Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged identity

Rss Feed Group items tagged

Gary Edwards

Revealed - the capitalist network that runs the world - physics-math - 19 October 2011 ... - 0 views

  •  
    The secret 1% revealed at last. Using advanced "complex systems heuristics", a group of mathematicians and scientist studying the stability of complex systems has applied their techniques to study the interlocking relationships driving the global economy. They claim to have identified the inner architecture of global economic power, and hope to make it more stable. Incredible stuff! A list of the top 50 of the 147 superconnected companies cross references nicely with the question, "Who Owns the Federal Reserve Bankster Cartel?" The focus is on global "Transnational Corporations" (TNCs) and how the interlocking ownership/cross-director-relationships has affected the global economy. The study discovers a "super-entity" comprised of a core 147 companies that control over 40% of the world's wealth and productivity capacity. Most of these are global banking and financial operations. Yes, Wall Street Banksters! "In effect, less than 1 per cent of the companies were able to control 40 per cent of the entire network," says James Glattfelder, head of the Zurich research team. Most were financial institutions. The top 20 included Barclays Bank, JPMorgan Chase & Co, and The Goldman Sachs Group. Collectively this 1% control a further 60% of global revenues. excerpt: AS OWS PROTESTS against financial power sweep the world this week, science may have confirmed the protesters' worst fears. An analysis of the relationships between 43,000 transnational corporations has identified a relatively small group of companies, mainly banks, with disproportionate power over the global economy.

    The study's assumptions have attracted some criticism, but complex systems analysts contacted by New Scientist say it is a unique effort to untangle control in the global economy. Pushing the analysis further, they say, could help to identify ways of making global capitalism more stable.

    The idea that a few bankers control a large chunk of the global econo
  •  
    Important work but perhaps too immature to base decisions on with confidence. I was struck by this statement: "Glattfelder says we may need global anti-trust rules, which now exist only at national level, to limit over-connection among TNCs. Sugihara says the analysis suggests one possible solution: firms should be taxed for excess interconnectivity to discourage this risk." My relevant question is, who would be the recipients of the postulated tax? Anytime you create a revenue stream, the recipients acquire a vested interest in maintaining and expanding that revenue stream and the folks who pay the revenue acquire a vested interest in minimizing or eliminating the expense. While the payers incentives are consistent with the article's statement, the identities of the recipients and their incentives to tweak the tax to produce more revenue needs more thought and discussion with a strong focus on: [i] who makes that decision; [ii] who has the the power to decide whether that authority is abused; and [iii] who has standing to initiate actions to correct abuse. On the latter, the U.S. Constitution would seem to require that those who pay the taxes are entitled to Due Process. But at the same time, the individual consumer can also be injured by abuse. However, a hallmark trait of most trade agreements is that only government and regulated corporations are granted standing to challenge regulatory decisions, which has skewed their interpretation heavily to the corporate side. Universal standing is the cure.
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
Paul Merrell

Is media just another word for control? - 0 views

  • A recent poll asked people in Britain how many Iraqis had been killed as a result of the invasion of Iraq in 2003. The answers they gave were shocking. A majority said that fewer than 10,000 had been killed. Scientific studies report that up to a million Iraqi men, women and children died in an inferno lit by the British government and its ally in Washington. That's the equivalent of the genocide in Rwanda. And the carnage goes on. Relentlessly.What this reveals is how we in Britain have been misled by those whose job is to keep the record straight.
  • We all live in an information age - or so we tell each other as we caress our smart phones like rosary beads, heads down, checking, monitoring, tweeting. We're wired; we're on message; and the dominant theme of the message is ourselves. Identity is the zeitgeist. A lifetime ago in 'Brave New World', Aldous Huxley predicted this as the ultimate means of social control because it was voluntary, addictive and shrouded in illusions of personal freedom. Perhaps the truth is that we live not in an information age but a media age. Like the memory of Mandela, the media's wondrous technology has been hijacked. From the BBC to CNN, the echo chamber is vast.
  • Today liberal democracy is being replaced by a system in which people are accountable to a corporate state - not the other way round as it should be. In Britain, the parliamentary parties are devoted to the same doctrine of care for the rich and struggle for the poor. This denial of real democracy is an historic shift. It's why the courage of Edward Snowden, Chelsea Manning and Julian Assange is such a threat to the powerful and unaccountable. And it's an object lesson for those of us who are meant to keep the record straight. The great reporter Claud Cockburn put it well: "Never believe anything until it's officially denied".Imagine if the lies of governments had been properly challenged and exposed as they secretly prepared to invade Iraq - perhaps a million people would be alive today.
  •  
    Are we living in an Information Age or a Media Age? Good question. The Internet offers an Information Age but is the NSA Pandora's Box?
Paul Merrell

DOJ Pushes to Expand Hacking Abilities Against Cyber-Criminals - Law Blog - WSJ - 0 views

