Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged collaborating-nations

Rss Feed Group items tagged

Paul Merrell

Burning Ukraine's Protesters Alive | Consortiumnews - 0 views

  • In Ukraine, a grisly new strategy – bringing in neo-Nazi paramilitary forces to set fire to occupied buildings in the country’s rebellious southeast – appears to be emerging as a favored tactic as the coup-installed regime in Kiev seeks to put down resistance from ethnic Russians and other opponents. The technique first emerged on May 2 in the port city of Odessa when pro-regime militants chased dissidents into the Trade Unions Building and then set it on fire. As some 40 or more ethnic Russians were burned alive or died of smoke inhalation, the crowd outside mocked them as red-and-black Colorado potato beetles, with the chant of “Burn, Colorado, burn.” Afterwards, reporters spotted graffiti on the building’s walls containing Swastika-like symbols and honoring the “Galician SS,” the Ukrainian adjunct to the German SS in World War II.
  • This tactic of torching an occupied building occurred again on May 9 in Mariupol, another port city, as neo-Nazi paramilitaries – organized now as the regime’s “National Guard” – were dispatched to a police station that had been seized by dissidents, possibly including police officers who rejected a new Kiev-appointed chief. Again, the deployment of the “National Guard” was followed by burning the building and killing a significant but still-undetermined number of people inside. (Early estimates of the dead range from seven to 20.) In the U.S. press, Ukraine’s “National Guard” is usually described as a new force derived from the Maidan’s “self-defense” units that spearheaded the Feb. 22 revolt in Kiev overthrowing elected President Viktor Yanukovych. But the Maidan’s “self-defense” units were drawn primarily from well-organized bands of neo-Nazi extremists from western Ukraine who hurled firebombs at police and fired weapons as the anti-Yanukovych protests turned increasingly violent. But the mainstream U.S. press – in line with State Department guidance – has sought to minimize or dismiss the key role played by neo-Nazis in these “self-defense” forces as well as in the new government. At most, you’ll see references to these neo-Nazis as “Ukrainian nationalists.”
  • However, as resistance to Kiev’s right-wing regime expanded in the ethnic Russian east and south, the coup regime found itself unable to count on regular Ukrainian troops to fire on civilians. Thus, its national security chief Andriy Parubiy, himself a neo-Nazi, turned to the intensely motivated neo-Nazi shock troops who had been battle-tested during the coup. These extremists were reorganized as special units of the National Guard and dispatched to the east and south to do the dirty work that the regular Ukrainian military was unwilling to do. Many of these extreme Ukrainian nationalists lionize World War II Nazi collaborator Stepan Bandera and – like Bandera – dream of a racially pure Ukraine, free of Jews, ethnic Russians and other “inferior” beings. The slur of calling the Odessa protesters Colorado beetles — as they were being burned alive — was a reference to the black-and-red colors used by the ethnic Russian resistance in the east. Though the mainstream U.S. press either describes Parubiy simply as the interim government’s chief of national security (with no further context) or possibly as a “nationalist,” his fuller background includes his founding of the Social-National Party of Ukraine in 1991, blending radical Ukrainian nationalism with neo-Nazi symbols. Last year, he became commandant of the Maidan’s “self-defense forces.” Then, on April 15,  after becoming the Kiev regime’s chief of national security and finding Ukrainian troops unwilling to fire on fellow Ukrainians in the east, Parubiy went on Twitter to announce, “Reserve unit of National Guard formed #Maidan Self-defense volunteers was sent to the front line this morning.”
  • ...1 more annotation...
  • Those National Guard forces also were reported on the ground in Odessa when the trade unions building was torched on May 2 and they showed up again in Mariupol as the police station was burned on May 9, according to a report in the New York Times on Saturday. The Times mentioned the appearance – and then disappearance – of the National Guard without providing any useful background about this newly organized force. In the language used by the mainstream U.S. press and the Kiev regime, the neo-Nazi brigades are “volunteers” and “self-defense” units while the rebels resisting the post-coup regime are “pro-Russian militants” or “terrorists.”
Gary Edwards

Tomgram: Nomi Prins, Goldmanizing Donald Trump | TomDispatch - 0 views

  •  
    "The Goldman Sachs Effect How a Bank Conquered Washington By Nomi Prins This is a MUST READ document. Yeah, and it should scare the crap out of all of us. .............................................. Irony isn't a concept with which President Donald J. Trump is familiar. In his Inaugural Address, having nominated the wealthiest cabinet in American history, he proclaimed, "For too long, a small group in our nation's capital has reaped the rewards of government while the people have borne the cost. Washington flourished -- but the people did not share in its wealth."  Under Trump, an even smaller group will flourish -- in particular, a cadre of former Goldman Sachs executives. To put the matter bluntly, two of them (along with the Federal Reserve) are likely to control our economy and financial system in the years to come. Infusing Washington with Goldman alums isn't exactly an original idea. Three of the last four presidents, including The Donald, have handed the wheel of the U.S. economy to ex-Goldmanites. But in true Trumpian style, after attacking Hillary Clinton for her Goldman ties, he wasn't satisfied to do just that.  He had to do it bigger and better.  Unlike Bill Clinton and George W. Bush, just a sole Goldman figure lording it over economic policy wasn't enough for him. Only two would do. The Great Vampire Squid Revisited Whether you voted for or against Donald Trump, whether you're gearing up for the revolution or waiting for his next tweet to drop, rest assured that, in the years to come, the ideology that matters most won't be that of the "forgotten" Americans of his Inaugural Address. It will be that of Goldman Sachs and it will dominate the domestic economy and, by extension, the global one. At the dawn of the twentieth century, when President Teddy Roosevelt governed the country on a platform of trust busting aimed at reducing corporate power, even he could not bring himself to bust up the banks.  That was a mistake
Paul Merrell

Brazil Looks to Break from U.S.-Centric Internet | TIME.com - 0 views

  • Brazil plans to divorce itself from the U.S.-centric Internet over Washington’s widespread online spying, a move that many experts fear will be a potentially dangerous first step toward fracturing a global network built with minimal interference by governments. President Dilma Rousseff ordered a series of measures aimed at greater Brazilian online independence and security following revelations that the U.S. National Security Agency intercepted her communications, hacked into the state-owned Petrobras oil company’s network and spied on Brazilians who entrusted their personal data to U.S. tech companies such as Facebook and Google. The leader is so angered by the espionage that on Tuesday she postponed next month’s scheduled trip to Washington, where she was to be honored with a state dinner. Internet security and policy experts say the Brazilian government’s reaction to information leaked by former NSA contractor Edward Snowden is understandable, but warn it could set the Internet on a course of Balkanization.
  • “The global backlash is only beginning and will get far more severe in coming months,” said Sascha Meinrath, director of the Open Technology Institute at the Washington-based New America Foundation think tank. “This notion of national privacy sovereignty is going to be an increasingly salient issue around the globe.” While Brazil isn’t proposing to bar its citizens from U.S.-based Web services, it wants their data to be stored locally as the nation assumes greater control over Brazilians’ Internet use to protect them from NSA snooping. The danger of mandating that kind of geographic isolation, Meinrath said, is that it could render inoperable popular software applications and services and endanger the Internet’s open, interconnected structure.
  • The effort by Latin America’s biggest economy to digitally isolate itself from U.S. spying not only could be costly and difficult, it could encourage repressive governments to seek greater technical control over the Internet to crush free expression at home, experts say. In December, countries advocating greater “cyber-sovereignty” pushed for such control at an International Telecommunications Union meeting in Dubai, with Western democracies led by the United States and the European Union in opposition.
  • ...5 more annotations...
  • Rousseff says she intends to push for international rules on privacy and security in hardware and software during the U.N. General Assembly meeting later this month. Among Snowden revelations: the NSA has created backdoors in software and Web-based services. Brazil is now pushing more aggressively than any other nation to end U.S. commercial hegemony on the Internet. More than 80 percent of online search, for example, is controlled by U.S.-based companies. Most of Brazil’s global Internet traffic passes through the United States, so Rousseff’s government plans to lay underwater fiber optic cable directly to Europe and also link to all South American nations to create what it hopes will be a network free of U.S. eavesdropping.
  • More communications integrity protection is expected when Telebras, the state-run telecom company, works with partners to oversee the launch in 2016 of Brazil’s first communications satellite, for military and public Internet traffic. Brazil’s military currently relies on a satellite run by Embratel, which Mexican billionaire Carlos Slim controls. Rousseff is urging Brazil’s Congress to compel Facebook, Google and all companies to store data generated by Brazilians on servers physically located inside Brazil in order to shield it from the NSA. If that happens, and other nations follow suit, Silicon Valley’s bottom line could be hit by lost business and higher operating costs: Brazilians rank No. 3 on Facebook and No. 2 on Twitter and YouTube. An August study by a respected U.S. technology policy nonprofit estimated the fallout from the NSA spying scandal could cost the U.S. cloud computing industry, which stores data remotely to give users easy access from any device, as much as $35 billion by 2016 in lost business.
  • Brazil also plans to build more Internet exchange points, places where vast amounts of data are relayed, in order to route Brazilians’ traffic away from potential interception. And its postal service plans by next year to create an encrypted email service that could serve as an alternative to Gmail and Yahoo!, which according to Snowden-leaked documents are among U.S. tech giants that have collaborated closely with the NSA. “Brazil intends to increase its independent Internet connections with other countries,” Rousseff’s office said in an emailed response to questions from The Associated Press on its plans. It cited a “common understanding” between Brazil and the European Union on data privacy, and said “negotiations are underway in South America for the deployment of land connections between all nations.” It said Brazil plans to boost investment in home-grown technology and buy only software and hardware that meet government data privacy specifications.
  • While the plans’ technical details are pending, experts say they will be costly for Brazil and ultimately can be circumvented. Just as people in China and Iran defeat government censors with tools such as “proxy servers,” so could Brazilians bypass their government’s controls. International spies, not just from the United States, also will adjust, experts said. Laying cable to Europe won’t make Brazil safer, they say. The NSA has reportedly tapped into undersea telecoms cables for decades. Meinrath and others argue that what’s needed instead are strong international laws that hold nations accountable for guaranteeing online privacy.
  • “There’s nothing viable that Brazil can really do to protect its citizenry without changing what the U.S. is doing,” he said. Matthew Green, a Johns Hopkins computer security expert, said Brazil won’t protect itself from intrusion by isolating itself digitally. It will also be discouraging technological innovation, he said, by encouraging the entire nation to use a state-sponsored encrypted email service. “It’s sort of like a Soviet socialism of computing,” he said, adding that the U.S. “free-for-all model works better.”
  •  
    So both Brazil and the European Union are planning to boycott the U.S.-based cloud industry, seizing on the NSA's activities as legal grounds. Under the various GATT series of trade agreements, otherwise forbidden discriminatory actions taken that restrict trade in aid of national security are exempt from redress through the World Trade Organization Dispute Resolution Process. So the NSA voyeurs can add legalizing economic digital discrimination against the U.S. to its score card.
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

