Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged academic

Rss Feed Group items tagged

Paul Merrell

Cracking The "Conspiracy Theories'" Psycholinguistic Code: The Witch Hunt against Indep... - 0 views

  • A new crusade appears to be underway to target independent research and analysis available via alternative news media. This March saw the release of “cognitive infiltration” advocate Cass Sunstein’s new book, Conspiracy Theories and Other Dangerous Ideas. In April, the confirmed federal intelligence-gathering arm, Southern Poverty Law Center (SPLC), released a new report, “Agenda 21: The UN, Sustainability, and Right Wing Conspiracy Theory.” Most recently, Newsweek magazine carried a cover story, titled, “The Plots to Destroy America: Conspiracy Theories Are a Clear and Present Danger.” As its discourse suggests, this propaganda campaign is using the now familiar “conspiracy theory” label, as outlined in Central Intelligence Agency Document 1035-960, the 1967 memo laying out a strategy for CIA “media assets” to counter criticism of the Warren Commission and attack independent investigators of President John F. Kennedy’s assassination. At that time the targets included attorney Mark Lane and New Orleans District Attorney Jim Garrison, who were routinely defamed and lampooned in major US news outlets.
  • Declassified government documents have proven Lane and Garrison’s allegations of CIA-involvement in the assassination largely accurate. Nevertheless, the prospect of being subject to the conspiracy theorist smear remains a potent weapon for intimidating authors, journalists, and scholars from interrogating complex events, policies, and other potentially controversial subject matter.
  •  
    Sunstein was the Administrator of the White House Office of Information and Regulatory Affairs in the Obama administration, a long-time buddy of Obama's who taught law at the University of Chicago. He's also the husband of neocon U.S. Ambassador to the UN Samantha Power. He now teaches law at Harvard.  I haven't read Sunstein's book, but did read a paper he had previously published, as I recall on SSRN, along the same theme. It was a comical read, seemingly the winner of some sort of contest to see who could stuff the most logical fallacies into a set number of pages. And of course the premises of the fallacies had no citations. Sunstein simply assumes that the official version of events is invariably the only true version and that any version that conflicts is a dangerous "conspiracy theory."  So then he proposes some asinine, truly juvenile propaganda methods that the government might use to destroy the reputations of the "conspiracy theorists." Having been a professional, trained propagandist for the U.S. Army in Viet Nam, I can say with some confidence that no one need fear Sunstein's proposed methods.  Short story, Sunstein is a "good ole' boy" from the Chicago Democratic Machine who in truth lacks the skills and abilities to be even a good academic, let alone a good propagandist. That isn't to suggest that ad hominem attacks can never destroy reputations. But "conspiracy theorist" just isn't strong enough to instill fear. Call us "terrorists" instead and maybe you'd get some traction. 
Paul Merrell

The Snipers Massacre on the Maidan in Ukraine | Johnson's Russia List - 0 views

  • The Snipers Massacre on the Maidan in Ukraine By Ivan Katchanovski, Ph.D. School of Political Studies & Department of Communication University of Ottawa Ottawa, ON K1N 6N5, Canada ikatchan@uottawa.ca Paper presented at the Chair of Ukrainian Studies Seminar at the University of Ottawa, Ottawa, October 1, 2014 [With visuals and footnotes here academia.edu/8776021/The_Snipers_Massacre_on_the_Maidan_in_Ukraine]
  • Conclusion The analysis and the evidence presented in this academic investigation put the Euromaidan and the conflict in Ukraine into a new perspective. The seemingly irrational mass shooting and killing of the protesters and the police on February 20 appear to be rational from self-interest based perspectives of rational choice and Weberian theories of instrumentally-rational action. This includes the following: the Maidan leaders gaining power as a result of the massacre, President Yanukovych and his other top government officials fleeing on February 21, 2014 from Kyiv and then from Ukraine, and the retreat by the police.
  • The same concerns Maidan protesters being sent under deadly fire into positions of no important value and then being killed wave by wave from unexpected directions. Similarly, snipers killing unarmed protesters and targeting foreign journalists but not Maidan leaders, the Maidan Self-Defense and the Right Sector headquarters, the Maidan stage, and pro-Maidan photographs become rational. While such actions are rational from a rational choice or instrumentally-rational theoretical perspective, the massacre not only ended many human lives but also undermined democracy, human rights, and the rule of law in Ukraine. The massacre of the protesters and the police represented a violent overthrow of the government in Ukraine and a major human rights crime. This violent overthrow constituted an undemocratic change of government. It gave start to a large-scale violent conflict that turned into a civil war in Eastern Ukraine, to a Russian military intervention in support of separatists in Crimea and Donbas, and to a de-facto break-up of Ukraine.
  • ...1 more annotation...
  • It also escalated an international conflict between the West and Russia over Ukraine. The evidence indicates that an alliance of elements of the Maidan opposition and the far right was involved in the mass killing of both protesters and the police, while the involvement of the special police units in killings of some of the protesters cannot be entirely ruled out based on publicly available evidence. The new government that came to power largely as a result of the massacre falsified its investigation, while the Ukrainian media helped to misrepresent the mass killing of the protesters and the police. The evidence indicates that the far right played a key role in the violent overthrow of the government in Ukraine. This academic investigation also brings new important questions that need to be addressed.
ashkif as

5th International Meeting on Traditional & Alternative Medicine - 0 views

  •  
    5th International Meeting on Traditional & Alternative Medicine scheduled on April 22-23, 2019 at Rome, Italy. The theme of Traditional Medicine congress is Exploring New Horizons in Traditional & Alternative Medicine. Traditional Medicine Meeting will provide a broad range of academic disciplines in natural product which will be emphasized from the discovery of natural products from natural sources through the clinical uses to attract researchers that are contributing in the field of tr...
Paul Merrell

