Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged fake-expert

Rss Feed Group items tagged

Paul Merrell

A Clinton Fan Manufactured Fake News That MSNBC Personalities Spread to Discredit WikiL... - 0 views

  • The phrase “Fake News” has exploded in usage since the election, but the term is similar to other malleable political labels such as “terrorism” and “hate speech”; because the phrase lacks any clear definition, it is essentially useless except as an instrument of propaganda and censorship. The most important fact to realize about this new term: those who most loudly denounce Fake News are typically those most aggressively disseminating it. One of the most egregious examples was the recent Washington Post article hyping a new anonymous group and its disgusting blacklist of supposedly pro-Russia news outlets – a shameful article mindlessly spread by countless journalists who love to decry Fake News, despite the Post article itself being centrally based on Fake News. (The Post this week finally added a lame editor’s note acknowledging these critiques; the Post editors absurdly claimed that they did not mean to “vouch for the validity” of the blacklist even though the article’s key claims were based on doing exactly that). Now we have an even more compelling example. Back in October, when WikiLeaks was releasing emails from the John Podesta archive, Clinton campaign officials and their media spokespeople adopted a strategy of outright lying to the public, claiming – with no basis whatsoever – that the emails were doctored or fabricated and thus should be ignored. That lie – and that is what it was: a claim made with knowledge of its falsity or reckless disregard for its truth – was most aggressively amplified by MSNBC personalities such as Joy Ann Reid and Malcolm Nance, The Atlantic’s David Frum, and Newsweek’s Kurt Eichenwald.
  • The phrase “Fake News” has exploded in usage since the election, but the term is similar to other malleable political labels such as “terrorism” and “hate speech”; because the phrase lacks any clear definition, it is essentially useless except as an instrument of propaganda and censorship. The most important fact to realize about this new term: Those who most loudly denounce Fake News are typically those most aggressively disseminating it. One of the most egregious examples was the recent Washington Post article hyping a new anonymous group and its disgusting blacklist of supposedly pro-Russia news outlets — a shameful article mindlessly spread by countless journalists who love to decry Fake News, despite the Post article itself being centrally based on Fake News. (The Post this week finally added a lame editor’s note acknowledging these critiques; the Post editors absurdly claimed that they did not mean to “vouch for the validity” of the blacklist even though the article’s key claims were based on doing exactly that). Now we have an even more compelling example. Back in October, when WikiLeaks was releasing emails from the John Podesta archive, Clinton campaign officials and their media spokespeople adopted a strategy of outright lying to the public, claiming — with no basis whatsoever — that the emails were doctored or fabricated and thus should be ignored. That lie — and that is what it was: a claim made with knowledge of its falsity or reckless disregard for its truth — was most aggressively amplified by MSNBC personalities such as Joy Ann Reid and Malcolm Nance, The Atlantic’s David Frum, and Newsweek’s Kurt Eichenwald.
  • That the emails in the Wikileaks archive were doctored or faked — and thus should be disregarded — was classic Fake News, spread not by Macedonian teenagers or Kremlin operatives but by established news outlets such as MSNBC, The Atlantic, and Newsweek. And, by design, this Fake News spread like wildfire all over the internet, hungrily clicked and shared by tens of thousands of people eager to believe it was true. As a result of this deliberate disinformation campaign, anyone reporting on the contents of the emails was instantly met with claims that the documents in the archive had been proven fake. The most damaging such claim came from MSNBC’s intelligence analyst Malcolm Nance. As I documented on October 11, he tweeted what he — for some bizarre reason — labeled an “Official Warning.” It decreed: “#PodestaEmails are already proving to be riddled with obvious forgeries & #blackpropaganda not even professionally done.” That tweet was re-tweeted by more than 4,000 people. It was vested with added credibility by Clinton-supporting journalists like Reid and Frum (“expert to take seriously”).
  • ...3 more annotations...
  • From the start, it was obvious that it was this accusation from Clinton supporters — not the WikiLeaks documents — that was a complete fraud, perpetrated on the public as deliberate disinformation. With regard to the claim about the Podesta emails, now we know exactly who created it in the first instance: a hard-core Clinton fanatic.
  • All of that, in turn, led to an article in something called the “Daily News Bin” with the headline: “MSNBC intelligence expert: WikiLeaks is releasing falsified emails not really from Hillary Clinton.” This classic fake news product — citing Nance and Reid among others — was shared more than 40,000 times on Facebook alone.
  • Sadly for Chacon, however, the people who ended up getting fooled by his Fake News items were the nation’s most prominent Clinton supporters, including supposed experts and journalists from MSNBC who used his obvious fakes to try to convince the world that the WikiLeaks archive had been compromised and thus should be ignored.
Paul Merrell

M of A - US Military In Iraq Circulates Fake Islamic State Document - Media Fall For it - 0 views

  • It seems that the U.S. military is propagandizing against the Islamic State by distributing fake Islamic State documents. This, in effect, will make the Islamic State look better than it is. Iraqi Forces Fighting for Ramadi Make Their Way Toward City Center In a telephone briefing on Tuesday, [Col. Steven H. Warren, the United States military spokesman in Baghdad,] said that coalition forces had recovered Islamic State leaflets in the nearby city of Falluja urging its fighters — if they lose control of the city — to impersonate Iraqi security forces and commit atrocities. “Some acts that they’re instructed to do on this document include blowing up mosques, killing and torturing civilians and breaking into homes while dressed as I.S.F. fighters,” Colonel Warren said, referring to Iraqi security forces. “They do all this to discredit the I.S.F.” Colonel Warren called the instructions in the leaflets “the behavior of thugs, behavior of killers, the behavior of terrorists.” Colonel Warren also tweeted the "Islamic State leaflet" and its translation: COL Steve Warren Verified account @OIRSpox ISIL fighters ordered to dress as ISF and commit atrocities before fleeing Fallujah. [Photo of the document and its translation] 7:30 AM - 22 Dec 2015"
  • The document was immediately identified as fake by Aymenn Jawad Al-Tamimi, a well known researcher who curates a large collection of all published Islamic State documents: Aymenn J Al-Tamimi @ajaltamimi Aymenn J Al-Tamimi Retweeted COL Steve Warren Dear Col. Steve Warren @OIRSpox, this purported 'Fallujah withdrawal' document is an obvious fake: 7:43 AM - 22 Dec 2015 Al Tamimi gives two main reasons why he believes the document is fake: the document allegedly from Fallujah is under an IS letter head from Ninawa province. Fallujah is in Anbar province, the document refers to the government militia with its real honorable name "Hashd Sha'abi" while the regular derogatory Islamic State term for the militia is "Hashd Rafidi". Another writer with deep experience in the region also believes that the document is fake: Anand Gopal @Anand_Gopal_ Anand Gopal Retweeted COL Steve Warren Here’s a US military spokesman circulating fake ISIS documents as propaganda 9:41 AM - 22 Dec 2015
  • An Iraq security analyst concurs: Alex M. @Alex_de_M COL Warren needs a chat with his G2 section. The leaflets are pretty obviously fakes... 9:45 AM - 22 Dec 2015 One would think that the behavior the Islamic State displays in its own propaganda videos is argument enough to condemn it. By using obviously fake IS documents to condemn the Islamic State the U.S. military creates the opposite effect. That the U.S. needs fake evidence to let the Islamic State look bad actually makes it look better than it is. This not only in the eyes of its followers.
  • ...1 more annotation...
  • Update Dec 23, 3:45am The NYT, quoted above, has now changed its piece without issuing a correction note. The text now says: In a telephone briefing on Tuesday, Colonel Warren said that coalition forces had recovered what he said were Islamic State leaflets in the nearby city of Falluja urging its fighters — if they lose control of the city — to impersonate Iraqi security forces and commit atrocities.The authenticity of the leaflets could not be independently confirmed, and experts on the Islamic State were debating their validity after the coalition publicized them on Tuesday. The NYT first repeated the military propaganda of the fake leaflet without any doubt or checking of its authenticity. It now says that there is a "debate" about the genuineness of the document. There is no "debate". The experts all say that the document is fake. This is - if at all - a "debate" about the earth being flat. It is another low that the NYT can even not admit that it has again been taken in by military's propaganda.
Paul Merrell

