn over policies, procedures, and training manuals that shape uses of X-rays; reports on past deployments; information on the costs of the X-ray devices and the number of vans purchased; and information on the health and safety effects of the technology. But New York City is fighting on appeal to suppress that information and more, as if it is some kind of spy agency rather than a municipal police department operating on domestic soil, ostensibly at the pleasure of city residents.Its insistence on extreme secrecy is part of an alarming trend. The people of New York City are effectively being denied the ability to decide how they want to be policed.
  • ...3 more annotations...
  • For all we know, the NYPD might be bombarding apartment houses with radiation while people are inside or peering inside vehicles on the street as unwitting passersby are exposed to radiation. The city’s position—that New Yorkers have no right to know if that is happening or not—is so absurd that one can hardly believe they’re taking it. These are properly political questions. And it’s unlikely a target would ever notice. “Once equipped, the van—which looks like a standard delivery van—takes less than 15 seconds to scan a vehicle,” Fox News reported after looking at X-ray vans owned by the federal government. “It can be operated remotely from more than 1,500 feet and can be equipped with optional technology to identify radioactivity as well.”
  • And since the technology can see through clothing, it is easy to imagine a misbehaving NYPD officer abusing it if there are not sufficient safeguards in place. Trusting the NYPD to choose prudent, sufficient safeguards under cover of secrecy is folly. This is the same department that spent 6 years conducting surveillance on innocent Muslims Americans in a program so unfocused that it produced zero leads—and that has brutalized New York City protestors on numerous occasions. Time and again it’s shown that outside oversight is needed.Lest readers outside New York City presume that their walls still stand between them and their local law enforcement agency, that isn’t necessarily the case. Back in January, in an article that got remarkably little attention, USA Today reported the following:
  • At least 50 U.S. law enforcementagencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance. Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person's house without first obtaining a search warrant. The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.
  •  
    About the technology from the patent holder's web site: http://as-e.com/resource-center/technology/z-backscatter/ Example photos of the Z Backspatter Vans and examples of X-Ray photos taken with it. https://goo.gl/MO1TVi  Forty percent higher radiation than airport security scanners. with a range of over a thousand feet. 12-seconds to conduct a scan.  
Paul Merrell

Hello, NSA - 1 views

  • The government is listening to your internets. Generate a sentence with some of the keywords they're looking for. Tweet or share and you could earn a new follower in Washington.
  •  
    Nice idea. Include a sentence designed to attract NSA attention in every email, in web comments, etc., perhaps linked to this web site.  Flood their automated keyword scanning capability. 
  •  
    I'm finding this warning in the footer of near all my Tea Party Patriot notifications: WARNING: Due to Presidential Executive Orders, the National Security Agency (NSA) may have read this email without warning, warrant, or notice. They may do this without any judicial or legislative oversight. You have no recourse, nor protection ... IF anyone other than the addressee of this e-mail is reading it, you are in violation of the 1st & 4th Amendments to the Constitution of the United States.
  •  
    I'm using the following as my email signature these days: "[Notice not included in the above original message: The U.S. National Security Agency neither confirms nor denies that it intercepted this message.]"
Paul Merrell

