Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged audio

Rss Feed Group items tagged

Paul Merrell

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth - 0 views

  • Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".
  • Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.
  • This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):
  • ...4 more annotations...
  • 1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.
  • If you think this is an excusable and responsible statement, raise your hand now.Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.
  • Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.
  • Privacy remains your own responsibility.
  •  
    And of course, Google would never succumb to a subpoena requiring it to turn over the audio stream to the NSA. The Tor Browser just keeps looking better and better. https://www.torproject.org/projects/torbrowser.html.en
Paul Merrell

Audio Reveals What John Kerry Told Syrians Behind Closed Doors - The New York Times - 0 views

  • Secretary of State John Kerry was clearly exasperated, not least at his own government. Over and over again, he complained to a small group of Syrian civilians that his diplomacy had not been backed by a serious threat of military force, according to an audio recording of the meeting obtained by The New York Times.
  • At the meeting last week, Mr. Kerry was trying to explain that the United States has no legal justification for attacking Mr. Assad’s government, whereas Russia was invited in by the government.
  • His frustrations and dissent within the Obama administration have hardly been a secret, but in the recorded conversation, Mr. Kerry lamented being outmaneuvered by the Russians, expressed disagreement with some of Mr. Obama’s policy decisions and said Congress would never agree to use force. 0:19
  • ...3 more annotations...
  • He also spoke of the obstacles he faces back home: a Congress unwilling to authorize the use of force and a public tired of war.
  • As time ran short, Mr. Kerry told the Syrians that their best hope was a political solution to bring the opposition into a transitional government. Then, he said, “you can have an election and let the people of Syria decide: Who do they want?” A State Department official, speaking on the condition of anonymity, said later that Mr. Kerry was not indicating a shift in the administration’s view of Mr. Assad, only reiterating a longstanding belief that he would be ousted in any fair election. At one point, Mr. Kerry astonished the Syrians at the table when he suggested that they should participate in elections that include President Bashar al-Assad, five years after President Obama demanded that he step down. Mr. Kerry described the election saying it would be set up by Western and regional powers, and the United Nations, “under the strictest standards.” He said that the millions of Syrians who have fled since the war began in 2011 would be able to participate. 0:19
  • “Everybody who’s registered as a refugee anywhere in the world can vote. Are they going to vote for Assad? Assad’s scared of this happening.” But the Syrians were skeptical that people living under government rule inside Syria would feel safe casting ballots against Mr. Assad, even with international observers — or that Russia would agree to elections if it could not ensure the outcome. And that is when the conversation reached an impasse, with Ms. Shehwaro, an educator and social media activist, recalling hopes for a more direct American role. “So you think the only solution is for somebody to come in and get rid of Assad?” Mr. Kerry asked. “Yes,” Ms. Shehwaro said. “Who’s that going to be?” he asked. “Who’s going to do that?”
  •  
    Sounding more and more like Obama won't be willing to commence another overt war. But look for more instances of the U.S. doing strategic bombing for ISIL and Al-Nusrah, as with the attack on the Syrian Army and blowing up the two bridges over the Euphrates that the Syrian Army needed to attack an ISIL stronghold.
Gary Edwards

The Basic Library - Article V Project To Restore Liberty - 2 views

  •  
    "Free Google Book Search (360 B.C.) The Republic - Plato (46 B.C.) Cicero's Brutus - Cicero   (1517) Discourses on Livy - Machiavelli (1553) The Discourse of Voluntary Servitude - Étienne de La Boétie (1690) Two Treatises of Government - John Locke   (1698) Discourses Concerning Government - Algernon Sydney Sidney's Discourses and Locke's Second Treatise were recommended by Jefferson and Madison as containing the "general principles of liberty and the rights of man, in nature and society" (1748) The Spirit of Laws  - Montesquieu (1748) The Principles of Natural and Politic Law - Burlamaqui   (1755) Old Family Letters - John Adams (1758) The Law of Nations- Vattel   (1764-1769) The Writings of Samuel Adams (1765-1769) Blackstone's Commentaries on the Laws of England (1766) The Declaratory Act (1770) The Writings of John Adams V1-2              The Writings of John Adams V3-4              The Writings of John Adams V5-7              The Writings of John Adams V8-10   (1771-1788) The Autobiography of Benjamin Franklin (1772) The Votes and Proceedings of the Freeholders and other Inhabitants (1774) A Full Vindication of the Measures of Congress - Hamilton (1774) Novanglus - John Adams Principle Controversy between Great Britain and Her Colonies (1776) Common Sense- Thomas Paine One Incident which gave a stimulus to the pamphlet Common Sense was, that it happened to appear on the very day that the King of England's speech reached the United States, in which the Americans were denounced as rebels and traitors, and in which speech it was asserted to be the right of the legislature of England to bind the Colonies in all cases whatsoever. (1776-1783) The Crisis- Thomas Paine (1780) Journal of the Convention for Framing the Massachusetts Bay Constitution (1785) Remarks concerning the Government and Laws of the United States of America: in Four Letters addressed to Mr. Adams (1787) The Anti-Federalist (audio) (1787) The Federalist
Paul Merrell

Head of al Qaeda's Syrian branch threatens Russia in audio message | The Long War Journal - 0 views