After Criticism, Washington Post Disavows 'Russian Propaganda' Blacklist Of Indie Media - 0 views

  • AUSTIN, Texas — Amid a wave of widespread criticism and legal threats, the Washington Post has added a lengthy editor’s note to an article which alleged that a host of independent media websites were spreading Russian propaganda. Washington Post added editor's note to top of "Russian propaganda" story after being called out for shoddy reportinghttps://t.co/dWKbZJGS9a pic.twitter.com/skGiZUX2Ls — Ben Norton (@BenjaminNorton) December 7, 2016 The article, written by Craig Timberg and published on Nov. 24, relied largely on information compiled by PropOrNot, an anonymous group that claims to be comprised of media analysts and researchers. At the time the Post story was published, the group’s homepage featured a list of 200 websites, including MintPress News and many other well-established independent media outlets, which the organization alleges are either deliberately or inadvertently spreading Russian propaganda. Among other criticisms levied against the group, PropOrNot’s research depends on overly broad criteria. According to its own stated methodology, criticism of the ”US, Obama, Hillary Clinton, the EU, Angela Merkel, NATO, Ukraine, Jewish people, US allies, the ‘mainstream media,’ and democrats, the center-right or center-left, and moderates of all stripes,” would be grounds for inclusion on “The List.” The Post added an editor’s note to the article on Wednesday in an apparent attempt to distance the newspaper from the controversy. “The Washington Post on Nov. 24 published a story on the work of four sets of researchers who have examined what they say are Russian propaganda efforts to undermine American democracy and interests,” the note begins.
  • While Timberg’s article does refer to the work of multiple researchers, the bulk of the report relied on allegations made by PropOrNot. The Washington Post continued: “One of them was PropOrNot, a group that insists on public anonymity, which issued a report identifying more than 200 websites that, in its view, wittingly or unwittingly published or echoed Russian propaganda. A number of those sites have objected to being included on PropOrNot’s list, and some of the sites, as well as others not on the list, have publicly challenged the group’s methodology and conclusions. The Post, which did not name any of the sites, does not itself vouch for the validity of PropOrNot’s findings regarding any individual media outlet, nor did the article purport to do so.” Numerous websites, including MintPress, have objected to their inclusion on “The List.” On Tuesday, James Moody, the lawyer representing the publisher of the website Naked Capitalism, demanded a formal retraction and public apology on Tuesday. Moody wrote: “You did not provide even a single example of ‘fake news’ allegedly distributed or promoted by Naked Capitalism or indeed any of the 200 sites on the PropOrNot blacklist. You provided no discussion or assessment of the credentials or backgrounds of these so-called ‘researchers’ (Clint Watts, Andrew Weisburd, and J.M. Berger and the “team” at PropOrNot), and no discussion or analysis of the methodology, protocol or algorithms such ‘researchers’ may or may not have followed.” Backlash against both PropOrNot and the Post’s story hasn’t just come from media outlets included on “The List,” though.
  • “The group promoted by the Post … embodies the toxic essence of Joseph McCarthy, but without the courage to attach individual names to the blacklist,” wrote Ben Norton and Glenn Greenwald in The Intercept, which was not featured on the PropOrNot list, on Nov. 26. The Post’s editor’s note concludes: “Since publication of The Post’s story, PropOrNot has removed some sites from its list.” However, MintPress and Naked Capitalism remain on “The List,” as do respected alternative and independent media sites Antiwar.com, Black Agenda Report, Truthout, and Truthdig. Overall, the Post’s new position seemed poorly received by many of the media analysts who have criticized the story. On Wednesday evening, Adam Johnson, a reporter who writes for Fairness and Accuracy in Reporting, tweeted that the Post editors who refuse to retract the story are “a bunch of cowards.” what a bunch of cowards. "This blacklist that served as the entire news basis of our piece is bullshit but we wont retract the story" https://t.co/V5ZSwSMgTg — Adam H. Johnson (@adamjohnsonNYC) December 7, 2016 Timberg’s article appeared amid widespread outcry over the apparent threat of “fake news” against American democracy. Kevin Gosztola, managing editor of Shadowproof, told MintPress editor-in-chief Mnar Muhawesh that the rush to create “blacklists” of media outlets undermines the freedom of the press.
  • ...1 more annotation...
  • “When you start to put people on lists you’re actually diminishing speech,” Gosztola said in an interview with Muhawesh for “Behind the Headline.”
  •  
    The Washington Post backpedals from its "fake news" story.
Gary Edwards

The PJ Tatler » Yes, it's true: The birth certificate is built in layers. And... - 0 views

  •  
    Photoshop expert: and author of more than 17 books on computer graphics Mara Zebest: Obama's Latest Long-Form Birth Certificate Is a Fake! http://gatewaypundit.rightnetwork.com/2011/04/critics-obamas-latest-long-form-birth-certificate-is-a-fake/
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
Paul Merrell

In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots - 0 views

  • Donald Trump, for reasons I’ve repeatedly pointed out, is an extremist, despicable, and dangerous candidate, and his almost-certain humiliating defeat is less than a month away. So I realize there is little appetite in certain circles for critiques of any of the tawdry and sometimes fraudulent journalistic claims and tactics being deployed to further that goal. In the face of an abusive, misogynistic, bigoted, scary, lawless authoritarian, what’s a little journalistic fraud or constant fearmongering about subversive Kremlin agents between friends if it helps to stop him? But come January, Democrats will continue to be the dominant political faction in the U.S. — more so than ever — and the tactics they are now embracing will endure past the election, making them worthy of scrutiny. Those tactics now most prominently include dismissing away any facts or documents that reflect negatively on their leaders as fake, and strongly insinuating that anyone who questions or opposes those leaders is a stooge or agent of the Kremlin, tasked with a subversive and dangerously un-American mission on behalf of hostile actors in Moscow. To see how extreme and damaging this behavior has become, let’s just quickly examine two utterly false claims that Democrats over the past four days — led by party-loyal journalists — have disseminated and induced thousands of people, if not more, to believe. On Friday, WikiLeaks published its first installment of emails obtained from the account of Clinton campaign chair John Podesta. Despite WikiLeaks’ perfect, long-standing record of only publishing authentic documents, MSNBC’s favorite ex-intelligence official, Malcolm Nance, within hours of the archive’s release, posted a tweet claiming — with zero evidence and without citation to a single document in the WikiLeaks archive — that it was compromised with fakes:
  • As you can see, more than 4,000 people have re-tweeted this “Official Warning.” That includes not only random Clinton fans but also high-profile Clinton-supporting journalists, who by spreading it around gave this claim their stamp of approval, intentionally leading huge numbers of people to assume the WikiLeaks archive must be full of fakes, and its contents should therefore simply be ignored. Clinton’s campaign officials spent the day fueling these insinuations, strongly implying that the documents were unreliable and should thus be ignored. Poof: Just like that, unpleasant facts about Hillary Clinton disappeared, like a fairy protecting frightened children by waving her magic wand and sprinkling her dust over a demon, causing it to scatter away. Except the only fraud here was Nance’s claim, not any of the documents published by WikiLeaks. Those were all real. Indeed, at Sunday night’s debate, when asked directly about the excerpts of her Wall Street speeches found in the release, Clinton herself confirmed their authenticity. And news outlets such as the New York Times and AP reported — and continue to report — on their contents without any caveat that they may be frauds. No real print journalists or actual newsrooms (as opposed to campaign operatives masquerading as journalists) fell for this scam, so this tactic did not prevent reporting from being done.
  •  
    Glenn Greenwald chastises Dems for claiming leaked Clintone emails are forgeries.
Paul Merrell

