Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged WebPage

Rss Feed Group items tagged

Paul Merrell

Israeli ex-officers issue peace plan, condemn government inaction - The Boston Globe - 0 views

  • JERUSALEM — A group of more than 200 retired Israeli military and intelligence officers criticized the government for a lack of action in resolving the Israeli-Palestinian conflict on Friday and issued a detailed plan they say can end the impasse.The report’s publication closely follows a week of turmoil in Israeli politics that saw the appointment of a defense minister who is an outspoken skeptic of peace efforts with the Palestinians. Advertisement With peace talks in a deep freeze, the plan by Commanders for Israel’s Security on Friday called to ‘‘preserve conditions’’ for negotiations with the Palestinians. It urges a combination of political and security initiatives together with delivering economic benefits to Palestinians in Gaza, the West Bank, and East Jerusalem simultaneously.It calls for a freeze on settlement building, the acceptance in principle of the Arab Peace Initiative and the recognition that East Jerusalem should be part of a future Palestinian state ‘‘when established as part of a future agreement.’’ The Israeli opposition and much of the international community have long argued for these proposals.Commanders for Israel’s Security is a group comprising more than 200 retired generals and intelligence officers, veterans of decades of regional strife who are seeking to resolve the conflict. War veterans are well-respected in Israel, and their input has previously shifted debate.
  • The group’s chairman, Amnon Reshef, a fabled Israeli war hero and a former commander of its armored corps, said the plan ‘‘refutes the fear mongers’’ who claim there is currently no Palestinian peace partner or that conditions are not right for negotiations. He said such an argument, which is common in Israel after years of conflict and failed talks, ‘‘should not serve as an excuse for passivity and inaction.’’ Advertisement Reshef warned ‘‘the current status quo is an illusion’’ that endangers a two-state solution to the conflict.The report widens a growing rift between the government and the country’s military leaders. The former defense minister Moshe Yaalon was forced out after backing the military in a series of disagreements with political hard-liners. His ultranationalist successor, Avigdor Lieberman, is largely at odds with the military he now commands.
  • Reshef said his group’s plan aims to preserve conditions for future peace talks with the Palestinians while bettering Israel’s national security, regional and international ties in the interim. ‘‘In our experience we know that you cannot defeat terror only by military means, you have to improve the Palestinians quality of life,’’ he said.The group of military veterans said it hopes the plan will be considered by decision-makers and by the general public in Israel as well as in the United States.
  •  
    We're years past the point where a two-state solution was possible, if it ever was. 
Paul Merrell

