Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged citizen-threat-ranking

Rss Feed Group items tagged

Paul Merrell

Fresno Police Roll Out Dystopian 'Threat Ranking' System - 0 views

  • “On 57 monitors that cover the walls of the center, operators zoomed and panned an array of roughly 200 police cameras perched across the city. They could dial up 800 more feeds from the city’s schools and traffic cameras, and they soon hope to add 400 more streams from cameras worn on officers’ bodies and from thousands from local businesses that have surveillance systems.” Though the intricate surveillance apparatus described above seems straight from a dystopic novel, it is actually the Washington Post’s recent description of the the visual data collection system employed by a local California police department. The police department in Fresno, California, has taken extreme measures to combat high rates of crime in the city. As the Post reports, Fresno’s Real Time Crime Center, buried deep in the police station’s headquarters, has developed as a response to what many police call increasing threats. The system, according to police officials, can “provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases” — a feature they say is increasingly important in the wake of events like the November terror attack in Paris and the San Bernardino shooting last month.
  • “Our officers are expected to know the unknown and see the unseen,” Fresno Chief of Police Jerry Dyer said. “They are making split-second decisions based on limited facts. The more you can provide in terms of intelligence and video, the more safely you can respond to calls.” Programs similar to the Real Time Crime Center have launched in New York, Houston, and Seattle over the course of the last decade. Nationwide, the use of Stingrays, data fusion centers, and aerial drone surveillance have broadened the access local police have to private information. In another example, the FBI is continually developing a comprehensive biometric database that local police access every day. “This is something that’s been building since September 11,” says Jennifer Lynch, a senior attorney at the Electronic Frontier Foundation. Like the problem of police militarization, Lynch traces the trend back to the Pentagon: “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.”
  • While many of these programs may fail to shock Americans, one new software program takes police scrutiny of private citizens to a new level. Beware, a software tool produced by tech firm Intrado, not only surveils the data of the citizens of Fresno, the first city to test it — it calculates threat levels based on what it discovers. The software scours arrest records, property records, Deep Web searches, commercial databases, and social media postings. By this method, it was able to designate a man with a firearm and gang convictions involved in a real-time domestic violence dispute as the highest of three threat levels: a bright red ranking. Fresno police say the intelligence from Beware aided them, as the man eventually surrendered and officers found he was armed with a gun. Beware scours billions of data points to develop rankings for citizens, and though few recoil at the thought of catching criminals and miscreants, the program provides particular cause for concern because of both its invasiveness and its fallibility.
  • ...3 more annotations...
  • These shortcomings have sparked concern among Fresno’s city council members, who discussed the issue at a meeting in November. At that meeting, one council member cited an incident where a girl who posted on social media about a card game called “Rage” was consequently given an elevated threat ranking — all because “rage” could be a triggering keyword for Beware. At that same meeting, libertarian-leaning Republican councilman Clinton J. Olivier asked Chief Dyer to use the technology to calculate his threat level. In real-time, Olivier was given a green, or non-threatening ranking, but his home received a yellow, or medium, threat ranking. It was likely due to the record of his home’s prior occupant. “Even though it’s not me that’s the yellow guy, your officers are going to treat whoever comes out of that house in his boxer shorts as the yellow guy,” Olivier told Dyer. “That may not be fair to me.” He added later, “[Beware] has failed right here with a council member as the example.” “It’s a very unrefined, gross technique,” Fresno civil rights attorney, Rob Nabarro, has said of Beware’s color-coded levels. “A police call is something that can be very dangerous for a citizen,” he noted, echoing Olivier’s worries.
  • Further, though Fresno police use Beware, they are left in the dark about how it determines rankings. Intrado designates the method a “trade secret,” and as such, will not share it with the officers who use it. This element of the software’s implementation has concerned civil rights advocates like Nabarro. He believes the secrecy surrounding the technology may result in unfair, unchecked threat rankings. Nabarro cautioned that between the software’s secrecy and room for error, Beware could accidentally rank a citizen as dangerous based on, for example, posts on social media criticizing police. This potential carries with it the ability for citizens to be punished not for actual crimes, but for exercising basic constitutional rights. Further, it compromises the rights of individuals who have been previously convicted of crimes, potentially using past behavior to assume guilt in unrelated future incidents. Chief Dyer insists concerns are exaggerated and that a particular score does not guarantee a particular police response. Police maintain the tools are necessary to fight crime. Nevertheless, following the heated November meeting, Dyer suggested he would work to turn off the color-coded threat ranking due to citizens’ concerns. “It’s a balancing act,” he admitted.
  • It remains to be seen if Fresno police and residents will move forward with the technology or shut it down over privacy concerns. City officials in Oakland, California, for example, recently scaled back plans to establish a Real Time Crime Center after outraged citizens protested. At the very least, as Northern California ACLU attorney Matt Cagle said, “[W]henever these surveillance technologies are on the table, there needs to be a meaningful debate. There needs to be safeguards and oversight.”
  •  
    Claiming trade secrecy for the software's selection criteria for threat ranking actually constitutes policy policy, the trade secrecy claim would probably not survive judical review. It's at least arguably an unconstitutional delegation of a government function (ranking citizens as threats) to a private company. Police departments in Florida were sued to produce records of how a related surveillance device, the Stingray IMSI device that intercepts cell phone calls by mimicking a cell-phone tower, and only averted court-ordered disclosure of its trade secret workings by the FBI swooping in just before decision to remove all the software documentation from local police possession, custody, and control.    There is a long chain of case law holding that information that is legitimately trade secret and proprietary loses that protection if adopted by local or federal government as law. With a software program that classifies citizens as threats for governmental purposes if they meet the program's selection criteria, the software is performing a strictly governmental function that is in reality law. 
Paul Merrell