Fresno Police Roll Out Dystopian 'Threat Ranking' System - 0 views

  • “On 57 monitors that cover the walls of the center, operators zoomed and panned an array of roughly 200 police cameras perched across the city. They could dial up 800 more feeds from the city’s schools and traffic cameras, and they soon hope to add 400 more streams from cameras worn on officers’ bodies and from thousands from local businesses that have surveillance systems.” Though the intricate surveillance apparatus described above seems straight from a dystopic novel, it is actually the Washington Post’s recent description of the the visual data collection system employed by a local California police department. The police department in Fresno, California, has taken extreme measures to combat high rates of crime in the city. As the Post reports, Fresno’s Real Time Crime Center, buried deep in the police station’s headquarters, has developed as a response to what many police call increasing threats. The system, according to police officials, can “provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases” — a feature they say is increasingly important in the wake of events like the November terror attack in Paris and the San Bernardino shooting last month.
  • “Our officers are expected to know the unknown and see the unseen,” Fresno Chief of Police Jerry Dyer said. “They are making split-second decisions based on limited facts. The more you can provide in terms of intelligence and video, the more safely you can respond to calls.” Programs similar to the Real Time Crime Center have launched in New York, Houston, and Seattle over the course of the last decade. Nationwide, the use of Stingrays, data fusion centers, and aerial drone surveillance have broadened the access local police have to private information. In another example, the FBI is continually developing a comprehensive biometric database that local police access every day. “This is something that’s been building since September 11,” says Jennifer Lynch, a senior attorney at the Electronic Frontier Foundation. Like the problem of police militarization, Lynch traces the trend back to the Pentagon: “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.”
  • While many of these programs may fail to shock Americans, one new software program takes police scrutiny of private citizens to a new level. Beware, a software tool produced by tech firm Intrado, not only surveils the data of the citizens of Fresno, the first city to test it — it calculates threat levels based on what it discovers. The software scours arrest records, property records, Deep Web searches, commercial databases, and social media postings. By this method, it was able to designate a man with a firearm and gang convictions involved in a real-time domestic violence dispute as the highest of three threat levels: a bright red ranking. Fresno police say the intelligence from Beware aided them, as the man eventually surrendered and officers found he was armed with a gun. Beware scours billions of data points to develop rankings for citizens, and though few recoil at the thought of catching criminals and miscreants, the program provides particular cause for concern because of both its invasiveness and its fallibility.
  • ...3 more annotations...
  • These shortcomings have sparked concern among Fresno’s city council members, who discussed the issue at a meeting in November. At that meeting, one council member cited an incident where a girl who posted on social media about a card game called “Rage” was consequently given an elevated threat ranking — all because “rage” could be a triggering keyword for Beware. At that same meeting, libertarian-leaning Republican councilman Clinton J. Olivier asked Chief Dyer to use the technology to calculate his threat level. In real-time, Olivier was given a green, or non-threatening ranking, but his home received a yellow, or medium, threat ranking. It was likely due to the record of his home’s prior occupant. “Even though it’s not me that’s the yellow guy, your officers are going to treat whoever comes out of that house in his boxer shorts as the yellow guy,” Olivier told Dyer. “That may not be fair to me.” He added later, “[Beware] has failed right here with a council member as the example.” “It’s a very unrefined, gross technique,” Fresno civil rights attorney, Rob Nabarro, has said of Beware’s color-coded levels. “A police call is something that can be very dangerous for a citizen,” he noted, echoing Olivier’s worries.
  • Further, though Fresno police use Beware, they are left in the dark about how it determines rankings. Intrado designates the method a “trade secret,” and as such, will not share it with the officers who use it. This element of the software’s implementation has concerned civil rights advocates like Nabarro. He believes the secrecy surrounding the technology may result in unfair, unchecked threat rankings. Nabarro cautioned that between the software’s secrecy and room for error, Beware could accidentally rank a citizen as dangerous based on, for example, posts on social media criticizing police. This potential carries with it the ability for citizens to be punished not for actual crimes, but for exercising basic constitutional rights. Further, it compromises the rights of individuals who have been previously convicted of crimes, potentially using past behavior to assume guilt in unrelated future incidents. Chief Dyer insists concerns are exaggerated and that a particular score does not guarantee a particular police response. Police maintain the tools are necessary to fight crime. Nevertheless, following the heated November meeting, Dyer suggested he would work to turn off the color-coded threat ranking due to citizens’ concerns. “It’s a balancing act,” he admitted.
  • It remains to be seen if Fresno police and residents will move forward with the technology or shut it down over privacy concerns. City officials in Oakland, California, for example, recently scaled back plans to establish a Real Time Crime Center after outraged citizens protested. At the very least, as Northern California ACLU attorney Matt Cagle said, “[W]henever these surveillance technologies are on the table, there needs to be a meaningful debate. There needs to be safeguards and oversight.”
  •  
    Claiming trade secrecy for the software's selection criteria for threat ranking actually constitutes policy policy, the trade secrecy claim would probably not survive judical review. It's at least arguably an unconstitutional delegation of a government function (ranking citizens as threats) to a private company. Police departments in Florida were sued to produce records of how a related surveillance device, the Stingray IMSI device that intercepts cell phone calls by mimicking a cell-phone tower, and only averted court-ordered disclosure of its trade secret workings by the FBI swooping in just before decision to remove all the software documentation from local police possession, custody, and control.    There is a long chain of case law holding that information that is legitimately trade secret and proprietary loses that protection if adopted by local or federal government as law. With a software program that classifies citizens as threats for governmental purposes if they meet the program's selection criteria, the software is performing a strictly governmental function that is in reality law. 
Paul Merrell

Leaked Emails ot Save the Children confirms Pakistan full of CIA agents!! - 0 views