A Distorted Lens Justifying An Illegitimate Ukrainian Government - 0 views

  • Support it or oppose it, a coup d’état took place in Kiev after an EU-brokered agreement was signed by the Ukrainian government and the mainstream opposition on Feb. 21. The agreement called for power sharing between both sides through the formation of a national unity government and for an end to the opposition-led street protests in Kiev. President Viktor Yanukovych ordered the Ukrainian police and security forces to withdraw from their positions, and even earlier, he had made multiple concessions to the opposition leadership. Instead of keeping its end of the bargain, the Ukrainian mainstream opposition executed a coup through the use of violence by organized ultra-nationalist gangs, which some analysts have compared to stay-behinds or secretive militias that were created by NATO during the Cold War. These armed ultra-nationalist groups took over administrative bodies in Ukraine and fought until they managed to oust the Ukrainian government and opened the path for opposition leaders to take power on Feb. 25. The Ukrainian mainstream opposition used the EU-brokered agreement, which the Brussels-based European Commission deliberately refused to enforce, as a means of justifying the formation of a coup-imposed government.
  • In the absence of almost half the Ukrainian Verkhovna Rada, or Ukrainian Parliament, the opposition parties began to arbitrarily pass unconstitutional laws. They also unconstitutionally selected Oleksandr/Aleksandr Valentynovych Turchynov as the acting president of Ukraine before President Viktor Yanukovych was even impeached. Intimidation and violence were additionally used to secure the cooperation of any disagreeing parliamentarians or state officials in Kiev. Saying that the ultra-nationalists and fascists are marginal elements, the mainstream media networks in North America and the European Union have simply dismissed the armed ultra-nationalist groups involved in the coup that are presently integrated into the putsch regime running Kiev. The militant ultra-nationalists, however, are very influential and amassing power under the illegal premiership of Arseniy Yatsenyuk.  Yatsenyuk, himself, is from Yulia Tymoshenko’s notoriously corrupt All-Ukrainian Union Fatherland Party (Batkivshchyna) and essentially a U.S. and EU appointee. There is even a pre-coup leaked telephone interception, likely either recorded by the intelligence services of Russia or Ukraine, in which U.S. Assistant Secretary of State Victory Nuland says that Yatsenyuk will be appointed as the prime minister of the Ukrainian government that the U.S. is putting together.
  • It is unlikely that Yatsenyuk and the loosely-knit alliance of the governing parties that ran Ukraine under the Yushchenko-Tymoshenko governments, foreign-based Ukrainians, and the forces behind the Orange Revolution that form the Orangist camp which he belongs to could have gotten back into power in Ukraine without pressure, the use of force and foreign backing. Yatsenyuk was even threatened and booed by the Ukrainians gathered at Independence Square when it was announced that he would be appointed as the prime minister of the post-coup government. A vast segment of the protesters made it clear that Tymoshenko, Yatsenyuk’s party leader, was no alternative to the ousted President Viktor Yanukovych in their eyes, either, when it was announced that she wanted to run for prime minister. The Orangists do not have the support of a majority of the population, nor did they form the parliamentary majority in the Verkhovna Rada. Their Orangist president, Viktor Yushchenko, only got 5 percent of the vote in January 2010, in a show of no-confidence, whereas Viktor Yanukovych won the first and second rounds of the presidential elections in 2010. According to Victoria Nuland, the U.S. has also poured $5 billion into “democracy promotion” inside Ukraine. This is U.S. State Department doublespeak for politicized funding that Washington has sent to Ukraine to organize the Orange Revolution and its Euromaidan sequel or what can frankly be described as regime change.
  • ...10 more annotations...
  • To rule Ukraine once more, the Orangists and their foreign backers have used and manipulated the ultra-nationalist elements of the population — some of which are openly anti-European Union — as their foot soldiers in an application of force against their democratically-elected opponents. Despite their views, the ultra-nationalists are actually more honest than the Orangist liberal figures like Arseniy Yatsenyuk. Unlike the misleading and utterly corrupt Orangist leaders, the ultra-nationalists do not hide their agendas and platforms.
  • The ultra-nationalists have inconsolably anti-Russian attitudes. Many of them also dislike a vast spectrum of other groups, including Jews, Armenians, Roma, Poles, Tatars, supporters of the Party of Regions and communists. In this context, it should come as no surprise that one of the first decisions that the post-coup regime in Kiev made was to remove the legal status of the Russian language as the regional language of half of Ukraine. Right Sector is, itself, a coalition of militant ultra-nationalists. These militants were instrumental in fighting government forces and taking over both government buildings in Kiev and regional governments in the western portion of Ukraine. Despite the protests of First Deputy Defense Minister Oleynik, Deputy Defense Minister Mozharovskiy and Defense Minister Babenk, Arseniy Yatsenyuk’s post-coup government has even given the ultra-nationalist opposition militias official status within the Ukrainian military and security forces. Yatsenyuk and the Orangists also dismissed all the officials that protested that the move would fracture the country and make the political divide in Ukraine irreversible.
  • Several members of Svoboda have been given key cabinet and government posts. One of the two junior deputy prime ministers, or assistant deputy prime ministers, is Oleksandr Sych. The ministry of agriculture and food has been given for management to Ihor Shvaika. The environment and natural resources ministry has been assigned to Andry/Andriy Mokhnyk. The defense minister is Ihor Tenyukh, a former admiral in the Ukrainian Navy who obstructed Russian naval movements in Sevastopol during the Russo-Georgian War over South Ossetia and who was later dismissed by the Ukrainian government for insubordination. Oleh Makhnitsky, another member of Svoboda, has been assigned as the new prosecutor-general of Ukraine by the coup government. Andry Parubiy, one of the founders of Svoboda, is now the post-coup secretary of the National Security and Defense Council of Ukraine (RNBO). He was the man controlling the so-called “Euromaidan security forces” that fought government forces in Kiev. His job as secretary is to represent the president and act on his behalf in coordinating and implementing the RNBO’s decisions. As a figure, Parubiy clearly illustrates how the mainstream opposition in Ukraine is integrated with the ultra-nationalists. Parubiy is an Orangist and was a leader in the Orange Revolution. He has changed parties several times. After founding Svoboda, he joined Viktor Yushchenko’s Our Ukraine before joining Yulia Tymoshenko’s Fatherland Party and being elected as one of the Fatherland Party’s deputies, or members of parliament.