The Maidan Massacre: US Army Orders: Sow Chaos | New Eastern Outlook - 0 views

  • In a dramatic development in the trial in Kiev of several Berkut police officers accused of shooting civilians in the Maidan demonstrations in February 2014, the defence has produced two Georgians who confirm that the murders were committed by foreign snipers, at least 50 of them, operating in teams. The two Georgians, Alexander Revazishvili and Koba Nergadze have agreed to testify by video from Tbilisi, if permitted, as they feared for their lives if brought to Kiev. The defence lawyer stated, “The eyewitnesses said they had seen with their own eyes a group of people who had received weapons and cartridges and who would deliver fire afterwards from the building of the Conservatoire. Nergadze also saw snipers at the roof of Hotel Ukraine. They know the individuals personally. Besides, they know the organizers and clients and are ready to give their names, as well as the names of the perpetrators.” “In all, about fifty mercenaries arrived in Kiev then and they were involved in the events on the Maidan afterwards and fired at the protesters on February 20,” Goroshinsky went on. “The mercenaries split into groups of ten men each and were dispatched to different spots where from they delivered fire.” “Each of them [the mercenaries] received $5,000 for the job done,” he said. “In other words, these people had been brought [to Kiev] with a well-specified task to create a conflict.” https://journal-neo.org/2017/12/15/the-maidan-massacre-us-army-orders-sow-chaos/
  •  
    "In the September 2015 issue of Oriental Review, Dr. Ivan Katchanovski, at the University of Ottawa, published a devastating paper on the Maidan killings setting out in extensive detail the conclusive evidence that it was a false flag operation and that members of the present Kiev regime, including Poroshenko himself were involved in the murders, not the government forces. His paper contains all you need to know and I highly recommend it. Here is a summary of his findings: "The paper analyzes a large amount of evidence from different publicly available sources concerning this massacre and killings of specific protestors…"This academic investigation concludes that the massacre was a false flag operation, which was rationally planned and carried out with a goal of the overthrow of the government and seizure of power. It found various evidence of the involvement of an alliance of the far right organizations, specifically the Right Sector and Svoboda, and oligarchic parties, such as Fatherland. Concealed shooters and spotters were located in at least 20 Maidan-controlled buildings or areas. The various evidence that the protesters were killed from these locations include some 70 testimonies, primarily by Maidan protesters, several videos of "snipers" targeting protesters from these buildings, comparisons of positions of the specific protesters at the time of their killing and their entry wounds, and bullet impact signs. The study uncovered various videos and photos of armed Maidan "snipers" and spotters in many of these buildings. https://journal-neo.org/2017/12/15/the-maidan-massacre-us-army-orders-sow-chaos/"
Paul Merrell

Iraq war costs U.S. more than $2 trillion -study | Reuters - 0 views

  • (Reuters) - The U.S. war in Iraq has cost $1.7 trillion with an additional $490 billion in benefits owed to war veterans, expenses that could grow to more than $6 trillion over the next four decades counting interest, a study released on Thursday said.The war has killed at least 134,000 Iraqi civilians and may have contributed to the deaths of as many as four times that number, according to the Costs of War Project by the Watson Institute for International Studies at Brown University.When security forces, insurgents, journalists and humanitarian workers were included, the war's death toll rose to an estimated 176,000 to 189,000, the study said.
  • The report, the work of about 30 academics and experts, was published in advance of the 10th anniversary of the U.S.-led invasion of Iraq on March 19, 2003.It was also an update of a 2011 report the Watson Institute produced ahead of the 10th anniversary of the Sept. 11 attacks that assessed the cost in dollars and lives from the resulting wars in Afghanistan, Pakistan and Iraq.The 2011 study said the combined cost of the wars was at least $3.7 trillion, based on actual expenditures from the U.S. Treasury and future commitments, such as the medical and disability claims of U.S. war veterans.That estimate climbed to nearly $4 trillion in the update.
  • The estimated death toll from the three wars, previously at 224,000 to 258,000, increased to a range of 272,000 to 329,000 two years later.Excluded were indirect deaths caused by the mass exodus of doctors and a devastated infrastructure, for example, while the costs left out trillions of dollars in interest the United States could pay over the next 40 years.The interest on expenses for the Iraq war could amount to about $4 trillion during that period, the report said.The report also examined the burden on U.S. veterans and their families, showing a deep social cost as well as an increase in spending on veterans. The 2011 study found U.S. medical and disability claims for veterans after a decade of war totaled $33 billion. Two years later, that number had risen to $134.7 billion.
  • ...2 more annotations...
  • The report concluded the United States gained little from the war while Iraq was traumatized by it. The war reinvigorated radical Islamist militants in the region, set back women's rights, and weakened an already precarious healthcare system, the report said. Meanwhile, the $212 billion reconstruction effort was largely a failure with most of that money spent on security or lost to waste and fraud, it said.
  • "Action needed to be taken," said Steven Bucci, the military assistant to former Defense Secretary Donald Rumsfeld in the run-up to the war and today a senior fellow at the Heritage Foundation, a conservative Washington-based think-tank.Bucci, who was unconnected to the Watson study, agreed with its observation that the forecasts for the cost and duration of the war proved to be a tiny fraction of the real costs."If we had had the foresight to see how long it would last and even if it would have cost half the lives, we would not have gone in," Bucci said. "Just the time alone would have been enough to stop us. Everyone thought it would be short."
Paul Merrell