Former Fox News guest accused of fabricating CIA career | TheHill - 0 views

  • A former cable news commentator was arrested on Thursday for allegedly fabricating a 27-year career with the CIA.According to the Justice Department, 62-year-old Wayne Simmons used the false story to try and gain security clearances and government contracts, including a successful overseas posting to advise military personnel.ADVERTISEMENTHe falsely claimed to have worked as an “Outside Paramilitary Special Operations Officer” from 1973 to 2000, the government alleges in its indictment, in order to work with contractors engaged in multi-million dollar deals with the United States government.He also used his time with the CIA to “bolster his credibility” with someone investing $125,000 in a fake real estate investment, the government charged.Additionally, Simmons lied on government forms to deny that he had been charged with or convicted of a felony offense and to claim that his prior arrests were “directly related related to his supposed intelligence work for the CIA,” according to the charges.
  • Simmons was charged with major fraud against the U.S., wire fraud and making false statements to the government. If convicted, he could be imprisoned for decades.CIA spokesman Dean Boyd said in a brief statement that the agency was “working closely with the Justice Department on this matter.”
Paul Merrell

Hollywood producer claims Boston bombing was a "false flag attack" - News - VoR Intervi... - 0 views

  • Crisis actors, smoke bombs, fake blood and literal "smoke and mirrors" were all part of what was the false flag terrorist attack called the Boston Marathon Bombing. To anyone who saw the pictures and footage of fake blood, make- up artists and smiling “victims”. It was obvious that something was not right. For those involved in filmmaking and in the know the discrepancies were obvious. We spoke to famous Hollywood filmmaker, producer and director Nathan Folks about why he is certain the Boston Marathon Bombing was a false flag terrorist attackRead more: http://voiceofrussia.com/2014_04_25/The-Boston-bombing-was-a-false-flag-attack-Nathan-Folks-7658/
Paul Merrell

Information Warfare: Automated Propaganda and Social Media Bots | Global Research - 0 views

  • NATO has announced that it is launching an “information war” against Russia. The UK publicly announced a battalion of keyboard warriors to spread disinformation. It’s well-documented that the West has long used false propaganda to sway public opinion. Western military and intelligence services manipulate social media to counter criticism of Western policies. Such manipulation includes flooding social media with comments supporting the government and large corporations, using armies of sock puppets, i.e. fake social media identities. See this, this, this, this and this. In 2013, the American Congress repealed the formal ban against the deployment of propaganda against U.S. citizens living on American soil. So there’s even less to constrain propaganda than before.
  • Information warfare for propaganda purposes also includes: The Pentagon, Federal Reserve and other government entities using software to track discussion of political issues … to try to nip dissent in the bud before it goes viral “Controlling, infiltrating, manipulating and warping” online discourse Use of artificial intelligence programs to try to predict how people will react to propaganda
  • Some of the propaganda is spread by software programs. We pointed out 6 years ago that people were writing scripts to censor hard-hitting information from social media. One of America’s top cyber-propagandists – former high-level military information officer Joel Harding – wrote in December: I was in a discussion today about information being used in social media as a possible weapon.  The people I was talking with have a tool which scrapes social media sites, gauges their sentiment and gives the user the opportunity to automatically generate a persuasive response. Their tool is called a “Social Networking Influence Engine”. *** The implications seem to be profound for the information environment. *** The people who own this tool are in the civilian world and don’t even remotely touch the defense sector, so getting approval from the US Department of State might not even occur to them.
  • ...2 more annotations...
  • How Can This Real? Gizmodo reported in 2010: Software developer Nigel Leck got tired rehashing the same 140-character arguments against climate change deniers, so he programmed a bot that does the work for him. With citations! Leck’s bot, @AI_AGW, doesn’t just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source. As can be the case with these sorts of things, many of the deniers don’t know they’ve been targeted by a robot and engage AI_AGW in debate. The bot will continue to fire back canned responses that best fit the interlocutor’s line of debate—Leck says this goes on for days, in some cases—and the bot’s been outfitted with a number of responses on the topic of religion, where the arguments unsurprisingly often end up. Technology has come a long way in the past 5 years. So if a lone programmer could do this 5 years ago, imagine what he could do now. And the big players have a lot more resources at their disposal than a lone climate activist/software developer does.  For example, a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (and see this).  So if the lone programmer is doing it, it’s not unreasonable to assume that the big boys are widely doing it.
  • How Effective Are Automated Comments? Unfortunately, this is more effective than you might assume … Specifically, scientists have shown that name-calling and swearing breaks down people’s ability to think rationally … and intentionally sowing discord and posting junk comments to push down insightful comments  are common propaganda techniques. Indeed, an automated program need not even be that sophisticated … it can copy a couple of words from the main post or a comment, and then spew back one or more radioactive labels such as “terrorist”, “commie”, “Russia-lover”, “wimp”, “fascist”, “loser”, “traitor”, “conspiratard”, etc. Given that Harding and his compadres consider anyone who questions any U.S. policies as an enemy of the state  – as does the Obama administration (and see this) – many honest, patriotic writers and commenters may be targeted for automated propaganda comments.
Paul Merrell

Land Destroyer: NATO's War on Syria Just Got Dirtier - 0 views

  • But even with the West's capitulation in Syria, and months passing without a shred of credible evidence produced, hacks among Western media continue to perpetuate the original narrative. Among these are of course corporate-financier funded think-tanks and propaganda fronts like the Brookings Institution, Foreign Policy Magazine, the Foundation for the Defense of Democracies (FDD), and establishment papers like the Guardian. In the middle of it all is couch-potato self-proclaimed weapons expert, Eliot Higgins, a representation of the West's propaganda 2.0 campaign.  UK-based Higgins lost his job and now spends his days combing social media sites for "evidence" he then analyzes and reports on. The Western media, with its propagandists expelled from Syria and many of its "sources" in Syria exposed in humiliating attempts to fabricate and manipulate evidence, quickly picked Higgins up and elevated his armchair blogging to "expert analysis." Since then, Higgins has joined the already discredited "Syrian Observatory for Human Rights" another UK-based individual, as the basis upon which the West's Syrian narrative spins. 
  • Whitaker is desperately attempting to keep the wheels on the establishment's new propaganda 2.0 vehicle - manipulating social media, much the way Hersh describes intelligence being manipulated, to create any outcome necessary to bolster a predetermined narrative.  What he doesn't address is the fact that Higgins' work almost entirely depends on videos posted online by people he does not know, who may be misrepresenting who they are, what they are posting, and their motivations for doing so - such is the nature of anonymity on the web and why this evidence alone is useless outside of a larger geopolitical context.  Both Whitaker and Higgins, who maintain that the Syrian government was behind the attacks, fail to address another glaring reality. A false flag attack is designed to look like the work of one's enemy. In other words, terrorists in Syria would use equipment, uniforms, weapons, and tactics that would pin the crime on the Syrian government. All Higgins has proved, thus far, is that the superficial details of the operation made for a convincing false flag attack. 
  • Toward the end of Higgin's piece, he, like his friends at the Guardian, attempt to claim Al Nusra, contrary to Hersh's report, are most likely not capable of producing sarin.
  • ...5 more annotations...
  • The e-mails illustrate prior knowledge of chemical weapons falling into the hands of terrorists who fully planned on using them in a false flag operation. Higgins and others had this information, and now, have Seymour Hersh's report as well, yet they still pose the argument that the militants had neither the ability nor the means to carry out the attacks. In fact, it appears that the Western media and underlings like Higgins went out of their way specifically to discredit the notion from even being considered.  In other words, a concerted cover-up.  The e-mails above, and others in the large cache also reveal the possible motivation for these lies. So-called journalists and researchers peddling the West's narrative appear to have a wide range of lucrative offers presented to them, as well as funding for them to continue doing the work they are already involved in. This of course is only the case so long as their narratives mesh with the institutions, corporations, and individuals cutting the checks. 
  • The e-mails reveal multiple correspondences regarding chemical weapons falling into the hands of terrorists aimed at using them in a false flag operation, Higgins' and Van Dyke's mutual "benefactor" located in Virginia, "near DC" (Langley, Virginia?), and job offers for Higgins from NGOs and a defense contractor involving "open source intelligence," the new buzzword used by Higgins and Whitaker in regards to the new form of propaganda they both participate in. 
  • While perhaps Higgins and company missed that CNN report, it is now revealed that at least Higgins, and several other journalists were told by an American contractor on the ground inside of Syria, that militants had gained access to chemical weapons and more importantly, were planning to use them in a false flag attack - this months before the August 21 attack in Damascus.   The Syrian Electronic Army (SEA) has released e-mails this week between American contractor Matthew Van Dyke and members of the Western media, including Higgins. The e-mails indicated that militants had chemical weapons and were planning to use them in an attack to frame the Syrian government - serving as impetus for wider foreign intervention. SEA's emails have been confirmed by Higgins himself in a series of self-incriminating tweets where he goes, point-by-point, attempting to provide explanations for the damning revelations. 
  • Why would Higgins even mention the possibility of a false flag attack, when all that would do is alienate him from the establishment he is so eagerly trying to be a part of? His recent piece in Foreign Policy and the Guardian's ceaseless promotion of his work are favors that demand reciprocation - in the form of toeing the line and selling a narrative Higgins and others know is deceitful.  That Higgins, the Guardian, and Foreign Policy are prepared to throw veteran journalist Seymour Hersh under the bus to protect their interests, gives us a look into the depths of depravity within which this "new" media Whitaker celebrates, operate.  Worst of all for the West, is that the transparency and accountability they claim to uphold, had to be kept in check by the SEA - an organization wanted by the FBI as "terrorists." We would be led to believe by the likes of Whitaker, Higgins, and Van Dyke that the Syrian government and their supporters are the villains, but in their own words and actions we see the truth. 
  • Note: The full extent of SEA's leaked e-mails exposes Van Dyke and the journalists he associates with as utterly depraved, deceitful, unprincipled individuals each driven by untethered greed and narcissism. The e-mails also reveal that "aid ships" are used to bring in weapons and foreign fighters, that the Syrians are almost entirely behind the government and that the so-called revolution was "fake." Van Dyke is exposed as having conspired to kill a man and his entire family over a trivial personal dispute and much, much more. Readers are encouraged to comb through the archives, and to follow SEA on Twitter  @Official_SEA16.
  •  
    "Brown Moses" (Eliot Higgins) has been the principle source of "evidence" that the Assad government used chemical weapons, arguing strenuously that the "rebels" had no such capability. But the Syrian Electronic Army obtained a large number of emails between Higgins and an American mercenary working in Syria showing beyond doubt that Higgins had been put on notice in May 2013 -- months before the sarin gas attack near Damascus in late August -- that the "rebels" had sarin.   Oopsies!
Paul Merrell