  • While the mainstream media in North America and the EU look the other way about the ultra-nationalists in the coup government in Kiev, the facts speak for themselves. Both the EU and the U.S. governments have rubbed their elbows with the ultra-nationalists. Oleh Tyahnybok, the leader of Svoboda (formerly the Social Nationalist Party of Ukraine), was even part of the opposition triumvirate that all the U.S. and EU officials visiting Kiev met with while performing their political pilgrimages to Ukraine to encourage the protesters to continue with their demonstrations and riots demanding Euro-Atlantic integration. Svoboda has popularly been described as a neo-Nazi grouping. The World Jewish Congress has demanded that Svoboda be banned. The ultra-nationalist party was even condemned by the EU’s own European Parliament, which passed a motion on Dec. 13, 2012 categorically condemning Svoboda.
  • The ultra-nationalists are such an integral part of the mainstream opposition that the U.S.-supported Orangist president of Ukraine, Viktor Yushchenko, posthumously awarded the infamous Nazi collaborator Stepan Bandera the title and decoration of the “Hero of Ukraine” in 2010. Foreign audiences, however, would not know that if they relied on reportage from the likes of the U.S. state-run Radio Free Europe, which tried to protect Yushchenko because he wanted to reorient Ukraine toward the U.S. and EU. Parubiy also lobbied the European Parliament not to oppose Yushchenko’s decision. Other smaller ultra-nationalists parties were also given government posts, and several of the independent cabinet members are also aligned to these parties. Dmytro Yarosh from Right Sector (Pravyi Sektor) is the deputy secretary of the RNBO, and the Trizub Party was given the education ministry. Trizub had Sergey Kvit appointed to the post of education minister.
  • The role of the ultra-nationalists in executing the coup has been essentially ignored by the mainstream media in North America and the EU. The roots of the bloodshed in Kiev have been ignored, too. The shootings of protesters by snipers have simply been presented as the vile actions of the Ukrainian government, never taking into consideration the agitation of the armed ultra-nationalist gangs and the mainstream opposition leaders for a conflict. According to a leaked telephone conversation on Feb. 26 between Estonian Foreign Minister Urmas Paet and European Union Commissionaire Catherine Ashton, which was leaked by the Security Service of Ukraine (SBU) , the snipers who shot at protesters and police in Kiev were allegedly hired by Ukrainian opposition leaders. Estonian Foreign Minister Paet made the statements on the basis of details he was given by one of the head doctors of the medical team of the anti-government protests, Olga Bogomolets, an opponent of Viktor Yanukovych’s government who wanted it removed from power. Paet tells Ashton the following first: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” This is also corroborated by the fact that Yanukovych actually had ordered the Ukrainian riot police and security forces not to use lethal force.
  • The Estonian official then mentions that it was verified to him that the same snipers were killing people on both sides. He tells Ashton the following: “And second, what was quite disturbing, this same Olga [Bogomolets] told as well that all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides.” Another important point that Paet makes to Ashton is the following: “[Dr. Olga Bogomolets] then also showed me some photos she said that as a medical doctor she can say that it is the same handwriting, the same type of bullets, and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Past reports that the mainstream media were hostile to the ousted Ukrainian government also raise serious questions that corroborate what has been said about the snipers intentionally killing protesters to instigate regime change.
  • The Telegraph reported on Feb. 20 that “[a]t least three of the bodies displayed single bullet wounds to the heads,” and “were shot in the head, the neck or the heart. None were shot anywhere else like in the legs.” This means that the snipers were making kill shots by design, which seems like the last thing that the Ukrainian government would want to do when it was trying to appease the protesters and bring calm to Kiev. The Ukrainian journalist Alexey Yaroshevsky’s account of the sniper shootings is also worth noting, and it is backed up by footage taken by his Russian crew in Kiev.  Their footage shows armed opposition members running away from the scene of the shooting of anti-government protesters. What comes across as unusual is that the armed members of the opposition were constantly agitating to start firefights at every opportunity that they could get.
  • The commandant of the SSU, Major-General Oleksandr Yakimenko, has testified that his counter-intelligence forces were monitoring the CIA in Ukraine during the protests. According to the SSU, the CIA was active on the ground in Kiev and collaborating with a small circle of opposition figures. Yakimenko has also said that it was not the police or government forces that fired on the protesters, but snipers from the Philharmonic Building that was controlled by the opposition leader Andriy Parubiy, which he asserts was interacting with the CIA. Speaking to the Russian media, Yakimenko said that 20 men wearing “special combat clothes” and carrying “sniper rifle cases, as well as AKMs with scopes” ran out of the opposition-controlled Philharmonic Building and split into two groups of 10 people, with one taking position at the Ukraine Hotel. The anti-government protesters even saw this and asked Ukrainian police to pursue them, and even figures from Right Sector and Svoboda asked Yakimenko’s SSU to investigate and apprehend them, but Parubiy prevented it. Major-General Yakimenko has categorically stated that opposition leaders were behind the shootings. Following the release of the conversation between Paet and Ashton, the Estonian Foreign Ministry confirmed that the leak was authentic, whereas the European Commission kept silent. The mainstream media in North America and the EU either ignored it or said very little. The Telegraph even claimed that Dr. Bogomolets told it that she had not treated any government forces even though she contradicts this directly in an interview with CNN where says she treated military personnel.
  • CNN, on the other hand, quickly glossed over the story, giving it only enough attention to create the impression that the network is fairly covering the news. Opting not to give the story the airtime that it deserved, CNN instead posted it on its webpage. The conversation is immediately discredited, undermined and dismissed in the first sentence of the article, which is attributed to Foreign Minister Paet: “Don’t read too much into the conversation.” The article was deliberately structured by CNN to undermine the important information that would challenge the narrative that the U.S. mainstream media have been painting. The title, sub-titles and opening sentences of most texts act as microcosms or summaries of the articles, and in many cases, readers evaluate or decide to read the articles on the basis of what these texts communicate. Moreover, the first sentence of the article sets the tempo for readers and and influences their opinion, too. Although anyone who listens to the conversation between Paet and Ashton and considers the evidence that is being discussed would realize just how important the news was, the message being set forth by CNN was a dismissive one.
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
Paul Merrell