Harder for Americans to Rise From Lower Rungs - NYTimes.com - 0 views

  • Benjamin Franklin did it. Henry Ford did it. And American life is built on the faith that others can do it, too: rise from humble origins to economic heights. “Movin’ on up,” George Jefferson-style, is not only a sitcom song but a civil religion.
  • But many researchers have reached a conclusion that turns conventional wisdom on its head: Americans enjoy less economic mobility than their peers in Canada and much of Western Europe. The mobility gap has been widely discussed in academic circles, but a sour season of mass unemployment and street protests has moved the discussion toward center stage. Former Senator Rick Santorum of Pennsylvania, a Republican candidate for president, warned this fall that movement “up into the middle income is actually greater, the mobility in Europe, than it is in America.” National Review, a conservative thought leader, wrote that “most Western European and English-speaking nations have higher rates of mobility.” Even Representative Paul D. Ryan, a Wisconsin Republican who argues that overall mobility remains high, recently wrote that “mobility from the very bottom up” is “where the United States lags behind.”
  • Liberal commentators have long emphasized class, but the attention on the right is largely new.
  • ...2 more annotations...
  • At least five large studies in recent years have found the United States to be less mobile than comparable nations. A project led by Markus Jantti, an economist at a Swedish university, found that 42 percent of American men raised in the bottom fifth of incomes stay there as adults. That shows a level of persistent disadvantage much higher than in Denmark (25 percent) and Britain (30 percent) — a country famous for its class constraints. Meanwhile, just 8 percent of American men at the bottom rose to the top fifth. That compares with 12 percent of the British and 14 percent of the Danes.
  • Despite frequent references to the United States as a classless society, about 62 percent of Americans (male and female) raised in the top fifth of incomes stay in the top two-fifths, according to research by the Economic Mobility Project of the Pew Charitable Trusts. Similarly, 65 percent born in the bottom fifth stay in the bottom two-fifths. By emphasizing the influence of family background, the studies not only challenge American identity but speak to the debate about inequality. While liberals often complain that the United States has unusually large income gaps, many conservatives have argued that the system is fair because mobility is especially high, too: everyone can climb the ladder. Now the evidence suggests that America is not only less equal, but also less mobile.
Paul Merrell

Engineering Empire: An Introduction to the Intellectuals and Institutions of American I... - 0 views

  • Educating yourself about empire can be a challenging endeavor, especially since so much of the educational system is dedicated to avoiding the topic or justifying the actions of imperialism in the modern era. If one studies political science or economics, the subject might be discussed in a historical context, but rarely as a modern reality; media and government voices rarely speak on the subject, and even more rarely speak of it with direct and honest language. Instead, we exist in a society where institutions and individuals of power speak in coded language, using deceptive rhetoric with abstract meaning. We hear about 'democracy' and 'freedom' and 'security,' but so rarely about imperialism, domination, and exploitation.
  • The objective of this report is to provide an introduction to the institutional and social structure of American imperialism. The material is detailed, but should not be considered complete or even comprehensive; its purpose is to function as a resource or reference for those seeking to educate themselves about the modern imperial system. It's not an analysis of state policies or the effects of those policies, but rather, it is an examination of the institutions and individuals who advocate and implement imperial policies. What is revealed is a highly integrated and interconnected network of institutions and individuals - the foreign policy establishment - consisting of academics (so-called "experts" and "policy-oriented intellectuals") and prominent think tanks.
  •  
    A primer on the foreign policy wonks who actually set U.S. foreign policy: a small group of people whose power to set policy survives the ebb and flow of new Presidents. Names, affiliations, who they influence, and more. 
Paul Merrell

The academic paper that predicted the NSA scandal | War of Ideas - 0 views

  • If you've been following the fallout from last week's NSA surveillance revelations, you may have seen repeated reference to a certain "recent MIT study." "Unique in the Crowd: The Privacy Bounds of Human Mobility," published in Nature's Scientific Reports last year, has been cited by multiple media sources, including this one, as evidence for why -- contra Dianne Feinstein -- your metadata matters. Indeed, re-examined in light of the current headlines, the concerns raised by the study seem quite prescient. The paper's authors, Yves-Alexandre de Montjoye, César A. Hidalgo, Michel Verleysen, and Vincent D. Blondel of MIT and the Universite Catholique de Louvain, examined a dataset of 15 months of anonymous cell-phone data from 1.5 million people in a "small European country." (They're a bit coy about how they obtained the data.) There were no names, addresses, or phone numbers in the data, yet they argue that "if individual's patterns are unique enough, outside information can be used to link the data back to an individual." In fact, just four points of observation -- time of the call and the nearest cell-phone tower -- were enough to identify 95 percent of individuals in the database.
Paul Merrell

short films : Naked Citizens - 0 views

  • Increasing numbers of 'terror suspects' are being arrested on the basis of online and CCTV surveillance data. Authorities claim they act in the public interest, but does this intense surveillance keep us safer?"I woke up to pounding on my door", says Andrej Holm, a sociologist from the Humboldt University. In what felt like a scene from a movie, he was taken from his Berlin home by armed men after a systematic monitoring of his academic research deemed him the probable leader of a militant group. After 30 days in solitary confinement, he was released without charges. Across Western Europe and the USA, surveillance of civilians has become a major business. With one camera for every 14 people in London and drones being used by police to track individuals, the threat of living in a Big Brother state is becoming a reality. At an annual conference of hackers, keynote speaker Jacob Appelbaum asserts, "to be free of suspicion is the most important right to be truly free". But with most people having a limited understanding of this world of cyber surveillance and how to protect ourselves, are our basic freedoms already being lost?
  •  
    Outstanding short (32 min.) documentary about the surveillance state. 
Paul Merrell