Leaked docs show spyware used to snoop on US computers | Ars Technica - 0 views

  • Software created by the controversial UK-based Gamma Group International was used to spy on computers that appear to be located in the United States, the UK, Germany, Russia, Iran, and Bahrain, according to a leaked trove of documents analyzed by ProPublica. It's not clear whether the surveillance was conducted by governments or private entities. Customer e-mail addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer, and the Qatari government.
  • The leaked files—which were posted online by hackers—are the latest in a series of revelations about how state actors including repressive regimes have used Gamma's software to spy on dissidents, journalists, and activist groups. The documents, leaked last Saturday, could not be readily verified, but experts told ProPublica they believed them to be genuine. "I think it's highly unlikely that it's a fake," said Morgan Marquis-Bore, a security researcher who while at The Citizen Lab at the University of Toronto had analyzed Gamma Group's software and who authored an article about the leak on Thursday. The documents confirm many details that have already been reported about Gamma, such as that its tools were used to spy on Bahraini activists. Some documents in the trove contain metadata tied to e-mail addresses of several Gamma employees. Bill Marczak, another Gamma Group expert at the Citizen Lab, said that several dates in the documents correspond to publicly known events—such as the day that a particular Bahraini activist was hacked.
  • The leaked files contain more than 40 gigabytes of confidential technical material, including software code, internal memos, strategy reports, and user guides on how to use Gamma Group software suite called FinFisher. FinFisher enables customers to monitor secure Web traffic, Skype calls, webcams, and personal files. It is installed as malware on targets' computers and cell phones. A price list included in the trove lists a license of the software at almost $4 million. The documents reveal that Gamma uses technology from a French company called Vupen Security that sells so-called computer "exploits." Exploits include techniques called "zero days" for "popular software like Microsoft Office, Internet Explorer, Adobe Acrobat Reader, and many more." Zero days are exploits that have not yet been detected by the software maker and therefore are not blocked.
  • ...2 more annotations...
  • Many of Gamma's product brochures have previously been published by the Wall Street Journal and Wikileaks, but the latest trove shows how the products are getting more sophisticated. In one document, engineers at Gamma tested a product called FinSpy, which inserts malware onto a user's machine, and found that it could not be blocked by most antivirus software. Documents also reveal that Gamma had been working to bypass encryption tools including a mobile phone encryption app, Silent Circle, and were able to bypass the protection given by hard-drive encryption products TrueCrypt and Microsoft's Bitlocker.
  • The documents also describe a "country-wide" surveillance product called FinFly ISP which promises customers the ability to intercept Internet traffic and masquerade as ordinary websites in order to install malware on a target's computer. The most recent date-stamp found in the documents is August 2, coincidung with the first tweet by a parody Twitter account, @GammaGroupPR, which first announced the hack and may be run by the hacker or hackers responsible for the leak. On Reddit, a user called PhineasFisher claimed responsibility for the leak. "Two years ago their software was found being widely used by governments in the middle east, especially Bahrain, to hack and spy on the computers and phones of journalists and dissidents," the user wrote. The name on the @GammaGroupPR Twitter account is also "Phineas Fisher." GammaGroup, the surveillance company whose documents were released, is no stranger to the spotlight. The security firm F-Secure first reported the purchase of FinFisher software by the Egyptian State Security agency in 2011. In 2012, Bloomberg News and The Citizen Lab showed how the company's malware was used to target activists in Bahrain. In 2013, the software company Mozilla sent a cease-and-desist letter to the company after a report by The Citizen Lab showed that a spyware-infected version of the Firefox browser manufactured by Gamma was being used to spy on Malaysian activists.
Paul Merrell

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
Gary Edwards

PressTV - Malaysian plane disappearance linked to 9/11: Barrett - 0 views

  • The FBI has recognized other 9/11 cell call anomalies. For example, according to the FBI, one of the alleged calls from Flight 93 lasted for two hours and six minutes after the supposed crash; another lasted 65 minutes after the official crash time. No wonder the FBI has always taken the official position that "Osama Bin Laden was never wanted in connection with 9/11, because there is no hard evidence Bin Laden had anything to do with 9/11." The FBI knows 9/11 was an inside job. They know – as Elias Davidsson's book Hijacking America's Mind on 9/11 explains – that none of the 19 Arabs blamed for 9/11 was even on board any of the allegedly hijacked planes.
  • Pentagon Comptroller Dov Zakheim, a Zionist extremist, managed to lose 2.3 trillion dollars from the Pentagon's accounts shortly before 9/11. Zakheim's company SPC invented a "flight termination system" designed to allow operators to seize control of aircraft by remote control and fly them from the ground. Several of the key people who developed Zakheim's "Flight Termination System" were on the 9/11 flights. Were they silenced? Or rewarded with money and a new identity in a National Security Witness Protection Program? Zakheim's "Flight Termination System" appears to have been used on 9/11.
  • Was it also used on Malaysian Airlines Flight 370?
  • ...5 more annotations...
  • In his article "Phone calls from the 9/11 planes: How they fooled America," Dr. David Ray Griffin explains that the 9/11 cell phone calls –  starting with the notorious "calls" from Bush Administration cheerleader Barbara Olson to her husband, Bush's Solicitor General Ted Olson –  must have been faked. The FBI agrees with Dr. Griffin. After spending five years telling the American people about the "cell phone calls," the FBI radically revised its story in 2006, admitting that 13 of the 15 alleged 9/11 cell phone calls never happened. Amazingly, the FBI even admitted that Ted Olson never received the famous phone calls from his wife, who (Olson claimed) had supposedly called him from hijacked Flight 77.
  • of justice.
  • Olson should have been immediately arrested for obstruction
  • Dr. Griscom points out that the anomalous cell phone calls from Malaysian Flight 370 are reminiscent of those from the allegedly hijacked airliners of September 11th, 2001. In both cases, "impossible" cell phone calls puzzled experts.
  • The FBI and the media initially reported 15 cell phone calls from hijacked airliners on 9/11. At least one of the recipients, Deena Burnett, was absolutely certain that her husband, a passenger on UA93, had called her from his cell phone, whose number came up on her caller ID. The problem: The Burnett call, and the other alleged cell phone calls, could not possibly have been placed from the airliners, which were flying at high altitudes, too fast and far beyond the range of 2001 cell phone technology.
  •  
    Some new thinking about the very strange and mysterious disappearance of Malaysian Airlines Flight 370. Amazingly, some of the most perplexing and explainable mysteries are very similar to unexplained circumstances on 9/11
Paul Merrell