  • Here are the emails. An article written by Umar Cheema is also on the Web, will post link once I am on my laptop. http://cirp.pk/e-mail.htm (edit: although some names have been blacked out, you can still view them by taking mouse over the links! e.g. First email is by Hassan Noor.. to Mike Novell, tkrift (??), Amanullah Khan.. CC is Afnan Aleem) These basically proves that everyone in the Abbotabad commission (except Mr Ashraf Qazi), including a very senior judge and general, were working under the influence of Save The Children NGO Retired General Nadeem was directly working under them! Afridi was NOT tortured by ISI. He did give ISI some false statements which the ISI didn't dig deeper because it suited them! (Example he was working for CIA since 2008, not 2009 as ISI was led to believe) Edit: Here is the article: http://www.thenews.com.pk/Todays-Ne...s-Abbottabad-Commission-was-penetrated-by-CIA -- All these NGOs should be banned and thrashed! ISI should publically hang foreign agents! (Even if they are Generals)
  • Record shows Abbottabad Commission was penetrated by CIA​ Umar Cheema Friday, August 02, 2013 From Print Edition ISLAMABAD: A mind-blowing detail has emerged from the internal correspondence of NGO Save the Children disclosing its infiltration into the Abbottabad Commission to save its skin following allegations of the CIA’s penetration into the NGO in a hunt for Osama bin Laden through Dr Shakil Afridi, now under arrest in Peshawar. “Some of us suspected that the khakis had access to the record and receive daily updates but never realised an NGO had infiltrated too,” said an official privy to the Commission’s working. The leaked communication indicates that Lt Gen (retd) Nadeem Ahmed, an unofficial representative of the Army and ISI in the Commission, was allegedly cultivated by Save the Children who would offer him ‘how-to-do’ bailout advice, even sharing details about the internal politics of the Commission and classified record, something in radical contradiction to his reputation as a thorough professional and a man of integrity. He briefed the deputy country director of Save the Children, according to the email, about the views of different members, staunch opposition from a panel colleague, Ashraf Jehangir Qazi, resulting in his dissenting note on the NGO and other institutions, and Gen (retd) Nadeem’s plan to effectively counter this note in collaboration with Justice (R) Javed Iqbal, the Chairman.
  • Another member, Abbas Khan, was neither willing to sign the report in its current shape, discloses email record, nor wanted to put a dissenting note hence decided to prolong his stay in the US where he went on the ‘pretext of medical ground’. More alarmingly, the NGO was granted access to the Commission’s report well before it was sent to the prime minister. Save the Children had uninterrupted access to the four drafts prepared in June 2012 by the members including the chairman, email record available with The News indicates. All favours granted to Save the Children on behalf of the Commission were in clear breach of public trust raising question marks about the integrity of the members. The chairman of the NGO, Save the Children, was contacted by The News. He initially agreed to meet but later stopped taking calls and did not respond to messages sent to him.Nadeem also felt confident, the email record shows, that he would be able to convince the panel with the answers given by the NGO and urge his colleagues to go by the facts presented by Save the Children instead of believing on the contents of Afridi’s statement. Gen (R) Nadeem also advised the NGO, an email of the country director reads, to fight the expulsion of our expatriate as otherwise the ISI would move quickly to close down the country programme before the Commission report comes out.
  • ...3 more annotations...
  • The NGO has neither denied the email record and the contents it carried (when shown by The News for seeking version) nor offered specific comments but that: “Our assistance to the Abbottabad Commission and its members including Gen Nadeem was within the legal parameters and Abbottabad Commission mandate to find facts.” Nadeem was not available for comments, however, his close aide termed the allegations as utterly “rubbish and non-sense” when comments were sought after showing the email record A transcript of internal wrangling: Muhammad Hassan Noor Saadi, deputy country director of Save the Children, met Gen (R) Nadeem on November 20, 2012 that followed his email to four senior colleagues. The report was primarily compiled by ‘our friend’, his email reads, and was endorsed by the Chairman but one of the members, Ashraf Qazi, was not in agreement with them. He wrote a dissenting note criticising Chairman Justice (R) Javed Iqbal and Gen (R) Nadeem ‘for being soft on certain institutions (including Save the Children).’
  • The Commission could not issue the report with that note and therefore now they are working on developing counter arguments on the note, read the email. The Commission needs to have a lot of comments removed from the note before it is in a shape that allows the report to be shared, the email continues, otherwise it can jeopardize the integrity of the members of the Commission. Justice (R) Javed Iqbal and Gen (R) Nadeem ‘have to work extra hard to factually prove a lot of things wrong that this third member is referring to,’ read the email of deputy country director. The email then explained the position of the fourth member, Abbas Ali Khan, absent from discussion. He is not willing to sign the report in the current shape, reads Hassan’s email, but also does not want to put in a note of dissent and therefore continues to prolong his stay in the US where he went on the pretext of treatment. As a way forward, the email continues, the two members will work with the third member (Ashraf Qazi) and try to come to a point where the note is significantly reduced and numbers of comments are taken out of the report. Gen (R) Nadeem’s advisory role of the NGO: The email also brings to light his role as adviser to the NGO. To a question that what Save the Children should do, Nadeem advised the deputy country director to build relationship and confidence with the Ministry of Interior and Economic Affairs Division. “It would take few months for you to be back to complete normalcy,” Gen (R) Nadeem advised.
  • In another email generated on August 29, 2012, David Wright, the country director, wrote that ‘on my instructions Hassan asked Gen (R) Nadeem to give an honest assessment as to what he thinks our chances are of surviving this.’ Gen (R) Nadeem replied that he felt confident regarding the answers we (NGO) will give to the questions proposed, ‘he could convince the other commission members to go with the fact rather than the content of Afridi’s statement.’ Gen (R) Nadeem also advised to fight the expulsion of our expatriates, Wrights email continued. “He felt if we did not do this and the expats left, the ISI would then move quickly to close down the country programme before the Commission report comes out.” Report draft shared with the NGO: Wright’s another email indicates that the draft was shared more than once with the NGO. Referring to a meeting of two senior officers of Save the Children with Gen (R) Nadeem, the country director said they were shown the report written by the Chairman of the Commission. The email said there were four versions of the report in June 2012 and these were reduced to two in August that year. However, they have reservations about the latest version shared in August as ‘the report which was originally thought to be our saviour, will be the tool for this expulsion.’ We will do our best, the email reads, to work ‘with our friends and try and get our responses in before the report is finalised.’ SOURCE: THE NEWS Record shows Abbottabad Commission was penetrated by CIA - thenews.com.pk
Paul Merrell