Israel decries US 'knife in back' over Palestinian govt - Yahoo News - 0 views

  • Washington's support for a new Palestinian government backed by Israel's Islamist foe Hamas, has left the Jewish state feeling betrayed, triggering a new crisis with its closest ally. Several Israeli ministers expressed public anger on Tuesday after the US State Department said it was willing to work with the new Palestinian unity government put together by the West Bank leadership and Gaza's Hamas rulers. Technocratic in nature, the new government was sworn in on Monday in front of president Mahmud Abbas, with Washington offering its backing several hours later.
  • Speaking to reporters on Monday, State Department spokeswoman Jen Psaki said the new cabinet would be judged "by its actions.""At this point, it appears that president Abbas has formed an interim technocratic government that does not include ministers affiliated with Hamas," she said. "With what we know now, we will work with this government."
  • The US endorsement was viewed as a major blow for Israeli Prime Minister Benjamin Netanyahu, who had on Sunday urged the international community not to rush into recognising the new government, which he said would only "strengthen terror."
  • ...4 more annotations...
  • "Unfortunately, American naivety has broken all records," said Communications Minister Gilad Erdan, a cabinet hardliner who is close to Netanyahu."Collaborating with Hamas, which is defined as a terror organisation in the United States, is simply unthinkable. "US capitulation to Palestinian tactics badly damages the chance of ever returning to negotiations and will cause Israel to take unilateral steps to defend its citizens from the government of terror which Abu Mazen (Abbas) has set up." Public radio said Netanyahu was feeling "betrayed and deceived," particularly as he had assured his security cabinet that US Secretary of State John Kerry had promised him Washington would not recognise the new government immediately.
  • "And it wasn't immediate -- it was five hours later that this recognition took place," the radio noted ironically. A senior political official quoted by the Israel Hayom freesheet, widely regarded as Netanyahu's mouthpiece, said the US move was "like a knife in the back." - 'Answer with annexation' - Israeli commentators said the Palestinians had chalked up a "major success" in driving a new wedge between Israel and its US ally.
  • With the peace process in tatters, hardliners within Netanyahu's rightwing coalition have been pushing for Israel to take unilateral steps such as the annexation of the main Jewish settlement blocs in the occupied West Bank.
  • The security cabinet agreed on Monday to set up a team to examine the annexation option, but Yediot Aharonot commentator Shimon Shiffer said the move was a sop to Bennett and other hardliners rather than a serious policy change.
  •  
    What's remarkable here is that Obama has apparently ratcheted down his fear of the Israel Lobby. But it's not as though Mr. Netanyahu was not warned that the world would see Israel as responsible if it blew up the Kerry-brokered negotiation between Israel and Palestine. Israel did blow it up by not delivering the last shipment of Palestinian prisoners required by the pre-negotiation agreement, attempting to gain further concessions using their release as leverage.  Palestine responded by joining a large number of U.N. treaty organizations and was thus recognized by most nations on the planet as a nation: a critically important move, because it is recognition by other nations as a nation that qualifies Palestine as a full-fledged U.N. member rather than an observer state, an application Palestine can now make at the time of its choosing. That is also important because Palestine is now positioned to join the Rome Convention that created the International Criminal Court, providing Palestine with legal standing to file war crime charges against high Israeli officials that would then obligate the Court to investigate. Palestine is holding back on that move, using it as bargaining leverage on the world stage.   Palestine also responded by forming a coalition "unity" government with Hamas, the political party that nominally rules the Gaza strip, the world's largest open-air concentration camp. At Israel's request, the U.S. had several years ago designated Hamas as a terrorist organization. But that was a purely political move. It seems that the political situation has changed. Obama is pivoting out of the Mideast as he performs his ballyhooed "pivot to Asia," which is actually a pivot to contain Russia that isn't working and a pivot to subjugate Africa and its huge store of untapped natural resources, including lots of oil. Blocking China's economic deals in Africa with military force seems to be the current top concern in the White House. Israel was already a pari
Paul Merrell

The Day - U.S. alerts foreign services about Snowden documents | News from southeastern... - 0 views

  • U.S. officials are alerting some foreign intelligence services that documents detailing their secret cooperation with the United States have been obtained by former National Security Agency contractor Edward Snowden, according to government officials.Snowden, U.S. officials said, took tens of thousands of documents, some of which contain sensitive material about collection programs against adversaries such as Iran, Russia and China. Some refer to operations that in some cases involve countries not publicly allied with the United States.The process of informing officials in capital after capital about the risk of disclosure is delicate. In some cases, one part of the cooperating government may know about the collaboration while others may not, the officials said. The documents, if disclosed, could compromise operations, officials said.
  • The Office of the Director of National Intelligence is handling the job of informing the other intelligence services, the officials said. ODNI declined to comment.
  • Snowden lifted the documents from a top secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines, according to sources, who spoke on the condition of anonymity to discuss sensitive matters.Snowden took 30,000 documents that involve the intelligence work of one of the services, the official said. He gained access to the documents through the Joint Worldwide Intelligence Communications System, or JWICS, for top secret/sensitive compartmented information, the sources said.The material in question does not deal with NSA surveillance but primarily with standard intelligence about other countries' military capabilities, including weapons systems-missiles, ships and jets, the officials say.
  • ...1 more annotation...
  • Nonetheless, the military intelligence agencies remain fearful, officials said. The NSA in recent months has provided them with an accounting of the documents it believes Snowden obtained.Intelligence officials said they could discern no pattern to the military intelligence documents taken and said Snowden appeared to harvest them at random. "It didn't seem like he was targeting something specific," the U.S. official said.
  •  
    A bit of comedy here. Our spy agencies will warn collaborating nations but when it comes to Congress or the American public, no warning. 
Paul Merrell

OPERATION CONDOR: National Security Archive Presents Trove of Declassified Documentatio... - 0 views