Spies Infiltrate a Fantasy Realm of Online Games - NYTimes.com - 0 views

  • Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.
  • Fearing that terrorist or criminal networks could use the games to communicate secretly, move money or plot attacks, the documents show, intelligence operatives have entered terrain populated by digital avatars that include elves, gnomes and supermodels. The spies have created make-believe characters to snoop and to try to recruit informers, while also collecting data and contents of communications between players, according to the documents, disclosed by the former National Security Agency contractor Edward J. Snowden. Because militants often rely on features common to video games — fake identities, voice and text chats, a way to conduct financial transactions — American and British intelligence agencies worried that they might be operating there, according to the papers.
  • Online games might seem innocuous, a top-secret 2008 N.S.A. document warned, but they had the potential to be a “target-rich communication network” allowing intelligence suspects “a way to hide in plain sight.” Virtual games “are an opportunity!” another 2008 N.S.A. document declared. But for all their enthusiasm — so many C.I.A., F.B.I. and Pentagon spies were hunting around in Second Life, the document noted, that a “deconfliction” group was needed to avoid collisions — the intelligence agencies may have inflated the threat. The documents, obtained by The Guardian and shared with The New York Times and ProPublica, do not cite any counterterrorism successes from the effort. Former American intelligence officials, current and former gaming company employees and outside experts said in interviews that they knew of little evidence that terrorist groups viewed the games as havens to communicate and plot operations.
  • ...5 more annotations...
  • In the 2008 N.S.A. document, titled “Exploiting Terrorist Use of Games & Virtual Environments,” the agency said that “terrorist target selectors” — which could be a computer’s Internet Protocol address or an email account — “have been found associated with Xbox Live, Second Life, World of Warcraft” and other games. But that document does not present evidence that terrorists were participating in the games. Still, the intelligence agencies found other benefits in infiltrating these online worlds. According to the minutes of a January 2009 meeting, GCHQ’s “network gaming exploitation team” had identified engineers, embassy drivers, scientists and other foreign intelligence operatives to be World of Warcraft players — potential targets for recruitment as agents.
  • “The Sigint Enterprise needs to begin taking action now to plan for collection, processing, presentation and analysis of these communications,” said one April 2008 N.S.A. document, referring to “signals intelligence.” The document added, “With a few exceptions, N.S.A. can’t even recognize the traffic,” meaning that the agency could not distinguish gaming data from other Internet traffic. By the end of 2008, according to one document, the British spy agency, known as GCHQ, had set up its “first operational deployment into Second Life” and had helped the police in London in cracking down on a crime ring that had moved into virtual worlds to sell stolen credit card information. The British spies running the effort, which was code-named Operation Galician, were aided by an informer using a digital avatar “who helpfully volunteered information on the target group’s latest activities.”
  • The surveillance, which also included Microsoft’s Xbox Live, could raise privacy concerns. It is not clear exactly how the agencies got access to gamers’ data or communications, how many players may have been monitored or whether Americans’ communications or activities were captured. One American company, the maker of World of Warcraft, said that neither the N.S.A. nor its British counterpart, the Government Communications Headquarters, had gotten permission to gather intelligence in its game. Many players are Americans, who can be targeted for surveillance only with approval from the nation’s secret intelligence court. The spy agencies, though, face far fewer restrictions on collecting certain data or communications overseas.
  • Even before the American government began spying in virtual worlds, the Pentagon had identified the potential intelligence value of video games. The Pentagon’s Special Operations Command in 2006 and 2007 worked with several foreign companies — including an obscure digital media business based in Prague — to build games that could be downloaded to mobile phones, according to people involved in the effort. They said the games, which were not identified as creations of the Pentagon, were then used as vehicles for intelligence agencies to collect information about the users. Eager to cash in on the government’s growing interest in virtual worlds, several large private contractors have spent years pitching their services to American intelligence agencies. In one 66-page document from 2007, part of the cache released by Mr. Snowden, the contracting giant SAIC promoted its ability to support “intelligence collection in the game space,” and warned that online games could be used by militant groups to recruit followers and could provide “terrorist organizations with a powerful platform to reach core target audiences.”
  • In spring 2009, academics and defense contractors gathered at the Marriott at Washington Dulles International Airport to present proposals for a government study about how players’ behavior in a game like World of Warcraft might be linked to their real-world identities. “We were told it was highly likely that persons of interest were using virtual spaces to communicate or coordinate,” said Dmitri Williams, a professor at the University of Southern California who received grant money as part of the program. After the conference, both SAIC and Lockheed Martin won contracts worth several million dollars, administered by an office within the intelligence community that finances research projects.
  •  
    Coming soon: disclosure of the NSA's public bathroom cams and microphones because people talk there and exchange germs that might have DNA in them that can be used to track terrorists. 
Gary Edwards

The Daily Bell - Gerald Celente on Multinationalism, Breaking the Chains and Individual... - 0 views