  • The head of Al Nusrah Front, Abu Muhammad al Julani, has released an audio message addressing Russia’s role in the Syrian war. Julani depicts Russia as being “Eastern Crusaders,” calls for reprisal attacks inside Russia, says the jihadists should attack Shiite villages, and argues that groups fighting the Assad regime shouldn’t seek assistance from the West or countries throughout the region. He also offers bounties of several million Euros to anyone who kills Bashar al Assad or Hezbollah leader Hassan Nasrallah. Julani’s 21-minute audio message, which was released online yesterday, is entitled “The Russian Intervention – The Last Arrow.” It has been translated by the SITE Intelligence Group.
  • Julani urges the “mujahideen in the Caucasus to distract” Russia’s attention from the war in Syria whenever possible by killing Russians in their home country, including soldiers. “If the Russian soldier kills from the masses of [Syria], kill from their masses. And if they kill from our soldiers, kill from theirs,” Julani says, according to SITE. “One for one. We will not be the ones who begin.” The infighting between various factions must come to a stop, Julani argues, so that the jihadists can focus on “breaking” the “Eastern and Western Crusader campaigns.” And the jihadists should mobilize on “all the fronts” throughout Syria in response. “All must start a large battle on the most sensitive areas for the regime, and the battle must be escalated and the Nusayri [Shiite] villages in Latakia targeted.” Latakia is a coastal province that has long been a stronghold for the Assad family. “I call upon all the factions to gather the largest possible amount of shells and rockets and strike the Nusayri [Shiite] villages every day with hundreds of rockets, just as the cursed ones do in the cities and villages of the Sunnis,” Julani says, according to SITE. “Make them taste some of the torture of our people. If they leave the villages and cities of the Sunnis, we will leave them alone and will not attack, for he who treats others the same as he treats himself is not unjust.”
  • Here, Julani is likely discussing the Sunni jihadists’ strategy of attacking Shiite civilian areas in order to force the Assad regime to refrain from attacking predominately Sunni areas. Al Nusrah, Ahrar al Sham and other Sunni jihadist groups have employed this strategy throughout the year by, for example, attacking Shiite villages in northern Syria until Assad, Iranian forces, and Hezbollah lay off of areas in the south where Sunnis, including jihadists, are cornered. Jaysh al Fateh has effectively used this plan to free civilians and some fighters stationed in Zabadani, a small city close to the border with Lebanon. Julani warns other groups in Syria to avoid seeking assistance from “the Western states and the regional states,” saying it will only bring more “humiliation and shame.” Julani does not address this warning to any specific parties, but he could be referring to Al Nusrah’s ally, Ahrar al Sham, which receives assistance from Turkey and Qatar. Al Nusrah itself has likely received support from Gulf nations, Turkey and other actors at times. In fact, al Qaeda ideologues have explicitly condoned such arrangements, arguing that it can advance the jihadists’ cause. Al Qaeda has even said it is permissible on theological grounds to receive support from Iran, which is currently the Sunni jihadists’ foe in Syria and elsewhere. So, while Julani may openly decry this practice, it is one al Qaeda has repeatedly deemed to be acceptable.
  •  
    It's good to stay aware of what the CIA's mercenary fores are doing. Sounds a lot like terrorism to me.
Paul Merrell

Exclusive: Israel's Video Justifying Destruction of a Gaza Hospital Was From 2009 - Int... - 0 views

  • mage: The video clip showing apparent firing from an annex to the hospital was actually shot during Israel’s 2008-09 “Operation Cast Lead,” and the audio clip accompanying it was from an incident unrelated to Al Wafa. (Screengrab: The Times of Israel)
  • A video distributed by the Israeli military in July suggesting that Palestinian fighters had fired from the Al Wafa Rehabilitation and Geriatric Hospital in Gaza City was not shot during the recent Israeli attack on Gaza, and both audio and video clips were manipulated to cover up the fact that they were from entirely different incidents, a Truthout investigation has revealed. The video, released by the Israel Defense Forces (IDF) on July 23, the same day Israeli airstrikes destroyed Al Wafa, was widely reported by pro-Israeli publications and websites as proving that the hospital was destroyed because Hamas had turned the hospital into a military facility. But the video clip showing apparent firing from an annex to the hospital was actually shot during Israel’s 2008-09 “Operation Cast Lead,” and the audio clip accompanying it was from an incident unrelated to Al Wafa. The misleading video was only the last in a series of IDF dissimulations about Al Wafa hospital that included false claims that Hamas rockets had been launched from the hospital grounds, or very near it, and that the hospital had been damaged by an attack on the launching site.
Paul Merrell

How the NSA Converts Spoken Words Into Searchable Text - The Intercept - 0 views

  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest. The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
  • ...9 more annotations...
  • The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s. What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds. In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited. Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
  • A 2008 document from the Snowden archive shows that  transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing: (U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing. A version of the system the NSA uses is now even available commercially.
  • But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.” The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states. A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
  • According to a 2011 memo, “How is Human Language Technology (HLT) Progressing?“, NSA that year deployed “HLT Labs” to Afghanistan, NSA facilities in Texas and Georgia, and listening posts in Latin America run by the Special Collection Service, a joint NSA/CIA unit that operates out of embassies and other locations. “Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
  • The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America. For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.” The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
  • VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
  • What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.” The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
  • Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
  • The presidentially appointed but independent Privacy and Civil Liberties Oversight Board (PCLOB) didn’t mention speech-to-text technology in its public reports. “I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept. His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
Paul Merrell

Leaked Audio Reveals Venezuelan Opposition in Secret Talks with IMF | venezuelanalysis.com - 0 views

  • A leaked audio of a conversation between Venezuelan businessman, Lorenzo Mendoza, and former politician, Ricardo Hausman, has revealed Venezuela’s political and business opposition to be seeking collaboration with the IMF (International Monetary Fund) ahead of the country’s parliamentary elections on December 6th. In the phone conversation, leaked in Venezuela last Wednesday, both men speak about the possibility of IMF intervention in the Venezuelan economy and frequently refer to each other as “mate”.   Mendoza currently ranks as one the wealthiest businessmen in the world and controls key areas of the Venezuelan economy, such as the production of cornflour, beer and other household staples. Government supporters hold him responsible for the widespread shortage of key products, which they say is an attempt to destabilise the administration of current leftwing President Nicolas Maduro.   Hausman was formerly Planning Minister (1992-1993) to disgraced ex-Venezuelan President president, Carlos Andres Perez. He currently resides in the US where he is a lecturer at the Kennedy School of Government at Harvard University. 
  • The recording has caused shockwaves amongst Venezuela’s citizens, who have widely rejected any IMF involvement in the country’s economics. The fund is largely held responsible by citizens for the country’s debt crisis in the 1980s, the economic turmoil of the 1990s, as well as for the riots known as the Caracazo in 1989 which led to widespread police repression and thousands of killings.  The IMF’s poisonous legacy in the country has led the country’s political opposition to distance itself publicly from the organisation. Nonetheless, its spokespeople have been consistently linked to the ill reputed fund over the past fifteen years of leftist government.  Earlier in February 2015, the political opposition led by Leopoldo Lopez, Maria Corina Machado and Antonio Ledezma, released a “Call for a National Transition Agreement” just days before the national government reported that it had uncovered plans for an attempted coup amongst the airforce.  “The Call for a National Transition” contained a number of points orientating the politics of a transitional regime in Venezuela, including selling off national public enterprises and the input of “international financial organisations”. 
  • In the audio, which is dominated by Hausman, the ex-minister reveals that he is a longterm friend of the IMF’s Vice-president for the Western Hemisphere, who has asked him to go to the organisation to “talk about Venezuela”. He explains that the fund is “worried” that it will have to “intervene” in the country.   “The condition is that we have a small committee meeting to speak, gloves off, about what the hell we can do to see… Or, if you were to receive a call from Obama or Holland, or whoever and they say… Hell, mate, for us it’s really important that they get involved in Venezuela,” says Hausman.  The economist also assures Mendoza that he is committed to the “war in Venezuela” despite his absence, stating that “there is no exit for Venezuela without substantial international help,” appearing to reference the opposition’s violent street campaign to unseat the government last year, entitled La Salida (the exit).  Specifically Hausman recommends a 40-50 billion dollar loan from the IMF, which he says will entail a significant restructure of the country’s “debt profile” and “what they euphemistically term, private sector involvement”. The two men also reference a group of Hausman’s students in the US, who appear to have been pinned by both men to carry out the economic restructuring in a post-Chavista government.  The conversation finishes with Hausman revealing that he has “projects” in Colombia, Mexico, Peru and Albania, and confirming that the time is right for “carrying out an adjustment plan in Venezuela”. 
  • ...1 more annotation...
  • After the government publicly released the recording between Hausman and Mendoza last week, Venezuelan President Nicolas Maduro accused the opposition of once again seeking financial support from the IMF in order to promote “insurrectionary violence” in the country.  “I have proof that the IMF has received a visit from a group of technocrats… who have requested 60 billion dollars in order to put their plan into action, and the fund has told them that they will give them [the money] if they unseat the government,” stated the president on his weekly television show, In Contact with Maduro.  Although Maduro has yet to reveal evidence, Mendoza at least seems to have corroborated the authenticity of the phone conversation, which he has slammed as an “illegal” recording of a “private talk” that he had with Hausman.  Maduro has called for Mendoza to be prosecuted.  “I hope the judicial bodies react,” he stated. 
Paul Merrell