White House: Al Qaeda in Iraq now 'transnational threat' | TheHill - 0 views

  • Al Qaeda's violent resurgence in Iraq and expansion into Syria now represents a "transnational threat network" that could possibly reach from the Mideast to the United States, according to the White House. The teaming of al Qaeda's Iraqi cell and affiliated Islamic militant groups in Syria into the new Islamic State of Iraq and al-Sham (ISIS) has developed into "a major emerging threat to Iraqi stability . . . and to us," a senior administration official told reporters on Wednesday. "It is a fact now that al Qaeda has a presence in Western Iraq" extending into Syria, "that Iraqi forces are unable to target," the official said. That growing presence "that has accelerated in the past six to eight months" has been accompanied by waves of bombings and attacks that threaten to throw Iraq into a full-blown civil war. 
  • Keeping ISIS from destabilizing the Iraqi government and expanding into other areas in the region is a "major focus" of this week's visit by Iraqi Prime Minister Nouri al Maliki to Washington. The Iraqi delegation met with Vice President Joe Biden Wednesday morning, and will meet with congressional leaders later in the day. Top defense lawmakers are already sounding the alarm on ISIS growth in the region and the threat posed by the al Qaeda faction to Iraq, Syria and ultimately the United States. "As the situation in both countries grows worse . . . we are deeply concerned that Al-Qaeda could use its new safe haven in Iraq and Syria to launch attacks against U.S. interests and those of our friends and allies," Sen. John McCain (R-Ariz.) along with Senate Armed Services Committee chief Carl Levin (D-Mich.), ranking member Jim Inhofe (R-Okla.) wrote in a letter to President Obama. Senate Foreign Relations heads Sens. Robert Menendez (D-NJ) and Bob Corker (R-Tenn.) also co-signed the letter, sent to the White House on Tuesday. 
  • "We urge you to press [al-Maliki] to formulate a comprehensive political and security strategy that can stabilize the country, enable Iraq to realize its vast potential, and help to safeguard our nation’s enduring national security interests in Iraq," they wrote. One area lawmakers are pressing the White House and Iraqi government on is increased U.S. assistance for counterterrorism operations in the country, backed by supplies of American military weapons and intelligence. 
  • ...2 more annotations...
  • Iraqi officials reportedly reached out to U.S. intelligence officials to see if American drones could begin conducting airstrikes against ISIS targets in Western Iraq. When asked whether the White House was considering expediting those weapon sales to Iraq, the official replied: "I will leave it up to the Iraqis to make that case." That said, the administration "is working closely with Congress" to facilitate the kind of military and intelligence aid being sought by al-Maliki from the United States. Counterterrorism support is evaluated "country by country and in Iraq that is [especially] complicated," the official said, noting the long-standing tribal and sectarian ties woven into the country's makeup. 
  • That said, the White House official ruled out the possibility of putting U.S. boots back on the ground in Iraq, in the form of military trainers, as part of any counterterrorism strategy. The White House and Pentagon failed to reach a bilateral security deal with Baghdad that would allow a handful of American troops to remain in the country after the U.S. pullout in 2011. That lack of a deal prevented Washington from fielding a postwar force in Iraq after the final withdrawal in December of that year. White House critics claim Obama's inability to lock in a postwar deal with Iraq opened the door for al Qaeda's return to power in the country. 
  •  
    Let's see if I've got this straight. Our previous wars in Iraq and Afghanistan resulted in massive recruitment by "terrorists" who now threat our shores once again. Therefore, we should launch a third war in Iraq or at least raining Hellfire missiles on Iraq from drones. This logic seems to ignore the immutable fact that it is U.S. violence in the region that converts peaceful Arab citizens into "terrorists." The message is clear: end our military involvement in the Mideast and northern Africa. But that message seems to fall on deaf ears in Washington, D.C. That is because this is not about terrorists at all. It is about control of Pipelinestan and profits in the military-industrial complex.   
Gary Edwards