  • Argentine Newspaper, Pagina 12, Highlights Evidence Presented by Archive Southern Cone Project Director Carlos Osorio Documents given to Court Reveal Condor Precedents; Secret Summary of Inaugural Condor Meeting Introduced into Court for First Time National Security Archive Electronic Briefing Book No. 514
  • The National Security Archive today posted key documents on Operation Condor, presented by its Southern Cone analyst, Carlos Osorio, at a historic trial in Buenos Aires of former military officers. During 10 hours on the witness stand recently, Osorio introduced one hundred documents into evidence for the court proceedings. His testimony was profiled on May 3 in a major feature article published in the Buenos Aires daily, Pagina 12. Operation Condor was an infamous secret alliance between South American dictatorships in the mid and late 1970s - a Southern Cone rendition and repression program - formed to track down and eliminate enemies of their military regimes. The Condor trial charges 25 high-ranking officers, originally including former Argentine presidents Jorge Videla (deceased) and Reynaldo Bignone (aged 87), with conspiracy to "kidnap, disappear, torture and kill" 171 opponents of the regimes that dominated the Southern Cone in the 1970s and 1980s. Among the victims were approximately 80 Uruguayans, 50 Argentines, 20 Chileans and a dozen others from Paraguay, Bolivia, Peru and Ecuador who were targeted by Condor operatives.
  • The tribunal requested Osorio’s testimony, which took place over two days on March 6 and 7, 2015, and included presentation of an Excel data base of 900 documents drawn mostly from U.S. government sources and from the Archive of Terror in Paraguay. Of these, Osorio focused on 100 declassified records selected for the tribunal, which was presided over by Judge Oscar Amirante, president of Federal Tribunal N° 1. The National Security Archive obtained the U.S. documents through the Freedom of Information Act (FOIA), primarily from the Central Intelligence Agency, Defense Intelligence Agency and the State Department. Other notable records originated from the Chilean former secret police, DINA. "We have been working on Operation Condor for years," Osorio said, "sifting through archives in many continents and building a body of knowledge and a trove of documents." The Pagina 12 feature entitled "The Evolution of Condor," described Osorio’s presentation of "dozens" of documents to the tribunal, and the contribution the documents made in educating the judges on the genesis and evolution of coordinated repression in the Southern Cone. Osorio’s testimony covered a range of topics including the breadth of Condor operations, U.S. knowledge of those operations and the authenticity of the records being introduced into evidence.
  • ...3 more annotations...
  • The article highlighted one document Osorio presented that revealed the bilateral precedent for what would become a multilateral system of regional repression: a secret accord between the Argentine and Paraguayan military intelligence services to "Collaborate in the struggle against subversion…" and the "… internment [of dissenters]…" " The agreement was dated September 12,1972, and signed by Paraguayan intelligence officer Col. Benito Guanes Serrano. Three years later, Guanes would also be one of the five original signatories of the secret Condor accords. Osorio discovered the document in the Archive of Terror in Paraguay. In September 1975, an assessment by a State Department intelligence analyst concluded that "The national security forces of the southern cone surpass the terrorists in cooperation at the international level…" Six weeks later, in Santiago, Chile, intelligence chiefs from Argentina, Bolivia, Chile, Paraguay and Uruguay signed an "Acta" officially establishing Operation Condor. Osorio introduced that pivotal document - provided to the Archive by a source in Chile - into evidence as well.
  • Two declassified U.S. documents presented to the tribunal underscored the contradictory response of high U.S. officials as they became aware of Condor operations in the summer of 1976. One well-known 13-page memorandum of conversation between Secretary of State Henry Kissinger and Argentine Foreign Minister Admiral Cesar Guzzetti dated June 10, 1976, revealed Kissinger’s endorsement of the regional collaboration to repress the left. After Guzzetti informed Kissinger that the Southern Cone regimes were engaged in "joint efforts" to fight "the terrorist problem," Kissinger essentially supported this approach: "If there are things that have to be done, you should do them quickly. But you should get back quickly to normal procedures," according to the declassified transcript Osorio provided to the court. "We want you to succeed. We do not want to harrass [sic] you," Kissinger concluded. "I will do what I can … "
  • After a CIA briefing to Kissinger’s top aides in late July 1976 on the Condor countries’ plans to send assassination teams around the world to eliminate opponents, the Secretary of State authorized a démarche to General Augusto Pinochet in Chile, General Jorge Videla in Argentina, and other military leaders in the region calling on them to cease and desist. "Government planned and directed assassinations within and outside the territory of Condor members has most serious implication which we must face squarely and rapidly," stated the secret August 13, 1976, cable to U.S. ambassadors in those nations. But the démarche was never delivered to any of the Condor regimes. After the U.S. ambassadors raised objections about presenting the démarche to the generals, on September 16, 1976, Kissinger rescinded it, and ordered "that no further action be taken on this matter." In addition to Osorio, the National Security Archive’s Chile Documentation Project director, Peter Kornbluh, testified in the Operation Condor trial for five hours in December 2014. Archive Advisory Board member, professor of journalism and author John Dinges presented evidence in April 2015. Read the Documents
Paul Merrell

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
Gary Edwards

The Daily Bell - Occupy Wall Street Demands Global UN Tax and Worldwide G20 Protest - 0 views

  •  
    Occupy's busting out on a new path ... So Adbusters is asking people all around the world to march on Oct. 29. "We want to send a clear message that we the people want to slow down this global casino." And Adbusters does have one specific demand, a 1 percent tax on financial-sector transactions (perhaps stocks, bonds, foreign-currency trades and derivatives). Some form of that idea, known as the "Robin Hood" tax, has been around for a while and might actually fly. - Jerry Large/Seattle Times Dominant Social Theme: We want justice for the world and the UN will give it to us. Free-Market Analysis: Kalle Lasn, founder of Adbusters magazine, based in Vancouver, B.C. - the magazine that issued the call for the initial Occupy Wall Street protests - has called on people to protest the upcoming G20 while demanding a one-percent tax on financial transactions. The revenue raised would be enormous and the lingering question is where this incredible revenue stream would be directed. The answer is obvious to those who follow what we call "directed history." The intention is likely to fund the UN as part of a final push to rationalize and perfect the initial stages of true world government. As we have written before, the movement toward world government is happening very quickly now. The ramifications are enormous and people who write off these protests as spontaneous and short-lived are not grasping what is taking place, in our humble opinion. The financial sales tax has been around for a very long time but has found its most recent voice in a column by Jerry Large of the Seattle Times. He recently gained an exclusive interview with Kalle Lasn, who sounds as if he hopes that a large protest on Oct 29th will mark the beginning of a push for such a tax. What's going on is pure one-worldism, an OWS ideology that is gradually revealing itself in dribs and drabs. It is one reason that that the OWS leaders have made no specific demands. They have hoped to create a momentu
Gary Edwards

Startup turns carbon dioxide into fuels - 0 views

  • The research has received funding from the Air Force Office of Scientific Research (AFSOR), the National Science Foundation and the Department of Energy (DOE). The collaboration between Liquid Light and the University was supported by the DOE Small Business Innovation Research program and the AFOSR Small Business Technology Transfer program. Princeton's agreement with Liquid Light allowed the company to continue to collaborate with Bocarsly and his research team. Before long, new discoveries were emerging. "They started noticing interesting chemistry that we wouldn't have predicted," said Bocarsly.
  • The Princeton scientists did some additional studies, and made a surprising discovery: They could turn CO2, which contains only one carbon, into a compound with a carbon-carbon bond, which vastly increases the possibilities for creating commercial applications. This was radical because although the reaction is certainly possible, it is highly unlikely to happen because so many other competing reactions are occurring. "Everyone who electrochemically reduces CO2 today makes compounds with only one carbon," said Bocarsly. "Nobody makes things with carbon-carbon bonds." He paused. "But we can." "That was a very 'wow' moment," recalled Cole, "because we thought that our process could only make methanol. But now we were finding that we could make a variety of products, and that is what makes this technology commercially interesting." She said Liquid Light scientists can now make more than 20 different products from CO2.
  • One of the chemicals Liquid Light can make is isopropanol, commonly known as rubbing alcohol and an important industrial chemical. Another is butanol, which could be commercially important as a fuel. Liquid Light's technology offers the potential to make these chemicals at lower cost than today's methods, which involve starting with fossil fuels such as petroleum and natural gas.
  • ...3 more annotations...
  • Why does pyridinium work so well as a catalyst for the reaction? Based on its structure, the ring-shaped molecule is an unlikely catalyst for this reaction because it shuttles just one electron at a time. But to convert CO2 to methanol requires six electrons, and to make higher-carbon molecules takes even more electrons. Bocarsly and his team — in collaboration with Steven Bernasek, professor of chemistry — are doing studies to understand the steps in the chemical reaction, and they are making rapid progress. "There are clearly some intermediate products formed during the reaction that do not sit around for a long time and are not there in very high concentrations," said Bocarsly.
  • The Princeton team also is studying the factors that determine which products can be made from CO2. The researchers have found that very subtle changes in the electrode surface can lead to production of different chemicals. For example, CO2 plus a pyridinium catalyst and a platinum electrode make methanol. However, the same catalyst and a different electrode give a different product. The team published its findings on how the reaction is affected by catalyst concentration, temperature and pressure in the journal ChemSusChem last year.
  • Citing government statistics that the United States generates about 5.5 billion metric tons of CO2 per year, Teamey said it will not be hard to obtain the starting materials for this new industry. However, the CO2 needs to be relatively pure, a requirement that rules out gasoline tailpipes and coal-fired power plants. Instead, said Teamey, the CO2 could come from manufacturing facilities, such as fertilizer manufacturers and cement plants, which according to Teamey emit some 100 million tons of high-purity CO2 each year.
  •  
    "Today, carbon dioxide (CO2) is a hot topic. Scientists around the globe are searching for ways to store, dispose of, or prevent the formation of the greenhouse gas, which is a major driver of global climate change. Liquid Light hopes to take this concept one step further and harness waste CO2 as a source of carbon to make industrial chemicals and fuels. The technology behind the process is simple: Take CO2 and mix it in a water-filled chamber with an electrode and a catalyst. The ensuing chemical reaction converts CO2 into a new molecule, methanol, which can be used as a fuel, an industrial solvent or a starting material for the manufacture of other chemicals. Liquid Light's founders include Bocarsly and his former graduate student Emily Cole, who earned her Ph.D. from Princeton in 2009. Cole helped revive efforts in Bocarsly's lab to study the conversion of CO2 into usable fuels, which led to the launch of Liquid Light and an ongoing collaboration that Bocarsly said has been extremely positive for his research team at the University. "We've made some discoveries that wouldn't have been made in a university setting, and this has really accelerated the research," Bocarsly said. "It is a very productive relationship." Back in the 1990s, a former Ph.D. student of Bocarsly's named Chao Lin conducted some of the earliest experiments on turning CO2 into methanol. He used palladium metal as the electrode and pyridinium, an inexpensive ring-shaped molecule, as the catalyst. By plugging the electrode into an electrical outlet, he could drive an electrochemical reaction that converted CO2 into methanol. As Bocarsly recalled, Lin was quite excited about his success. However, said Bocarsly, "We published that finding in 1994 and there was approximately zero interest in it." The work languished until 2005 when Cole, then a new graduate student, told Bocarsly she wanted to work on a clean-energy project. She took up the challenge of reproducing Lin's results, but this time
Paul Merrell