Damascus Has Audio of Daesh Talks With US Military Before Strike on Syrian Army - 0 views

  • The Syrian intelligence possesses an audio recording of conversation between Daesh terrorists and US military prior to the Washington-led coalition's airstrikes on the government troops near Deir ez-Zor on September 17, the speaker of the People's Council of Syria said Monday."The Syrian Army intercepted a conversation between the Americans and Daesh before the air raid on Deir ez-Zor", Hadiya Khalaf Abbas said as quoted by the Al Mayadeen broadcaster. US warplanes hit Syrian government troops near the eastern city of Deir ez-Zor on September 17, leaving 62 military personnel killed and a hundred wounded. The Pentagon said initially that the airstrike was a mistake and targeted Daesh militants. The head of the Syrian parliament added during her visit to Iran that after the coalition's airstrikes on the government troops US military directed terrorists' attack on the Syrian army.
  • The attack on government positions put to test a US-Russia brokered nationwide ceasefire that came into being in Syria earlier that week. Russia's Foreign Minister Sergei Lavrov said last Friday it was necessary to separate Daesh terrorists from "moderate" opposition forces in order to salvage the truce. Britain, Australia and Denmark confirmed their air forces' participation in the deadly airstrikes. The politician noted that the details would be made public later. Syrian Army soldiers that survived U.S. bombs in Deir Ezzor. pic.twitter.com/BrvN6wBR06
  •  
    The source is Sputnik, an official Russian government news agency. The story is dated September 19, 2016. The September 17 U.S. airstrike was on the surrounded Syran Army position that ISIL is now moving on from Mosul. SInce that report, the number killed by the airstrike has risen to over 80, apparently from some of the more than 100 wounded dying.
Paul Merrell

US watched ISIS rise in Syria and hoped to use it -- Kerry on leaked tape - 0 views

  • Last fall Secretary of State Kerry met privately with anti-Assad Syrian activists at the U.N.  The meeting was secretly taped, and you can listen to the tape here:
  • The New York Times got a hold of the tape back in September and wrote a story about it. So did CNN. More on their accounts later. The thrust of the conversation was the mutual frustration of Kerry and the Syrians that Bashar al-Assad was still in power and able to commit atrocities with the support of the Russians, who don’t adhere to international law the way we Americans do. I’d recommend listening to the whole tape; but the conversation went something like this: The Syrians complained we aren’t helping enough.  Kerry and his associates said we and the Saudis and Qatar and Turkey had provided huge amounts of aid to the rebels, who unfortunately were sort of aligned with extremists. “Nusra makes it hard,” Kerry said, referring to Jabhat al-Nusra, the Al Qaeda affiliate in Syria. “Nusra and Daesh [ISIS] both make it hard, because you have this extreme element out there and unfortunately some of the opposition has kind of chosen to work with them.” The rise of extremists had led to Russia’s intervention. Kerry said (at minute 26) that when Daesh, or ISIS, started to grow, the US watched and thought we could “manage” the ISIS situation, because it might push Assad to negotiate, but instead Putin came in. Kerry:
  • “The reason Russia came in is because ISIL was getting stronger, Daesh was threatening the possibility of going to Damascus and so forth. And that’s why Russia went in. Because they didn’t want a Daesh government and they supported Assad. “And we know that this was growing. We were watching. We saw that Daesh was growing in strength, and we thought Assad was threatened. We thought, however, we could probably manage, that Assad would then negotiate. Instead of negotiating, he got Putin to support him.” The Syrian activists present wanted more US aid, but Kerry and an aide said more military aid was problematic. “Right now we’re putting an extraordinary amount of arms in,” the secretary of state said. His aide said that arms are a double edged sword, because “when you pump more weapons into a place like Syria, it doesn’t end well for Syria. Because there’s always someone willing to put in arms from the other side.” Kerry spelled that out: “The problem is that, you know, you get, quote, enforcers in there and then everybody ups the ante, right? Russia puts in more, Iran puts in more; Hezbollah is there more and Nusra is more; and Saudi Arabia and Turkey put all their surrogate money in, and you all are destroyed.”
  • ...1 more annotation...
  • Kerry said the US wants a “political process” to supplant the fighting: elections, with millions of Syrian refugees in other countries allowed to vote– so that in his view Assad was sure to lose.  The Syrians present rejected this. One insisted that Assad had to be toppled by an invasion, because Syrians even outside the country would fear for their loved ones in the country. Kerry said a ground invasion by America would not be supported by Americans, due to thousands dead from our other wars.  Kerry said he was one of those within the Administration who wanted more action, but he lost the argument.  He was as frustrated as they were. “It’s hard because Congress will not authorize the use of force.” So the conversation was mostly about that frustration, but along the way Kerry said some rather revealing things. Combine this with the wikileaks revelation that the US State Department and Hillary Clinton knew our Arab allies Saudi Arabia and Qatar were giving ISIS “clandestine financial and logistic support” as it swept across Iraq and Syria in 2014, and you have the anti-interventionist view of America’s role in the Syrian war all nicely set out by John Kerry and someone in the State Department: We and our Arab allies supplied weapons. This caused the violence to escalate.  The good rebels “kind of” work with extremists, who get direct funding from our Arab allies. We thought the rise of ISIS would prove useful in pressuring Assad, but Putin intervened not because Russia wants to bomb civilians but because of the rise of ISIS. So our arming of the rebels and our clever hopes to manage the rise of ISIS while it put pressure on Assad led to more violence. This all sounds like a list of reasons for why the U.S. shouldn’t have intervened, along with the fact that we had no right to do so.
Gary Edwards