Erdogan Purges 60,000 Positions After Failed Coup, Shifting Turkey Into Totalitarianism - 0 views

  • Erdogan's purge took a dark turn when the Erdoğan government moved beyond ferreting out coup supporters in the military. Soldiers, police, judges, civil servants, teachers, and others—over 60,000 people so far—have been suspended, terminated, or detained, and a putatively temporary prohibition on international travel for all academics is now in effect.
  •  
    I'll have much more later, but it appears so far that Erdogan manipulated underlings into launching the coup attempt with possible U.S. assistance to conduct a purge of his opposition from government and to vastly tighten his control of the country. There are also signs of a resulting tectonic shift in the Mideast, with Turkey moving rapidly away from the U.S. and toward integration with the Chinese and Russian economies.
Paul Merrell

Central asset bubbles, currency wars are destroying emerging markets | Sunday Guardian - 0 views

  • as the out-of-control cabal of central banks inflated grotesque asset bubbles in global property, stock, and fixed-income markets? Or are we to believe traditional media’s “fake news” mantra of “it’s different this time?” Well, bad news, folks. It’s never different, not this time, not anytime, never.  Capitalism is being destroyed The US Federal Reserve, the Bank of England, and the European Central Bank have become gargantuan, out-of-control, rogue hedge funds. They are loaded with non-elected academics operating in opaque groupthink bubble chambers, repeating the broken Keynesian economic mantra of “whatever it takes, more debt is good”. They have magicked-up 100s of trillions in debt and guarantees, while the US Federal Reserve has gobbled up over 90% of the US mortgage market. Global stock market valuations are buoyed by stock buybacks, funded by record corporate debt, and enabled by reckless central bank zero-interest-rate policies. Pay no attention to the fact that in the past few years, US stock indices have surged over 70% to new all-time highs, while profits have only risen an anaemic 2%. Today’s record amount of corporate debt is cannibalising corporations, by bringing future earnings forward, which makes future stagnation and collapse into bankruptcy a certainty. For the near term, CEOs will continue to receive record pay packets for out-performing the market, as their stock prices bubble like a rocket ship into outer space, while these actions decimate any long-term growth prospects.
  • In 2005, preceding the credit crisis and the subsequent nationwide property price collapse, US Federal Reserve chairman, Dr Ben Bernanke was asked about risks associated with a dangerous subprime housing bubble that could destabilise the economy.  Bernanke stated that “I disagree with your premise. We’ve never had a decline in house prices on a nationwide basis. So, what I think is more likely is that house prices will slow, maybe stabilise: might slow consumption spending a bit. I don’t think it’s going to drive the economy too far from its full employment path, though.” So, what led to history’s biggest financial crisis in 2006? Too much debt, credit, and leverage—proving that Fed Chair Ben Bernanke was dead wrong. What did we learn? Nothing, a big fat zero. In fact, property prices have recently eclipsed previous 2006 highs, bubbling to frothy new all-time highs, while real wages declined and high-paying jobs have disappeared. 
  • Real estate is an asset but not an asset class because it lacks liquidity. It takes time to sell property and the difference between what a buyer is willing to pay and what a seller is willing to sell for may be huge. For example, a buyer may be willing to pay $750,000, but the seller will only sell at $900,000. In good times, frenzied buyers create “bidding wars” on coveted properties, sometimes rocketing the price 30% above the original offer. This is terrific if you are a property owner or property seller, but not so much if you are a first-time buyer. In bad times, prices collapse and the only price a buyer is willing to pay for the $900,000 home above is $90,000. Great for buyers, but not so great for the owner, who holds a mortgage of $700,000 that must be repaid to a bank.  During these boom times, optimism bias creeps into the minds of buyers, allowing them to pay off the charts, wildly inflated, irrational prices for fear of “missing out”. Optimism bias is a cognitive bias that causes a person to (mistakenly) believe nothing negative could ever happen to them. It is a “close your eyes and buy at new all-time highs” belief system. If the prices collapse, the banks can require more capital. If you do not have more capital, the bank can take your property. If the government wants to increase your taxes, you must pay or they will confiscate your property. In fact, property confiscations are already happening in Greece and Italy.  Commercial and residential real estate are now grotesque asset bubbles ready to explode. 
Paul Merrell

The U.S. military's stats on deadly airstrikes are wrong. Thousands have gone unreported - 0 views

  • The American military has failed to publicly disclose potentially thousands of lethal airstrikes conducted over several years in Iraq, Syria and Afghanistan, a Military Times investigation has revealed. The enormous data gap raises serious doubts about transparency in reported progress against the Islamic State, al-Qaida and the Taliban, and calls into question the accuracy of other Defense Department disclosures documenting everything from costs to casualty counts.In 2016 alone, U.S. combat aircraft conducted at least 456 airstrikes in Afghanistan that were not recorded as part of an open-source database maintained by the U.S. Air Force, information relied on by Congress, American allies, military analysts, academic researchers, the media and independent watchdog groups to assess each war's expense, manpower requirements and human toll. Those airstrikes were carried out by attack helicopters and armed drones operated by the U.S. Army, metrics quietly excluded from otherwise comprehensive monthly summaries, published online for years, detailing American military activity in all three theaters. Most alarming is the prospect this data has been incomplete since the war on terrorism began in October 2001. If that is the case, it would fundamentally undermine confidence in much of what the Pentagon has disclosed about its prosecution of these wars, prompt critics to call into question whether the military sought to mislead the American public, and cast doubt on the competency with which other vital data collection is being performed and publicized. Those other key metrics include American combat casualties, taxpayer expense and the military’s overall progress in degrading enemy capabilities.
Paul Merrell