  • Gerald Celente: As I said, they're in a trap and it's a tapering trap, the quantitative easing trap. They can't keep printing more money because it's going to devalue the currency. And by the way, this is complicated, because it's not only the United States that's doing it; most of the central banks are doing it. China, the Europeans – they're all pumping money into their systems to keep them afloat. They're all in a trap. A time comes when you just can't keep doing it anymore. You can only take heroin so much before it kills you. This is monetary methadone and it's not going to cure the problem so they're going to have to stop. When it stops, that's when we go back into a recession and/or a depression.
  • Is it a depression? Is it a depression if you live in Greece or Spain or Portugal? Is it a depression if you're among the over 12% unemployed in Italy? When you look at John Williams's ShadowStats, in the US we're looking at about 22% unemployment. So yes, it's a depression for a lot of people. And then again, median household income in the US, accounting for inflation, is 10% below 1999 levels. That's a fact. So if you're earning 10 percent less for your family than you were in 1999 and the costs have skyrocketed since then, particularly in healthcare, food, rent, property, gas and other costs, do you think you're living in a depression? Daily Bell: Is central banking an art, a science or just a fraud?
  • Gerald Celente: Neither. It's a criminal operation. Throughout the 1800s, one of the major issues of every presidential election was whether or not to have a central bank. They fought it successfully not to have one until 1913. These are private banks that are running our country and many others. This goes back to the scriptures; it's Christ chasing the moneychangers out of the temple. The moneychangers have just got new names – Deutsche Bank, Societe Generale, Goldman Sachs, JPMorgan Chase, and, of course, JPMorgan Chase got that name because you're going to have to chase them to get your money because they just put a limit on how much you can withdraw or deposit each month in certain accounts, with a limit of $50,000.
  • ...21 more annotations...
  • Daily Bell: It seems like people don't believe in central banking anymore so why does it continue? What holds it up in a so-called democracy where people have a vote? Gerald Celente: Most people don't even know what a central bank is and they still believe the lie that the Federal Reserve is a quasi-government institution when it's not. It's a totally private bank. Most people don't even know that. So most people are uninformed and like in all countries, they follow their leaders. Very few people rebel. There was an incident that happened in late October in the States. Hillary Clinton was speaking in Buffalo, delivering her model for what is required to solve complex problems. There was a heckler in the crowd who she admonished by saying, "... which doesn't include yelling. It includes sitting down and talking." What patronizing bullshit. You know what happened? The audience of 6,500 stood up and gave her a standing ovation that extended on and on. So it's the people. The people can blame the politicians all they want, but as I see it, it's the people's responsibility for the state of their nation.
  • Daily Bell: What's the employment picture like going forward in the US?
  • Gerald Celente: Lower paying jobs, less benefits, more temporary jobs and I think the question at the end is rather than going forward in the US it should be what's going forward in Slavelandia, because that's what it's become. You get out of college and you're an indentured servant. For the rest of your life you have to pay off your debt for your degree in worthlessness, for the most part. There are degrees that are worth something but not a lot of them. Where are you going to work? Name the company – Macy's? Starbucks? You can become a barista. Are they going to start teaching Shipping & Handling 101 in college? What are they going to do? Who are you going to work for? What are you going to do – stock shelves? This is better than slavery because when they had the plantation you had to take care of the slaves. Now you can just use them up and send them home. It's kind of like Bangladesh right here in the good 'ol USA.
  • Daily Bell: How about the rest of the world? Give us a global summary.
  • Gerald Celente: The global summary is this: Everybody can see what happened when the Federal Reserve talked about tapering several months ago. All of a sudden you saw the emerging markets start to crash; they dropped about 11% in a year before the Fed reversed its policy because all the hot, low-interest rate money that was leaving the US was flowing into the emerging markets, where you could borrow the money cheaply. So when they started to talk about tapering the hot money started flowing out of these countries, such as India, Brazil. They were really suffering from it and so were their stock markets. So without the cheap money flowing from the central banks, the entire global economy goes on stall and then it turns negative. You can see what's going on in China now; they're facing a banking crisis. Real estate prices in cities like Shanghai and Beijing have gone up over 20% in a year and no matter how the government tries to deflate it, the housing bubble keeps growing. The banks also have a lot of bad loans they're carrying. Now the Chinese government is trying to restrain that free-flow of cheap money, and what happens to their stock market when they do? It dives and the contagion spreads to other Asian equity markets. They all start dropping. It's all tied to cheap money and when the cheap money spigot begins to tighten up the global economy goes down. As I've made very clear, when the interest rates go up the economies go down – it's as simple as that. They've run out of this game. Compare this with the Great Depression, when it began essentially in 1930. This recession begin in 2008. It's now 2013 – we're only in 1935.
  • Daily Bell: China and the BRICS seem to be making noises about setting up their own monetary infrastructure without the dollar. Will that happen?
  • Gerald Celente: Yes, they are making noise, but reality is another issue, and the currency issue is complicated. The dollar goes down but where are you going to go, the euro? We were talking briefly about what's going on in Europe. There's financial market propaganda boasting that the worst of the eurozone crisis is over. They're bragging that The GDP of Spain was just reported to have gone up 0.1% and they made a big deal out of it. "The recession's over" is the B.S. message. No, the recession is not over! They're cooking the numbers to make a rotten situation look less rotten. In countries like Greece and Spain, youth unemployment is running above 50% and overall unemployment around 30%. The recession continues unabated, and there's absolutely no way out of this and they can't print their way out. Portugal, Italy, Greece, Spain, Ireland are doing terrible – what would anyone substitute euros for dollars? And what other currency choices are there, the yuan? As I mentioned, China has plenty of its own problems. They've been dumping a lot of cash into that society to keep it going. You know what China's greatest fear is? It's not the Spratly Islands or the South and China Sea territorial problems that are going on between them, the Philippines, Vietnam or the Japanese. China's greatest fear is its people. They've got 1.2 billion of them and if they're hungry or not happy there's going to be a lot of problems.
  • Again, what do you substitute the dollar for, Brazil's real or the Indian rupee? Remember, we saw what happened when the hot money started leaving the emerging market countries. The South African rand is also under pressure. The BRIC nations can speak as much as they want and they may have the greatest intention to create another reserve currency, but the fact is their economies are not robust or independent enough to create one at this time. As I said, talk is one thing, facts are another and although the world is less dependent on the dollar it is still by far the major reserve currency of the world and I don't see that rapidly changing unless there's a catastrophe that would cause it to happen. However, over the years, I do expect a new reserve model to develop.
  • Daily Bell: Let's talk about military action, particularly in Syria where Al Qaeda types have been fighting on the side of the US and NATO. Why does the US want to destabilize Syria and what country will be next – Iran? Russia?
  • Gerald Celente: We wrote about this in the Trends Journal going back to 2011. After Libya fell, Syria was the only port that the Chinese and the Russians had in the Mediterranean – the Port of Tartus. And also, Syria's only real ally in that area is Iran and, of course, Hezbollah in Lebanon. So with Syria out of the way there's nothing in the Middle East other than Iran to stop the continued spread of US influence and control in that area. It's really more about that than anything we see – again, having more control over that area for the US to do as it wants, with Iran really being the main target.
  • When President Obama backed off his red line threat and didn't attack Syria that was a tipping point. And, as important, the vast majority of Americans opposed the attack plan. That was a significant statement. The country said it was tired of war – and so are a lot of other nations.
  • Gerald Celente: Again, talk about morality and the recent Amnesty International report that said the United States was breaking international law in its use of drones to kill people that were convicted of nothing in addition to innocent people. How much more immoral could you get?
  • I can tell you how much immoral. How about starting wars in Afghanistan and Iraq – in Iraq with the proof that a war was started that killed at least a half a million people that was started under fake reasons; lies that Saddam Hussein had weapons of mass destruction and ties to al Qaeda. An Afghan war that's the longest war in American history, the war in Libya that they called a time-limed, scope-limited kinetic action that's destroyed the entire nation. You want to talk about immorality? How about the "too big to fail"? The government mandated immoral act of stealing money from the American people to give it to the banks, financiers and favored corporations? They say the fish rots from the head down and that's it; the fish has rotted in America for a long time. It didn't start with Obama. It goes back to Bush, Clinton, and keeps going back. Society gets the message from the top and, as I see it, they're simply following their leaders. For example, if their leader can start wars, rob people, take their money, why shouldn't I? Why should I operate on a moral level when immorality is condoned at the top?
  • Most recently, the United States government, in virtually every fashion of behavior, has been fascist. I don't say that by throwing the word out loosely. It's called the merger of corporate state and powers. It goes back to "too big to fail." Under capitalism there's no such thing. You're not too big to fail; you fail. Big, small, medium, you fail – it's capitalism.
  • Not anymore. You have your money taken from you by government order and it's transferred to the people who are the most favored by those in power. That's the only reason why the stock market keeps going up and why the multinationals are doing so well. That's where the $85 billion a month that the Federal Reserve is using in their quantitative easing is going. Then when you look at the other levels of immorality, as I mentioned, why shouldn't people feel as though they can do anything the government is doing? That's why it just keeps getting worse and worse. It's reflected in the music, the politics, every element of culture – both pop culture and political culture.
  • Under the dictates of the eurozone and globalization, the love of one's culture and pride of nation is denounced as "populism."
  • Daily Bell: Let's talk hard money. Can you give us an update on the price action of gold and silver? How about equity? Where is the stock market headed? We think the big boys are trying to rev it up and go for one last killing. Your thoughts?
  • Gerald Celente: The stock market will continue to rise as long as interest rates stay low. That's the best estimate you could give. They keep all of this quantitative easing that, for example, benefits the big private equity firms. Look what's going on in the United States with Blackstone Group. They own 40,000 homes. Where are they getting the money? Deutsche Bank is loaning them tons of money because they're getting money with overnight rates near zero, and they in turn loan it to the "bigs" really cheaply so it is just another example of what's keeping the whole stock market scam going.
  • As long as the money stays cheap the stock market keeps going up. As the money stays cheap gold and silver go up, and you're seeing gold making a bit of a rebound lately because of, again going back to the employment numbers in the States – there is no recovery, the jobs stink, they're not creating enough jobs. The tapering keeps going on, which is a devaluation of the currency, and quantitative easing continues. As long as money stays cheap gold goes up. Now, gold may go down when quantitative easing and tapering slow down. However, that's only going to be temporary because when that happens the bond market's going to explode, when interest rates go up, there's going to be another financial crisis. My best analysis at this time is the second quarter of 2014. The 'experts' are saying the stock market is booming. It has gone from a 14,000 high in 2007 to mid-15,000 now. Accounting for inflation, the stock market has to be about 15,750 just to be back at the 2007 level.
  • Daily Bell: There are other trends, of course, ones you often mention. You spoke to us last time about the New Millennium Renaissance.
  • Gerald Celente: Back to the renaissance... To me, that's the only thing that's going to change the future. We need a cultural, artistic and moral redevelopment, a restoration. Every issue that we've been talking about so far is based on human behavior and the human spirit – morality or immorality. Until morality is restored and the human spirit rises, nothing's going to change. As I was mentioning before, the fish rots from the head down. If you see the people at the head acting immorally, and from the head all the way down, why shouldn't you or I act immorally? What license do they have to steal that we don't? What license do they have to kill that we shouldn't?
Paul Merrell