Walter E. Williams: States should nullify Obamacare [AUDIO] | The Daily Caller - 0 views

  •  
    Interesting discussion by Walter Williams as guest host for Rush Limbaugh.  Walter points to the 1798 Jefferson-Madison "Kentucky Resolution" and, the Marbury v Madison ruling as the legal rational for States to oppose and nullify the Supreme Court Obamacare Tax. Many Conservatives erroneously blame the Kentucky Resolution for being the pretext of the Southern States defending their sovereignty by succeeding from the Union following the election of Lincoln in 1860.  My read is that Jefferson and Madison both saw the States as having the final say on the Constitutionality of any Federal action - be it Congress, Justice or Executive branch.  Marbury v. Madison seems to fully justify the Jefferson-Madison view of the Constitution and State Sovereignty.   Note that Jefferson and Madison were responding to the reprehensible Federalist "Alien and Sedition Act". excerpt: On Rush Limbaugh's Thursday program, George Mason University professor Walter E. Williams outlined the case that states can nullify Obamacare, citing Thomas Jefferson's 1789 Kentucky Resolution, which was a claim that the U. S. Constitution is a compact among the several states, and any power not delegated to the U.S. government is void. "I think the American citizens ought to press their state governors and legislatures just to nullify the law - just to plain nullify it and say, 'The citizens of such-and-such-a state don't have to obey Obamacare because it's unconstitutional, regardless of what the Supreme Court says,'" Williams said. Williams cited Marbury v. Madison, which said "all laws which are repugnant to the Constitution are null and void" to further the case for nullification from the states. Nullification is a doctrine introduced in the infancy of the United States and was what some have suggested led to the Civil War. As far as the legal precedent of nullification and how it led to the Civil War, Williams said he doubted the repercussions would as serious as the
Joe La Fleur

If I Were the Devil - (BEST VERSION) by PAUL HARVEY audio restored - YouTube - 0 views

  •  
    PROPHECY 47 YEARS AGO DID HE GET IT RIGHT?
Paul Merrell

World must act to stop Syria's chemical weapons use, Cameron says - CNN.com - 0 views

  • (CNN) -- [Breaking news alert, 5:23 p.m. ET] A closed-door meeting of the U.N. Security Council ended Thursday with no agreement on a resolution to address the crisis in Syria, a Western diplomat told CNN's Nick Paton Walsh on condition of anonymity. "It was clear there was no meeting of minds, and no agreement on the text. It is clear that our approaches are very different and we are taking stock (of the next steps)," the diplomat said. The members of the Security Council expect U.N. weapons inspectors to brief Secretary-General Ban Ki-moon shortly after they depart Syria on Saturday. Ban, in turn, will swiftly brief the Security Council on the findings, the diplomat said.
  • Obama and his top advisers are holding extensive talks with American allies as they ponder their options. But the president is facing doubts at home as well: More than 160 members of Congress, including 63 Democrats, have now signed letters calling for either a vote or at least a "full debate" before any U.S. action.
  •  
    The drive for a US/UK military strike on Syria is beginning to bog down. The UN Security Council could not reach agreement on a resolution to authorize the strike; resistance in Congress is rising with a call for full debate before launching such a strike, and I just watched the UK House of Commons forbid UK participation in the strike. ("Heated moments in the UK debate" video is on the linked page.) Unsurprising in the U.S. because last weekend's Reuters/Ipsos poll showed that public resistance to U.S. military action against Syria is actually stiffening, with only 9 percent supporting military action. Obama has scheduled a telephone conference with key members of Congress to encourage them not to interfere, but reportedly the phone conference will use non-secure connections so classified information will not be discussed.  Personally, I want the raw intelligence data on the alleged use of sarin by the Syrian government to be publicly released, including audio recordings, so that it can be subjected to debate by the public. Based on my monitoring of news on the Syrian conflict for more than a year, it seems clear that the Syrian foreign "rebels" have the ability to manufacture Sarin and have used it repeatedly in Syria. And the Syrian government has very strong incentives not to use Sarin, particularly at the moment the gas attack occurred. A UN team had just arrived, at Syria invitation, to investigate prior incidents involving alleged gas attacks in which both sides blamed the other. Not a good time for the Syrian government to launch such an attack but a great time for the rebels to stage a false flag attack, blaming the Syrian government.  So I want to see the evidence Obama claims to be relying upon. Supposedly, it is an intercept of a panicked conversation between a Syrian commander and a lower officer in the field. But that too could have been staged. Making it public would go a long way toward resolving the authenticity issue and determining whether it w
Paul Merrell

Scientist-developed malware prototype covertly jumps air gaps using inaudible sound | A... - 0 views

  • Computer scientists have proposed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection. The proof-of-concept software—or malicious trojans that adopt the same high-frequency communication methods—could prove especially adept in penetrating highly sensitive environments that routinely place an "air gap" between computers and the outside world. Using nothing more than the built-in microphones and speakers of standard computers, the researchers were able to transmit passwords and other small amounts of data from distances of almost 65 feet. The software can transfer data at much greater distances by employing an acoustical mesh network made up of attacker-controlled devices that repeat the audio signals. The researchers, from Germany's Fraunhofer Institute for Communication, Information Processing, and Ergonomics, recently disclosed their findings in a paper published in the Journal of Communications. It came a few weeks after a security researcher said his computers were infected with a mysterious piece of malware that used high-frequency transmissions to jump air gaps. The new research neither confirms nor disproves Dragos Ruiu's claims of the so-called badBIOS infections, but it does show that high-frequency networking is easily within the grasp of today's malware.
  •  
    Not event the Sneaker Net is secure. Note to self: surgically remove all microphones and video cams from all systems (just the laptop, I think, but check). 
Paul Merrell