  • The U.S. Department of Justice is pushing to make it easier for law enforcement to get warrants to hack into the computers of criminal suspects across the country. The move, which would alter federal court rules governing search warrants, comes amid increases in cases related to computer crimes. Investigators say they need more flexibility to get warrants to allow hacking in such cases, especially when multiple computers are involved or the government doesn’t know where the suspect’s computer is physically located. The Justice Department effort is raising questions among some technology advocates, who say the government should focus on fixing the holes in computer software that allow such hacking instead of exploiting them. Privacy advocates also warn government spyware could end up on innocent people’s computers if remote attacks are authorized against equipment whose ownership isn’t clear.
  • The government’s push for rule changes sheds light on law enforcement’s use of remote hacking techniques, which are being deployed more frequently but have been protected behind a veil of secrecy for years. In documents submitted by the government to the judicial system’s rule-making body this year, the government discussed using software to find suspected child pornographers who visited a U.S. site and concealed their identity using a strong anonymization tool called Tor. The government’s hacking tools—such as sending an email embedded with code that installs spying software — resemble those used by criminal hackers. The government doesn’t describe these methods as hacking, preferring instead to use terms like “remote access” and “network investigative techniques.” Right now, investigators who want to search property, including computers, generally need to get a warrant from a judge in the district where the property is located, according to federal court rules. In a computer investigation, that might not be possible, because criminals can hide behind anonymizing technologies. In cases involving botnets—groups of hijacked computers—investigators might also want to search many machines at once without getting that many warrants.
  • Some judges have already granted warrants in cases when authorities don’t know where the machine is. But at least one judge has denied an application in part because of the current rules. The department also wants warrants to be allowed for multiple computers at the same time, as well as for searches of many related storage, email and social media accounts at once, as long as those accounts are accessed by the computer being searched. “Remote searches of computers are often essential to the successful investigation” of computer crimes, Acting Assistant Attorney General Mythili Raman wrote in a letter to the judicial system’s rulemaking authority requesting the change in September. The government tries to obtain these “remote access warrants” mainly to “combat Internet anonymizing techniques,” the department said in a memo to the authority in March. Some groups have raised questions about law enforcement’s use of hacking technologies, arguing that such tools mean the government is failing to help fix software problems exploited by criminals. “It is crucial that we have a robust public debate about how the Fourth Amendment and federal law should limit the government’s use of malware and spyware within the U.S.,” said Nathan Wessler, a staff attorney at the American Civil Liberties Union who focuses on technology issues.
  • ...1 more annotation...
  • A Texas judge who denied a warrant application last year cited privacy concerns associated with sending malware when the location of the computer wasn’t known. He pointed out that a suspect opening an email infected with spyware could be doing so on a public computer, creating risk of information being collected from innocent people. A former computer crimes prosecutor serving on an advisory committee of the U.S. Judicial Conference, which is reviewing the request, said he was concerned that allowing the search of multiple computers under a single warrant would violate the Fourth Amendment’s protections against overly broad searches. The proposed rule is set to be debated by the Judicial Conference’s Advisory Committee on Criminal Rules in early April, after which it would be opened to public comment.
Paul Merrell

Tech giants oppose NSA reform bill for timid safeguards against spying - RT USA - 0 views

  • Ahead of Thursday’s US House vote on a bill sold as reform of a major US government spying program, top technology firms like Google have joined civil liberties and privacy groups in calling the legislation inadequate in fighting mass surveillance. The Reform Government Surveillance coalition – AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo – offered a statement on Wednesday denouncing the USA Freedom Act as a weak attempt at ending the government’s bulk storage of domestic phone metadata.
  • The USA Freedom Act would take the mass storage of phone records away from the government. Instead, telecommunications companies would be required to store the data. The bill would require the National Security Agency to get approval to search the telecoms’ cache of records from the often-compliant Foreign Intelligence Surveillance Court. Last-minute changes to the bill rankled privacy groups on Tuesday, leading many of them to decry the backdoor dealings as responsible for a “weakened,” “watered down” bill compared to what had previously passed the House Judiciary and Intelligence Committees earlier this month. On Wednesday, the tech coalition echoed these concerns, calling the amended legislation a move “in the wrong direction” of needed reform regarding mass surveillance. "The latest draft opens up an unacceptable loophole that could enable the bulk collection of Internet users' data," the coalition said. "While it makes important progress, we cannot support this bill as currently drafted and urge Congress to close this loophole to ensure meaningful reform." The loophole referred to by the coalition pertains to the USA Freedom Act’s definition for how and when government officials can search collected phone metadata records.
  • The new language – approved by House leaders and the Obama administration in recent days – modifies the prohibitions on bulk collection of domestic data to allow government officials to search for Americans’ phone records using a “a discrete term, such as a term specifically identifying a person, entity, account, address, or device, used by the Government to limit the scope of the information or tangible things sought.” This revised standard for the USA Freedom Act’s reform of surveillance is too broad and leaves privacy protections at risk, civil liberties groups said on Tuesday. In addition, the legislation’s new language also weakens the bill’s transparency provisions which outlined how much technology companies can disclose to customers about the extent of government requests of user data.
  • ...2 more annotations...
  • In addition to the tech coalition’s protest, the Computer & Communications Industry Association – whose members include Pandora, Samsung, Sprint, and others – said Wednesday it would “not support consideration or passage of the USA Freedom Act in its current form." The Obama administration publicly threw its support behind the amended USA Freedom Act, saying the bill would “provide the public greater confidence in our programs and the checks and balances in the system.” “The bill ensures our intelligence and law enforcement professionals have the authorities they need to protect the nation, while further ensuring that individuals’ privacy is appropriately protected when these authorities are employed,” the White House included.
  • Lawmakers opposed to the secretive negotiations attempted on Tuesday to counter the weakened surveillance reform bill by offering an amendment to the National Defense Authorization Act (NDAA) that is “materially identical” to the version of the USA Freedom Act that was advanced by the House Judiciary and Intelligence Committees earlier this month. Yet the amendment was denied by the House Rules Committee late Tuesday. The House is now scheduled to vote on the USA Freedom Act on Thursday under closed rules, which forbids adding amendments before the final vote.
  •  
    The Obama Administration and NSA supporters in the House of Representatives resort to a successful last-minute ambush attack to eviscerate the modest reforms proposed in the USA Freedom Act. 
Paul Merrell