XKeyscore Exposé Reaffirms the Need to Rid the Web of Tracking Cookies | Elec... - 0 views

  • The Intercept published an expose on the NSA's XKeyscore program. Along with information on the breadth and scale of the NSA's metadata collection, The Intercept revealed how the NSA relies on unencrypted cookie data to identify users. As The Intercept says: "The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies." The NSA slides released by The Intercept give detailed guides to understanding the data transmitted by these cookies, as well as how to find unique machine identifiers that analysts can use to differentiate between multiple machines using the same IP address. We've written before about how spy agencies piggyback on social media account data to find Internet users' names or other identifying info, and these slides drive home the point that HTTP cookies leave users vulnerable to government surveillance, since any intermediary (or spy agency) can read the sensitive data they contain.
  • Worse yet, most of the time these identifying cookies come from third-party sources on webpages, and users have no meaningful way to opt out of receiving them (short of blocking all third party cookies) since advertisers (the main server of these types of cookies) refuse to honor the Do Not Track header.  Browser makers could help address this sort of non-consensual tracking by both advertisers and the NSA with some simple technical changes—changes that have been shown to reduce the number of third party cookies received by 67%. So far, though, they've been unwilling to build privacy protecting features in by default. Until they do, the best way for users to protect themselves is by installing a privacy protecting app like Privacy Badger, which is designed to block these types of uniquely identifying tracking cookies, or HTTPS Everywhere to block the transmission of HTTP cookies.
Paul Merrell

Imagery and Empire: Understanding the Western Fear of Arab and Muslim Terrorists | Glob... - 0 views