And The Benghazi Media Circus Plays On… | Global Research - 0 views

  • A recent article written by this writer for Global Research posted last Saturday – “The Benghazi Scandal Is Obama’s Watergate But Worse” – was written in an effort to seek and uncover the truth. Accurate reporting on major world events is a challenge in today’s world where propaganda and disinformation are mainstream media norms and where virtually all major players in American politics simply lie through their teeth every time they open their mouths in constant effort to look good and cover up the truth. The American public knows this pathetic and sobering fact that deception has come to rule in the world of both politics and the media. People today neither believe their newscasters nor their political leaders. That is why examining the content of the tidal wave of assertions and opinions spewing forth from politicians and pundits in the aftermath of the latest Benghazi revelations must be taken with a grain of salt. Again, truth in today’s world is hard to come by. But as an investigative reporter, presenting a brief overview of recent comments and statements for any informed citizen to process and digest seems a worthwhile and important enterprise.
  • A timeline of recently unfolding events: On 10/12/12 exactly one month after the Benghazi incident, the legal conservative group Judicial Watch filed a Freedom of Information Act request seeking documents related to the Benghazi attack on September 11th, 2012 that killed the US Ambassador to Libya Christopher Stevens and three other Americans. Obama, who had campaigned on a promise of transparency in the criminal wake of the Bush regime, has proven to be anything but open and transparent. Having to sue the US government for access to the records, on April 18th, 2014, a full year and a half later, the Obama administration’s stonewalling ultimately failed and Judicial Watch successfully got hold of 41 State Department Benghazi related documents. Emails between high level White House officials discussing damage control strategies in the immediate aftermath of the Benghazi assault were released last week. Jubilant Republicans are now calling one of those emails their “smoking gun,” believing it is so incriminating that it will do in their would-be opponent Hillary Clinton from potentially competing in the 2016 presidential election.
  • The newly declassified email written by Obama’s then Deputy Strategic Communications Adviser Ben Rhodes specifically directed then UN Ambassador Susan Rice in preparation for her Sunday morning talk show appearances on September 16th, 2012 to explain the administration’s take on what it knew of the Benghazi murders. Rhodes advised Rice to attribute the Benghazi uprising as “rooted in an Internet video, and not a failure of policy,” pushing talking points designed to bolster Obama’s presidential image as a cool-as-a-cucumber-under-fire kind of wise and benevolent leader and statesman. The major emphasis of the email instructed Rice to blame the bogus anti-Moslem video as inciting a spontaneous protest like in other countries in the region that apparently grew violently out of control, of course all the while knowing that that was a boldface lie. This crucial piece of evidence proves that President Obama and Secretary of State Hillary Clinton both knew that the video did not cause the attack but that they chose to willfully deceive the American public in order to protect their own political careers and hence was born the infamously never ending Benghazi cover-up. Obama and Hillary withheld this damning email evidence even from the House Oversight Committee led by Congressman Darrel Issa (R-CA) requesting all documents pertaining to Benghazi more than a year ago. With the presidential election less than two months away at the time of the attack, Obama and Hillary were determined at all cost to keep hidden from Americans the real truth of criminal Benghazi activity they were guilty of engaging in during the months leading up to the attack. Last Thursday an angry Issa subpoenaed current Secretary of State John Kerry to appear before the committee on May 21st to further explain why those critical State Department records recently given to Judicial Watch were not among the 3200 documents originally handed over to his committee well over a year ago.
  • ...9 more annotations...
  • Investigative reporter Kenneth R. Timmerman as author of a new forthcoming book entitled ‘Dark Forces: The Truth About What Happened in Benghazi’ states: We know that orders were issued, then recalled, to deploy a 50-man Special Forces unit from Croatia that could have reached Benghazi within hours.Timmerman concludes that to date no documents revealing the person who ordered that unit to stand down have yet to surface.
  • Within hours of the general’s testimony came rebukes from both the senior Republican and Democrat on the powerful House Armed Services Committee making claims backing the administration’s that the military was incapable of responding in time to assist the ill-fated Americans in Benghazi. Because they represent the military in Congress that had already drawn the conclusion that nothing tactically could have been done to save the four Americans, they were quick to rebut the general’s testimony. Yet the day before 9/11 every year since 9/11/01 including on 9/10/11, the president meets with top military and security personnel to ensure that US embassies around the globe are bolstered with much needed extra security for 9/11 readiness. Yet the Benghazi compound was so insecure despite repeated requests, both Obama and the military apparently failed to have any military units on standby that could reach Benghazi to be of service on the night of 9/11/12. And this comes after intelligence sources have been reporting insufficient security at the Benghazi embassy compound.
  • Another disclosure at last Thursday’s House Oversight Committee hearing further damaging the credibility and actions of the Obama administration came from retired Air Force General Robert Lovell who at the time of Benghazi was in Germany serving as the senior African Command deputy director for intelligence. Lovell testified, “We should have sent help,” adding that the White House decision not to attempt military assistance due to the time factor was unacceptable. Lovell also stated unequivocally that the military knew that the Benghazi attack had nothing to do with the video falsely used by the administration to explain away the tragedy. The ex-general felt his military should have intervened and was waiting all night long for the call that never came from his bosses in Washington. Clearly he feels a sense of remorse and regret over the passivity imposed on him by his commander-in-chief Obama and State Department head Clinton.