Joseph Stiglitz: Man who ran World Bank calls for bankers to face the music - Business ... - 0 views

  • Yet Stiglitz's interest in the abuses of banks extends beyond the academic. He argues that breaking the economic and political power that has been amassed by the financial sector in recent decades, especially in the US and the UK, is essential if we are to build a more just and prosperous society. The first step, he says, is sending some bankers to jail. " That ought to change. That means legislation. Banks and others have engaged in rent seeking, creating inequality, ripping off other people, and none of them have gone to jail."
Paul Merrell

Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People - Rebecca J... - 0 views

  • In defending the NSA's telephony metadata collection efforts, government officials have repeatedly resorted to one seemingly significant detail: This is just metadata—numbers dialed, lengths of calls. "There are no names, there’s no content in that database," President Barack Obama told Charlie Rose in June. No names; just metadata. New research from Stanford demonstrates the silliness of that distinction. Armed with very sparse metadata, Jonathan Mayer and Patrick Mutchler found it easy—trivially so—to figure out the identity of a caller. <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drebecca-j-rosen%26title%3Dstanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people%26pos%3Din-article&sz=300x185&c=387748957&tile=3" title=""><img src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drebecca-j-rosen%26title%3Dstanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people%26pos%3Din-article&sz=300x185&c=387748957&tile=3" alt="" /></a></div> Mayer and Mutchler are running an experiment which works with volunteers who agree to use an Android app, MetaPhone, that allows the researchers access to their metadata. Now, using that data, Mayer and Mutchler say that it was hardly any trouble at all to figure out who the phone numbers belonged to, and they did it in just a few hours.
  • They write: We randomly sampled 5,000 numbers from our crowdsourced MetaPhone dataset and queried the Yelp, Google Places, and Facebook directories. With little marginal effort and just those three sources—all free and public—we matched 1,356 (27.1%) of the numbers. Specifically, there were 378 hits (7.6%) on Yelp, 684 (13.7%) on Google Places, and 618 (12.3%) on Facebook. What about if an organization were willing to put in some manpower? To conservatively approximate human analysis, we randomly sampled 100 numbers from our dataset, then ran Google searches on each. In under an hour, we were able to associate an individual or a business with 60 of the 100 numbers. When we added in our three initial sources, we were up to 73. How about if money were no object? We don’t have the budget or credentials to access a premium data aggregator, so we ran our 100 numbers with Intelius, a cheap consumer-oriented service. 74 matched.1 Between Intelius, Google search, and our three initial sources, we associated a name with 91 of the 100 numbers.
  • Their results weren't perfect (and they note that the Intelius data was particularly spotty), but they didn't even try all that hard. "If a few academic researchers can get this far this quickly, it’s difficult to believe the NSA would have any trouble identifying the overwhelming majority of American phone numbers," they conclude. It's also difficult to believe they wouldn't try. As federal district judge Richard Leon wrote in his decision last week, "There is also nothing stopping the Government from skipping the [National Security Letter] step altogether and using public databases or any of its other vast resources to match phone numbers with subscribers."
  •  
    Another Obama/NSA lie exposed. 
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

WA State Bill Proposes Criminalizing Help to NSA, Turning Off Resources to Yakima Facil... - 0 views

  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • Lawmakers in Oklahoma, California and Indiana have already introduced similar legislation, and a senator in Arizona has committed to running it there, but Washington counts as the first state with an actual NSA facility within its borders to consider the Fourth Amendment Protection Act. The NSA operates a listening center on the Army’s Yakima Training Center (YTC). The NSA facility is in Taylor’s district, and he said he cannot sit idly by while a secretive facility in his own backyard violate the rights of people everywhere. “We’re running the bill to provide protection against the ever increasing surveillance into the daily lives of our citizens,” he said. “Our Founding Fathers established a series of checks and balances in the Constitution. Given the federal government’s utter failure to address the people’s concerns, it’s up to the states to stand for our citizens’ constitutional rights.”
  • ...3 more annotations...
  • According to documents made public by the US Military, as of 2008, a company called PacifiCorp serves as the primary supplier of electric power, and Cascade Natural Gas Corporation supplies natural gas to YTC. The Kittitas Public Utility District, a function of the state of Washington, provides electric power for the MPRC and the Doris site, but no documentation has yet proven that it also provides electricity used directly by the NSA facility on site. And while YTC does provide a bulk of its own water, documents also show that some of it gets there by first passing through upstream dams owned and operated by the State. The Army report states, “YTC lies within three WAUs whose boundaries coincide with WRIAs, as defined by the State of Washington natural resource agencies.” WAU’s are Washington State Water Administration Units. WRIAs are Washington State Water Resource Inventory Areas A Washington company also has a strong link to the NSA. Cray Inc. builds supercomputers for the agency.
  • If the bill passes, it would set in motion actions to stop any state support of the Yakima center as long as it remains in the state, and could make Cray ineligible for any contracts with the state or its political subdivisions. Three public universities in Washington join 166 schools nationwide partnering with the NSA. Taylor’s bill would address these schools’ status as NSA “Centers of Academic Excellence,” and would bar any new partnerships with other state colleges or universities. Tenth Amendment Center national communications director Mike Maharrey says the bills prohibition against using unconstitutionally gathered data in state court would probably have the most immediate impact. In fact, lawmakers in Kansas and Missouri will consider bills simply addressing this kind of data sharing.
  • “We know the NSA shares data with state and local law enforcement. We know from a Reuters report that most of this shared data has absolutely nothing to do with national security issues. This bill would make that information inadmissible in state court,” he said. “This data sharing shoves a dagger into the heart of the Fourth Amendment. This bill would stop that from happening. This is a no-brainer. Every state should do it.” Maharrey said he expects at least three more states to introduce the act within the next few weeks. “This idea is catching fire,” he said. “And why wouldn’t it? We have an out of control agency spying on virtually everybody in the world. We have a president and a Congress that appears poised to maybe put a band aid on it. Americans are realizing if we are going to slow down the NSA, we are going to have to take a different approach. This is it.”
Paul Merrell