Fearing 'enemies,' Turkey blocks YouTube | Europe | DW.DE | 28.03.2014 - 0 views

  • First Twitter, now YouTube. The Turkish telecoms authority TIB said the move to was an "administrative measure." But only a few hours before the measure came into force, a rather provocative recording was posted on the site. According to the official view, the audio clip is one of the most flagrant among the many that anonymous opponents of the government have been leaking online over the last few months. It exposes the Islamic-conservative government led by Prime Minister Recep Tayyip Erdogan just before the municipal elections scheduled to take place on March 30. The conversation that was leaked this time is between Foreign Minister Ahmet Davutoglu and several heads of the intelligence service and the military. Participants of the conversation were apparently looking for a reason to go to war with Syria.
  • According to reports from the Turkish newspaper Hürriyet, the Turkish foreign ministry has confirmed the authenticity of the recording and has explained that the conversation took place in the foreign ministry. The ministry also emphasized, however, that the contents of the recording were distorted. In a statement issued by the Ministry of Foreign Affairs this explanation was given: "Monitoring such a meeting of a highly confidential nature which was held at a location such as the office of the foreign minister, where the most sensitive security issues of the state are discussed; and releasing these conversations to the public are a despicable attack, an act of espionage and a very serious crime against the national security of Turkey. This incident reveals the extent the threats of cyber and electronic attacks that Turkey encounters." The statement called the perpetrators "enemies of our state" and said they would be identified and severely punished as soon as possible.
  • But according to the legal expert, another aspect of the problem is at stake here. "This is a case of espionage. The alleged conversation took place in a secure location and it is on a very sensitive topic - the question of whether there should or should not be a war with Syria," he says. Tokuzlu added that the content of the conversation was clearly supposed to be released to the public in order to influence the results of this Sunday's (30.03.2014) local elections. But blocking the whole YouTube site was never an appropriate solution, Tokuzlu maintains. "There is no reason to block entire sites. You could block individual accounts or videos; that would be legitimate in this sort of a case," he said. Tokuzlu also explained that blocking YouTube could not be compared with the move to block Twitter: "The Security Council in Turkey held an emergency meeting. Right after, YouTube was blocked. That shows how important this case is."
  • ...2 more annotations...
  • The Turkish radio and television supervisory board RTÜK banned several Turkish media outlets from spreading the video or communicating its contents. According to the newspaper Hürriyet, the Turkish federal prosecutor's office has already initiated investigations against those responsible for the video. Measures taken too far According to legal expert Bertan Tokuzlu, the recording gives the impression that the government wanted to make trouble internationally, in order to distract the public from internal problems. "If the government wanted to create a reason for war, that is absolutely not in keeping with international legal standards," says Tokuzlu.
  • The recording also mentions Turkish arms deliveries to Syrian opposition groups. "If that is the case and we have a war crime to deal with, then the public has a right to know this information, according to the European Court of Human Rights," Tokuzlu stressed, adding that the Turkish government's reaction to the publication of the conversation was very thin-skinned. "If the recording provides evidence of a war crime, then that might mean the government will be brought before a war crimes tribunal in the near future. That is a delicate subject."
  •  
    This article is from 28 March 2014. The Turkish government a few days ago restored access to YouTube and Twitter, after reports that more than 300,000 Turks had thwarted the ban by learning to use Tor and VPN tunneling, posing a long-term obstacle to Turkish intelligence service surveillance. The Foreign Ministry recording was of the Foreign Minister and other high Turkish officials discussing plans for a false flag attack on Turkey to justify Turkey launching its own direct military attacks on Syria. Because Turkey is a member of NATO, an attack on Turkey triggers the obligations of other NATO member nations to join Turkey's "defense." 
Gary Edwards

Ron Paul Proposes Fiscal Reform Plan With Full Support of Rush Limbaugh - Daily Rush Li... - 0 views

  •  
    Audio of one very incredible moment.  On the Monday Oct 17th, 2011 show, Rush Limbaugh declared his full support of the Ron Paul Fiscal Plan that includes $1 Trillion in budgetary spending cuts, bringing home the troops, and the full neutering of the EPA.
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

Appeals court chilly to feds' arguments for NSA surveillance program - POLITICO.com - 0 views

  • The first federal appeals court to hear a challenge to the National Security Agency's broad collection of data on Americans' telephone calls since the program was publicly revealed last year gave a surprisingly chilly reception Tuesday to the government's arguments for the legality of the surveillance.
  • Tuesday's argument session was webcast live by C-SPAN and can be viewed here.
  •  
    ACLU v. Clapper case on appeal before the Second Circuit. District Judge Paulley had granted the government's motion to dismiss. ACLU took it's appeal from that ruling. At issue is the legality of the NSA bulk telephone metadata collection. Predicting outcomes on the basis of judges' questions at hearing is risky. But I agree with the article that the judges gave the government's position a chilly reception. Normally, federal appellate hearings are scheduled for 20 minutes. This one was given an hour plus 45 minutes. CSPAN did a good job of the video recording, but the audio is out of sync with the video, at least with my connection. Still, a very interesting argument.  
Paul Merrell

NZ Prime Minister John Key Retracts Vow to Resign if Mass Surveillance Is Shown - 0 views