  • Meanwhile, last week in a heated exchange with ABC correspondent Jon Karl a visibly agitated White House Press Secretary Jay Carney insisted that Rhodes’ email was not related to Benghazi at all but referred to the Moslem protests generally taking place in the region in response to the video. The next day Fox reporter Ed Henry engaged Carney on the same issue, eliciting the same haranguing reaction. All this appears to be yet more desperate lies in a feeble attempt to cover his bosses’ Obama and Hillary’s asses called criminal guilt, and by so doing committing his own. Carney had been among the original recipients of Rhodes’ email. Carney further explained that the same Rhodes talking points echoed those delivered earlier to Congress and the White House by deputy CIA director Mike Morell who a month ago claimed he received no pressure or influence from anyone in the Obama administration in coming up with his version of what most likely transpired on 9/11/12 based on all CIA intelligence sources available at the time. Yet on his own Morell admitted to toning down the intelligence reports leading up to the Benghazi attack purposely so as to not appear to be an “I told you so” gesture that would offend Hillary and her State Department. That said, Hillary’s underling and rising star Victoria Nuland (the later promoted to profanity-speaking Assistant Secretary of State who played such a key role in the recent US backed fascist Ukrainan coup) objected to Morell’s talking points that in her mind leaned too heavily toward blaming her boss and their State Department for insufficient security at the Benghazi compound. Her words:
  • Why do we want Hill to start fingering Ansar Al Sharia [the known al Qaeda affiliated attackers that murdered the four Americans], when we aren’t doing that ourselves until we have the investigation results…and the penultimate point could be abused by Members to beat the State Department for not paying attention to Agency warnings so why do we want to feed that?… Concerned.Observe how the exclusive focus of all post-Benghazi interdepartmental correspondence from Rhodes’ to Morell’s to Nuland’s all center on appearance and potential perception to avoid CYA blame. Furthest down on their priority list is honest and truthful disclosure and self-accountability. Again, the name of the game in the world of politics is passing the buck whenever possible to minimize potential heat that comes with looking bad and maximizing looking good by any means or lies necessary. Benghazi perfectly illustrates all of this.
  • Based on the information finally coming to light all last week, last Friday House Speaker John Boehner (R-OH) called for a special select committee not unlike the one for Watergate to further investigate Benghazi. Representative Trey Gowdy (SC-R) has already been selected as its lead investigator. This grandstanding ploy seems a bit superfluous and redundant since the House Oversight Committee has ostensibly been trying to get to the bottom of Benghazi for nearly a year and a half, albeit thus far ineffective in its results, no help from the State Department’s prior email omissions. Not only is Benghazi the hot topic buzzing here in America, on that same day last Friday, more bullets was buzzing in Benghazi as well. Nine police security soldiers were gunned down by, you guessed it, the same murderers still remaining at large that were behind the 9/11/12 Benghazi attack – the militant group the US has for years labeled an al Qaeda affiliated terrorist organization Ansar al-Sharia. After massacring 31 peaceful demonstrators protesting outside the militants’ headquarters last June, last week’s massacre is a powerful statement showing that the terrorists are still in charge in Benghazi and immune from any accountability from the US installed puppet government either in Tripoli or Washington. They remain free men at large despite Obama’s promise to hunt them down and bring them to justice.
  • The senior Democratic House Intel Committee Representative Adam Schiff (D-CA) typifies the partisan Obama-Hillary politics games of each side racing to the media to point fingers at each other in their same old, same old blame game. On Sunday Schiff stated he does not want any Democrats to participate in the newly forming select committee that the Republican House Speaker Boehner has just recently called for, already naming its GOP chair. That is simply a game the Dems will refuse to play. Why? Because Republicans cannot make them. Sound familiar? Perhaps your 7-year old child might employ this same game strategy. Insider Dems like former White House advisor turned ABC analyst (and another original recipient of Rhodes’ infamous email) David Plouffe conveniently took to ABC’s Sunday morning On This Week with George Stephanopoulos crying foul even louder with their familiar “conspiracy” chant they customarily use to discredit any criticism leveled at the Obama administration. His cries reaching desperation this week accuse a “very loud, delusional minority” of Republicans of an obsessive politics game over Benghazi. Another all too familiar grade school tactic, whatever misbehavior you are accused of, simply accuse your enemy of the same offense, an old early childhood trick that you never need outgrow in the world of politics.
  • Still another indignant reaction hardcore defenders of Hillary and Obama are now quick to cite are the thirteen embassy attacks that occurred as so called “Benghazi’s on Bush’s watch” when not a peep was ever heard from the press. This straw house strategy is designed to show how Republicans and Fox News are hypocritical in their obsession to find dirt on Benghazi where they deny any exists. Yet this accusation seems to omit one very significant fact. Not one of those embassy attacks during the Bush regime resulted in any murdered Americans, much less four of them and one being a US Ambassador, something that has not happened in the last 32 years before Benghazi. The media circus demonizing partisan politics players on both sides epitomizes why the US government is so utterly broken, horribly dysfunctional, morally bankrupt and totally ineffective in addressing any and all of the most pressing problems facing America and the world today. The blame game is all they know. Yet in all their exaggeration, lies, name calling and finger pointing, not one of them is even addressing the pink elephant in the room.
  • Obama, Hillary and then CIA Director retired General Betrayus Petraeus were/are international gun running criminal outlaws of the worst kind, working with the very same al Qaeda terrorist bunch that murdered those four nearly forgotten Americans. US tax dollars were/are going into the pockets of Ansar al-Sharia and al Qaeda mercenaries that looted Muammar Kaddafi’s gold cache and enormous weapon arsenal that included chemical weapons as well as surface to air missiles. And Obama, Petraeus and 2016 presidential heir apparent Hillary were in deep over their heads under Hillary and Stevens’ State Department cover, shipping them from Benghazi through Turkey to Syria to covertly fight a war by proxy against Assad’s government forces. After more than three bloody years, to this day the US is still bent on destroying another sovereign nation posing absolutely no security threat to America. These are the war crimes constantly being committed by Obama, Petraeus and Hillary and their lies upon lies are unraveling at an accelerated clip with each passing month. Thus, expect to see more desperate acts of aggression from desperate despots who know that their jig is up. Yet desperate despots do not care how many humans they will take down with them. But justice for these longtime perpetrators of multiple crimes against humanity will be served in the end.
Paul Merrell