Ukraine: One 'Regime Change' Too Many? | Consortiumnews - 0 views

  • Russia’s parliament has approved President Putin’s request for the use of force inside neighboring Ukraine, as the latest neocon-approved “regime change” spins out of control and threatens to inflict grave damage on international relations, ex-CIA analyst Ray McGovern explains. By Ray McGovern Is “regime change” in Ukraine the bridge too far for the neoconservative “regime changers” of Official Washington and their sophomoric “responsibility-to-protect” (R2P) allies in the Obama administration? Have they dangerously over-reached by pushing the putsch that removed duly-elected Ukrainian President Viktor Yanukovych? Russian President Vladimir Putin has given an unmistakable “yes” to those questions – in deeds, not words. His message is clear: “Back off our near-frontier!”
  • Unless Obama is completely bereft of advisers who know something about Russia, it should have been a “known-known” (pardon the Rumsfeldian mal mot) that the Russians would react this way to a putsch removing Yanukovich. It would have been a no-brainer that Russia would use military force, if necessary, to counter attempts to use economic enticement and subversive incitement to slide Ukraine into the orbit of the West and eventually NATO. This was all the more predictable in the case of Ukraine, where Putin – although the bête noire in corporate Western media – holds very high strategic cards geographically, militarily, economically and politically.
  • Putin has many other cards to play and time to play them. These include sitting back and doing nothing, cutting off Russia’s subsidies to Ukraine, making it ever more difficult for Yanukovich’s successors to cope with the harsh realities. And Moscow has ways to remind the rest of Europe of its dependence on Russian oil and gas.
  • ...6 more annotations...
  • There is one huge difference between Prague in 1968 and Kiev 2014. The “Prague Spring” revolution led by Dubcek enjoyed such widespread spontaneous popular support that it was difficult for Russian leaders Leonid Brezhnev and Aleksey Kosygin to argue plausibly that it was spurred by subversion from the West. Not so 45-plus years later. In early February, as violent protests raged in the Ukrainian capital of Kiev and the White House professed neutrality, U.S. State Department officials were, in the words of NYU professor emeritus of Russian studies Stephen Cohen, “plotting a coup d’état against the elected president of Ukraine.” We know that thanks to neocon prima donna Victoria Nuland, now Assistant Secretary of State for European Affairs, who seemed intent on giving new dimension to the “cookie-pushing” role of U.S. diplomats. Recall the photo showing Nuland in a metaphor of over-reach, as she reached deep into a large plastic bag to give each anti-government demonstrator on the square a cookie before the putsch. More important, recall her amateurish, boorish use of an open telephone to plot regime change in Ukraine with a fellow neocon, U.S. Ambassador Geoffrey Pyatt. Crass U.S. interference in Ukrainian affairs can be seen (actually, better, heard) in an intercepted conversation posted on YouTube on Feb. 4.
  • There was a surreal quality to President Obama’s remarks, several hours after Russian (or pro-Russian) troops took control of key airports and other key installations in the Crimea, which is part of Ukraine, and home to a large Russian naval base and other key Russian military installations. Obama referred merely to “reports of military movements taken by the Russian Federation inside of Ukraine” and warned piously that “any violation of Ukraine’s sovereignty and territorial integrity would be deeply destabilizing.” That Obama chose the subjunctive mood – when the indicative was, well, indicated – will not be lost on the Russians. Here was Obama, in his typically lawyerly way, trying to square the circle, giving a sop to his administration’s neocon holdovers and R2P courtiers, with a Milquetoasty expression of support for the new-Nuland-approved government (citing Biden’s assurances to old whatshisname/yatshisname). While Obama stuck to the subjunctive tense, Prime Minister Yatsenyuk appealed to Russia to recall its forces and “stop provoking civil and military resistance in Ukraine.” Obama’s comments seemed almost designed to sound condescending – paternalistic, even – to the Russians. Already into his second paragraph of his scripted remarks, the President took a line larded with words likely to be regarded as a gratuitous insult by Moscow, post-putsch.
  • “We’ve made clear that they [Russian officials] can be part of an international community’s effort to support the stability of a united Ukraine going forward, which is not only in the interest of the people of Ukraine and the international community, but also in Russia’s interest.” By now, Russian President Vladimir Putin is accustomed to Obama, Secretary of State John Kerry, National Security Adviser Susan Rice, et al. telling the Kremlin where its interests lie, and I am sure he is appropriately grateful. Putin is likely to read more significance into these words of Obama: “The United States will stand with the international community in affirming that there will be costs for any military intervention in Ukraine … and we will continue to coordinate closely with our European allies.”
  • There are bound to be fissures in the international community and in the Western alliance on whether further provocation in Ukraine is advisable. Many countries have much to lose if Moscow uses its considerable economic leverage over natural gas supplies, for example. And, aspiring diplomat though she may be, Victoria Nuland presumably has not endeared herself to the EC by her expressed “Fuck the EC” attitude. Aside from the most servile allies of the U.S. there may be a growing caucus of Europeans who would like to return the compliment to Nuland. After all does anyone other than the most extreme neocon ideologue think that instigating a civil war on the border of nuclear-armed Russia is a good idea? Or that it makes sense to dump another economic basket case, which Ukraine surely is, on the EU’s doorstep while it’s still struggling to get its own economic house in order? Europe has other reasons to feel annoyed about the overreach of U.S. power and arrogance. The NSA spying revelations – that continue, just like the eavesdropping itself does – seem to have done some permanent damage to transatlantic relationships.
  • In any case, Obama presumably knows by now that he pleased no one on Friday by reading that flaccid statement on Ukraine. And, more generally, the sooner he realizes that – without doing dumb and costly things – he can placate neither the neocons nor the R2P folks (naively well meaning though the latter may be), the better for everyone. In sum, the Nulands of this world have bit off far more than they can chew; they need to be reined in before they cause even more dangerous harm. Broader issues than Ukraine are at stake. Like it or not, the United States can benefit from a cooperative relationship with Putin’s Russia – the kind of relationship that caused Putin to see merit last summer in pulling Obama’s chestnuts out of the fire on Syria, for example, and in helping address thorny issues with Iran.
  • Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. His academic degrees are in Russian and he was an analyst of Russian foreign policy for the first decade of his 27-year career with the CIA.  He is now on the Steering Group of Veteran Intelligence Professionals for Sanity (VIPS).
  •  
    Former CIA Russian analyst Ray McGovern thinks the neocons bit off more than they can chew in the Ukraine. I hope they receive the blowback they so deeply deservie.
Paul Merrell