  • In August 2013, as evidence emerged of the active participation by New Zealand in the “Five Eyes” mass surveillance program exposed by Edward Snowden, the country’s conservative Prime Minister, John Key, vehemently denied that his government engages in such spying. He went beyond mere denials, expressly vowing to resign if it were ever proven that his government engages in mass surveillance of New Zealanders. He issued that denial, and the accompanying resignation vow, in order to reassure the country over fears provoked by a new bill he advocated to increase the surveillance powers of that country’s spying agency, Government Communications Security Bureau (GCSB) — a bill that passed by one vote thanks to the Prime Minister’s guarantees that the new law would not permit mass surveillance.
  • Since then, a mountain of evidence has been presented that indisputably proves that New Zealand does exactly that which Prime Minister Key vehemently denied — exactly that which he said he would resign if it were proven was done. Last September, we reported on a secret program of mass surveillance at least partially implemented by the Key government that was designed to exploit the very law that Key was publicly insisting did not permit mass surveillance. At the time, Snowden, citing that report as well as his own personal knowledge of GCSB’s participation in the mass surveillance tool XKEYSCORE, wrote in an article for The Intercept: Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. . . . The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks.
  • A series of new reports last week by New Zealand journalist Nicky Hager, working with my Intercept colleague Ryan Gallagher, has added substantial proof demonstrating GCSB’s widespread use of mass surveillance. An article last week in The New Zealand Herald demonstrated that “New Zealand’s electronic surveillance agency, the GCSB, has dramatically expanded its spying operations during the years of John Key’s National Government and is automatically funnelling vast amounts of intelligence to the US National Security Agency.” Specifically, its “intelligence base at Waihopai has moved to ‘full-take collection,’ indiscriminately intercepting Asia-Pacific communications and providing them en masse to the NSA through the controversial NSA intelligence system XKeyscore, which is used to monitor emails and internet browsing habits.” Moreover, the documents “reveal that most of the targets are not security threats to New Zealand, as has been suggested by the Government,” but “instead, the GCSB directs its spying against a surprising array of New Zealand’s friends, trading partners and close Pacific neighbours.” A second report late last week published jointly by Hager and The Intercept detailed the role played by GCSB’s Waihopai base in aiding NSA’s mass surveillance activities in the Pacific (as Hager was working with The Intercept on these stories, his house was raided by New Zealand police for 10 hours, ostensibly to find Hager’s source for a story he published that was politically damaging to Key).
  • ...6 more annotations...
  • That the New Zealand government engages in precisely the mass surveillance activities Key vehemently denied is now barely in dispute. Indeed, a former director of GCSB under Key, Sir Bruce Ferguson, while denying any abuse of New Zealander’s communications, now admits that the agency engages in mass surveillance.
  • Meanwhile, Russel Norman, the head of the country’s Green Party, said in response to these stories that New Zealand is “committing crimes” against its neighbors in the Pacific by subjecting them to mass surveillance, and insists that the Key government broke the law because that dragnet necessarily includes the communications of New Zealand citizens when they travel in the region.
  • So now that it’s proven that New Zealand does exactly that which Prime Minister Key vowed would cause him to resign if it were proven, is he preparing his resignation speech? No: that’s something a political official with a minimal amount of integrity would do. Instead — even as he now refuses to say what he has repeatedly said before: that GCSB does not engage in mass surveillance — he’s simply retracting his pledge as though it were a minor irritant, something to be casually tossed aside:
  • When asked late last week whether New Zealanders have a right to know what their government is doing in the realm of digital surveillance, the Prime Minister said: “as a general rule, no.” And he expressly refuses to say whether New Zealand is doing that which he swore repeatedly it was not doing, as this excellent interview from Radio New Zealand sets forth: Interviewer: “Nicky Hager’s revelations late last week . . . have stoked fears that New Zealanders’ communications are being indiscriminately caught in that net. . . . The Prime Minister, John Key, has in the past promised to resign if it were found to be mass surveillance of New Zealanders . . . Earlier, Mr. Key was unable to give me an assurance that mass collection of communications from New Zealanders in the Pacific was not taking place.” PM Key: “No, I can’t. I read the transcript [of former GCSB Director Bruce Ferguson’s interview] – I didn’t hear the interview – but I read the transcript, and you know, look, there’s a variety of interpretations – I’m not going to critique–”
  • Interviewer: “OK, I’m not asking for a critique. Let’s listen to what Bruce Ferguson did tell us on Friday:” Ferguson: “The whole method of surveillance these days, is sort of a mass collection situation – individualized: that is mission impossible.” Interviewer: “And he repeated that several times, using the analogy of a net which scoops up all the information. . . . I’m not asking for a critique with respect to him. Can you confirm whether he is right or wrong?” Key: “Uh, well I’m not going to go and critique the guy. And I’m not going to give a view of whether he’s right or wrong” . . . . Interviewer: “So is there mass collection of personal data of New Zealand citizens in the Pacific or not?” Key: “I’m just not going to comment on where we have particular targets, except to say that where we go and collect particular information, there is always a good reason for that.”
  • From “I will resign if it’s shown we engage in mass surveillance of New Zealanders” to “I won’t say if we’re doing it” and “I won’t quit either way despite my prior pledges.” Listen to the whole interview: both to see the type of adversarial questioning to which U.S. political leaders are so rarely subjected, but also to see just how obfuscating Key’s answers are. The history of reporting from the Snowden archive has been one of serial dishonesty from numerous governments: such as the way European officials at first pretended to be outraged victims of NSA only for it to be revealed that, in many ways, they are active collaborators in the very system they were denouncing. But, outside of the U.S. and U.K. itself, the Key government has easily been the most dishonest over the last 20 months: one of the most shocking stories I’ve seen during this time was how the Prime Minister simultaneously plotted in secret to exploit the 2013 proposed law to implement mass surveillance at exactly the same time that he persuaded the public to support it by explicitly insisting that it would not allow mass surveillance. But overtly reneging on a public pledge to resign is a new level of political scandal. Key was just re-elected for his third term, and like any political official who stays in power too long, he has the despot’s mentality that he’s beyond all ethical norms and constraints. But by the admission of his own former GCSB chief, he has now been caught red-handed doing exactly that which he swore to the public would cause him to resign if it were proven. If nothing else, the New Zealand media ought to treat that public deception from its highest political official with the level of seriousness it deserves.
  •  
    It seems the U.S. is not the only nation that has liars for head of state. 
Paul Merrell

The ultimate goal of the NSA is total population control | Antony Loewenstein | Comment... - 0 views