Inside the Battle Over the CIA Torture Report - Bloomberg View - 0 views

  • After months of internal wrangling, the Senate Intelligence Committee is finally set to release its report on President George W. Bush-era CIA practices, which among other details will contain information about foreign countries that aided in the secret detention and interrogation of suspected terrorists. Several U.S. officials told us that the negotiations are nearly complete between the Central Intelligence Agency and the committee's Democratic staff, which prepared the classified 6,300-page report and its 600-page, soon-to-be-released declassified executive summary. Dianne Feinstein, the committee's chairman, is set to release the summary early next week. Her staff members had objected vigorously to hundreds of redactions the CIA had proposed in the executive summary. After an often-contentious process to resolve the disputes, managed by top White House officials, Feinstein was able to roll back the majority of the disputed CIA redactions.
  • Among the most significant of Feinstein’s victories, the report will retain information on countries that aided the CIA program by hosting black sites or otherwise participating in the secret rendition of suspected terrorists. The countries will not be identified by name, but in other ways, such as code names like “Country A.” This falls short of Feinstein’s original desire, which was to name the countries explicitly, but represents a big victory for the committee nonetheless. In a victory for the CIA, Feinstein reluctantly agreed to allow the redactions of the pseudonyms of agency personnel mentioned in the report. The CIA maintained that any reference to individuals working under cover that offered clues to their identities could place them in harm’s way. “We need to understand the role that particular countries played across time. Even having pseudonyms for countries in the report is important for a full accounting,” said Raha Wala, senior counsel at Human Rights First, which advocated on behalf of the report’s declassification.
  • The CIA and some Republican senators had argued that even such masked identifications could be deciphered, leading to compromised relationships with those countries’ governments. In June 2013, the top intelligence official at the State Department, Philip Goldberg, wrote a classified letter to Congress warning against the disclosure of the names of countries who had participated in the program.
  • ...4 more annotations...
  • John Rizzo, who served as the CIA's acting general counsel during the black-site program and later wrote a memoir, "Company Man," said the agency has long fought against declassifying any information on the locations of the secret prisons overseas. "That was something we had fought for years and years," Rizzo told us. "Up to now one of the only remaining classified facts about the program was the names of countries where there were black sites." Rizzo said the concern about even referencing the locations of the black sites is that one could piece together the locations with other information that is likely to be in the final public report. One Republican Senate staffer familiar with the negotiations over the report said Feinstein's office relented on some concerns about redacting information that could identify countries hosting the black sites. "Do you scrub enough information to prevent that information from being released?" the staffer said. "It ended up as a half-step in-between, some of the stuff she wanted released and some of the information identifying the countries has been redacted."
  • There is also a risk that any information about foreign countries that aided the CIA programs, even using code names,  could be matched against public reporting that already exists to make them more identifiable. There have been news reports about cooperation by the governments of Poland,  Lithuania, Romania, Thailand and others. "Just because something is leaked doesn’t mean it’s still not secret," Rizzo said. "A national security secret is still a national security secret until the government says otherwise."
  • Originally there had been bipartisan support for the majority staff’s investigation, and the committee’s Republican staff was initially part of the investigation -- but it withdrew early in the process. Even after the Republican staff disowned the investigation, some Republican senators continued to support declassification, including John McCain and Lindsey Graham.
  • The release will not include internal CIA documents that the agency accused Feinstein’s staff of improperly removing from a CIA facility that had been set up for the investigators to work at. Feinstein said that her staff had removed the documents, including a review by Panetta, only after CIA officials tried to surreptitiously remove them from computers being used by the committee’s staff. “What was unique and interesting about the internal documents was not their classification level, but rather their analysis and acknowledgement of significant CIA wrongdoing,” Feinstein said on the Senate floor in July. “The interrogations and the conditions of confinement at the CIA detention sites were far different and far more harsh than the way the CIA had described them to us.”
  •  
    Nations that knowingly hosted the CIA "black sites" won't be named, as though their own citizens should be deprived of that information. I still maintain that there would be no need for redacting CIA agents' names who participated in the torture if they were named in criminal complaints as they are required to be by the Convention Against Torture, which -- through the Constitution's Treaty Clause, is "the law of this land." 
Paul Merrell

Pentagon fears blowback from 'humane' Guantánamo video release | The Miami He... - 0 views

  • A Pentagon official is invoking the revulsion of Muslims worldwide over images of U.S. Marines urinating on corpses to predict the global backlash at seeing videos of Guantánamo troops hauling a captive to force-feedings.The Justice Department included the declaration in a renewed bid to prevent the public from seeing 32 videos made by U.S. forces at the detention center in Cuba. “While the videos at issue in this litigation do not in my opinion depict any improper treatment of the detainees, but rather the lawful, humane and appropriate interaction between guards and detainees,” wrote U.S. Navy Rear Adm. Sinclair Harris, “persons and entities hostile to the United States and its detention of enemy belligerents at Guantánamo Bay are likely to think otherwise.”Harris is vice director of operations at the Department of Defense Joint Staff, and said he had watched some of the videos — which lawyers say portray troops forcing captive Abu Wa’el Dhiab to tube feedings. The admiral said he concluded the images could be used for propaganda purposes to stoke anti-American sentiment and put U.S. citizens at risk in Iraq and Afghanistan.
  • Dhiab, 43, was cleared for release from Guantánamo years ago but can’t be repatriated to his native Syria, a nation now wracked with Islamic State violence. Instead, Uruguay has offered him sanctuary in a deal that was sidelined first by the Pentagon then by that South American nation’s elections. He has been protesting by hunger striking.Dhiab wants the videos released, according to one of his attorneys, Cori Crider, and so does a consortium of 16 media organizations, which petitioned a federal court in Washington, D.C. On Oct. 3, Judge Gladys Kessler ordered the U.S. government to obscure the faces and identities in the videos of everyone but the captive, then make them public. Tuesday, U.S. government lawyers notified Kessler’s court that it would file an appeal.
  • Dhiab’s attorney argues that ugly optics are no excuse.“I’ve seen the videos — and of course they’re upsetting,” Crider said Wednesday by email from Reprieve, a London-based law firm that represents Dhiab at no charge. “But that’s no reason to hide the truth from Americans.” “By that logic, think of all the government scandals that never would have seen the light of day,” she added, citing the 2003 photos of guards abusing detainees at Abu Ghraib prison in Iraq and images of the 1968 My Lai massacre that “changed the conversation about Vietnam.”Reprieve’s legal team discovered there were recordings during a forced-feeding challenge; the detention center says it has since discontinued taping the tube feedings for reasons of patient privacy.
  • ...3 more annotations...
  • Harris suggested the videos could lead to the “perceived mistreatment of individuals,” and serve as a recruiting tool for the Islamic State. In his declaration he noted that South Florida journalist Steven Sotloff was forced by his captors to make an anti-Guantánamo statement before he was beheaded earlier this year. When Sotloff was killed, he was clad in an orange jumpsuit that has come to symbolize the prison in southeast Cuba.
  • Harris argued against release based on “prior experience from the release of certain provocative photographs and information.” He noted that “in 2012 the release of a video depicting Marines urinating on the corpses of alleged Taliban members was used as a recruitment tool for the Taliban and led to an Afghan soldier attacking and killing French troops.”It is not known when the U.S. Court of Appeals for the District of Columbia Circuit would take up the Justice Department appeal because Tuesday’s filing was not the appeal itself but notice to the court that the Obama administration was appealing Kessler’s release order.Separately, the prison camps commander Navy Rear Adm. Kyle Cozad, argued that disclosure of the videos would tip captives to certain techniques used by its tackle-and-shackle squad of soldiers — something Judge Kessler ridiculed in her ruling as “implausible” because the captives experience what is portrayed in the videos.
  • Cozad, however, suggested in a heavily redacted 13-page sworn statement that if the videos are released he might restrict access to news media in the cellblocks, a popular distraction at the detention center that the admiral characterized as “important for intellectual stimulation and overall morale.”He also listed a series of assaults that apparently occurred since he took over this summer, including a captive who resisted his force-feeding by biting a guard and another who hit a soldier in the face with a handcuffed fist.He called the videos a useful tool for the prison, saying staff likened them to “an NFL team watching video of the previous week’s football game to determine what plays worked well, what they did wrong, and what they could do better during the next game.”
  •  
    If DOJ does not win its appeal, watch for the GITMO prisoner to be suddenly released in order to moot his case so the video doesn't have to be disclosed.  
Paul Merrell