Has questioning 9/11 become more acceptable? - RT Op-Edge - 2 views

  • Despite the media’s best efforts to dismiss 9/11 conspiracy theories, one in two Americans doubt the government’s narrative and skepticism is slowly seeping its way into the mainstream. Twelve years on from the events of September 11, 2001, and a seemingly nightmarish deja vu has gripped the United States and its war-weary citizens. Again, the public is told that destructive weapons in faraway countries pose a critical danger, and that despite wearing the clothes of humanitarianism, a military solution that will inevitably harm civilians is the only meaningful response. The main difference today is that after an abstract decade-long ‘War on Terror’, Washington finds itself fighting in Syria on the same side as Al-Qaeda and those who are sympathetic to the alleged culprits of the 9/11 attacks.
  • Contrary to how the US media has presented them, movements that have questioned 9/11 continue to gather momentum and are often led by increasingly vocal scientists and academics that claim the account presented in the official 9/11 Commission report could not possibly be accurate.
  • The 9/11 Commission was chartered to provide a full and complete account of the circumstances surrounding the attacks, but even former commission vice-chairman Lee Hamilton wrote an article in the New York Times in 2008 describing how the CIA obstructed the 9/11 investigations, destroyed evidence and failed to respond to the commission’s own lawful requests for information – plus it’s also widely known that the 9/11 Commission report relies heavily on torture testimony.
  • ...3 more annotations...
  • If the United States continually lobbies its population to intervene in unpopular new military conflicts using unsubstantiated claims and questionable evidence, there is little doubt that greater numbers of people will reexamine 9/11 and endorse more critical perspectives of it, especially as those campaigns mature and become more sophisticated. There are many who have looked at the evidence and are convinced that Washington is lying, but the real juicy question is who exactly is responsible? Kevin Ryan of the Journal of 9/11 Studies recently published a book, “Another Nineteen,” which is perhaps the most comprehensive analysis of the political and military command structure that spectacularly failed to act on the morning of 9/11. The task at hand for 9/11 advocacy movements is grasping both the scientific and political totality of events and bringing that scrutiny into the mainstream, which it is steadily beginning to do.
  • It’s not easy to reliably gauge public opinion figures on this issue, but in 2008, a comprehensive international poll showed that 54 percent of respondents believed that parties other than Al-Qaeda were responsible, as reported by Reuters. A new poll conducted in September 2013 by polling firm YouGov found that one in two Americans have doubts about the government’s account of 9/11. 
  • There will always be mocking and scathing criticisms of those who question 9/11, but if scientists and experts disagree over the technical fundamentals, this enough is sufficient ground for advocating a new and comprehensive investigation. As it stands, this transformative event that radically altered American foreign and domestic policy and led to the deaths of over a million people has not been sufficiently explained.
  •  
    On August 31st, 2013, Kevin Ryan appeared on Coast to Coast (http://www.coasttocoastam.com/show/2013/08/31) for a four hour interview that is available on request. Amazing interview! The long-time co-editor of the Journal of 9/11, Kevin Ryan, offered an evidence-based analysis of other potential suspects responsible for the September 11th attacks in 2001. A former employee of Underwriters Laboratories (UL), Ryan pointed out that the World Trade Center (WTC) was designed to withstand the impact of airliners and the steel used in the buildings was certified by UL to tolerate several hours of intense fire. The steel was tested at 2000 degrees F and a typical office fire burns at 1200 degrees F, he explained, noting that the temperatures measured at the WTC were much lower, around 500 degrees F. This presents a glaring problem since one of the towers was completely destroyed in only 56 minutes, Ryan added. The UL repeated its tests after the disaster and determined the steel columns and floor structures should not have failed, he revealed. A proponent of controlled-demolition theory, Ryan stated definitively that "the evidence really points to the buildings having been destroyed through the use of explosives." Many witnesses reported explosions and flashes of light, he said. Ryan questioned the official government story that 19 young Arab Muslims led by Osama bin Laden and Khalid Sheikh Mohammed executed this unbelievable attack, observing that such a feat could not have been accomplished by these men as they had no access to plant explosives. Ryan identified former U.S. Defense Secretary Donald Rumsfeld and former Vice President Dick Cheney as "the two people who were in perfect position to coordinate the attacks of 9/11." Rumsfeld went missing for more than 30 minutes during the height of the attacks and Cheney gave a stand-down order as a plane approached the Pentagon, he reported. Ryan credited Rumsfeld and Cheney with the false conclusions that led to the Iraq
  •  
    Be sure to catch the free on-line documentary, "September 11 - The New Pearl Harbor", where director Massimo Mazzucco presents five hours of interviews and evidence comparing the 9-11 events to Pearl Harbor. Massimo confirms the findings of the Architects and Engineers for 9/11 Truth; that this was a controlled demolition. He then goes on to name the inside players responsible, and why they did it. Lots of discussion about the 1997 Cheney-Rumsfeld white paper, "The New American Century". The documentary (3 DVD's) is at: http://goo.gl/EIie3d
Paul Merrell