We Call a Top NSA Whistleblower … And Get the REAL SCOOP on Spying | Washingt... - 0 views

  •  
    "NSA whistleblower Thomas Drake corroborated Klein's assertions, testifying that while the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications." ..................... I then asked the NSA veteran Binney if the government's claim that it is only spying on metadata - and not content - was correct. We have extensively documented that the government is likely recording content as well. (And the government has previously admitted to "accidentally" collecting more information on Americans than was legal, and then gagged the judges so they couldn't disclose the nature or extent of the violations.) Binney said that was not true; the government is gathering everything, including content. Binney explained - as he has many times before - that the government is storing everything, and creating a searchable database … to be used whenever it wants, for any purpose it wants (even just going after someone it doesn't like). ..................... Binney said that former FBI counter-terrorism agent Tim Clemente is correct when he says that no digital data is safe (Clemente says that all digital communications are being recorded). Both Verint and Narus were founded in Israel in the 1990s. *** Binney next confirmed the statement of the author of the Patriot Act - Congressman Jim Sensenbrenner - that the NSA spying programs violate the Patriot Act. After all, the Patriot Act is focused on spying on external threats … not on Americans. Binney asked rhetorically: "How can an American court [FISA or otherwise] tell telecoms to cough up all domestic data?!" Update: Binney sent the following clarifying email about content collection: It's clear to me that they are collecting most e-mail in full plus other text type data on the web. As for phone calls, I don't think they would record/transcribe the approximately 3 billion US-to-US calls every day. It's more likely that they are reco
Paul Merrell

Czech and Slovak Reservists Memorandum against NATO. "We Reject Fighting in NATO Ranks ... - 0 views

  • On January 19th 2015 the facebook group, which combines all members of the CSLA, PS, VMV, SNB in reserve or decommissioned, issued an important memorandum, which has become even more urgent in light of the situation today. A defensive back up location in the event that the group gets „disappeared“ from Facebook, the group of the same name exists on VK.com. as well. For the first time since the end of the 2nd World War we see a genuine threat of war yet again. Consequently, we consider it necessary to issue the following statement. We, the Czechoslovak soldiers in reserve, unanimously reject any participation in battles that are geopolitical acts of aggression of the global elite by way of NATO and the support of our governments. We swore to defend our homeland the Czech and Slovak Republics. We swore to protect the freedom and independence of our proud and sovereign nations, for which our ancestors laid down their lives in the world wars. We are guided by this oath in a civilian initiative to deal with a crisis situation. Freedom and independence is being jeopardized long time by a system of representative pseudo-democracy, where an elected representative does not have the obligation to advance the interests of voters and in practice, laws represent but the personal interests of the legislators, the interests of political parties and economic interest groups. Our homeland is under the pressure of global elites and economic interest groups, who are doing away with the power of citizens through a system of representative democracy.
  • Our deliberately flawed constitution and charter of rights and freedoms is being perverted and constitutional laws are violated by legislators themselves. Legislative power is being privatized, executive power is being politicized and judicial power corrupted by lobbying laws and pressure from our governments. The results are an unplayable public deficit, deindustrialization, the privatization of the republic’s property and defrauded budgets, food and energy dependence, the privatization of natural resources, pensions and the health of citizens. Our country has been unlawfully divided, looted, indebted, people enslaved and their families liquidated by repossession genocide, national infrastructure transferred into the hands of western corporations. Destructive chaos and despair dominates in the community. For this reason, we the Czechoslovak soldiers in reserve recognize our military oath and together we come with a vision for the defense of our nations. We unequivocally reject fighting in the ranks of NATO against the Russian federation or other Slavic nations and we likewise intend to stand up firmly through organized civilian pressure against the further liquidation of our democracy, freedom and independence. We are uniting in a crisis situation and by utilizing our civilian and military skills and expertise we intend to create sufficiently strong, organized civil pressure for the period of time necessary to assert our patriotic goals. We swore allegiance to our homeland, the Czech and Slovak Republics. We, the Czechoslovak reserve soldiers, will fulfill this oath!
  •  
    If true, U.S. hegemony and NATO just took another big hit. What if they gave a war and nobody came?
Paul Merrell

NSA shares raw intelligence including Americans' data with Israel | World news | The Gu... - 0 views

  • The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process "minimization", but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
  • The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content."According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. "NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection", it says.
  • In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy."Any US person information that is acquired as a result of NSA's surveillance activities is handled under procedures that are designed to protect privacy rights," the spokesperson said.The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
  • ...3 more annotations...
  • While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel."Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge," states the report, titled 'History of the US – Israel Sigint Relationship, Post-1992'. "In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA's only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner."
  • In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. "On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems," the official says. "A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US."Later in the document, the official is quoted as saying: "One of NSA's biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended."
  • The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.In its statement, the NSA said: "We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations."NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information."
Paul Merrell