​Energy ballet: Iran, Russia and 'Pipelineistan' - RT Op-Edge - 0 views

  • A fascinating nuclear/energy ballet involving Iran, Russia, the US and the EU is bound to determine much of what happens next in the new great game in Eurasia. Let’s start with what’s going on with the Iranian nuclear dossier.
  • As we stand, the gap between the US, Russia, China, Britain, France and Germany on one side, and Iran on the other side, remains very wide. Essentially, the gap that really matters is between Washington and Tehran. And that, unfortunately, translates as a few more months for the vast sabotage brigade – from US neo-cons and assorted warmongers to Israel and the House of Saud – to force the deal to collapse. One of Washington’s sabotage mantras is “breakout capability”; a dodgy concept which boils down to total centrifuge capacity/capability to produce enough enriched uranium for a single nuclear bomb. This implies an arbitrary limit on Iran’s capacity to enrich uranium. The other sabotage mantra forces Iran to shut down the whole of its uranium enrichment program, and on top of it negotiate on its missiles. That’s preposterous; missiles are part of conventional armed forces. Washington in this instance is changing the subject to missiles that might carry the nuclear warheads that Iran does not have. So they should also be banned. Moscow and Beijing see “breakout capability” for what it is; a manufactured issue. While Washington says it wants a deal, Moscow and Beijing do want a deal – stressing it can be respected via strict monitoring.
  • ranian Supreme Leader Ayatollah Khamenei has established his red line on the record, so there should be no misunderstanding; the final nuclear deal must preserve Tehran’s legitimate right to enrich uranium - on an industrial scale – as part of a long-term energy policy. This is what Iranian negotiators have been saying from the beginning. So shutting down uranium enrichment is a non-starter. Sanction me baby one more time Uranium enrichment, predictably, is the key to the riddle. As it stands, Tehran now has more than 19,000 installed enrichment centrifuges. Washington wants it reduced to a few thousand. Needless to add, Israel – which has over 200 nuclear warheads and the missiles to bomb Iran, the whole thing acquired through espionage and illegal arms deals – presses for zero enrichment. In parallel undercurrents, we still have the usual US/Israeli “experts” predicting that Iran can produce a bomb in two to three months while blasting Tehran for “roadblocks” defending its “illicit” nuclear program. At least US National Security Adviser Susan Rice has momentarily shut up.
  • ...4 more annotations...
  • Another key contention point is the Arak heavy-water research reactor. Washington wants it scrapped – or converted into a light-water plant. Tehran refuses, arguing the reactor would only produce isotopes for medicine and agriculture. And then there’s the sanctions hysteria. The UN and the US have been surfing a sanction tidal wave since 2006. Tehran initially wanted those heavy sanctions which amount to economic war lifted as soon as possible; then it settled for a progressive approach. Obama might be able to lift some sanctions – but a US Congress remote-controlled by Tel Aviv will try to keep others for eternity. Here, with plenty of caveats is a somewhat detailed defense of a good deal compared to what may lead towards an apocalyptic road to war.
  • It’s a tragicomedy, really. Washington plays The Great Pretender, faking it full-time that Israel is not a nuclear-armed power while trying to convince the whole planet Israel is entitled to amass as many weapons as it wants while Iran is not allowed to even have conventional means to defend itself. Not to mention that nuclear-armed Israel has threatened and invaded virtually all of its neighbors, while Iran has invaded nothing.
  • As harsh as they really are, sanctions did not force Tehran to kneel and submit. Khamenei has repeatedly said he’s not optimistic about a nuclear deal. What he really wants, much more than a deal, is an improved economy. Now, with the sanctions cracking after the initial Geneva agreement, there is light at the end of the tunnel. Enter turbo-charged Russia-Iran negotiations. They include a power deal worth up to $10 billion, including new thermal and hydroelectric plants and a transmission network.
  • In many overlapping ways, the Iranian nuclear dossier now is like a hall of mirrors. It reflects an unstated Washington dream; unfettered access for US corporations to a virgin market of 77 million, including a well- educated young urban population, plus an energy bonanza for US Big Oil. But in the hall of mirrors there’s also the Iranian projection – as in fulfilling its destiny as the top geopolitical power in Southwest Asia, the ultimate crossroads between East and West. So in a sense the Supreme Leader has it all covered. If Rouhani shines and there is a final nuclear deal, the economic scenario will vastly improve, especially via massive European investment. If Washington scotches the deal over pressure from the usual lobbies, Tehran can always say it exercised all of its “heroic flexibility,” and move on – as in closer and closer integration with both Russia and China.
  •  
    Pepe Escobar
Paul Merrell