Endless Afghanistan? US-Afghan agreement would keep troops in place and funds flowing, ... - 0 views

  • While many Americans have been led to believe the war in Afghanistan will soon be over, a draft of a key U.S.-Afghan security deal obtained by NBC News shows the United States is prepared to maintain military outposts in Afghanistan for many years to come, and pay to support hundreds of thousands of Afghan security forces.The wide-ranging document, still unsigned by the United States and Afghanistan, has the potential to commit thousands of American troops to Afghanistan and spend billions of U.S. taxpayer dollars.The document outlines what appears to be the start of a new, open-ended military commitment in Afghanistan in the name of training and continuing to fight al-Qaeda. The war in Afghanistan doesn’t seem to be ending, but renewed under new, scaled-down U.S.-Afghan terms. Advertise | AdChoices “The Parties acknowledge that continued U.S. military operations to defeat al-Qaeda and its affiliates may be appropriate and agree to continue their close cooperation and coordination toward that end,” the draft states.
  • The 25-page “Security and Defense Cooperation Agreement Between the United States of America and the Islamic Republic of Afghanistan” is a sweeping document, vague in places, highly specific in others, defining everything from the types of future missions U.S. troops would be allowed to conduct in Afghanistan, to the use of radios and the taxation of American soldiers and contractors.The bilateral security agreement will be debated this week in Kabul by around 2,500 village elders, academics and officials in a traditional Loya Jirga. While the Loya Jirga is strictly consultative, Afghan President Hamid Karzai has said he won’t sign it without the Jirga’s approval.
  • The copy of the draft -- the full text is available here --  is dated July 25, 2013. As a working draft, it is particularly revealing because it shows the back and forth negotiations, as U.S. and Afghan officials added words and struck out paragraphs. The changes are marked by annotations still revealed in the text. The document is a work in progress. US officials say there have been more changes since July. The draft, however, does indicate the scope of this possible agreement with major implications for Washington, Kabul, U.S. troops and the continuation of America’s longest war.Taken as a whole, the document describes a basic U.S.-Afghan exchange. Afghanistan would allow Washington to operate military bases to train Afghan forces and conduct counter-terrorism operations against al-Qaeda after the current mission ends in 2014. For that foothold in this volatile mountain region wedged between Pakistan and Iran, the United States would agree to sustain and equip Afghanistan's large security force, which the government in Kabul currently cannot afford. The deal, according to the text, would take effect on Jan. 1, 2015 and “shall remain in force until the end of 2024 and beyond.” It could be terminated by either Washington or Kabul with two years advance written notice.
  • ...2 more annotations...
  • There is however what U.S. officials believe is a contradiction in the July draft, which would effectively ask American troops to provide training and confront al-Qaeda from the confines of bases. While it says operations against al-Qaeda may be necessary, it also says US troops will not be allowed to make arrests or enter Afghan homes. Advertise | AdChoices “No detention or arrest shall be carried out by the United States forces. The United States forces shall not search any homes or other real estate properties,” it says.“[The contradiction] was a matter of serious consternation at the highest levels” of the Obama administration over the weekend, according to one senior defense official. “It is the one remaining issue that could ultimately kill the deal." However, US officials believe that in a more recent draft, which was circulated among key Pentagon officials and US lawmakers on Monday, the US has won its position on this point.The document doesn’t specifically say how many U.S. and NATO troops would remain in Afghanistan beyond 2014. Afghan officials tell NBC News they hope it will be 10 to 15 thousand. U.S. officials tell NBC News the number is closer to seven to eight thousand, with an additional contribution from NATO. Factoring in troop rotations, home leave, and breaks between deployments, the service of tens of thousands of American troops would be required to maintain a force of seven to eight thousand for a decade or longer. The anticipated costs would likely run into the billions quickly.
  • Afghan officials tell NBC NEWS the agreement is critical to Afghanistan’s future stability. Without ongoing military assistance, training and funding, those officials say the government could collapse and Afghanistan would enter a civil war. If the agreement passes, the draft says Washington would commit to a long -term, indefinite military involvement in this land-locked Asian nation.A spokesperson for the White House National Security Council did not comment on the draft version of the agreement, but said that "the President is still reviewing options from his national security team and has not made a decision about a possible U.S. presence after 2014."The agreement circulating this week is unlikely to be the last. It first must pass through the Loya Jirga, then go onto parliament for final approval. “We’re looking at 60-days or more” before the US and Afghanistan sign any agreement, defense officials said. Here are highlights of the July draft of the bi-lateral agreement:
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
‹ Previous 21 - 40 of 72 Next › Last »
Showing 20 items per page