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
Paul Merrell

Remarks by President Obama in Address to the United Nations General Assembly | The Whit... - 0 views

  • Remarks by President Obama in Address to the United Nations General Assembly United Nations General Assembly Hall New York City, New York 10:13 A.M. EDT PRESIDENT OBAMA:  Mr. President, Mr. Secretary General, fellow delegates, ladies and gentlemen:  We come together at a crossroads between war and peace; between disorder and integration; between fear and hope. Around the globe, there are signposts of progress.  The shadow of World War that existed at the founding of this institution has been lifted, and the prospect of war between major powers reduced.  The ranks of member states has more than tripled, and more people live under governments they elected. Hundreds of millions of human beings have been freed from the prison of poverty, with the proportion of those living in extreme poverty cut in half.  And the world economy continues to strengthen after the worst financial crisis of our lives. 
  • And yet there is a pervasive unease in our world -- a sense that the very forces that have brought us together have created new dangers and made it difficult for any single nation to insulate itself from global forces.  As we gather here, an outbreak of Ebola overwhelms public health systems in West Africa and threatens to move rapidly across borders.  Russian aggression in Europe recalls the days when large nations trampled small ones in pursuit of territorial ambition.  The brutality of terrorists in Syria and Iraq forces us to look into the heart of darkness.
  • First, all of us -- big nations and small -- must meet our responsibility to observe and enforce international norms.  We are here because others realized that we gain more from cooperation than conquest. 
  • ...14 more annotations...
  • Recently, Russia’s actions in Ukraine challenge this post-war order.  Here are the facts.  After the people of Ukraine mobilized popular protests and calls for reform, their corrupt president fled.  Against the will of the government in Kyiv, Crimea was annexed.  Russia poured arms into eastern Ukraine, fueling violent separatists and a conflict that has killed thousands.  When a civilian airliner was shot down from areas that these proxies controlled, they refused to allow access to the crash for days.  When Ukraine started to reassert control over its territory, Russia gave up the pretense of merely supporting the separatists, and moved troops across the border. This is a vision of the world in which might makes right -- a world in which one nation’s borders can be redrawn by another, and civilized people are not allowed to recover the remains of their loved ones because of the truth that might be revealed. America stands for something different.  We believe that right makes might -- that bigger nations should not be able to bully smaller ones, and that people should be able to choose their own future.
  • nd these are simple truths, but they must be defended. America and our allies will support the people of Ukraine as they develop their democracy and economy.  We will reinforce our NATO Allies and uphold our commitment to collective self-defense.  We will impose a cost on Russia for aggression, and we will counter falsehoods with the truth.  And we call upon others to join us on the right side of history -- for while small gains can be won at the barrel of a gun, they will ultimately be turned back if enough voices support the freedom of nations and peoples to make their own decisions. Moreover, a different path is available -- the path of diplomacy and peace, and the ideals this institution is designed to uphold.  The recent cease-fire agreement in Ukraine offers an opening to achieve those objectives.  If Russia takes that path -- a path that for stretches of the post-Cold War period resulted in prosperity for the Russian people -- then we will lift our sanctions and welcome Russia’s role in addressing common challenges.  After all, that’s what the United States and Russia have been able to do in past years -- from reducing our nuclear stockpiles to meeting our obligations under the Nuclear Nonproliferation Treaty, to cooperating to remove and destroy Syria’s declared chemical weapons.  And that’s the kind of cooperation we are prepared to pursue again -- if Russia changes course. 
  • This speaks to a central question of our global age -- whether we will solve our problems together, in a spirit of mutual interest and mutual respect, or whether we descend into the destructive rivalries of the past.  When nations find common ground, not simply based on power, but on principle, then we can make enormous progress.  And I stand before you today committed to investing American strength to working with all nations to address the problems we face in the 21st century.
  • America is pursuing a diplomatic resolution to the Iranian nuclear issue, as part of our commitment to stop the spread of nuclear weapons and pursue the peace and security of a world without them.  And this can only take place if Iran seizes this historic opportunity.  My message to Iran’s leaders and people has been simple and consistent:  Do not let this opportunity pass.  We can reach a solution that meets your energy needs while assuring the world that your program is peaceful.  America is and will continue to be a Pacific power, promoting peace, stability, and the free flow of commerce among nations.  But we will insist that all nations abide by the rules of the road, and resolve their territorial disputes peacefully, consistent with international law. 