The Sound of Torture - The Intercept - 0 views

  • Suddenly there was a chilling scream. “Allah,” someone wailed. “Allah! Allah!” As I wrote at the time, this wasn’t a cry of religious ecstasy. It was the sound of deep pain, coming from elsewhere in the town library, which had been turned into a detention center by Iraqi security forces who were advised by American soldiers and contractors. I was embedded with the Americans for a week, and I had already heard two of them, from the Wisconsin National Guard, talk about seeing their Iraqi partners trussing up prisoners like animals at a slaughter. During raids, I had seen these Iraqis beat their detainees — muggings as a form of questioning — while their American advisers watched.
  • The CIA’s violations of its detainees are the tip of the torture iceberg. We run the risk, in the necessary debate sparked by the Senate’s release of 500 pages on CIA interrogation abuses, of focusing too narrowly on what happened to 119 detainees held at the agency’s black sites from 2002-2006. The problem of American torture — how much occurred, what impact it had, who bears responsibility — is much larger. Across Iraq and Afghanistan, American soldiers and the indigenous forces they fought alongside committed a large number of abuses against a considerable number of people. It didn’t begin at Abu Ghraib and it didn’t end there. The evidence, which has emerged in a drip-drip way over the years, is abundant though less dramatic than the aforementioned 500-page executive summary of the Senate’s still-classified report on the CIA.
  • Just as the CIA opposed release of the Senate torture report, the Pentagon and White House continue to do their best to suppress the evidence. The Daily Beast noted the other day that the Obama Administration, responding to pressure from the Pentagon, continues to fight in court to prevent the publication of thousands of photos of detainee abuse. The argument against release is nearly identical to the argument used by the CIA to repress the Senate’s report—it could put American lives in danger. To her credit, Sen. Dianne Feinstein pushed back and published an executive summary of her committee’s 6,000-page report (which has caused practically no protest or violence overseas). Repression is the gut instinct of institutions that have something to hide, and I came across that in Samarra, too. Shortly after I witnessed the threatened execution of a detainee (an Iraqi soldier pointed his AK-47 at a prisoner who was against a wall with his hands up), an order came down from the American command to get me out of Samarra. I was told to pack my backpack for the next convoy out of town. After I made a flurry of calls on my satellite phone, the order was rescinded. Someone wanted the truth to come out.
  • ...2 more annotations...
  • Here’s a partial reading list of essential reporting on torture in Iraq and Afghanistan: Senate Report on Abuses of Military Detainees (2008): http://media.washingtonpost.com/wp-srv/nation/pdf/12112008_detaineeabuse.pdf Haditha Killings by Tim McGirk: http://content.time.com/time/world/article/0,8599,1174649,00.html Taguba Report on Abuses at Abu Ghraib: https://www.aclu.org/sites/default/files/torturefoia/released/TR3.pdf Abu Ghraib Abuses by Seymour Hersh: http://www.newyorker.com/magazine/2004/05/10/torture-at-abu-ghraib Special Forces in Afghanistan by Matt Aikens: http://www.rollingstone.com/feature/a-team-killings-afghanistan-special-forces Constitution Project’s Task Force on Detainee Treament (See especially chapter 3): http://detaineetaskforce.org/report/ “The Dark Side” by Jane Mayer: http://www.amazon.com/The-Dark-Side-Inside-American/dp/0307456293
  • “None of Us Were Like This Before” by Joshua Phillips: http://www.amazon.com/None-Were-Like-This-Before/dp/1844678849 The Killing of Dilawar by Carlotta Gall: http://www.nytimes.com/2003/03/04/international/asia/04AFGH.html “Pay Any Price” by James Risen (See especially Chapter 7): http://www.barnesandnoble.com/w/pay-any-price-james-risen/1117916812?ean=9780544341418 “Dirty Wars” by Jeremy Scahill (a founder of The Intercept): http://www.amazon.com/Dirty-Wars-The-World-Battlefield/dp/156858671X “How to Break a Terrorist” by Matthew Alexander: http://www.amazon.com/How-Break-Terrorist-Interrogators-Brutality/dp/B0085S1S5K “The Black Banners” by Ali Soufan: http://www.amazon.com/Black-Banners-Inside-Against-al-Qaeda/dp/0393079422 “Kandahar’s Mystery Executions” by Anand Gopal: http://harpers.org/archive/2014/09/kandahars-mystery-executions/ “No Good Men Among the Living” by Anand Gopal: http://www.amazon.com/No-Good-Men-Among-Living/dp/0805091793
Paul Merrell