N.S.A. Able to Foil Basic Safeguards of Privacy on Web - NYTimes.com - 1 views

  • The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
  • The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
  • The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
  • ...11 more annotations...
  • “For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
  • Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.
  • For at least three years, one document says, GCHQ, almost certainly in collaboration with the N.S.A., has been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document. (Google denied giving any government access and said it had no evidence its systems had been breached).
  • Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip. “And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.
  • The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus on GCHQ but include thousands from or about the N.S.A. Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.
  • The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June. “Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.
  • Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.
  • At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service.
  • Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method. Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology and later by the International Organization for Standardization, which has 163 countries as members. Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.” “Eventually, N.S.A. became the sole editor,” the memo says.
  • But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence. A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum.
  • Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”
  •  
    Lengthy article, lots of new information on NSA decryption capabilities, none of it good for those who value their data privacy.
  •  
    Thanks Paul - nice job cutting this monster down to size :)
Paul Merrell

IPS - U.N. Will Censure Illegal Spying, But Not U.S. | Inter Press Service - 0 views

  • When the 193-member General Assembly adopts a resolution next month censuring the illegal electronic surveillance of governments and world leaders by the U.S. National Security Agency (NSA), the U.N.’s highest policy-making body will spare the United States from public condemnation despite its culpability in widespread wiretapping. A draft resolution currently in limited circulation – a copy of which was obtained by IPS – criticises “the conduct of extra-territorial surveillance” and the “interception of communications in foreign jurisdictions”. But it refuses to single out the NSA or the United States, which stands accused of spying on foreign governments, including political leaders in Germany, France, Brazil, Spain and Mexico, among some 30 others.
  • The draft says that while the gathering and protection of certain sensitive information may be justified on grounds of national security and criminal activity, member states must still ensure full compliance with international human rights. The resolution will also emphasise “that illegal surveillance of private communications and the indiscriminate interception of personal data of citizens constitutes a highly intrusive act that violates the rights to freedom of expression and privacy, and threatens the foundations of a democratic society.” Additionally, it will call for the establishment of independent oversight mechanisms capable of ensuring transparency and accountability of state surveillance of communications. And the resolution will request the U.N. High Commissioner for Human Rights, Navi PIllay, to present an interim report on the issue of human rights and “indiscriminate surveillance, including on extra-territorial surveillance.” This report is to be presented to the 69th session of the General Assembly next September, and a final report to its 70th session in 2015.
  • Chakravarthi Raghavan, a veteran Indian journalist who has been reporting on the U.N. and its activities since the 1960s, both in New York and later in Geneva, told IPS the resolution may help start a process under which the national security interests of every state, international security and right to privacy and human rights of people can be discussed and a balance found in some universal forum. “Otherwise, the U.N. world order will break down, and no one will benefit or emerge unscathed,” he said. Much will depend on the follow-up action that the General Assembly resolution calls for, and with what tenacity members pursue it. “Frankly, I am not at all clear that some of the nations raising the issue now are really serious,” said Raghavan, editor-emeritus of the Geneva-based South-North Development Monitor SUNS. “If they were, any one of them in Europe would have granted asylum to Edward Snowden, and not play footsie with U.S. in its attempts to have him jailed in the U.S. on espionage charges.” The revelations of U.S. spying have come mostly from documents released by Snowden, a former NSA contractor, who sought political asylum in Russia after he was accused of espionage by the United States.
  • ...2 more annotations...
  • One Third World diplomat, speaking on condition of anonymity, told IPS the draft could undergo changes by the time it reaches the General Assembly mid-November. But he held out little hope the final resolution will specifically castigate the United States because of the political clout it wields at the United Nations, and Washington’s notoriety for exerting diplomatic pressure on its allies and aid recipients. Besides which, he said, everybody plays the spying game, including the French, the Germans, the Chinese and the Russians — and therefore none of them can afford to take a “holier than thou” attitude. Still, as the New York Times put it last week, “One thing is clear: the NSA’s Cold War-era argument, that everyone does it, seems unlikely to win the day.”
  • There has been a longstanding tradition that the “Five Eyes” do not spy on each other, the five being the United States, Britain, Canada, Australia and New Zealand. But the surveillance of European political leaders has triggered a strong rejoinder from the 28-member European Union (EU). Raghavan told IPS that even if other countries are not publicly feuding with the U.S. over this — and perhaps their own security apparatuses are secretly collaborating in this global “surveillance state” — the NSA activities at a minimum raise several systemic issues involving basic violations. These include violations of the U.N. Charter; “unauthorised” and blatantly illegal invasions and/or intrusions into national space; World Trade Organisation (WTO) agreements, in particular the Trade-Related Intellectual Property Rights (TRIPS) Agreement and the General Agreement on Trade in Services (GATS); the International Telecommunication Union Treaty and Conventions; treaties and protocols of the World Intellectual Property Organisation (WIPO); the Universal Human Rights Declaration and conventions; and the Vienna diplomatic conventions and codes of behaviour among civilised nations. “All these strike at the roots of the very basics of international law and international public law,” he said.
  •  
    So if Raghavan is correct, a new treaty will emerge from the debacle that limits but does not end foreign surveillance. And if so, I predict that it will have no enforcement provisions and absolutely no citizen remedies for rights violated. The farther we go down the NSA rabbit hole, the more convinced I am that it is a stark choice between having spy agencies equipped for digital surveillance and Internet Freedom.  Internet Freedom seems far better equipped to produce world peace through understanding than spy agencies who deliver their "intelligence" to only the favored few. 
Paul Merrell