  • In other words, on issue after issue, we cannot rely on a rule book written for a different century.  If we lift our eyes beyond our borders -- if we think globally and if we act cooperatively -- we can shape the course of this century, as our predecessors shaped the post-World War II age.  But as we look to the future, one issue risks a cycle of conflict that could derail so much progress, and that is the cancer of violent extremism that has ravaged so many parts of the Muslim world. Of course, terrorism is not new.  Speaking before this Assembly, President Kennedy put it well:  “Terror is not a new weapon,” he said.  “Throughout history it has been used by those who could not prevail, either by persuasion or example.”  In the 20th century, terror was used by all manner of groups who failed to come to power through public support.  But in this century, we have faced a more lethal and ideological brand of terrorists who have perverted one of the world’s great religions.  With access to technology that allows small groups to do great harm, they have embraced a nightmarish vision that would divide the world into adherents and infidels -- killing as many innocent civilians as possible, employing the most brutal methods to intimidate people within their communities.
  • I have made it clear that America will not base our entire foreign policy on reacting to terrorism.  Instead, we’ve waged a focused campaign against al Qaeda and its associated forces -- taking out their leaders, denying them the safe havens they rely on.  At the same time, we have reaffirmed again and again that the United States is not and never will be at war with Islam.  Islam teaches peace.  Muslims the world over aspire to live with dignity and a sense of justice.  And when it comes to America and Islam, there is no us and them, there is only us -- because millions of Muslim Americans are part of the fabric of our country. So we reject any suggestion of a clash of civilizations. Belief in permanent religious war is the misguided refuge of extremists who cannot build or create anything, and therefore peddle only fanaticism and hate.  And it is no exaggeration to say that humanity’s future depends on us uniting against those who would divide us along the fault lines of tribe or sect, race or religion.
  • But this is not simply a matter of words.  Collectively, we must take concrete steps to address the danger posed by religiously motivated fanatics, and the trends that fuel their recruitment.  Moreover, this campaign against extremism goes beyond a narrow security challenge.  For while we’ve degraded methodically core al Qaeda and supported a transition to a sovereign Afghan government, extremist ideology has shifted to other places -- particularly in the Middle East and North Africa, where a quarter of young people have no job, where food and water could grow scarce, where corruption is rampant and sectarian conflicts have become increasingly hard to contain.   As an international community, we must meet this challenge with a focus on four areas.  First, the terrorist group known as ISIL must be degraded and ultimately destroyed.
  • The second:  It is time for the world -- especially Muslim communities -- to explicitly, forcefully, and consistently reject the ideology of organizations like al Qaeda and ISIL.
  • Later today, the Security Council will adopt a resolution that underscores the responsibility of states to counter violent extremism.  But resolutions must be followed by tangible commitments, so we’re accountable when we fall short.  Next year, we should all be prepared to announce the concrete steps that we have taken to counter extremist ideologies in our own countries -- by getting intolerance out of schools, stopping radicalization before it spreads, and promoting institutions and programs that build new bridges of understanding.
  • Third, we must address the cycle of conflict -- especially sectarian conflict -- that creates the conditions that terrorists prey upon.
  • The good news is we also see signs that this tide could be reversed.  We have a new, inclusive government in Baghdad; a new Iraqi Prime Minister welcomed by his neighbors; Lebanese factions rejecting those who try to provoke war.  And these steps must be followed by a broader truce.  Nowhere is this more necessary than Syria.  Together with our partners, America is training and equipping the Syrian opposition to be a counterweight to the terrorists of ISIL and the brutality of the Assad regime.  But the only lasting solution to Syria’s civil war is political -- an inclusive political transition that responds to the legitimate aspirations of all Syrian citizens, regardless of ethnicity, regardless of creed.
  • My fourth and final point is a simple one:  The countries of the Arab and Muslim world must focus on the extraordinary potential of their people -- especially the youth.
  • We recognize as well that leadership will be necessary to address the conflict between Palestinians and Israelis.  As bleak as the landscape appears, America will not give up on the pursuit of peace.  Understand, the situation in Iraq and Syria and Libya should cure anybody of the illusion that the Arab-Israeli conflict is the main source of problems in the region.  For far too long, that's been used as an excuse to distract people from problems at home.  The violence engulfing the region today has made too many Israelis ready to abandon the hard work of peace.  And that's something worthy of reflection within Israel.
  • Because let’s be clear:  The status quo in the West Bank and Gaza is not sustainable.  We cannot afford to turn away from this effort -- not when rockets are fired at innocent Israelis, or the lives of so many Palestinian children are taken from us in Gaza. So long as I am President, we will stand up for the principle that Israelis, Palestinians, the region and the world will be more just and more safe with two states living side by side, in peace and security. So this is what America is prepared to do:  Taking action against immediate threats, while pursuing a world in which the need for such action is diminished.  The United States will never shy away from defending our interests, but we will also not shy away from the promise of this institution and its Universal Declaration of Human Rights -- the notion that peace is not merely the absence of war, but the presence of a better life. 
  •  
    Epic hypocrisy. He bows to international law while waging multiple wars in direct defiance of it. And that's just in the first few paragraphs. It gets worse the farther he gets in his speech.
Paul Merrell