  • William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.
  • “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.Binney, who featured in a 2012 short film by Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government intrusion unlimited.“The ultimate goal of the NSA is total population control”, Binney said, “but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone.”
  • It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”The lack of official oversight is one of Binney’s key concerns, particularly of the secret Foreign Intelligence Surveillance Court (Fisa), which is held out by NSA defenders as a sign of the surveillance scheme's constitutionality.“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally.”
  • ...4 more annotations...
  • He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out but fear retribution and exile, not unlike Snowden himself, who is likely to remain there for some time.
  • Binney recently told the German NSA inquiry committee that his former employer had a “totalitarian mentality” that was the "greatest threat" to US society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over of Iraq.The era of mass surveillance has gone from the fringes of public debate to the mainstream, where it belongs. The Pew Research Centre released a report this month, Digital Life in 2025, that predicted worsening state control and censorship, reduced public trust, and increased commercialisation of every aspect of web culture.It’s not just internet experts warning about the internet’s colonisation by state and corporate power. One of Europe’s leading web creators, Lena Thiele, presented her stunning series Netwars in London on the threat of cyber warfare. She showed how easy it is for governments and corporations to capture our personal information without us even realising.Thiele said that the US budget for cyber security was US$67 billion in 2013 and will double by 2016. Much of this money is wasted and doesn't protect online infrastructure. This fact doesn’t worry the multinationals making a killing from the gross exaggeration of fear that permeates the public domain.
  • Wikileaks understands this reality better than most. Founder Julian Assange and investigative editor Sarah Harrison both remain in legal limbo. I spent time with Assange in his current home at the Ecuadorian embassy in London last week, where he continues to work, release leaks, and fight various legal battles. He hopes to resolve his predicament soon.At the Centre for Investigative Journalism conference, Harrison stressed the importance of journalists who work with technologists to best report the NSA stories. “It’s no accident”, she said, “that some of the best stories on the NSA are in Germany, where there’s technical assistance from people like Jacob Appelbaum.” A core Wikileaks belief, she stressed, is releasing all documents in their entirety, something the group criticised the news site The Intercept for not doing on a recent story. “The full archive should always be published”, Harrison said.
  • With 8m documents on its website after years of leaking, the importance of publishing and maintaining source documents for the media, general public and court cases can’t be under-estimated. “I see Wikileaks as a library”, Assange said. “We’re the librarians who can’t say no.”With evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney said: “I call people who are covering up NSA crimes traitors”.
Paul Merrell

Mastermind of The Bamako Terror Attack Mokhtar Belmokhtar: A CIA Sponsored "Intelligenc... - 0 views