  • Seven out of the top ten countries afflicted by terrorist attacks are predominately Muslim, according to the Australia-headquartered Institute for Economics and Peace’s Global Terrorism Index for 2014, which is based on the University of Maryland’s meta-analytic Global Terrorism Database. Using a maximum value of ten and a minimum value of zero, the entire international community is systematically ranked. Although the definition of terrorist incidents in the University of Maryland’s Global Terrorism Database can definitely be debated over, important inferences can be made from its data sets and the Institute for Economics and Peace’s Global Terrorism Index. Several key features can be noticed, if readers look at the nature and identities of the perpetrators of what is classified as acts of terrorism among the top thirty countries in the Global Terrorism Index for 2014. The first feature is that the violence generated from the ascribed terrorist groups falls within the framework of insurrections and civil wars that are generally equated as acts of terrorism. For example, this is the case for countries like Somalia, the Philippines, Thailand, Colombia, Turkey, Mali, the Democratic Republic of Congo, and Nepal, which are respectively ranked seventh, ninth, tenth, sixteenth, seventeenth, twenty-second, and twenty-fourth place. Under closer examination several of these insurgencies can be tied to international rivalries and power plays by the US and its allies. This becomes obvious when more observations are made.
  • The second feature is that the majority of the cases of terrorism in the indexed countries, especially the higher ranked they are on the list, are connected to Washington’s direct or indirect interference in their affair. For example, this is the case for Iraq, NATO-garrisoned Afghanistan, Pakistan, Syria, Somalia, Yemen, Russia, Lebanon, Libya, the Democratic Republic of Congo, Sudan, South Sudan, China, and Iran, which are respectively ranked first, second, third, fifth, seventh, eighth, eleventh, fourteenth, fifteenth, eighteenth, nineteenth, twentieth, twenty-fifth, and twenty-eighth. US-led wars, Pentagon interventions, US-backed coups, or US government support for so-called «opposition» groups or proxy regimes have all been a basis for the affliction of terrorism in these countries. Out of the above countries, according to the Global Terrorism Index, 82% of global deaths that are assigned to acts of terrorism happen in NATO-garrisoned Afghanistan, Iraq, Pakistan, Syria, and Nigeria. The ties to US foreign policy should be clear.
  • It has been claimed that if all terrorists are not Arabs or Muslims, that most terrorists are Arabs or Muslims. Is this true or another myth? An empirical look at data compiled in the US and Europe will help answer this question. In the US, which is ranked thirtieth in the Global Terrorism Index for 2014, the majority of terrorists are not Muslims and are non-Muslims according to the Federal Bureau of Investigation (FBI). Inside the US, 6% of terrorist cases from 1980 to 2005 were committed by Muslim terrorists. [1] The other 94% of terrorism cases and terrorists — in other words, the vast majority — were not related to Arabs, Muslims, or Islam. [2] While the FBI’s methodology on what is a terrorist attack and what is not a terrorist attack is questionable, it will be accepted herein for arguments sake. According to the same FBI report, there were actually more terrorist attacks launched by Jews from 1980 to 2005 on US soil. The same FBI data was compiled by the Princeton University-linked webpage loonwatch.com in a chart that describes the breakdown of cases of terrorist attacks on US soil from 1980 to 2005 as follows: 42% Hispanic terrorism; 24% extreme left-wing group terrorism; 16% other types of terrorists that do not fit into the other main categories; 7% Jewish terrorists; 6% Muslim terrorists; and 5% communist terrorists. [3] While Muslim terrorists comprised 6% of the attacks on US soil from 1980 to 2005, Jewish terrorists and Hispanic terrorists respectively comprised 7% and 42% of the terrorist attacks in the US during the same period. There, however, is no fear mongering about Jews or Hispanic people. The same media and government focus is not given to them as is given to ethnic Arabs and Muslims.
  • ...4 more annotations...
  • Illusions are at work in the world. The truth has been turned on its head. The victims are being portrayed as the perpetrators. Whether stated candidly, implied, or unmentioned, the notion of Arabs and Muslims as savages and terrorists plays on the imagery that the so-called Western World embodies equality, freedom, choice, civilization, tolerance, progress, and modernity whereas the so-called Arab-Muslim World underneath its surface represents inequality, restrictions, tyranny, a lack of choices, savagery, intolerance, backwardness, and primitiveness. This imagery actually serves to de-politize the political nature of tensions. It sanitizes the actions of empire, from coercive diplomacy with Iran and support for regime change in Syria to the invasions of Afghanistan and Iraq and US military intervention in Somalia, Yemen, and Libya. As mentioned earlier, in varying degrees, this imagery extends to other places that are seen by US Orientalists as non-Western places or entities, like Russia and China. At its roots, this imagery is really part of a discourse that sustains a system of power that allows power to be practiced by an empire over «outsiders» and against its own citizens. It is because of US foreign policy and economic interests that Arabs and Muslims are unempirically portrayed as terrorists while real world data that shows that US intervention is creating terrorism is ignored. This is why there is a fixation on the attack on Parliament Hill in Canada, the Martin Place hostage crisis in Sydney, and the Charlie Hebdo attack in Paris, but US, Canadian, Australian, and French governmental support for terrorism that has cost tens of thousands of lives in Syria is ignored.
  • There is a huge disparity in who is causing and committing terrorism and who is being victimized and blamed for it. Despite the overwhelming facts, whenever Arabs or Muslims commit crimes and acts of terrorism, they are the individuals that are focused on whereas non-Arabs and non-Muslims are ignored. If it does acknowledge that Muslims are the biggest victims of terrorism, Orientalism still manages to assess some guilt to the victims of terrorism by tacitly portraying them as members of a savage community or society that are as much prone to facing a violent end as animals in a jungle.
  • The same pattern repeats itself in the European Union. Loonwatch.com also compiles data on terrorism in the European Union from the reports of the European Union’s European Police Office (Europol) from 2007, 2008, and 2009 in its annual EU Terrorism Situation and Trend Reports. [4] The data further distances Muslims from terrorist acts. 99.6% of the terrorist attacks in the European Union were committed by non-Muslims. [5] The number of failed, foiled, or successful terrorist attacks by Muslims in the EU from 2007 to 2009 was simply five attacks whereas the number of terrorist attacks by separatist groups was 1,352 attacks, which equates to approximately 85% of all terrorist incidents in the European Union. [6] According to Europol, the number of failed, foiled, or successful terrorist attacks by so-called left-wing groups was 104 while another 52 attacks were categorized as non-specific. [7] In the same period, two attacks were attributed to so-called right-wing groups by Europol. [8]
  • It has been claimed that if all terrorists are not Arabs or Muslims, that most terrorists are Arabs or Muslims. Is this true or another myth? An empirical look at data compiled in the US and Europe will help answer this question.
  •  
    Very interesting statistics that depart from the common American belief. Note that the stats do not include "terrorism" inflicted by U.S. or foreign government military forces. But all wars produce terror far beyond the wildest capabilities of individual "terrorists."
Paul Merrell