After almost 13 years, it's time to end Congress' blanket authorization of force | Wash... - 0 views

  • t may sound hard to believe, but Senate Majority Leader Harry Reid, D-Nev., isn't always wrong -- at least when he states the obvious: “9/11 is a long time ago,” he said Wednesday, “and it's something that needs to be looked at again.” The “it” is the post-9/11 Authorization for Use of Military Force resolution, or AUMF, adopted three days after the terror attacks, and now going on its lucky 13th year. It's been in effect nearly twice as long as the Gulf of Tonkin resolution authorizing Vietnam, what was “America's Longest War” -- until the 21st century, that is.
  • On Sept. 14, 2001, Congress authorized the president to use “all necessary and appropriate force” against the perpetrators of the 9/11 attacks and those who “harbored” them. Two successive administrations have since turned the 60 words of the AUMF's operative clause into what journalist Gregory Johnsen calls “the most dangerous sentence in U.S. history” -- a writ for a war without temporal or spatial limits. The last time the Senate held hearings on the AUMF, Sen. Lindsey Graham, R-S.C., asked the Pentagon's civilian special operations chief, Michael Sheehan, “does [the president] have the authority to put boots on the ground in the Congo?” Answer: “Yes, sir, he does.” Predictably, the hawkish Graham was totally okay with that. “The battlefield is wherever the enemy chooses to make it,” right? Right, said Sheehan: “from Boston to the [Federally Administered Tribal Areas of Pakistan]."
  • Asked how much longer the war on terrorism will last, Sheehan replied, “at least 10 to 20 years.” So presumably the AUMF can serve as the basis for Chelsea Clinton's “kill list” in 2033, after she trounces George P. Bush. Lyndon Johnson once compared the Gulf of Tonkin resolution to “Grandma’s nightshirt” because “it covers everything.” Even LBJ might have marveled at how the last two administrations have stretched the post-9/11 AUMF. Under the theory that “the United States is a battlefield in the war on terror,” the Bush administration invoked it to justify warrantless wiretapping and military detention of American citizens on American soil. The Obama administration cites it as legal authority for the extrajudicial killing of Americans via remote-control.
  • ...2 more annotations...
  • The Senate Foreign Relations Committee will be taking another look at the AUMF this week. The hearing's title, “Authorization For Use Of Military Force After Iraq And Afghanistan,” hints at a preordained conclusion: that an updated authorization is needed. Ranking Republican Sen. Bob Corker of Tennessee wants to be sure the executive branch has “all the tools and capabilities” it needs to address “threats that did not exist in 2001.” Rep. Barbara Lee, D-Calif., the sole member of Congress to vote “no” on the original AUMF, has a better idea: end it, don't mend it. Joined by libertarian-leaning, antiwar Republicans like Reps. Justin Amash and Walter Jones, she's introduced legislation to repeal the AUMF. Two imperial presidents in a row have treated that authorization like a permanent delegation of congressional war power to the president. Their successors would no doubt do the same with any new “tools and capabilities” they’re given.
  • Without the AUMF, presidents still retain the constitutional power to “repel sudden attacks,” as James Madison put it. And if they think groups like al-Shabaab or Boko Haram demand a more sustained military response, they'll be free to make that case to Congress. But delegating new authorities in advance might permanently change our constitutional default setting from peace to war. Madison also said that “No nation could preserve its freedom in the midst of continual warfare.” We're now into our second decade running that experiment; how much longer do we want to risk proving him right?
  •  
    I looked at Barbara Lee's bill. It requires a report from the Executive on all actions currently undertaken pursuant to the AUMF and requires that each action identified be terminated 60 days after the report unless Congress reauthorizes the action. It also repeals the AUMF. It's a good approach, but should require a sunset provision for each re-authorization so the Executive is blocked from maintaining us in a perpetual state of war as it has done with the AUMF itself. We're a long way from 9/11 and we are now fighting multiple wars in multiple nations against organizations that had nothing to do with 9/112, ostensibly to retaliate against those responsible for 9/11. No more open ended authorizations for war. 
Paul Merrell