Moon of Alabama - 0 views

  • Over the last year the U.S. bombed Jabhat al-Nusra personal and facilities in Syria some five or six times. The al-Qaeda subgroup also has a history of attacking U.S. paid "relative moderate" proxy forces in Syria. The Pentagon recently inserted another U.S. mercenary group into north Syria. This was accompanied by a media campaign in which the administration lauded itself for the operation. The newly inserted group is especially trained and equipped to direct U.S. air attacks like those that earlier hit al-Nusra fighters. Now that freshly inserted group was attacked by Jabhat al-Nusra. Some of its members were killed and others were abducted. The Obama administration is shocked, SHOCKED, ABSOLUTELY SHOCKED that Jabhat al-Nusra would do such a ghastly deed. "Why would they do that?" "Who could have known that they would attack U.S. proxy forces???"
  • There is no longer an Jihadist ISIS or ISIL in Syria and Iraq. The people leading that entity declared (pdf) today, at the highly symbolic beginning of Ramadan, themselves to be a new caliphate:
  • Could someone explain to the fucking dimwits in the Pentagon and the Obama administrations that people everywhere, and especially terrorists group, hate it when you bomb them and kill their leaders? That those people you bomb might want to take revenge against you and your proxies? That people you bombed will not like your targeting team moving in next door to them? That alQaeda is not an "ally"? These people are too pathetically clueless to even be embarrassed about it. The accumulated intelligence quotient of the administration and Pentagon officials running the anti-Syria operation must be below three digits. But aside from their lack of basic intelligence the utter lack of simple "street smarts" is the real problem here. These people have no idea how life works outside of their beltway cages.
  • ...12 more annotations...
  • On more thought from me on why the dimwits did not foresee that Nusra would attack. The White House insisted on calling a part of Nusra the "Khorasan group" and explained that it was only bombing this groups of alQaeda veterans now part of Nusra because the "Khorasan group" planning to hit in "western" countries. No expert nor anyone on the ground in Syria thought that this differentiation was meaningful. Nusra is alQaeda and so are all of its members. But the White House and Pentagon probably thought that Nusra would accept the artificial separation they themselves had made up. That Nusra would understand that it is seen as an "ally" and only the "Khorasan group" is seen as an enemy. If that was the line of thinking, and the situation seems to point to that, then these people have fallen for their own propaganda stunt. They probably believed that the "Khorasan group" was an accepted narrative because they were telling that tale to themselves. Poor idiots.
  • UPDATE: The one sane guy at the Council of Foreign relations, Micah Zenko, foresaw this debacle and wrote on March 2: [The U.S. trained mercenaries] will immediately be an attractive target for attacks by the Islamic State, Assad’s ground and air forces, and perhaps Nusra and other forces. Killing or taking prisoner fighters (or the families of those fighters) who were trained by the U.S. military will offer propaganda value, as well as leverage, to bargain for those prisoners’ release. He compared the whole operation to the 1961 CIA invasion of Cuba: Last September, the White House and Congress agreed to authorize and fund a train-and-equip project similar to the Bay of Pigs, but this time in the Middle East, without any discussion about phase two. The Syrian project resembles 1961 in two ways: What happens when the fighting starts is undecided, and the intended strategic objective is wholly implausible.
  • The attack on Friday was mounted by the Nusra Front, which is affiliated with Al Qaeda. It came a day after the Nusra Front captured two leaders and at least six fighters of Division 30, which supplied the first trainees to graduate from the Pentagon’s anti-Islamic State training program. In Washington, several current and former senior administration officials acknowledged that the attack and the abductions by the Nusra Front took American officials by surprise and amounted to a significant intelligence failure. While American military trainers had gone to great lengths to protect the initial group of trainees from attacks by Islamic State or Syrian Army forces, they did not anticipate an assault from the Nusra Front. In fact, officials said on Friday, they expected the Nusra Front to welcome Division 30 as an ally in its fight against the Islamic State....A senior Defense Department official acknowledged that the threat to the trainees and their Syrian recruiters had been misjudged, and said that officials were trying to understand why the Nusra Front had turned on the trainees. Like other Obama administration operations this one did not fail because of "intelligence failure" but because an utter lack of common sense.
  • U.S. media can no agree with itself if Russia is giving ISIS an airforce or if Russia pounds ISIS with the biggest bomber raid in decades. Such confusion occurs when propaganda fantasies collide with the observable reality. To bridge such divide requires some fudging. So when the U.S. claims to act against the finances of the Islamic State while not doing much, the U.S Public Broadcasting Service has to use footage of Russian airstrikes against the Islamic State while reporting claimed U.S. airstrike successes. The U.S. military recently claimed to have hit Islamic State oil tankers in Syria. This only after Putin embarrassed Obama at the G-20 meeting in Turkey. Putin showed satellite pictures of ridiculous long tanker lines waiting for days and weeks to load oil from the Islamic State without any U.S. interference.
  • The U.S. then claimed to have hit 116 oil tankers while the Russian air force claims to have hit 500. But there is an important difference between these claims. The Russians provided videos showing how their airstrikes hit at least two different very large oil tanker assemblies with hundreds of tankers in each. They also provided video of several hits on oil storage sites and refinery infrastructure. I have found no video of U.S. hits on Islamic State oil tanker assemblies. The U.S. PBS NewsHour did not find any either. In their TV report yesterday about Islamic State financing and the claimed U.S. hits on oil trucks they used the videos Russia provided without revealing the source. You can see the Russian videos played within an interview with a U.S. military spokesperson at 2:22 min.
  • The U.S. military spokesperson speaks on camera about U.S. airforce hits against the Islamic State. The video cuts to footage taken by Russian airplanes hitting oil tanks and then trucks. The voice-over while showing the Russian video with the Russians blowing up trucks says: "For the first time the U.S. is attacking oil delivery trucks." The video then cuts back to the U.S. military spokesperson. At no point is the Russian campaign mentioned or the source of the footage revealed. Any average viewer of the PBS report will assume that the black and white explosions of oil trucks and tanks are from of U.S. airstrikes filmed by U.S. air force planes. The U.S. military itself admitted that its strikes on IS oil infrastructure over the last year were "minimally effective". One wonders then how effective the claimed strike against 116 trucks really was. But unless we have U.S. video of such strikes and not copies of Russian strike video fraudulently passed off as U.S. strikes we will not know if those strikes happened at all.
  • The wannabe Sultan Erdogan did not get his will in Syria where he had planned to capture and annex Aleppo. The Russians prevented that. He now goes for his secondary target, Mosul in Iraq, which many Turks see as historic part of their country
  • Mosul, Iraq's second biggest city with about a million inhabitants, is currently occupied by the Islamic State. On Friday a column of some 1,200 Turkish soldiers with some 20 tanks and heavy artillery moved into a camp near Mosul. The camp was one of four small training areas where Turkey was training Kurds and some Sunni-Arab Iraqis to fight the Islamic State. The small camps in the northern Kurdish area have been there since the 1990s. They were first established to fight the PKK. Later their Turkish presence was justified as ceasefire monitors after an agreement ended the inner Kurdish war between the KDP forces loyal to the Barzani clan and the PUK forces of the Talabani clan. The bases were actually used to monitor movement of the PKK forces which fight for Kurdish independence in Turkey. The base near Mosul is new and it was claimed to be just a small weapons training base. But tanks and artillery have a very different quality than some basic AK-47 training. Turkey says it will increase the numbers in these camps to over 2000 soldiers.
  • Should Mosul be cleared of the Islamic State the Turkish heavy weapons will make it possible for Turkey to claim the city unless the Iraqi government will use all its power to fight that claim. Should the city stay in the hands of the Islamic State Turkey will make a deal with it and act as its protector. It will benefit from the oil around Mosul which will be transferred through north Iraq to Turkey and from there sold on the world markets. In short: This is an effort to seize Iraq's northern oil fields. That is the plan but it is a risky one. Turkey did not ask for permission to invade Iraq and did not inform the Iraqi government. The Turks claim that they were invited by the Kurds: Turkey will have a permanent military base in the Bashiqa region of Mosul as the Turkish forces in the region training the Peshmerga forces have been reinforced, Hürriyet reported. The deal regarding the base was signed between Kurdistan Regional Government (KRG) President Massoud Barzani and Turkish Foreign Minister Feridun Sinirlioğlu, during the latter’s visit to northern Iraq on Nov. 4. There are two problems with this. First: Massoud Barzani is no longer president of the KRG. His mandate ran out and the parliament refused to prolong it. Second: Mosul and its Bashiqa area are not part of the KRG. Barzani making a deal about it is like him making a deal about Paris.
  • The Iraqi government and all major Iraqi parties see the Turkish invasion as a hostile act against their country. Abadi demanded the immediate withdrawal of the Turkish forces but it is unlikely that Turkey will act on that. Some Iraqi politicians have called for the immediate dispatch of the Iraqi air force to bomb the Turks near Mosul. That would probably the best solution right now but the U.S. installed Premier Abadi is too timid to go for such strikes. The thinking in Baghdad is that Turkey can be kicked out after the Islamic State is defeated. But this thinking gives Turkey only more reason to keep the Islamic State alive and use it for its own purpose. The cancer should be routed now as it is still small. Barzani's Kurdistan is so broke that is has even confiscated foreign bank accounts to pay some bills. That may be the reason why Barzani agreed to the deal now. But the roots run deeper. Barzani is illegally selling oil that belongs to the Iraqi government to Turkey. The Barzani family occupies  not only the presidential office in the KRG but also the prime minister position and the local secret services. It is running the oil business and gets a big share of everything else. On the Turkish side the oil deal is handled within the family of President Erdogan. His son in law, now energy minister, had the exclusive right to transport the Kurdish oil through Turkey. Erdogan's son controls the shipping company that transports the oil over sea to the customer, most often Israel. The oil under the control of the Islamic State in Iraq passes the exactly same route. These are businesses that generate hundreds of millions per year.
  • It is unlikely that U.S., if it is not behinds Turkey new escapade, will do anything about it. The best Iraq could do now is to ask the Russians for their active military support. The Turks insisted on their sovereignty when they ambushed a Russian jet that brushed its border but had no intend of harming Turkey. Iraq should likewise insist on its sovereignty, ask Russia for help and immediately kick the Turks out. The longer it waits the bigger the risk that Turkey will eventually own Mosul.
  • Another fake news item currently circling is that Trump has given order to the military to create safe zones for Syria. The reality is still far from it: [H]is administration crafted a draft order that would direct the Pentagon and the State Department to submit plans for the safe zones within 90 days. The order hasn't yet been issued. The draft of the order, which will be endlessly revised, says that safe zones could be in Syria or in neighboring countries. The Pentagon has always argued against such zones in Syria and the plans it will submit, should such an order be issued at all, will reflect that. The safe zones in Syria ain't gonna happen
  •  
    So the first group of U.S. trained "moderate" Syrian opposition fighters are an epic fail. Who'd of thunk? 
1 - 18 of 18
Showing 20 items per page