Turmoil in Hong Kong, Terrorism in Xinjiang: America's Covert War on China | Global Res... - 0 views

  • What is more troubling is the greater geopolitical agenda driving both of these seemingly “internal” conflicts – and that they both lead back to a single source beyond China’s borders. With the so-called “Islamic State” (ISIS) now implicated in receiving, training, and employing terrorists from China’s Xinjiang province, and considering the fact that ISIS is the result of an intentional, engineered proxy war the US and its allies are waging in the Middle East, along with the fact that the unrest in Hong Kong is also traced back to Washington and London, presents a narrative of an ongoing confrontation between East and West being fought on the battlefield of fourth generation warfare.
  • If one was asked to name a global-spanning military and intelligence operation opposed to Syria, Iran, Russia, and China, they might say the US Central Intelligence Agency (CIA) and the US Government – and they would be right. But they could also easily answer by saying the “Islamic State” or ISIS/ISIL as it is also known. This is especially true after revelations surfaced that US-backed Uyghur separatists in China’s western-most province of Xinjiang have joined ISIS for training with intentions of leading an armed rebellion against Beijing upon their return. Reuters in their article, “China militants getting IS ‘training’,” would claim: Chinese militants from the western region of Xinjiang have fled from the country to get “terrorist training” from Islamic State group fighters for attacks at home, state media reported on Monday. The report was the first time state-run media had linked militants from Xinjiang, home to ethnic minority Uighur Muslims, to militants of the Islamic State group of radical Sunni Muslims.
  • However, it isn’t just China’s government that claims militants in Xinjiang seek to carve out an independent state in western China – the militants themselves have stated as much, and the United States government fully backs their agenda to do so. Indeed, first and foremost in backing the Xinjiang Uyghur separatists is the United States through the US State Department’s National Endowment for Democracy (NED). For China, the Western region referred to as “Xinjiang/East Turkistan” has its own webpage on NED’s site covering the various fronts funded by the US which include:
  • ...3 more annotations...
  • The next step Washington appears to be taking in China is an attempts to enhance the menace of terrorists in Xinjiang. In addition to assisting US attempts to destabilize territory in China, ISIS has also threatened to launch a campaign against another US enemy – Russia – this in addition to already directly fighting Hezbollah in Lebanon, the governments of Syria and Iraq, and with ISIS claiming to be behind attacks in Egypt against the military-led government that ousted the West’s Muslim Brotherhood proxies. With both Russia and China now in ISIS’ sights, the global public must begin asking questions as to how and why ISIS just so happens to be arraying itself against all of Washington’s enemies, by-passing all of its allies including Israel, Saudi Arabia, and Qatar, and where exactly they are getting the weapons, cash, intelligence, logistical, and administrative capabilities to do so. So suspicious is ISIS’ appearance, agenda, and actions, many across the world have long-ago concluded they are simply the latest creation of the US and other Western-aligned intelligence agencies, just as Al Qaeda and the Muslim Brotherhood was before them, So loud has this narrative become, establishment newspapers like the New York Times have begun writing columns to tamp down what they are calling “conspiracy theories.”
  • This containment strategy would be updated and detailed in the 2006 Strategic Studies Institute report “String of Pearls: Meeting the Challenge of China’s Rising Power across the Asian Littoral” where it outlines China’s efforts to secure its oil lifeline from the Middle East to its shores in the South China Sea as well as means by which the US can maintain American hegemony throughout the Indian and Pacific Ocean. The premise is that, should Western foreign policy fail to entice China into participating in the “international system” as responsible stakeholders, an increasingly confrontational posture must be taken to contain the rising nation. This includes funding, arming, and backing terrorists and proxy regimes from Africa, across the Middle East, Central Asia, Southeast Asia, and even within China’s territory itself. Documented support of these movements not only include Xinjiang separatists and the leaders of “Occupy Central” in Hong Kong, but also militants and separatists in Baluchistan, Pakistan where the West seeks to disrupt a newly christened Chinese port and pipeline, as well as the machete wielding supporters of Aung San Suu Kyi in Myanmar’s Rakhine state – yet another site the Chinese hope to establish a logistical hub.
  • It is not a coincidence that ISIS is standing in for and fulfilling America’s deepest imperial aspirations from North Africa, across the Middle East, and now inching toward the borders of the West’s two largest competitors, Russia and China. Nor is it a coincidence that “Occupy Central” protesters are parroting verbatim talking points scripted in Washington earlier this year. It is no coincidence that the US State Department’s NED is found involved in every hotspot of instability and conflict both within China’s borders and beyond them. It is a documented conspiracy that is now increasingly seeing the light truth cast upon it. Whether or not that is enough to end the unnecessary barbarism and bloodshed that has resulted from the West’s hegemonic aspirations remains to be seen.
Paul Merrell