How Secret Partners Expand NSA's Surveillance Dragnet - The Intercept - 0 views

  • Huge volumes of private emails, phone calls, and internet chats are being intercepted by the National Security Agency with the secret cooperation of more foreign governments than previously known, according to newly disclosed documents from whistleblower Edward Snowden. The classified files, revealed today by the Danish newspaper Dagbladet Information in a reporting collaboration with The Intercept, shed light on how the NSA’s surveillance of global communications has expanded under a clandestine program, known as RAMPART-A, that depends on the participation of a growing network of intelligence agencies.
  • It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as “third-party partners,” are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables. The NSA documents state that under RAMPART-A, foreign partners “provide access to cables and host U.S. equipment.” This allows the agency to covertly tap into “congestion points around the world” where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.
  • The secret documents reveal that the NSA has set up at least 13 RAMPART-A sites, nine of which were active in 2013. Three of the largest – codenamed AZUREPHOENIX, SPINNERET and MOONLIGHTPATH – mine data from some 70 different cables or networks. The precise geographic locations of the sites and the countries cooperating with the program are among the most carefully guarded of the NSA’s secrets, and these details are not contained in the Snowden files. However, the documents point towards some of the countries involved – Denmark and Germany among them. An NSA memo prepared for a 2012 meeting between the then-NSA director, Gen. Keith Alexander, and his Danish counterpart noted that the NSA had a longstanding partnership with the country’s intelligence service on a special “cable access” program. Another document, dated from 2013 and first published by Der Spiegel on Wednesday, describes a German cable access point under a program that was operated by the NSA, the German intelligence service BND, and an unnamed third partner.
  • ...2 more annotations...
  • The program, which the secret files show cost U.S. taxpayers about $170 million between 2011 and 2013, sweeps up a vast amount of communications at lightning speed. According to the intelligence community’s classified “Black Budget” for 2013, RAMPART-A enables the NSA to tap into three terabits of data every second as the data flows across the compromised cables – the equivalent of being able to download about 5,400 uncompressed high-definition movies every minute. In an emailed statement, the NSA declined to comment on the RAMPART-A program. “The fact that the U.S. government works with other nations, under specific and regulated conditions, mutually strengthens the security of all,” said NSA spokeswoman Vanee’ Vines. “NSA’s efforts are focused on ensuring the protection of the national security of the United States, its citizens, and our allies through the pursuit of valid foreign intelligence targets only.”
  • The Danish and German operations appear to be associated with RAMPART-A because it is the only NSA cable-access initiative that depends on the cooperation of third-party partners. Other NSA operations tap cables without the consent or knowledge of the countries that host the cables, or are operated from within the United States with the assistance of American telecommunications companies that have international links. One secret NSA document notes that most of the RAMPART-A projects are operated by the partners “under the cover of an overt comsat effort,” suggesting that the tapping of the fiber-optic cables takes place at Cold War-era eavesdropping stations in the host countries, usually identifiable by their large white satellite dishes and radomes. A shortlist of other countries potentially involved in the RAMPART-A operation is contained in the Snowden archive. A classified presentation dated 2013, published recently in Intercept editor Glenn Greenwald’s book No Place To Hide, revealed that the NSA had top-secret spying agreements with 33 third-party countries, including Denmark, Germany, and 15 other European Union member states:
  •  
    Don't miss the slide with the names of the NSA-partner nations. Lots of E.U. member nations.
Paul Merrell

NSA Spying Relies on AT&T's 'Extreme Willingness to Help' - ProPublica - 0 views

  • he National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed NSA documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as “highly collaborative,” while another lauded the company’s “extreme willingness to help.”
  • AT&T’s cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013. AT&T has given the NSA access, through several methods covered under different legal rules, to billions of emails as they have flowed across its domestic networks. It provided technical assistance in carrying out a secret court order permitting the wiretapping of all Internet communications at the United Nations headquarters, a customer of AT&T. The NSA’s top-secret budget in 2013 for the AT&T partnership was more than twice that of the next-largest such program, according to the documents. The company installed surveillance equipment in at least 17 of its Internet hubs on American soil, far more than its similarly sized competitor, Verizon. And its engineers were the first to try out new surveillance technologies invented by the eavesdropping agency. One document reminds NSA officials to be polite when visiting AT&T facilities, noting: “This is a partnership, not a contractual relationship.” The documents, provided by the former agency contractor Edward Snowden, were jointly reviewed by The New York Times and ProPublica.
  • It is not clear if the programs still operate in the same way today. Since the Snowden revelations set off a global debate over surveillance two years ago, some Silicon Valley technology companies have expressed anger at what they characterize as NSA intrusions and have rolled out new encryption to thwart them. The telecommunications companies have been quieter, though Verizon unsuccessfully challenged a court order for bulk phone records in 2014. At the same time, the government has been fighting in court to keep the identities of its telecom partners hidden. In a recent case, a group of AT&T customers claimed that the NSA’s tapping of the Internet violated the Fourth Amendment protection against unreasonable searches. This year, a federal judge dismissed key portions of the lawsuit after the Obama administration argued that public discussion of its telecom surveillance efforts would reveal state secrets, damaging national security.
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

N.S.A. Spied on Allies, Aid Groups and Businesses - NYTimes.com - 0 views

  • Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.
  • While the names of some political and diplomatic leaders have previously emerged as targets, the newly disclosed intelligence documents provide a much fuller portrait of the spies’ sweeping interests in more than 60 countries. Britain’s Government Communications Headquarters, working closely with the National Security Agency, monitored the communications of senior European Union officials, foreign leaders including African heads of state and sometimes their family members, directors of United Nations and other relief programs, and officials overseeing oil and finance ministries, according to the documents. In addition to Israel, some targets involved close allies like France and Germany, where tensions have already erupted over recent revelations about spying by the N.S.A.
  • Details of the surveillance are described in documents from the N.S.A. and Britain’s eavesdropping agency, known as GCHQ, dating from 2008 to 2011. The target lists appear in a set of GCHQ reports that sometimes identify which agency requested the surveillance, but more often do not. The documents were leaked by the former N.S.A. contractor Edward J. Snowden and shared by The New York Times, The Guardian and Der Spiegel. The reports are spare, technical bulletins produced as the spies, typically working out of British intelligence sites, systematically tapped one international communications link after another, focusing especially on satellite transmissions. The value of each link is gauged, in part, by the number of surveillance targets found to be using it for emails, text messages or phone calls. More than 1,000 targets, which also include people suspected of being terrorists or militants, are in the reports. It is unclear what the eavesdroppers gleaned. The documents include a few fragmentary transcripts of conversations and messages, but otherwise contain only hints that further information was available elsewhere, possibly in a larger database.
  • ...8 more annotations...
  • Ms. Hansen, the spokeswoman for the European Commission, said that it was already engaged in talks with the United States that were “needed to restore trust and confidence in the trans-Atlantic relationship.” She added that “the commission will raise these new allegations with U.S. and U.K. authorities.”
  • Also appearing on the surveillance lists is Joaquín Almunia, vice president of the European Commission, which, among other powers, has oversight of antitrust issues in Europe. The commission has broad authority over local and foreign companies, and it has punished a number of American companies, including Microsoft and Intel, with heavy fines for hampering fair competition. The reports say that spies intercepted Mr. Almunia’s communications in 2008 and 2009. Mr. Almunia, a Spaniard, assumed direct authority over the commission’s antitrust office in 2010. He has been involved in a three-year standoff with Google over how the company runs its search engine. Competitors of the online giant had complained that it was prioritizing its own search results and using content like travel reviews and ratings from other websites without permission. While pushing for a settlement with Google, Mr. Almunia has warned that the company could face large fines if it does not cooperate.
  • Some condemned the surveillance on Friday as unjustified and improper. “This is not the type of behavior that we expect from strategic partners,” Pia Ahrenkilde Hansen, a spokeswoman for the European Commission, said on the latest revelations of American and British spying in Europe. Some of the surveillance relates to issues that are being scrutinized by President Obama and a panel he appointed in Washington that on Wednesday recommended tighter limits on the N.S.A., particularly on spying of foreign leaders, especially allies.
  • “We do not use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line,” said Vanee Vines, an N.S.A. spokeswoman. But she added that some economic spying was justified by national security needs. “The intelligence community’s efforts to understand economic systems and policies, and monitor anomalous economic activities, are critical to providing policy makers with the information they need to make informed decisions that are in the best interest of our national security,” Ms. Vines said.
  • The surveillance reports show American and British spies’ deep appetite for information. The French companies Total, the oil and gas giant, and Thales, an electronics, logistics and transportation outfit, appear as targets, as do a French ambassador, an “Estonian Skype security team” and the German Embassy in Rwanda.
  • Multiple United Nations Missions in Geneva are listed as targets, including Unicef and the United Nations Institute for Disarmament Research. So is Médecins du Monde, a medical relief organization that goes into war-ravaged areas. Leigh Daynes, an executive director of the organization in Britain, responded to news about the surveillance by saying: “There is absolutely no reason for our operations to be secretly monitored.” More obvious intelligence targets are also listed, though in smaller numbers, including people identified as “Israeli grey arms dealer,” “Taleban ministry of refugee affairs” and “various entities in Beijing.” Some of those included are described as possible members of Al Qaeda, and as suspected extremists or jihadists.
  • While few if any American citizens appear to be named in the documents, they make clear that some of the intercepted communications either began or ended in the United States and that N.S.A. facilities carried out interceptions around the world in collaboration with their British partners. Some of the interceptions appear to have been made at the Sugar Grove, W.Va., listening post run by the N.S.A. and code-named Timberline, and some are explicitly tied to N.S.A. target lists in the reports.
  • Strengthening the likelihood that full transcripts were taken during the intercepts is the case of Mohamed Ibn Chambas, an official of the Economic Community of West African States, known as Ecowas, a regional initiative of 15 countries that promotes economic and industrial activity. Whether intentionally or through some oversight, when Mr. Chambas’s communications were intercepted in August 2009, dozens of his complete text messages were copied into one of the reports.
  •  
    No mention of any "terrorist" targets. Could it be that Snowden and Greenwald are right, that the surveillance is not about terrorism at all? Surely our nation's leaders would not lie to us about that. Right. The Politics of Fear.
Paul Merrell

NZ Prime Minister John Key Retracts Vow to Resign if Mass Surveillance Is Shown - 0 views