The Woman at the Center of the C.I.A.'s Torture Report - 0 views

  • or the past eight months, there has been a furious battle raging behind closed doors at the White House, the C.I.A., and in Congress. The question has been whether the Senate Select Committee on Intelligence would be allowed to use pseudonyms as a means of identifying characters in the devastating report it released last week on the C.I.A.’s abusive interrogation and detention program. Ultimately, the committee was not allowed to, and now we know one reason why. The NBC News investigative reporter Matthew Cole has pieced together a remarkable story revealing that a single senior officer, who is still in a position of high authority over counterterrorism at the C.I.A.—a woman who he does not name—appears to have been a source of years’ worth of terrible judgment, with tragic consequences for the United States. Her story runs through the entire report. She dropped the ball when the C.I.A. was given information that might very well have prevented the 9/11 attacks; she gleefully participated in torture sessions afterward; she misinterpreted intelligence in such a way that it sent the C.I.A. on an absurd chase for Al Qaeda sleeper cells in Montana. And then she falsely told congressional overseers that the torture worked.
  • Had the Senate Intelligence Committee been permitted to use pseudonyms for the central characters in its report, as all previous congressional studies of intelligence failures, including the widely heralded Church Committee report in 1975, have done, it might not have taken a painstaking, and still somewhat cryptic, investigation after the fact in order for the American public to hold this senior official accountable. Many people who have worked with her over the years expressed shock to NBC that she has been entrusted with so much power. A former intelligence officer who worked directly with her is quoted by NBC, on background, as saying that she bears so much responsibility for so many intelligence failures that “she should be put on trial and put in jail for what she has done.” Instead, however, she has been promoted to the rank of a general in the military, most recently working as the head of the C.I.A.’s global-jihad unit. In that perch, she oversees the targeting of terror suspects around the world. (She was also, in part, the model for the lead character in “Zero Dark Thirty.”)
  • Amazingly, perhaps, more than thirteen years after the 9/11 attacks, no one at the C.I.A. has ever been publicly held responsible for this failure. Evidently, the C.I.A. was adamant in its negotiations with the White House and the Senate Intelligence Committee that the American public never learn the names of anyone directly involved in this failure.
  • ...3 more annotations...
  • According to sources in the law-enforcement community who I have interviewed over the years, and who I spoke to again this week, this woman—whose name the C.I.A. has asked the news media to withhold—had supervision over an underling at the agency who failed to share with the F.B.I. the news that two of the future 9/11 hijackers had entered the United States prior to the terrorist attacks.
  • As NBC recounts, this egregious chapter was apparently only the first in a long tale, in which the same C.I.A. official became a driving force in the use of waterboarding and other sadistic interrogation techniques that were later described by President Obama as “torture.” She personally partook in the waterboarding of Khalid Sheikh Mohammed, the architect of the 9/11 attacks, at a black site in Poland. According to the Senate report, she sent a bubbly cable back to C.I.A. headquarters in 2003, anticipating the pain they planned to inflict on K.S.M. in an attempt to get him to confirm a report from another detainee, about a plot to use African-American Muslims training in Afghanistan for future terrorist attacks. “i love the Black American Muslim at AQ camps in Afghanuistan (sic). … Mukie (K.S.M.) is going to be hatin’ life on this one,” she wrote, according to the report. But, as NBC notes, she misconstrued the intelligence gathered from the other detainee. Somehow, the C.I.A. mistakenly believed that African-American Muslim terrorists were already in the United States. The intelligence officials evidently pressed K.S.M. so hard to confirm this, under such physical duress, that he eventually did, even though it was false—leading U.S. officials on a wild-goose chase for black Muslim Al Qaeda operatives in Montana. According to the report, the same woman oversaw the extraction of this false lead, as well as the months-long rendition and gruesome interrogation of another detainee whose detention was a case of mistaken identity. Later, in 2007, she accompanied then C.I.A. director Michael Hayden to brief Congress, where she insisted forcefully that the torture program had been a tremendous and indispensable success.
  • Readers can speculate on how the pieces fit together, and who the personalities behind this program are. But without even pseudonyms, it is exceedingly hard to connect the dots. It seems entirely possible—though, again, one can only speculate—that the C.I.A. overcompensated for its pre-9/11 intelligence failures by employing overly harsh measures later. Once they’d made a choice that America had never officially made before—of sanctioning torture—it seems possible that they felt they had to defend its efficacy, despite mounting evidence to the contrary. If so, this would be worth learning. But without names, or even pseudonyms, it is almost impossible to piece together the puzzle, or hold anyone in the American government accountable. Evidently, that is exactly what the C.I.A. was fighting for during its eight-month-long redaction process, behind all those closed doors.
Paul Merrell

CIA Assessment on Surviving Secondary Screening - 0 views

  • Today, 21 December 2014, WikiLeaks releases two classified documents by a previously undisclosed CIA office detailing how to maintain cover while travelling through airports using false ID – including during operations to infiltrate the European Union and the Schengen passport control system. This is the second release within WikiLeaks' CIA Series, which will continue in the new year. The two classified documents aim to assist CIA undercover officials to circumvent these systems around the world. They detail border-crossing and visa regulations, the scope and content of electronic systems, border guard protocols and procedures for secondary screenings. The documents show that the CIA has developed an extreme concern over how biometric databases will put CIA clandestine operations at risk – databases other parts of the US government made prevalent post-9/11.
  • The CIA manual "Surviving Secondary", dated 21 September 2011, details what happens in an airport secondary screening in different airports around the world and how to pass as a CIA undercover operative while preserving one's cover. Among the reasons for why secondary screening would occur are: if the traveller is on a watchlist (noting that watchlists can often contain details of intelligence officials); or is found with contraband; or "because the inspector suspects that something about the traveler is not right".
  • The second document in this release, "Schengen Overview", is dated January 2012 and details guidelines for border officials in the EU's Schengen zone and the threats their procedures might pose in exposing the "alias identities of tradecraft-conscious operational travelers", the CIA terminology for US spies travelling with false ID during a clandestine operation. It outlines how various electronic systems within Schengen work and the risks they pose to clandestine US operatives, including the Schengen Information System (SIS), the European fingerprint database EURODAC (European Dactyloscopie) and FRONTEX (Frontières extérieures) – the EU agency responsible for easing travel between member states while maintaining security.
Paul Merrell