Here's How You Can Find Out If The NSA Shared Your Data With British Spies - Forbes - 0 views

  • In the UK earlier this month, human rights groups Liberty and Privacy International were cheered by a tribunal decision that declared GCHQ’s access to NSA spies’ data illegal. Though it was a hollow victory, as the tribunal also declared all current activities, including all those blanket surveillance projects much derided by free speech activists, entirely legal. The practices previously broke the law because the public was unaware of what safeguards were in place for the UK’s access to data from NSA programs like Prism; as soon as Snowden blew everything wide open the snoops had to explain themselves, and that was enough for the tribunal to confirm the legality of GCHQ’s operations. But the case has had one significant effect: anyone can now figure out if their data was illegally shared by the agencies. Privacy International has set up a simple webpage that anyone in the world can sign up to. You can visit the page here.
  • Once the UK Investigatory Powers Tribunal has determined whom was affected, it has to inform them. Though participants should find out whether their data were unlawfully obtained by GCHQ from the millions of private communications hoovered up by the NSA up until December 2014, it won’t be anytime soon. Privacy International warned in its FAQs: “Count on it being many months, and likely years before this action is completed.” And somewhat ironically Privacy International has to collect participant’s information, including their name and email address, to supply the service. They may ask for more information from willing participants once the group has determined if more is required from the IPT. Anyone who wants to submit directly to the tribunal can do so here.
Paul Merrell

WikiLeaks Reveals The "Snowden Stopper": CIA Tool To Track Whistleblowers - 0 views

  • As the latest installment of it’s ‘Vault 7’ series, WikiLeaks has just dropped a user manual describing a CIA project known as ‘Scribbles’ (a.k.a. the “Snowden Stopper”), a piece of software purportedly designed to allow the embedding of ‘web beacon’ tags into documents “likely to be stolen.” The web beacon tags are apparently able to collect information about an end user of a document and relay that information back to the beacon’s creator without being detected. Per WikiLeaks’ press release:
  • Today, April 28th 2017, WikiLeaks publishes the documentation and source code for CIA’s “Scribbles” project, a document-watermarking preprocessing system to embed “Web beacon”-style tags into documents that are likely to be copied by Insiders, Whistleblowers, Journalists or others. The released version (v1.0 RC1) is dated March, 1st 2016 and classified SECRET//ORCON/NOFORN until 2066. Scribbles is intended for off-line preprocessing of Microsoft Office documents. For reasons of operational security the user guide demands that “[t]he Scribbles executable, parameter files, receipts and log files should not be installed on a target machine, nor left in a location where it might be collected by an adversary.”
  • The ‘Scribbles’ User Guide explains how the tool generates a random watermark for each document, inserts that watermark into the document, saves all such processed documents in an output directory, and creates a log file which identifies the watermarks inserted into each document. Scribbles can watermark multiple documents in one batch and is designed to watermark several groups of documents.
  • ...1 more annotation...
  • Dr. Martin McHugh, Information Technology Programme chair at Dublin Institute of Technology, gave the RT more details on how the “Scribbles” tool can be used for “bad as well as good.” “Methods of tracking have historically been developed for our protection but have evolved to become used to track us without our knowledge.” “Web beacons typically go unnoticed. A tiny file is loaded as part of a webpage. Once this file is accessed, it records unique information about you, such as your IP address and sends this back to the creator of the beacon.” But, the “Scribbles” user guide notes there is just one small problem with the program…it only works with Microsoft Office products.  So, if end users use other programs such as OpenOffice of LibreOffice then the CIA’s watermarks become visible to the end user and their cover is blown.
Paul Merrell