  • In August 2013, as evidence emerged of the active participation by New Zealand in the “Five Eyes” mass surveillance program exposed by Edward Snowden, the country’s conservative Prime Minister, John Key, vehemently denied that his government engages in such spying. He went beyond mere denials, expressly vowing to resign if it were ever proven that his government engages in mass surveillance of New Zealanders. He issued that denial, and the accompanying resignation vow, in order to reassure the country over fears provoked by a new bill he advocated to increase the surveillance powers of that country’s spying agency, Government Communications Security Bureau (GCSB) — a bill that passed by one vote thanks to the Prime Minister’s guarantees that the new law would not permit mass surveillance.
  • Since then, a mountain of evidence has been presented that indisputably proves that New Zealand does exactly that which Prime Minister Key vehemently denied — exactly that which he said he would resign if it were proven was done. Last September, we reported on a secret program of mass surveillance at least partially implemented by the Key government that was designed to exploit the very law that Key was publicly insisting did not permit mass surveillance. At the time, Snowden, citing that report as well as his own personal knowledge of GCSB’s participation in the mass surveillance tool XKEYSCORE, wrote in an article for The Intercept: Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. . . . The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks.
  • A series of new reports last week by New Zealand journalist Nicky Hager, working with my Intercept colleague Ryan Gallagher, has added substantial proof demonstrating GCSB’s widespread use of mass surveillance. An article last week in The New Zealand Herald demonstrated that “New Zealand’s electronic surveillance agency, the GCSB, has dramatically expanded its spying operations during the years of John Key’s National Government and is automatically funnelling vast amounts of intelligence to the US National Security Agency.” Specifically, its “intelligence base at Waihopai has moved to ‘full-take collection,’ indiscriminately intercepting Asia-Pacific communications and providing them en masse to the NSA through the controversial NSA intelligence system XKeyscore, which is used to monitor emails and internet browsing habits.” Moreover, the documents “reveal that most of the targets are not security threats to New Zealand, as has been suggested by the Government,” but “instead, the GCSB directs its spying against a surprising array of New Zealand’s friends, trading partners and close Pacific neighbours.” A second report late last week published jointly by Hager and The Intercept detailed the role played by GCSB’s Waihopai base in aiding NSA’s mass surveillance activities in the Pacific (as Hager was working with The Intercept on these stories, his house was raided by New Zealand police for 10 hours, ostensibly to find Hager’s source for a story he published that was politically damaging to Key).
  • ...6 more annotations...
  • That the New Zealand government engages in precisely the mass surveillance activities Key vehemently denied is now barely in dispute. Indeed, a former director of GCSB under Key, Sir Bruce Ferguson, while denying any abuse of New Zealander’s communications, now admits that the agency engages in mass surveillance.
  • Meanwhile, Russel Norman, the head of the country’s Green Party, said in response to these stories that New Zealand is “committing crimes” against its neighbors in the Pacific by subjecting them to mass surveillance, and insists that the Key government broke the law because that dragnet necessarily includes the communications of New Zealand citizens when they travel in the region.
  • So now that it’s proven that New Zealand does exactly that which Prime Minister Key vowed would cause him to resign if it were proven, is he preparing his resignation speech? No: that’s something a political official with a minimal amount of integrity would do. Instead — even as he now refuses to say what he has repeatedly said before: that GCSB does not engage in mass surveillance — he’s simply retracting his pledge as though it were a minor irritant, something to be casually tossed aside:
  • When asked late last week whether New Zealanders have a right to know what their government is doing in the realm of digital surveillance, the Prime Minister said: “as a general rule, no.” And he expressly refuses to say whether New Zealand is doing that which he swore repeatedly it was not doing, as this excellent interview from Radio New Zealand sets forth: Interviewer: “Nicky Hager’s revelations late last week . . . have stoked fears that New Zealanders’ communications are being indiscriminately caught in that net. . . . The Prime Minister, John Key, has in the past promised to resign if it were found to be mass surveillance of New Zealanders . . . Earlier, Mr. Key was unable to give me an assurance that mass collection of communications from New Zealanders in the Pacific was not taking place.” PM Key: “No, I can’t. I read the transcript [of former GCSB Director Bruce Ferguson’s interview] – I didn’t hear the interview – but I read the transcript, and you know, look, there’s a variety of interpretations – I’m not going to critique–”
  • Interviewer: “OK, I’m not asking for a critique. Let’s listen to what Bruce Ferguson did tell us on Friday:” Ferguson: “The whole method of surveillance these days, is sort of a mass collection situation – individualized: that is mission impossible.” Interviewer: “And he repeated that several times, using the analogy of a net which scoops up all the information. . . . I’m not asking for a critique with respect to him. Can you confirm whether he is right or wrong?” Key: “Uh, well I’m not going to go and critique the guy. And I’m not going to give a view of whether he’s right or wrong” . . . . Interviewer: “So is there mass collection of personal data of New Zealand citizens in the Pacific or not?” Key: “I’m just not going to comment on where we have particular targets, except to say that where we go and collect particular information, there is always a good reason for that.”
  • From “I will resign if it’s shown we engage in mass surveillance of New Zealanders” to “I won’t say if we’re doing it” and “I won’t quit either way despite my prior pledges.” Listen to the whole interview: both to see the type of adversarial questioning to which U.S. political leaders are so rarely subjected, but also to see just how obfuscating Key’s answers are. The history of reporting from the Snowden archive has been one of serial dishonesty from numerous governments: such as the way European officials at first pretended to be outraged victims of NSA only for it to be revealed that, in many ways, they are active collaborators in the very system they were denouncing. But, outside of the U.S. and U.K. itself, the Key government has easily been the most dishonest over the last 20 months: one of the most shocking stories I’ve seen during this time was how the Prime Minister simultaneously plotted in secret to exploit the 2013 proposed law to implement mass surveillance at exactly the same time that he persuaded the public to support it by explicitly insisting that it would not allow mass surveillance. But overtly reneging on a public pledge to resign is a new level of political scandal. Key was just re-elected for his third term, and like any political official who stays in power too long, he has the despot’s mentality that he’s beyond all ethical norms and constraints. But by the admission of his own former GCSB chief, he has now been caught red-handed doing exactly that which he swore to the public would cause him to resign if it were proven. If nothing else, the New Zealand media ought to treat that public deception from its highest political official with the level of seriousness it deserves.
  •  
    It seems the U.S. is not the only nation that has liars for head of state. 
Paul Merrell

U.S. to China: We Hacked Your Internet Gear We Told You Not to Hack | Wired Enterprise ... - 0 views

  • The headline news is that the NSA has surreptitiously “burrowed its way into nearly all the security architecture” sold by the world’s largest computer networking companies, including everyone from U.S. mainstays Cisco and Juniper to Chinese giant Huawei. But beneath this bombshell of a story from Der Spiegel, you’ll find a rather healthy bit of irony. After all, the United States government has spent years complaining that Chinese intelligence operations could find ways of poking holes in Huawei networking gear, urging both American businesses and foreign allies to sidestep the company’s hardware. The complaints grew so loud that, at one point, Huawei indicated it may abandon the U.S. networking market all together. And, yet, Der Speigel now tells us that U.S. intelligence operations have been poking holes in Huawei networking gear — not to mention hardware sold by countless other vendors in both the States and abroad. “We read the media reports, and we’ve noted the references to Huawei and our peers,” says William Plummer, a Huawei vice president and the company’s point person in Washington, D.C. “As we have said, over and over again — and as now seems to be validated — threats to networks and data integrity can come from any and many sources.”
  • Plummer and Huawei have long complained that when the U.S. House Intelligence Committee released a report in October 2012 condemning the use of Huawei gear in telephone and data networks, it failed to provide any evidence that the Chinese government had compromised the company’s hardware. Adam Segal, a senior fellow for China Studies at the Center for Foreign Relations, makes the same point. And now we have evidence — Der Spiegel cites leaked NSA documents — that the U.S. government has compromised gear on a massive scale. “Do I see the irony? Certainly the Chinese will,” Segal says, noting that the Chinese government and the Chinese press have complained of U.S hypocrisy ever since former government contractor Edward Snowden first started to reveal NSA surveillance practices last summer. “The Chinese government has been hammering home what they call the U.S.’s ulterior motives for criticizing China, and there’s been a steady drumbeat of stories in the Chinese press about backdoors in the products of U.S. companies. They’ve been going after Cisco in particular.”
  • To be sure, the exploits discussed by Der Spiegel are a little different from the sort of attacks Congress envisioned during its long campaign against Huawei and ZTE, another Chinese manufacturer. As Segal and others note, Congress mostly complained that the Chinese government could collaborate with people inside the two companies to plant backdoors in their gear, with lawmakers pointing out that Huawei’s CEO was once an officer in China’s People’s Liberation Army, or PLA, the military arm of the country’s Communist party. Der Spiegel, by contrast, says the NSA is exploiting hardware without help from anyone inside the Ciscos and the Huaweis, focusing instead on compromising network gear with clever hacks or intercepting the hardware as it’s shipped to customers. “For the most part, the article discusses typical malware exploits used by hackers everywhere,” says JR Rivers, an engineer who has built networking hardware for Cisco as well as Google and now runs the networking startup Cumulus Networks. “It’s just pointing out that the NSA is engaged in the practice and has resources that are not available to most people.” But in the end, the two types of attack have the same result: Networking gear controlled by government spies. And over the last six months, Snowden’s revelations have indicated that the NSA is not only hacking into networks but also collaborating with large American companies in its hunt for data.
  • ...2 more annotations...
  • Jim Lewis, a director and senior fellow with the Center for Strategic and International Studies, adds that the Chinese view state-sponsored espionage a little differently than the U.S. does. Both countries believe in espionage for national security purposes, but the Chinese argue that such spying might include the theft of commercial secrets. “The Chinese will tell you that stealing technology and business secrets is a way of building their economy, and that this is important for national security,” says Lewis, who has helped oversee meetings between the U.S. and the Chinese, including officers in the PLA. “I’ve been in the room when they’ve said that. The last time was when a PLA colonel said: ‘In the U.S., military espionage is heroic and economic espionage is a crime. In China, the line is not that clear.’” But here in the United States, we now know, the NSA may blur other lines in the name of national security. Segal says that although he, as an American, believes the U.S. government is on stronger ethical ground than the Chinese, other nations are beginning to question its motives. “The U.S has to convince other countries that our type of intelligence gathering is different,” he says. “I don’t think that the Brazils and the Indias and the Indonesias and the South Africas are convinced. That’s a big problem for us.”
  • The thing to realize, as the revelations of NSA snooping continue to pour out, is that everyone deserves scrutiny — the U.S government and its allies, as well as the Chinese and others you may be more likely to view with skepticism. “All big countries,” Lewis says, “are going to try and do this.”
  •  
    Of course, we now know that the U.S. conducts electronic surveillance for a multitude of purposes, including economic. Check this group's notes tagged "NSA-targets" and/or "NSA-goals".
Paul Merrell