Mystery Sponsor Of Weapons And Money To Syrian Mercenary "Rebels" Revealed | Zero Hedge - 0 views

  • Previously, when looking at the real underlying national interests responsible for the deteriorating situation in Syria, which eventually may and/or will devolve into all out war with hundreds of thousands killed, we made it very clear that it was always and only about the gas, or gas pipelines to be exact, and specifically those involving the tiny but uber-wealthy state of Qatar. Needless to say, the official spin on events has no mention of this ulterior motive, and the popular, propaganda machine, especially from those powers supporting the Syrian "rebels" which include Israel, the US and the Arabian states tries to generate public and democratic support by portraying Assad as a brutal, chemical weapons-using dictator, in line with the tried and true script used once already in Iraq. On the other hand, there is Russia (and to a lesser extent China: for China's strategic interests in mid-east pipelines, read here), which has been portrayed as the main supporter of the "evil" Assad regime, and thus eager to preserve the status quo without a military intervention
  • However, one question that has so far remained unanswered, and a very sensitive one now that the US is on the verge of voting to arm the Syrian rebels, is who was arming said group of Al-Qaeda supported militants up until now. Now, finally, courtesy of the FT we have the (less than surprising) answer, which goes back to our original thesis, and proves that, as so often happens in the middle east, it is once again all about the natural resources. From the FT: The tiny gas-rich state of Qatar has spent as much as $3bn over the past two years supporting the rebellion in Syria, far exceeding any other government, but is now being nudged aside by Saudi Arabia as the prime source of arms to rebels.
  • Why would Qatar want to become involved in Syria where they have little invested?  A map reveals that the kingdom is a geographic prisoner in a small enclave on the Persian Gulf coast.   It relies upon the export of LNG, because it is restricted by Saudi Arabia from building pipelines to distant markets.  In 2009, the proposal of a pipeline to Europe through Saudi Arabia and Turkey to the Nabucco pipeline was considered, but Saudi Arabia that is angered by its smaller and much louder brother has blocked any overland expansion.   Already the largest LNG producer, Qatar will not increase the production of LNG.  The market is becoming glutted with eight new facilities in Australia coming online between 2014 and 2020.   A saturated North American gas market and a far more competitive Asian market leaves only Europe.  The discovery in 2009 of a new gas field near Israel, Lebanon, Cyprus, and Syria opened new possibilities to bypass the Saudi Barrier and to secure a new source of income.  Pipelines are in place already in Turkey to receive the gas.  Only Al-Assad is in the way.
  • ...6 more annotations...
  • Qatar has proposed a gas pipeline from the Gulf to Turkey in a sign the emirate is considering a further expansion of exports from the world's biggest gasfield after it finishes an ambitious programme to more than double its capacity to produce liquefied natural gas (LNG).   "We are eager to have a gas pipeline from Qatar to Turkey," Sheikh Hamad bin Khalifa Al Thani, the ruler of Qatar, said last week, following talks with the Turkish president Abdullah Gul and the prime minister Recep Tayyip Erdogan in the western Turkish resort town of Bodrum. "We discussed this matter in the framework of co-operation in the field of energy. In this regard, a working group will be set up that will come up with concrete results in the shortest possible time," he said, according to Turkey's Anatolia news agency.   Other reports in the Turkish press said the two states were exploring the possibility of Qatar supplying gas to the strategic Nabucco pipeline project, which would transport Central Asian and Middle Eastern gas to Europe, bypassing Russia. A Qatar-to-Turkey pipeline might hook up with Nabucco at its proposed starting point in eastern Turkey. Last month, Mr Erdogan and the prime ministers of four European countries signed a transit agreement for Nabucco, clearing the way for a final investment decision next year on the EU-backed project to reduce European dependence on Russian gas.
  • Specifically, the issue at hand is the green part of the proposed pipeline: as explained above, it simply can't happen as long as Russia is alligned with Assad.
  • So there you have it: Qatar doing everything it can to promote bloodshed, death and destruction by using not Syrian rebels, but mercenaries: professional citizens who are paid handsomely to fight and kill members of the elected regime (unpopular as it may be), for what? So that the unimaginably rich emirs of Qatar can get even richer. Although it is not as if Russia is blameless: all it wants is to preserve its own strategic leverage over Europe by being the biggest external provider of natgas to the continent through its own pipelines. Should Nabucco come into existence, Gazpromia would be very, very angry and make far less money! As for the Syrian "rebels", who else is helping them? Why the US and Israel of course. And with the Muslim Brotherhood "takeover" paradigm already tested out in Egypt, it is only a matter of time.
  • Perhaps it is Putin's turn to tell John Kerry he prefer if Qatar was not "supplying assistance to Syrian mercenaries"? What is worse, and what is already known is that implicitly the US - that ever-vigilant crusader against Al Qaeda - is effectively also supporting the terrorist organization: The relegation of Qatar to second place in providing weapons follows increasing concern in the West and among other Arab states that weapons it supplies could fall into the hands of an al-Qaeda-linked group, Jabhat al-Nusrah. Yet Qatar may have bitten off more than it can chew, even with the explicit military Israeli support, and implicit from the US. Because the closer Qatar gets to establishing its own puppet state in Syria, the closer Saudi Arabia is to getting marginalized:
  • What Saudi Arabia wants is not to leave the Syrian people alone, but to install its own puppet regime so it has full liberty to dictate LNG terms to Qatar, and subsequently to Europe.
  • Sadly, when it comes to the US (and of course Israel), it does have a very hidden agenda: one that involves lying to its people about what any future intervention is all about, and the fabrication of narrative about chemical weapons and a bloody regime hell bent on massacring every man, woman and child from the "brave resistance." What they all fail to mention is that all such "rebels" are merely paid for mercenaries of the Qatari emir, whose sole interest is to accrue even more wealth even if it means the deaths of thousands of Syrians in the process. A bigger read through of the events in Syria reveals an even more complicated web: one that has Qatar facing off against Syria, with both using Syria as a pawn in a great natural resource chess game, and with Israel and the US both on the side of the petrodollars, while Russia and to a lesser extent China, form the counterbalancing axis and refuse to permit a wholesale overthrow of the local government which would unlock even more geopolitical leverage for the gulf states. Up until today, we would have thought that when push comes to shove, Russia would relent. However, with the arrival of a whole lot of submarines in Cyprus, the games just got very serious. After all the vital interests of Gazprom - perhaps the most important "company" in the world - are suddenly at stake.
Paul Merrell