Do We Really Want a New World War With Russia? | New Eastern Outlook - 0 views

  • Washington continues making an international fool of herself by her inability to effectively counter the impression around the world that Russia, spending less than 10% of the Pentagon annually on defense, has managed to do more against ISIS in Syria in six weeks than the mighty US Air Force bombing campaign has done in almost a year and half. One aspect that bears attention is the demonstration by the Russian military of new technologies that belie the widely-held Western notion that Russia is little more than a backward oil and raw material commodity exporter. Recent reorganization of the Russian state military industrial complex as well as reorganization of the Soviet-era armed forces under Defense Minister Sergey Shoigu’s term are visible in the success so far of Russia’s ISIS and other terror strikes across Syria. Clearly Russian military capabilities have undergone a sea-change since the Soviet Cold War era. In war there are never winners. Yet Russia has been in an unwanted war with Washington de facto since the George W. Bush Administration announced its lunatic plan to place what they euphemistically term “Ballistic Missile Defense” missiles and advanced radar in Poland, Czech Republic, Romania and Turkey after 2007. Without going into detail, BMD technologies are the opposite of defensive. They instead make a pre-emptive war highly likely. Of course the radioactive ash heap in such an exchange would be first and foremost the EU countries foolish enough to invite US BMD to their soil.
  • What the Russian General Staff has managed, since the precision air campaign began September 30, has stunned western defense planners with Russian technological feats not expected. Two specific technologies are worth looking at more closely: The Russian Sukoi SU-34 fighter-bomber and what is called the Bumblebee hyperbaric mortar weapon.
  • The plane responsible for some of the most damaging strikes on ISIS and other terror enclaves in Syria is manufactured by the Russian state aircraft industry under the name Sukhoi SU-34. As the Russian news agency RIA Novosti described the aircraft, “The Su-34 is meant to deliver a sufficiently large ordnance load to a predetermined area, hit the target accurately and take evasive action against pursuing enemy planes.” The plane is also designed to deal with enemy fighters in aerial combat such as the US F-16. The SU-34 made a first test flight in 1990 as the collapse of the Soviet Union and the chaos of the Yeltsin years caused many delays. Finally in 2010 the plane was in full production. According to a report in US Defense Industry Daily, among the SU-34 features are: • 8 ton ordnance load which can accommodate precision-guided weapons, as well as R-73/AA-11 Archer and R-77/AA-12 ‘AMRAAMSKI’ missiles and an internal 30mm GSh-301 gun. • Maximum speed of Mach 1.8 at altitude.
  • ...8 more annotations...
  • • 3,000 km range, extensible to “over 4,000 km” with the help of additional drop tanks. The SU-34 can also refuel in mid-air. • It can fly in TERCOM (Terrain Contour Matching) mode for low-level flight, and has software to execute a number of difficult maneuvers. • Leninets B004 phased array multimode X-band radar, which interleaves terrain-following radar and other modes.
  • Clearly the aircraft is impressive as it has demonstrated against terrorist centers in Syria. Now, however, beginning this month it will add a “game-changer” in the form of a new component. Speaking at the Dubai Air Show on November 12, Igor Nasenkov, the First Deputy General Director of the Radio-Electronic Technologies Concern (KRET) announced that this month, that is in the next few days, SUKHOI SU-34 fighter-bombers will become electronic warfare aircraft as well. Nasenkov explained that the new Khibiny aircraft electronic countermeasures (ECM) systems, installed on the wingtips, will give the SU-34 jets electronic warfare capabilities to launch effective electronic countermeasures against radar systems, anti-aircraft missile systems and airborne early warning and control aircraft. KRET is a holding or group of some 95 Russian state electronic companies formed in 2009 under the giant Russian state military industry holding, Rostec.
  • Russia’s advances in what is euphemistically termed in military jargon, Electronic Counter Measures or ECM, is causing some sleepless nights for the US Pentagon top brass to be sure. In the battles in eastern pro-Russian Ukraine earlier this year, as well as in the Black Sea, and now in Syria, according to ranking US military sources, Russia deployed highly-effective ECM technologies like the Krasukha-4, to successfully jam hostile radar and aircraft. Lt. General Ben Hodges, Commander of US Army Europe (USAREUR) describes Russian ECM capabilities used in Ukraine as “eye-watering,” suggesting some US and NATO officers are more than slightly disturbed by what they see. Ronald Pontius, deputy to Army Cyber Command’s chief, Lt. Gen. Edward Cardon, told a conference in October that, “You can’t but come to the conclusion that we’re not making progress at the pace the threat demands.” In short, Pentagon planners have been caught flat-footed for all the trillions of wasted US taxpayer dollars in recent years thrown at the military industry.