Obama's "Catastrophic Defeat" in Ukraine » CounterPunch: Tells the Facts, Nam... - 0 views

  • “We are currently witnessing an epic and historic event. The Ukrainian regular army and the punitive battalions are suffering a catastrophic defeat to the south of Donetsk…..It still is not quite clear how the Junta intends to avoid a complete defeat here…. By squandering the most combat-capable brigades in systematic offensive operations, the Junta sustained enormous losses and at the same time suffered a crushing, purely military defeat. The southern front has collapsed.” – The Southern Front Catastrophe – August 27, 2014″, Colonel Cassad, Military Briefing, Novorossiya, Ukraine “The reports out of Novorussia (New Russia) are nothing short of incredible… sources are reporting that Novorussian forces have bypassed Mariupol from the north and have entered the Zaporozhie region!” – News from the Front, Vineyard of the Saker Barack Obama has pushed Ukraine to the brink of political, economic and social collapse. Now he wants to blame Russia for the damage he’s done. It’s absurd. Moscow is in no way responsible for Ukraine’s descent into anarchy. That’s all Washington’s doing, just as Iraq, Afghanistan, Libya, and now Syria were Washington’s doing. If you want to blame someone, blame Obama.
  • “We are currently witnessing an epic and historic event. The Ukrainian regular army and the punitive battalions are suffering a catastrophic defeat to the south of Donetsk…..It still is not quite clear how the Junta intends to avoid a complete defeat here…. By squandering the most combat-capable brigades in systematic offensive operations, the Junta sustained enormous losses and at the same time suffered a crushing, purely military defeat. The southern front has collapsed.” – The Southern Front Catastrophe – August 27, 2014″, Colonel Cassad, Military Briefing, Novorossiya, Ukraine “The reports out of Novorussia (New Russia) are nothing short of incredible… sources are reporting that Novorussian forces have bypassed Mariupol from the north and have entered the Zaporozhie region!” – News from the Front, Vineyard of the Saker Barack Obama has pushed Ukraine to the brink of political, economic and social collapse. Now he wants to blame Russia for the damage he’s done. It’s absurd. Moscow is in no way responsible for Ukraine’s descent into anarchy. That’s all Washington’s doing, just as Iraq, Afghanistan, Libya, and now Syria were Washington’s doing. If you want to blame someone, blame Obama.
  • Ukraine’s troubles began when the US State Department toppled the elected president in February and replaced him with a compliant stooge who agreed to follow Washington’s directives. The new “junta” government quickly launched a full-blown war against Russian-speaking Ukrainians in the east which split the civilian population and drove the country to ruin. The plan “pacify” the East was concocted in Washington, not Kiev and certainly not Moscow.
  • ...4 more annotations...
  • Donetsk and Lugansk have formed militias and taken the war to the enemy. They’ve engaged Obama’s proxy-army on the battlefield and pounded it into mincemeat. That’s why Obama deployed his propagandists to lie about the fictitious “Russian invasion”. The administration needs a diversion because the Novorussia forces (aka-the “pro Russia separatists”) are kicking the holy crap out of Obama’s legions. That’s why Washington and Kiev are in full panic-mode, because none of this was supposed to happen. Obama figured the army would put down the insurrection, crush the resistance, and move him one step closer to his goal of establishing NATO bases and missile defense systems on Russia’s western flank. Well, guess what? It’s not playing out that way and it probably never will. The Novorussia fighters are too tough, too smart and too motivated to be one-upped by Obama’s feckless troopers. (Check out this short video and you’ll see why the rebels are winning: Vineyard of the Saker)
  • Putin hasn’t sent tanks and artillery into Ukraine. He doesn’t need to. The militias are loaded with battle-hardened veterans who know how to fight and who are quite good at it. Just ask Poroshenko whose army has been taking it in the shorts for the last couple of weeks. Check out this blurb in Thursday’s Itar Tass: “Over the week of August 16-23, the self-defense fighters of the Donetsk and Luhansk People’s Republics seized 14 T-64 tanks, 25 infantry fighting vehicles, 18 armored personnel carriers, one armored reconnaissance and patrol vehicle, one Uragan multiple launch rocket system, two Gvozdika self-propelled artillery guns, four D-30 howitzers, four mortars, one ZU-23-2 air defense system and 33 vehicles.” (East Ukraine militias seize large amount of Ukrainian armor, Itar Tass) Get the picture? The Ukrainian army is getting beaten to a pulp, which means that Obama’s glorious “pivot strategy” just slammed into a brick wall.
  • Bottom line: Russia has not invaded Ukraine. The propagandists in the media are just trying to hide the fact that the Novorussia Army Forces (NAF; aka-the pro Russia separatists) are kicking ass and taking names. That’s what’s really going on. That’s why Obama and his gaggle of miscreant neocons are in a furor. It’s because they don’t know what to do next, so they’ve returned to their default position on every issue; lie like hell until they settle on a plan.
  • So, who do you believe; Kerry or the facts? And who are you going to believe this time; “Aluminum tubes” Gordie or Organization for Security and Co-operation in Europe (OSCE) monitor Andrey Kelin who said yesterday: “We have said that no Russian involvement has been spotted, there are no soldiers or equipment present.” “Accusations relating to convoys of armored personnel carriers have been heard during the past week and the week before that. All of them were proven false back then, and are being proven false again now.” (RT) Repeat: “No Russian involvement”. All the accusations “were proven false.” “False” as in fake, phony, propaganda, bunkum, lies which, by the way, appears to be Gordon’s area of expertise.
  •  
    Don't miss the video at http://vineyardsaker.blogspot.com/2014/08/watershed-press-conference-by-top.html It's a press conference by Alexander V. Zakharchenko, Chairman of The Council of Ministers of The Donetsk National Republic, describing the rout of coup government forces and the reconstitution of the Novorussia militias into a national army. Russian with English subtitle translation.  According to him the DNR army has killed thousands of Ukrainian soldiers, but the coup government is notifying family members that they are "missing in action," even when the DNR transfers the bodies to Ukraine. He also describes encountering coup government soldiers wearing the insignia of the Galacia SS Division, a Ukraine collaborators' division of the Nazi World War II Waffen SS. (The coup government includes in its leadership neo-Nazis, and neo-Nazi militias are fighting on the side of the coup government.)  
Paul Merrell