Alfreda Frances Bikowsky - Wikipedia, the free encyclopedia - 0 views

  • Alfreda Frances Bikowsky (born 1965) is a career Central Intelligence Agency officer who has headed the Bin Laden Issue Station (also known as its code name, Alec Station) and the Global Jihad unit. Bikowsky's identity is not publicly acknowledged by the Agency, but was deduced by independent investigative journalists in 2011.[1] In January 2014, the Washington Post named her and tied her to a pre-9/11 intelligence failure and the extraordinary rendition of Khalid El-Masri.[2] The Senate Intelligence Committee report on CIA torture, released in December 2014, showed that Bikowsky was not only a key part of the torture program, but also one of its chief apologists.
Paul Merrell

Ukrainian Parliament sets Sights on NATO: CSTO Counters | nsnbc international - 0 views

  • The Ukrainian Parliament, on Tuesday, December 23, voted for abandoning Ukraine’s neutral status and set the country on course for a NATO membership. The CSTO countered by integrating its constituent armed forces with the Russian Command and Control Center. Russian Foreign Minister Sergey Lavrov described Kiev’s decision as counterproductive while Belarus President Lukashenko asserted his country’s commitment to the collective defense within the CSTO and within the framework of the Eurasian Economic Union. 
  • Lavrov noted that the decision escalates confrontations and creates the illusion that the profound internal crisis in Ukraine can be resolved through the adoption of such laws. Russian Prime Minister Dmitry Medvedev noted on his Facebook page that Ukraine’s no-aligned status was “in essence an application to enter NATO, turning Ukraine into a potential military opponent of Russia”. Russia’s Ambassador to the OSCE, Andrei Kelin commented on Kiev’s decision, describing it as unfriendly, and as adding trouble and tension to the Russian-Ukrainian relationship.
  • It is noteworthy that former French Foreign Minister Roland Dumas, who participated in the negotiations about Germany’s reunification, repeatedly stressed that the understanding that NATO wouldn’t station weapons or troops in any of the former Warsaw Pact member States or expand eastwards was “the essence of peace”. In an interview with l’Humanité.fr in September, Dumas said: “This was the essence of peace. Everyone was in agreement… Well, the Americans do not heed. They transported weapons to the Baltic countries and Poland. Hence the controversy when Putin came to power”.
  • ...4 more annotations...
  • Belarus President Alexander Lukashenko asserted that the CSTO has been created and operates to protect the interests of all of its member states, reports the Belarus news agency BelTa. The news agency quotes Lukashenko added: “As the common economic space grows larger and more advanced within the framework of the Eurasian Economic Union, which members are now virtually identical to those of the CSTO, the importance of protecting economic interests will be pushed to the forefront. .. The existing mechanism of interaction between the special services and other services can be used for that. The services are capable of putting a stop to organized criminal groups, which are now trying to find loopholes and exploit the new economic conditions for their criminal gains.”
  • The members of the post-Soviet Collective Security Treaty Organization (CSTO) countered the push for a NATO expansion to Ukraine by incorporating their national military forces into the National Defense Control Center of Russia. The announcement about the move was made by Putin, during the opening of the CSTO session in Moscow on December 23, that was held parallel to a final meeting before the formal establishment of the Eurasian Economic Union (EEU) on January 1, 2015.
  • Moscow repeatedly warned against NATO’s eastwards expansion. Earlier this year Russian President Putin noted that one of the important reasons behind Moscow’s acceptance of the Crimean referendum and Crimea’s accession into the Russian Federation was the prospect of the deployment of NATO forces, especially naval forces to Crimea. Putin commented that Russia was more comfortable with Russia’s Western “Partners for peace” visiting a Russian naval base in Crimea than the other way around.
  • Among the primary initiatives following the CSTO’s counter-moves to NATO’s eastward expansion in Ukraine is the integration of CSTO member states’ Air Forces, a highly sophisticated electronic command and control center, and thus far, the delivery of new Russian-built, state of the art jets to Belarus.
  •  
    Russia and its neighbors who don't have NATO membership aspirations enter into a collective defense agreement, coordinated by the Russian military. 
Paul Merrell

FBI says search warrants not needed to use "stingrays" in public places | Ars Technica - 0 views

  • The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed "stingrays," the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts. The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa). In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were "concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests" of Americans. According to the letter, which was released last week: For example, we understand that the FBI’s new policy requires FBI agents to obtain a search warrant whenever a cell-site simulator is used as part of a FBI investigation or operation, unless one of several exceptions apply, including (among others): (1) cases that pose an imminent danger to public safety, (2) cases that involve a fugitive, or (3) cases in which the technology is used in public places or other locations at which the FBI deems there is no reasonable expectation of privacy.
  • The letter was prompted in part by a Wall Street Journal report in November that said the Justice Department was deploying small airplanes equipped with cell-site simulators that enabled "investigators to scoop data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location." The bureau's position on Americans' privacy isn't surprising. The Obama Administration has repeatedly maintained that the public has no privacy in public places. It began making that argument as early as 2010, when it told a federal appeals court that the authorities should be allowed to affix GPS devices on vehicles and track a suspect's every move without court authorization. The Supreme Court, however, eventually ruled that warrants are required. What's more, the administration has argued that placing a webcam with pan-and-zoom capabilities on a utility pole to spy on a suspect at his or her residence was no different from a police officer's observation from the public right-of-way. A federal judge last month disagreed with the government's position, tossing evidence gathered by the webcam that was operated from afar.
  • In their letter, Leahy and Grassley complained that little is known about how stingrays, also known as ISMI catchers, are used by law enforcement agencies. The Harris Corp., a maker of the devices from Florida, includes non-disclosure clauses with buyers. Baltimore authorities cited a non-disclosure agreement to a judge in November as their grounds for refusing to say how they tracked a suspect's mobile phone. They eventually dropped charges rather than disclose their techniques. Further, sometimes the authorities simply lie to judges about their use or undertake other underhanded methods to prevent the public from knowing that the cell-site simulators are being used.
  • ...1 more annotation...
  • Hanni Fakhoury, an attorney for the Electronic Frontier Foundation, said some states and judges are pushing back against stingrays. "In Tacoma, judges now require police (to) specifically note they plan to use an IMSI catcher and promise not to store data collected from people who are not investigation targets," he said. "The Florida and Massachusetts state supreme courts ruled warrants were necessary for real-time cell phone tracking. Nine states—Colorado, Illinois, Indiana, Maryland, Minnesota, Tennessee, Utah, Virginia, and Wisconsin—passed laws specifically requiring police to use a warrant to track a cell phone in real time."
  •  
    Is there any problem here that couldn't be cured by discharge and public flogging for any government official caught using information derived from a stingray?
Paul Merrell