  • During the critical days of the March 2014 Crimean citizens’ referendum vote to appeal for status within Russia, New York Times reporters then in Crimea reported the presence of Russian electronic jamming systems, known as R-330Zh Zhitel, manufactured by Protek in Voronezh, Russia. That state-of-the-art technology was believed to have been used to prevent the Ukrainian Army from invading Crimea before the referendum. Russian forces in Crimea, where Russia had a legal basing agreement with Kiev, reportedly were able to block all communication of Kiev military forces, preventing a Crimean bloodbath. Washington was stunned.
  • Thereafter, in April, 2014, one month after the accession of Crimea into the Russian Federation, President Obama ordered the USS Donald Cook into the Black Sea waters just off Crimea, the home port of Russia’s Black Sea Fleet, to “reassure” EU states of US resolve. Donald Cook was no ordinary guided missile destroyer. It had been refitted to be one of four ships as part of Washington’s Aegis Ballistic Missile Defense System aimed at Russia’s nuclear arsenal. USS Donald Cook boldly entered the Black Sea on April 8 heading to Russian territorial waters. On April 12, just four days later, the US ship inexplicably left the area of the Crimean waters of the Black Sea for a port in NATO-member Romania. From there it left the Black Sea entirely. A report on April 30, 2014 in Russian newspaper Rossiyskaya Gazeta Online titled, “What Frightened the American Destroyer,” stated that while the USS Donald Cook was near Crimean (Russian by that time) waters, a Russian Su-24 Frontal Aviation bomber conducted a flyby of the destroyer. The Rossiyskaya Gazeta went on to write that the Russian SU-24 “did not have bombs or missiles onboard. One canister with the Khibin electronic warfare complex was suspended under the fuselage.” As it got close to the US destroyer, the Khibins turned off the USS Donald Cook’s “radar, combat control circuits, and data transmission system – in short, they turned off the entire Aegis just like we turn off a television by pressing the button on the control panel. After this, the Su-24 simulated a missile launch at the blind and deaf ship. Later, it happened once again, and again – a total of 12 times.”
  • While the US Army denied the incident as Russian propaganda, the fact is that USS Donald Cook never approached Russian Black Sea waters again. Nor did NATO ships that replaced it in the Black Sea. A report in 2015 by the US Army’s Foreign Military Studies Office assessed that Russia, “does indeed possess a growing EW capability, and the political and military leadership understand the importance…Their growing ability to blind or disrupt digital communications might help level the playing field when fighting against a superior conventional foe.” Now new Russian Khibini Electronic Counter Measure systems are being installed on the wingtips of Russia’s SUKHOI SU-34 fighter-bombers going after ISIS in Syria.
  • A second highly-advanced new Russian military technology that’s raising more than eyebrows in US Defense Secretary ‘Ash’ Carter’s Pentagon is Russia’s new Bumblebee which Russia’s military classifies as a flamethrower. In reality it is a highly advanced thermobaric weapon which launches a warhead that uses a combination of an explosive charge and highly combustible fuel. When the rocket reaches the target, the fuel is dispersed in a cloud that is then detonated by the explosive charge. US Military experts recently asked by the US scientific and engineering magazine Popular Mechanics to evaluate the Bumblebee stated that, “the resulting explosion is devastating, radiating a shockwave and fireball up to six or seven meters in diameter.” The US experts noted that the Bumblebee is “especially useful against troops in bunkers, trenches, and even armored vehicles, as the dispersing gas can enter small spaces and allow the fireball to expand inside. Thermobarics are particularly devastating to buildings — a thermobaric round entering a structure can literally blow up the building from within with overpressure.”
  • We don’t go into yet another new highly secret Russian military technology recently subject of a Russian TV report beyond a brief mention, as little is known. It is indicative of what is being developed as Russia prepares for the unthinkable from Washington. The “Ocean Multipurpose System: Status-6” is a new Russian nuclear submarine weapons system designed to bypass NATO radars and any existing missile defense systems, while causing heavy damage to “important economic facilities” along the enemy’s coastal regions. Reportedly the Status-6 will cause what the Russian military terms, “assured unacceptable damage” to an adversary force. They state that its detonation “in the area of the enemy coast” (say, New York or Boston or Washington?) would result in “extensive zones of radioactive contamination” that would ensure that the region would not be used for “military, economic, business or other activity for a long time.” Status-6 reportedly is a massive torpedo, designated as a “self-propelled underwater vehicle.” It has a range of up to 10 thousand kilometers and can operate at a depth of up to 1,000 meters. At a November 10 meeting with the Russian military chiefs, Vladimir Putin stated that Russia would counter NATO’s US-led missile shield program through “new strike systems capable of penetrating any missile defenses.” Presumably he was referring to Status-6.
  •  
    Not to mentiont that Russia has deployed its S-400 surface to air defense system to Syria, which is 2 generations later than the currently deployed U.S. Patriot systems. The S-400 can knock down aircraft or missiles flying up to 90,000 feet and travels at over 17,000 mph, very near Earth escape velocity. It has a lateral range of nearly 300 miles.
1 - 9 of 9
Showing 20 items per page