  • In response to the tragic Paris events of November 13, Central Intelligence Agency director  John Brennan  warned that “ISIL is planning additional attacks… It is clear to me that ISIL has an external agenda, that they are determined to carry out these types of attacks.” (Quoted in Daily Telegraph, November 16, 2015) Five days later following the CIA Chief’s  premonition, the Bamako Radisson Hotel Blu in Mali’s capital was the object of a terrorist attack, resulting in  21 people dead. Following the attack and the taking of hostages by the terrorists, French and Malian special forces raided the hotel. US. Africa Command (AFRICOM) also confirmed that US special forces were involved.
  • The Bamako terror operation was allegedly coordinated by Mokhtar Belmokhtar (aka Khaled Abu al-Abbas), leader of an affiliate of Al Qaeda in the Islamic Maghreb (AQIM), the Islamist al-Mulathameen (Masked) Brigade, or “Those who Sign with Blood.” Belmokhtar’s group was created in 2012 in the wake of the war on Libya. His organization has also allegedly been involved in the drug trade, smuggling as well kidnapping operations of foreigners in North Africa.  While his whereabouts are said to be known, French intelligence has dubbed Belmokhtar “the uncatchable”. In June he was reported dead  as a result in a U.S. air strike in Libya. His death was subsequently denied. Based on shaky evidence, The New York Times report below (November 20) concludes that Belmokhtar’s group (together with AQIM) is unequivocally behind the Bamako attacks:
  • A member of Al Qaeda in Africa confirmed Saturday that the attack Friday on a hotel in Bamako, Mali, had been carried out by a jihadist group loyal to Mokhtar Belmokhtar, an Algerian operative for Al Qaeda. The Qaeda member, who spoke via an online chat, said that an audio message and a similar written statement in which the group claimed responsibility for the attack were authentic. The SITE Intelligence Group, which monitors jihadist groups, also confirmed the authenticity of the statement. The Qaeda member, who refused to be named for his protection, said that Mr. Belmokhtar’s men had collaborated with the Saharan Emirate of Al Qaeda in the Islamic Maghreb, … In the audio recording, the group, known as Al Mourabitoun, says it carried out the operation in conjunction with Al Qaeda’s branch in the Islamic Maghreb. The recording was released to the Al Jazeera network and simultaneously to Al Akhbar, … The recording states: “We, in the group of the Mourabitoun [Arabic Rebel Group], in cooperation with our brothers in Al Qaeda in Islamic Maghreb, the great desert area, claim responsibility for the hostage-taking operation in the Radisson hotel in Bamako.” (emphasis added)
  • ...7 more annotations...
  • In turn, the French Minister of Defense acknowledged –prior to the conduct of a police investigation– that the authors of the attack were “most likely” led by Mokhtar Belmokhtar’s group in association with Al Qaeda in the Islamic Maghreb (AQIM). What Defense Minister Jean-Yves Le Drain failed to mention was that both Belmokhtar and AQIM have longstanding links to the CIA, which in turn has a working relationship with France’s  General Directorate for External Security, Direction générale de la sécurité extérieure (DGSE).  Casually ignored by the Western media, the leaders of Al Qaeda in the Islamic Maghreb (AQIM) including Belmokhtar were trained and recruited by the CIA in Afghanistan. Acknowledged by the Washington based Council on Foreign Relations (CFR): Most of AQIM’s major leaders are believed to have trained in Afghanistan during the 1979-1989 war against the Soviets as part of a group of North African volunteers known as “Afghan Arabs” that returned to the region and radicalized Islamist movements in the years that followed. The group is divided into “katibas” or brigades, which are clustered into different and often independent cells. The group’s top leader, or emir, since 2004 has been  Abdelmalek Droukdel, also known as Abou Mossab Abdelwadoud, a trained engineer and explosives expert who has fought in Afghanistan and has roots with the GIA in Algeria. (Council on Foreign Relations, Al Qaeda in the Islamic Maghreb, cfr.org, undated)
  • Mokhtar Belmokhtar: Post Cold War CIA intelligence asset?  The Council on Foreign Relations erroneously describes “Mokhtar Belmokhtar as the one-eyed veteran of the anti-Soviet Afghan insurgency.” (CFR, op cit, emphasis added). Belmokhtar (born in 1972) did not fight in the Soviet-Afghan war (1979-1989). He was recruited in 1991 at the age of 19 in the immediate wake of the Cold War. CIA recruitment continued in the wake of the Cold War. It was in large part directed against the Russian Federation and the former Soviet Republics as well as the Middle East. The purpose of this later CIA recruitment was to establish a network of “intelligence assets” to be used in the CIA’s post-cold war insurgencies. Leaders of the Chechen Islamist insurgencies were also trained in CIA camps in Afghanistan and Pakistan, including the notorious leader of the Chechen insurrection Ibn al-Khattab (a citizen of Saudi Arabia).
  • Following his training and recruitment and a two year stint in Afghanistan (1991-1993), Mokhtar Belmokhtar was sent back to Algeria in 1993 at age 21 where he joined the  Salafist Group for Preaching and Combat (GSPC) (emblem left). The latter was initially part of the so-called Armed Islamic Group  (Groupe islamique armé (GIA)) in Algeria which sought to overthrow the secular Algerian Government with a view to installing a theocratic Islamic State. Supported covertly by the CIA, Belmokhtar fought in Southern Algeria in the civil war opposing Islamist forces and the secular government. He was also  instrumental in the integration and merging of “jihadist” forces. In January 2007,  the Armed islamic Group (GIA) which had been prominent in the 1990s, officially changed its name to the Al-Qaeda Organization in the Islamic Maghreb (AQIM). In turn, as of 2007, the newly formed AQIM established a close relationship with the Libya Islamic Fighting Group (LIFG), which was directly supported by NATO during the 2011 war on Libya, “providing weapons, training, special forces and even aircraft to support them in the overthrow of Libya’s government.” (Tony Cartalucci, The Geopolitical Reordering of Africa: US Covert Support to Al Qaeda in Northern Mali, France “Comes to the Rescue”, Global Research, January 2013). British SAS Special Forces had also been brought into Libya prior to the onset of the insurrection, acting as military advisers to the LIFG. In fact, what has unfolded since the war on Libya is the merging of LIFG and AQIM forces. In turn, many of the LIFG operatives have been dispatched to Syria to fight within the ranks of Al Nusrah and the ISIS.
  • It is worth noting that the 2007  restructuring  of jihadist forces in Algeria and the Maghreb coincided with  the appointment of Robert Stephen Ford as US ambassador to Algeria in August 2006. Ford had been reassigned by the State Department from Baghdad to Algiers. From 2004 to 2006, he worked closely with Ambassador John Negroponte at the US embassy in Baghdad in supporting the creation of  both Shia and Sunni death squads in Iraq. This project consisted in recruiting and training terrorists modelled on the so-called “Salvador Option” which had been applied by the CIA in Central America. Negroponte as we recall played a central role in supporting the Contras terrorists in Nicaragua as ambassador to Honduras from 1981-1985. For further details see Michel Chossudovsky, “The Salvador Option For Syria”: US-NATO Sponsored Death Squads Integrate “Opposition Forces”, Global Research,  May 28, 2012) The 2006 appointment of Robert Stephen Ford to head the US Embassy in Algeria was timely. It coincided with the consolidation of jihadist groups within Algeria and the Maghreb. It preceded the 2011 US-NATO sponsored insurrections in Libya and Syria. In 2010, Ford was approved by the US Congress as US Ambassador to Syria. He presented his credentials to president Bashar al Assad in January 2011, barely two months prior to the onslaught of the terrorist insurrection in the border city of Daraa in mid-March 2011. Ford played a central role in assisting the channelling of US and allied support to Syrian “opposition” groups including Al Nusrah and the ISIS.
  • Belmokhtar’s history and involvement in Afghanistan confirms that from the very outset he was an instrument of US intelligence. While, he operates with a certain degree of independence and autonomy in relation to his intelligence sponsors, he and his organization are bona fide CIA “intelligence assets”, which can be used by the CIA as part of a covert agenda. There are various definitions of  an “intelligence asset”. From the standpoint of US intelligence, “assets” linked up to terrorist organizations must not be aware that they are supported and monitored by Western intelligence. With regard to Al Qaeda, from the outset in 1979, the CIA chose to operate through various front organizations as well as indirectly through its Saudi, Qatari and Pakistani intelligence partners. CIA’s Milton Beardman who played a central role in the Soviet Afghan war confirms that members of Al Qaeda including Osama bin Laden were not aware of the role they were playing on behalf of Washington. In the words of bin Laden (quoted by Beardman): “neither I, nor my brothers saw evidence of American help”(Michel Chossudovsky, Who is Osama bin Laden, Global Research, September 12, 2001): Motivated by nationalism and religious fervor, the Islamic warriors were unaware that they were fighting the Soviet Army on behalf of Uncle Sam. While there were contacts at the upper levels of the intelligence hierarchy, Islamic rebel leaders in theatre had no contacts with Washington or the CIA.  (Ibid) Amply documented, Al Qaeda in the Islamic Maghreb (AQIM)and its affiliated groups including the Libya Islamic Fighting Group (LIFG) was serving the interests of the Western military alliance. Confirmed by the Washington Post, June 29, 2011 (See below), France was supplying weapons to the LIFG at the height of NATO’s bombing raids.
  • AQIM in turn was receiving weapons from the LIFG, which was supported by NATO. Moreover, LIFG mercenaries had integrated AQIM brigades. According to alleged Terror Mastermind Mokhtar Belmokhtar, who also coordinated the 2013 In Amenas Mali kidnapping operation: “We have been one of the main beneficiaries of the revolutions in the Arab world. As for our benefiting from the (Libyan) weapons, this is a natural thing in these kinds of circumstances.” http://www.hanford.gov/c.cfm/oci/ci_terrorist.cfm?dossier=174 Al Qaeda in the Islamic Maghreb (AQIM) is indelibly tied into a Western intelligence agenda. While it is described  as  ”one of the region’s wealthiest, best-armed militant groups”, financed covertly by Saudi Arabia and Qatar. France’s  Canard enchaîné revealed (June 2012) that Qatar (a staunch ally of the United States) has been funding various terrorist entities in Mali: The original report cites a French military intelligence report as indicating that Qatar has provided financial support to all three of the main armed groups in northern Mali: Iyad Ag Ghali’s Ansar Ed-Dine, al-Qa’ida in the Islamic Maghreb (AQIM) and the Movement for Unity and Jihad in West Africa (MUJWA). The amount of funding given to each of the groups is not mentioned but it mentions that repeated reports from the French DGSE to the Defense Ministry have mentioned Qatar’s support for ‘terrorism’ in northern Mali. (quoted by Jeune Afrique June 2012)
  • Qatar is a proxy state, a de facto Persian Gulf territory largely controlled by Washington. It hosts  a number of Western military and intelligence facilities. The Emir of Qatar does not finance terrorism without the consent of the CIA. And with regard to Mali, the CIA coordinates its activities in liaison with its French intelligence partners and counterparts, including la Direction du renseignement militaire (DRM) and the Direction générale de la sécurité extérieure (DGSE). The implications are obvious and should be carefully understood by Western public opinion. Inasmuch as Belmokhtar and AQIM are “intelligence assets”, both US and French intelligence are (indirectly) behind the Bamako attacks. Both US and French intelligence are complicit in the State sponsorship of terrorism.
1 - 20 of 57 Next › Last »
Showing 20 items per page