Charlie Hebdo: Paris attack brothers' campaign of terror can be traced back to Algeria ... - 0 views

  • Algeria. Long before the identity of the murder suspects was revealed by the French police – even before I heard the names of Cherif and Said Kouachi – I muttered the word “Algeria” to myself. As soon as I heard the names and saw the faces, I said the word “Algeria” again. And then the French police said the two men were of “Algerian origin”. For Algeria remains the most painful wound within the body politic of the Republic – save, perhaps, for its continuing self-examination of Nazi occupation – and provides a fearful context for every act of Arab violence against France. The six-year Algerian war for independence, in which perhaps a million and a half Arab Muslims and many thousands of French men and women died, remains an unending and unresolved agony for both peoples. Just over half a century ago, it almost started a French civil war.
  • But there’s an important context that somehow got left out of the story this week, the “history corner” that many Frenchmen as well as Algerians prefer to ignore: the bloody 1954-62 struggle of an entire people for freedom against a brutal imperial regime, a prolonged war which remains the foundational quarrel of Arabs and French to this day.The desperate and permanent crisis in Algerian-French relations, like the refusal of a divorced couple to accept an agreed narrative of their sorrow, poisons the cohabitation of these two peoples in France. However Cherif and Said Kouachi excused their actions, they were born at a time when Algeria had been invisibly mutilated by 132 years of occupation. Perhaps five million of France’s six and a half million Muslims are Algerian. Most are poor, many regard themselves as second-class citizens in the land of equality.
  • More than 100 years earlier, France had invaded Algeria itself, subjugating its native Muslim population, building small French towns and chateaux across the countryside, even – in an early 19th-century Catholic renaissance which was supposed to “re-Christianise” northern Africa – converting mosques into churches.The Algerian response to what today appears to be a monstrous historical anachronism varied over the decades between lassitude, collaboration and insurrection. A demonstration for independence in the Muslim-majority and nationalist town of Sétif on VE Day – when the Allies had liberated the captive countries of Europe – resulted in the killing of 103 European civilians. French government revenge was ruthless; up to 700 Muslim civilians – perhaps far more – were killed by infuriated French “colons” and in bombardment of surrounding villages by French aircraft and a naval cruiser. The world paid little attention.
  • ...4 more annotations...
  • But when a full-scale insurrection broke out in 1954 – at first, of course, ambushes with few French lives lost and then attacks on the French army – the sombre war of Algerian liberation was almost preordained. Beaten in that classic post-war anti-colonial battle at Dien Bien Phu, the French army, after its debacle in 1940, seemed vulnerable to the more romantic Algerian nationalists who noted France’s further humiliation at Suez in 1956.
  • What the historian Alistair Horne rightly described in his magnificent history of the Algerian struggle as “a savage war of peace” took the lives of hundreds of thousands. Bombs, booby traps, massacres by government forces and National Liberation Front guerrillas in the “bled” – the countryside south of the Mediterranean – led to the brutal suppression of Muslim sectors of Algiers, the assassination, torture and execution of guerrilla leaders by French paratroopers, soldiers, Foreign Legion operatives – including German ex-Nazis – and paramilitary police. Even white French sympathisers of the Algerians were “disappeared”. Albert Camus spoke out against torture and French civil servants were sickened by the brutality employed to keep Algeria French.
  • The Algerian conflict finished in a bloodbath. White “pied noir” French colonists refused to accept France’s withdrawal, supported the secret OAS in attacking Algerian Muslims and encouraged French military units to mutiny. At one point, De Gaulle feared that French paratroopers would try to take over Paris.When the end came, despite FLN promises to protect French citizens who chose to stay in Algeria, there were mass killings in Oran.
  • And when the Algerian civil war of the 1980s commenced – after the Algerian army cancelled a second round of elections which Islamists were sure to win – the corrupt FLN “pouvoir” and the Muslim rebels embarked on a conflict every bit as gruesome as the Franco-Algerian war of the 1950s and 1960s. Torture, disappearances, village massacres all resumed. France discreetly supported a dictatorship whose military leaders salted away millions of dollars in Swiss banks.Algerian Muslims returning from the anti-Soviet war in Afghanistan joined the Islamists in the mountains, killing some of the few remaining French citizens in Algeria. And many subsequently left to fight in the Islamist wars, in Iraq and later Syria.Enter here the Kouachi brothers, especially Chérif, who was imprisoned for taking Frenchmen to fight against the Americans in Iraq. And the United States, with French support, now backs the FLN regime in its continuing battle against Islamists in Algeria’s deserts and mountain forests, arming a military which tortured and murdered thousands of men in the 1990s.As an American diplomat said just before the 2003 invasion of Iraq, the United States “has much to learn” from the Algerian authorities. You can see why some Algerians went to fight for the Iraqi resistance. And found a new cause…
Paul Merrell

Egypt and UAE discuss Security Cooperation: Nibbing NATO's Covert Infrastructure in the... - 0 views