Blocking a 'Realist' Strategy on the Mideast | Consortiumnews - 0 views

  • Official Washington’s influential neocons appear back in the driver’s seat steering U.S. policy in the Middle East toward a wider conflict in Syria and away from a “realist” alternative that sought a Putin-Obama collaboration to resolve the region’s crises more peacefully, reports Robert Parry.
  • There’s also the other finicky little problem that the action of arming and training rebels and unleashing them against a sovereign state is an act of aggression (if not terrorism depending on what they do), similar to what U.S. officials have piously condemned the Russians of doing in Ukraine. But this hypocrisy is never acknowledged either by U.S. policymakers or the mainstream U.S. press, which has gone into Cold War hysterics over Moscow’s alleged support for embattled ethnic Russians in eastern Ukraine on Russia’s border — while demanding that Obama expand support for Syrian rebels halfway around the world, even though many of those “moderates” have allied themselves with al-Qaeda terrorists.
  • Though it’s been known for quite awhile that the Syrian civil war had degenerated into a sectarian conflict with mostly Sunni rebels battling the Alawites, Shiites, Christians and other minorities who form the base of support for Assad, the fiction has been maintained in Washington that a viable and secular “moderate opposition” to Assad still exists. The reality on the ground says otherwise. For instance, in Friday’s New York Times, an article by correspondent Ben Hubbard described the supposed Syrian “moderates” who are receiving CIA support as “a beleaguered lot, far from becoming a force that can take on the fanatical and seasoned fighters of the Islamic State.” But the situation is arguably worse than just the weakness of these “moderates.” According to Hubbard’s reporting, some of these U.S.-backed fighters “acknowledge that battlefield necessity had put them in the trenches with the Nusra Front, Al Qaeda’s Syrian affiliate, an issue of obvious concern for the United States. …
  • ...10 more annotations...
  • “Lt. Col. Fares al-Bayyoush, the former aviation engineer who now heads the Fursan al-Haq Brigade, acknowledged that his men had fought alongside the Nusra Front because they needed all the help they could get. “Sometimes, he said, that help comes in forms only a jihadi group can provide. He cited the rebel takeover of the northern town of Khan Sheikhoun, saying that the rebels were unable to take out one government position until the Nusra Front sent a suicide bomber to blow it up. In another town nearby, Nusra sent four bombers, including an American citizen. “‘We encourage them actually,’ Mr. Bayyoush said with a laugh. ‘And if they need vehicles, we provide them’.”
  • The “moderate” rebels also don’t share President Obama’s priority of carrying the fight to the Islamic State militants, reported Hubbard, “ousting Mr. Assad remains their primary goal.” This dilemma of the mixed allegiances of the “moderates” has been apparent for at least the past year. Last September, many of the previously hailed Syrian “moderate” rebels unveiled themselves to be Islamists who repudiated the U.S.-backed political opposition and allied themselves with al-Qaeda’s al-Nusra Front. [See Consortiumnews.com’s “Syrian Rebels Embrace Al-Qaeda.”] In other words, the just-approved congressional action opening the floodgates to hundreds of millions of dollars more in military aid to Syrian “moderates” could actually contribute to al-Qaeda’s Syrian affiliate gaining control of Syria, which could create a far greater threat to U.S. national security than the consolidation of the Islamic State inside territory of Syria and Iraq.
  • While the Islamic State brandishes its brutality as a gruesome tactic for driving Western interests out of the Middle East, it has shown no particular interest in taking its battle into the West. By contrast, al-Qaeda follows a conscious strategy of inflicting terrorist attacks on the West as part of a long-term plan to wreck the economies of the United States and Europe. Thus, Obama’s hastily approved strategy for investing more in Syrian “moderates” – if it allows a continued spillover of U.S. military equipment to al-Nusra – could increase the chances of creating a base for international terrorism in Damascus at the heart of the Middle East. That would surely prompt demands for a reintroduction of U.S. ground troops into the region.
  • There are also obvious alternatives to following such a self-destructive course, although they would require Obama and much of Official Washington to climb down from their collective high horses and deal with such demonized leaders as Syria’s Assad and Russian President Vladimir Putin, not to mention Iran. A “realist” strategy would seek out a realistic political solution to the Syrian conflict, which would mean accepting the continuation of Assad’s rule, at least for the near term, as part of a coalition government that would offer stronger Sunni representation. This unity government could then focus on eliminating remaining pockets of al-Qaeda and Islamic State resistance before holding new elections across as much of the country as possible.
  • As part of this strategy to weaken these Islamic extremists, the United States and the European Union would have to crack down on the militants’ funding sources in Saudi Arabia and the Persian Gulf, as touchy as that can be with the Saudis holding such influence over the U.S. economy. But Obama could start the process of facing down Saudi blackmail by declassifying the secret section of the 9/11 Report which reportedly describes Saudi financing of al-Qaeda before the 9/11 attacks. I’m told that U.S. intelligence now has a clear picture of which Saudi princes are providing money to Islamist terrorists. So, instead of simply sending drones and warplanes after youthful jihadist warriors, the Obama administration might find it more useful to shut down these funders, perhaps nominating these princes as candidates for the U.S. “capture or kill list.”
  • To get Assad fully onboard for the necessary concessions to his Sunni opponents, the Russians could prove extremely valuable. According to a source briefed on recent developments, Russian intelligence already has served as a go-between for U.S. intelligence to secure Assad’s acceptance of Obama’s plan to send warplanes into parts of Syrian territory to attack Islamic State targets. The Russians also proved helpful a year ago in getting Assad to surrender his chemical weapons arsenal to defuse a U.S. threat to begin bombing Assad’s military in retaliation for a Sarin gas attack outside Damascus on Aug. 21, 2013. Although Assad denied involvement – and subsequent evidence pointed more toward a provocation by rebel extremists – Putin’s intervention gave Obama a major foreign policy success without a U.S. military strike. That intervention, however, infuriated Syrian rebels who had planned to time a military offensive with the U.S. bombing campaign, hoping to topple Assad’s government and take power in Damascus. America’s influential neoconservatives and their “liberal interventionist” allies – along with Israeli officials – were also livid, all eager for another U.S.-backed “regime change” in the Middle East.
  • Putin thus made himself an inviting neocon target. By the end of last September, American neocons were taking aim at Ukraine as a key vulnerability for Putin. A leading neocon, Carl Gershman, president of the U.S.-government-funded National Endowment for Democracy, took to the op-ed pages of the neocon Washington Post to identify Ukraine as “the biggest prize” and explain how its targeting could undermine Putin’s political standing inside Russia. “Ukraine’s choice to join Europe will accelerate the demise of the ideology of Russian imperialism that Putin represents,” Gershman wrote. “Russians, too, face a choice, and Putin may find himself on the losing end not just in the near abroad but within Russia itself.” At the time, Gershman’s NED was funding scores of political and media projects inside Ukraine. What followed in Ukraine had all the earmarks of a U.S. destabilization campaign against Putin’s ally, the elected President Viktor Yanukovych.
  • Then, with U.S. officialdom and the mainstream U.S. press engaging in an orgy of Cold War-style propaganda, Putin was demonized as a new Hitler expanding territory by force. Anyone who knew the facts recognized that Putin had actually been trying to maintain the status quo, i.e., sustain the Yanukovych government until the next election, and it was the West that had thrown the first punch. But Washington’s new “group think” was that Putin instigated the Ukraine crisis so he could reclaim lost territory of the Russian empire. President Obama seemed caught off-guard by the Ukraine crisis, but was soon swept up in the West’s Putin/Russia bashing. He joined in the hysteria despite the damage that the Ukraine confrontation was inflicting on Obama’s own hopes of working with Putin to resolve other Middle East problems.
  • Thus, the initial victory went to the neocons who had astutely recognized that the emerging Putin-Obama collaboration represented a serious threat to their continued plans for “regime change” across the Middle East. Not only had Putin helped Obama head off the military strike on Syria, but Putin assisted in getting Iran to agree to limits on its nuclear program. That meant the neocon desire for more “shock and awe” bombing in Syria and Iran had to be further postponed. The Putin-Obama cooperation might have presented an even greater threat to neocon plans if the two leaders could have teamed up to pressure Israeli Prime Minister Benjamin Netanyahu to finally reach a reasonable agreement with the Palestinians. At the center of the neocons’ strategy at least since the mid-1990s has been the idea that “regime change” in Middle East governments hostile to Israel would eventually starve Israel’s close-in enemies, such as Lebanon’s Hezbollah and Palestine’s Hamas, of support and free Israel’s hand to do what it wanted with the Palestinians. [See Consortiumnews.com’s “The Mysterious Why of the Iraq War.”]
  • The Putin-Obama collaboration – if allowed to mature – could have derailed that core neocon strategy and denied Israel the unilateral power to decide the Palestinians’ fate. But the Ukraine crisis – and now the plan to pour a half-billion dollars into the Syrian rebels fighting Assad – have put the neocon strategy back on track. The next question is whether Obama and whatever “realists” remain in Official Washington have the will and the determination to reclaim control of the Middle East policy train and take it in a different direction.
  •  
    Robert Parry takes a break from the nuts and bolts of U.S. foreign proxy wars, steps back, and provides a broader view of what is happening to the balance of power within the Obama administration, and sees the neocons as regaining lost influence.
1 - 20 of 91 Next › Last »
Showing 20 items per page