Mozilla-backed Stop Watching Us blows past 100,000 signatures to fight NSA surveillance... - 0 views

  • The legal battle over PRISM and the NSA’s phone records program is only getting under way, but advocacy groups are striking while the issue is hot. Stop Watching Us, a website that encourages citizens to digitally sign a letter that will be emailed to their elected representatives, today passed the 100,000 signature mark. That milestone, passed this morning, comes less than 48 hours after the start of the program. Currently Stop Watching Us has collected 112,279 total signatures.
  • Stop Watching Us is more than concerned individuals. It’s publicly backed by dozens of companies, privacy advocates, and legal groups. At a minimum, people opposed to the NSA’s activities will be noticed.
  • The legal battle over PRISM and the NSA’s phone records program is only getting under way, but advocacy groups are striking while the issue is hot. Stop Watching Us, a website that encourages citizens to digitally sign a letter that will be emailed to their elected representatives, today passed the 100,000 signature mark. That milestone, passed this morning, comes less than 48 hours after the start of the program. Currently Stop Watching Us has collected 112,279 total signatures
Paul Merrell

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com - 0 views

  • It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords, briefly locking out the FBI until it gained back control. The new details emerged in local press reports from a Thursday bail hearing in Dublin, Ireland, where Marques, 28, is fighting extradition to America on charges that Freedom Hosting facilitated child pornography on a massive scale. He was denied bail today for the second time since his arrest in July. Freedom Hosting was a provider of turnkey “Tor hidden service” sites — special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network. Tor hidden services are used by sites that need to evade surveillance or protect users’ privacy to an extraordinary degree – including human rights groups and journalists. But they also appeal to serious criminal elements, child-pornography traders among them.
  • On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the Tor Browser Bundle, reporting back to a mysterious server in Northern Virginia. The FBI was the obvious suspect, but declined to comment on the incident. The FBI also didn’t respond to inquiries from WIRED today. But FBI Supervisory Special Agent J. Brooke Donahue was more forthcoming when he appeared in the Irish court yesterday to bolster the case for keeping Marques behind bars, according to local press reports. Among the many arguments Donahue and an Irish police inspector offered was that Marques might reestablish contact with co-conspirators, and further complicate the FBI probe. In addition to the wrestling match over Freedom Hosting’s servers, Marques allegedly dove for his laptop when the police raided him, in an effort to shut it down.
  • The apparent FBI-malware attack was first noticed on August 4, when all of the hidden service sites hosted by Freedom Hosting began displaying a “Down for Maintenance” message. That included at least some lawful websites, such as the secure email provider TorMail. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address. By midday, the code was being circulated and dissected all over the net. Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. Though many older revisions of Firefox were vulnerable to that bug, the malware only targeted Firefox 17 ESR, the version of Firefox that forms the basis of the Tor Browser Bundle – the easiest, most user-friendly package for using the Tor anonymity network. That made it clear early on that the attack was focused specifically on de-anonymizing Tor users. Tor Browser Bundle users who installed or manually updated after June 26 were safe from the exploit, according to the Tor Project’s security advisory on the hack.
  • ...2 more annotations...
  • Perhaps the strongest evidence that the attack was a law enforcement or intelligence operation was the limited functionality of the malware. The heart of the malicious Javascript was a tiny Windows executable hidden in a variable named “Magneto.” A traditional virus would use that executable to download and install a full-featured backdoor, so the hacker could come in later and steal passwords, enlist the computer in a DDoS botnet, and generally do all the other nasty things that happen to a hacked Windows box. But the Magneto code didn’t download anything. It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
  • The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway. The code’s behavior, and the command-and-control server’s Virginia placement, is also consistent with what’s known about the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007. Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor. Prior to the Freedom Hosting attack, the code had been used sparingly, which kept it from leaking out and being analyzed.
  •  
    Taking down the entire Freedom Hosting service because some content was kiddie porn is reminiscent of the U.S. government's proxy take-down of Mega-Upload in New Zealand. Such actions that disable legitimate users or deny access to their data are in my opinion violative of the 1st and 4th Amendments.  It suppresses the Freedom of Speech and seizes more than the 4th Amendment allows.  That our own government would use malware for surveillance purposes under any circumstance is just plain chilling.
Paul Merrell