Head of UN agency resigns after refusing to retract report calling Israel an 'apartheid... - 0 views

  • ima Khalaf, the head of the United Nations Economic and Social Commission for Western Asia (ESCWA). resigned today after she was asked to withdraw a report her agency published earlier this week that stated Israel is an “apartheid regime.” “The secretary-general demanded yesterday that I withdraw the report, and I refused,”Khalaf told reporters at a press conference in Beirut today, according to the Middle East Eye. “It was expected that Israel and its allies would put enormous pressure on the United Nations secretary general to renounce the report,” she also said, according to Reuters. Then Khalaf stated that the United Nations “had scrubbed the report from its website.” While the webpage for the report, titled “Israeli Practices towards the Palestinian People and the Question of Apartheid,” was removed, the link to the executive summary of the report is still active on the UN website here. Here is the full report: Israeli Practices towards the Palestinian People and the Question of Apartheid by Mondoweiss on Scribd
shiraj786

Getting Started with Chrome extension - Diigo help - 0 views

  • Use the “Save” option to bookmark a page. Bookmarking saves a link to the page in your online Diigo library, allowing you to easily access it later.
  • Highlighting can also be accomplished from the context pop-up. After the Chrome extension is installed, whenever you select text on a webpage, the context pop-up will appear, allowing you to accomplish text-related annotation. Highlight Pop-up Menu – After you highlight some text, position your mouse cursor over it and the highlight pop-up menu will appear. The highlight pop-up menu allows you to add notes to, share, or delete the highlight.
  • Sticky Note Click the middle icon on the annotation toolbar to add a sticky note to the page. With a sticky note, you can write your thoughts anywhere on a web page.
bestmsit01

Buy WordPress Website Accounts - 100% High-Quality Service - 0 views

  •  
    Buy Wordpress Website Accounts Buy WordPress Website accounts to get a ready-made website. These sites already have content, visitors, and search power. They are great for bloggers, sellers, and small businesses. You don't need to build from scratch or spend hours setting up. Choose blogs, affiliate pages, or online shops. Make sure the account is real, safe, and easy to move. This helps you grow faster and avoid tech problems. Why will you purchase my service? ➤ Providing you all access with Gmail Account ➤ Best Quality Hosting Providing. ➤ Best Quality Domain . ➤ The dedicated IP address is completely new ➤ Unlimited Full Verified SSL Sertificat . ➤ Replacement Guaranteed ➤ 100% Satisfaction Guaranteed ➤ No bots/software used ➤ Manually Created ➤ Fast Delivery ➤ 100% Safe & Real ➤ Real & High-Quality Services ➤ You can Used for any Bloggs, ecommerce Service. If You Want To More Information Just Contact Now. 24 Hours Reply/Contact Email : bestmsit@gmail.com Skype : Best MS IT Telegram : @bestmsit
bestmsit01

Buy Wordpress Website Design - 100% High_Quality Service & Best Design Provider Agency - 0 views

  •  
    Buy Wordpress Website Design Buy WordPress website design services to get a professional, responsive, and user-friendly site tailored to your brand. Whether you need a blog, business site, or eCommerce store, expert designers can build a layout that looks great and works smoothly on all devices. Save time, avoid coding stress, and stand out online with a custom design. Perfect for startups, creators, and growing businesses looking to build trust and boost engagement from day one. Why will you purchase my service? ➤ Replacement Guaranteed ➤ Manually design ➤ Fast Delivery ➤ 100% Safe & Real ➤ Real & High-Quality Services If You Want To More Information Just Contact Now. 24 Hours Reply/Contact Email : bestmsit@gmail.com Skype : Best MS IT Telegram : @bestmsit
bestmsit01

Buy Web Page Design - Best & 100% Secure Web Page Design Service - 0 views

  •  
    Buy Web Page Design Get a web page that looks great and helps you get more visitors. We design simple, clean pages that work on phones and computers. Whether you need a business site or a landing page, we can help. Our pages load fast and are easy to use. Perfect for small businesses and startups. Start today and grow your online reach with ease. Why will you purchase my service? ➤ Replacement Guaranteed ➤ Manually design ➤ Fast Delivery ➤ 100% Safe & Real ➤ Real & High-Quality Services If You Want To More Information Just Contact Now. 24 Hours Reply/Contact Email : bestmsit@gmail.com Skype : Best MS IT Telegram : @bestmsit
1 - 13 of 13
Showing 20 items per page