GCHQ taps fibre-optic cables for secret access to world's communications | UK news | gu... - 0 views

  • Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
  • GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called "the largest programme of suspicionless surveillance in human history"."It's not just a US problem. The UK has a huge dog in this fight," Snowden told the Guardian. "They [GCHQ] are worse than the US."
  • However, on Friday a source with knowledge of intelligence argued that the data was collected legally under a system of safeguards, and had provided material that had led to significant breakthroughs in detecting and preventing serious crime.Britain's technical capacity to tap into the cables that carry the world's communications – referred to in the documents as special source exploitation – has made GCHQ an intelligence superpower.By 2010, two years after the project was first trialled, it was able to boast it had the "biggest internet access" of any member of the Five Eyes electronic eavesdropping alliance, comprising the US, UK, Canada, Australia and New Zealand.UK officials could also claim GCHQ "produces larger amounts of metadata than NSA". (Metadata describes basic information on who has been contacting whom, without detailing the content.)By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: "We have a light oversight regime compared with the US".
  • ...8 more annotations...
  • When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was "your call".The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
  • For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.This was done under secret agreements with commercial companies, described in one document as "intercept partners".The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned "sensitive relationship teams" and staff were urged in one internal guidance paper to disguise the origin of "special source" material in their reports for fear that the role of the companies as intercept partners would cause "high-level political fallout".
  • The GCHQ documents that the Guardian has seen illustrate a constant effort to build up storage capacity at the stations at Cheltenham, Bude and at one overseas location, as well a search for ways to maintain the agency's comparative advantage as the world's leading communications companies increasingly route their cables through Asia to cut costs. Meanwhile, technical work is ongoing to expand GCHQ's capacity to ingest data from new super cables carrying data at 100 gigabits a second. As one training slide told new users: "You are in an enviable position – have fun and make the most of it."
  • The categories of material have included fraud, drug trafficking and terrorism, but the criteria at any one time are secret and are not subject to any public debate. GCHQ's compliance with the certificates is audited by the agency itself, but the results of those audits are also secret.An indication of how broad the dragnet can be was laid bare in advice from GCHQ's lawyers, who said it would be impossible to list the total number of people targeted because "this would be an infinite list which we couldn't manage".There is an investigatory powers tribunal to look into complaints that the data gathered by GCHQ has been improperly used, but the agency reassured NSA analysts in the early days of the programme, in 2009: "So far they have always found in our favour".
  • Historically, the spy agencies have intercepted international communications by focusing on microwave towers and satellites. The NSA's intercept station at Menwith Hill in North Yorkshire played a leading role in this. One internal document quotes the head of the NSA, Lieutenant General Keith Alexander, on a visit to Menwith Hill in June 2008, asking: "Why can't we collect all the signals all the time? Sounds like a good summer project for Menwith."By then, however, satellite interception accounted for only a small part of the network traffic. Most of it now travels on fibre-optic cables, and the UK's position on the western edge of Europe gave it natural access to cables emerging from the Atlantic.
  • The processing centres apply a series of sophisticated computer programmes in order to filter the material through what is known as MVR – massive volume reduction. The first filter immediately rejects high-volume, low-value traffic, such as peer-to-peer downloads, which reduces the volume by about 30%. Others pull out packets of information relating to "selectors" – search terms including subjects, phone numbers and email addresses of interest. Some 40,000 of these were chosen by GCHQ and 31,000 by the NSA. Most of the information extracted is "content", such as recordings of phone calls or the substance of email messages. The rest is metadata.
  • "The criteria are security, terror, organised crime. And economic well-being. There's an auditing process to go back through the logs and see if it was justified or not. The vast majority of the data is discarded without being looked at … we simply don't have the resources."However, the legitimacy of the operation is in doubt. According to GCHQ's legal advice, it was given the go-ahead by applying old law to new technology. The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary.However, an obscure clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad. But the nature of modern fibre-optic communications means that a proportion of internal UK traffic is relayed abroad and then returns through the cables.
  • British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
  •  
    Note particularly that the Brit criteria adds economic data to the list of categories categories the NSA trawls for and shares its data with the U.S. NSA. Both agencies claim to be targeting foreigners, so now we're into the "we surveil your citizens; you surveil our citizens, then we'll share the results" scenario that leaves both sides of the pond with a superficial excuse to say "we don't surveil our own citizens, just foreigners." But it's just ring-around-the-rosy. 850,000 NSA employees and U.S. private contractors with access to GCHQ surveillance databases.  Lots more in the article that I didn't highlight.
1 - 20 of 21 Next ›
Showing 20 items per page