  • Egyptian Interior Minister Mohamed Ibrahim and an Egyptian delegation left Egypt on Sunday for a three-day visit and meetings with UAE Interior Minister Saif Bin Zayed Al-Nahyan and Emitati police chiefs. In November 2014 the UAE published a “terror list” including 85 organizations. Among them, many who are known to be involved in activities as proxy for Gulf Arab, Western and NATO government’s in covert war and regime change operations. 
  • The agenda reportedly focuses on the expansion of cooperation in intelligence, countering terrorism, the arrest of suspects, smuggling and crime. Both Egypt and the UAE are members of Interpol.
  • In November 2014 the UAE published a list of 85 organizations which it had designated as terrorist organizations. The list includes a number of Muslim Brotherhood and Al-Qaeda linked organizations which are known to be used as proxies for certain Gulf Arab as well as Western and NATO covert wars and terrorist operations. The development prompted nsnbc editor-in-Chief and independent analyst Christof Lehmann to note that the “UAE Terror List nibs NATO’s covert Infrastructure in the Bud”.
  • ...2 more annotations...
  • The list also includes organizations which are currently legally operating in at lest seven European countries and at least two organizations which are currently legally operating in the United States. Most noteworthy with regards to the United States’ covert regime-change program is that the USA’s terror list includes CANVAS, a.k.a. as DEMOZ. Virtually identical CANVAS flyers instructing protesters in combating police were found during Rabaa al-Adaweya and Nahda Square sit ins and the violent protests in the Ukrainian capital Kiev. Both situations ended in mass bloodshed and evidence strongly suggesting that cells embedded within the protest organizers shot and killed both police officers and protesters with the intention to create civil war like circumstances. Other organizations with known ties to Western and certain Gulf Arab countries covert war on Libya, Mali, Syria, Iraq and beyond include Jabhat al-Nusrah, Fatah al-Islam, Daesh, a.k.a. ISIS, ISIL or Islamic State, Boko Haram, Terik-i-Taliban, the Houthi movement, Liwa-al-Islam, as well as the ISIS associated Ansar Bayt al-Maqdis. (see complete list below).
  • The list also includes Fatah al-Islam which is legally operating in Italy, the Islamic Association in Finland, the Muslim Association of Sweden, Det Islamske Forbundet in Norway, Islamic Relief in the United Kingdom, The Cordoba Foundation in the United Kingdom, Council on American Relations CAIR in the United States, which is known for having close ties to networks around Zbigniev Brzezinski and the Rockefeller family, the Federation of Islamic Organizations in Europe, the Islamic Society of Germany, the Islamic Society of Denmark, the League of Muslims in Belgium and others. While many of the included organizations project an image of charitable or religious organizations or lobbies, many have been or are actively involved in covert infiltration and recruitment projects in cooperation with intelligence services, radicalization, subversion, financing of terrorism, or regime change operations.
Paul Merrell

F.B.I. Is Broadening Surveillance Role, Report Shows - NYTimes.com - 0 views

  • Although the government’s warrantless surveillance program is associated with the National Security Agency, the Federal Bureau of Investigation has gradually become a significant player in administering it, a newly declassified report shows.In 2008, according to the report, the F.B.I. assumed the power to review email accounts the N.S.A. wanted to collect through the “Prism” system, which collects emails of foreigners from providers like Yahoo and Google. The bureau’s top lawyer, Valerie E. Caproni, who is now a Federal District Court judge, developed procedures to make sure no such accounts belonged to Americans.
  • Then, in October 2009, the F.B.I. started retaining copies of unprocessed communications gathered without a warrant to analyze for its own purposes. And in April 2012, the bureau began nominating new email accounts and phone numbers belonging to foreigners for collection, including through the N.S.A.’s “upstream” system, which collects communications transiting network switches.That information is in a 231-page study by the Justice Department’s inspector general about the F.B.I.’s activities under the FISA Amendments Act of 2008, which authorized the surveillance program. The report was entirely classified when completed in September 2012. But the government has now made a semi-redacted version of the report public in response to a Freedom of Information Act lawsuit filed by The New York Times.
  • The report also filled in a gap about the evolving legality of the warrantless wiretapping program, which traces back to a decision by President George W. Bush in October 2001 to direct the N.S.A. to collect Americans’ international phone calls and emails, from network locations on domestic soil, without the individual warrants required by the Foreign Intelligence Surveillance Act, or FISA. The Times revealed that program in December 2005.After the article appeared, telecommunications providers that had voluntarily participated in the program were sued, and a Federal District Court judge in Detroit ruled that the program was illegal, although that decision was later vacated. The Bush administration sought to put the program on more solid legal footing by gaining orders from the Foreign Intelligence Surveillance Court approving it.Continue reading the main story Continue reading the main story Continue reading the main story In January 2007, the Bush administration persuaded the court’s Judge Malcolm Howard to issue an order to telephone and network companies requiring them to let the security agency target foreigners’ accounts for collection without individual warrants. But in April 2007, when the order came up for renewal before Judge Roger Vinson, he said that it was illegal.
  • ...1 more annotation...
  • Judge Vinson’s resistance led Congress to enact, in August 2007, the Protect America Act, a temporary law permitting warrantless surveillance of foreigners from domestic network locations. The next year, Congress replaced that law with the FISA Amendments Act.Last month, as a result of separate Freedom of Information Act lawsuits by The Times and the Electronic Frontier Foundation, the government declassified the identities of the judges who disagreed in early 2007 and several court filings from that episode. But it remained unclear what the N.S.A. had done in June and July of 2007.The newly declassified report said Judge Vinson issued an order on May 31, 2007, that allowed existing surveillance to continue by approving collection on a long list of specific foreign phone numbers and email addresses. But after that, when the agency wanted to start wiretapping an additional person, it had to ask the court for permission.The report said that “the rigorous nature of the FISA Court’s probable cause review of new selectors submitted to the various FISA Court judges following Judge Vinson’s May 31, 2007, order caused the N.S.A. to place fewer foreign selectors under coverage than it wanted to.” That and other factors “combined to accelerate the government’s efforts” to persuade Congress to enact the Protect America Act.
Paul Merrell

The Mystery of a Ukrainian Army 'Defector' | Consortiumnews - 0 views

  • Exclusive: U.S. intelligence officials suggest that the person who fired the missile that downed Malaysia Airlines Flight 17 may have been “a defector” from the Ukrainian army, an apparent attempt to explain why some CIA analysts thought satellite images revealed men in Ukrainian army uniforms manning the missile battery, writes Robert Parry. By Robert Parry As the U.S. government seeks to build its case blaming eastern Ukrainian rebels and Russia for the shoot-down of Malaysia Airlines Flight 17, the evidence seems to be getting twisted to fit the preordained conclusion, including a curious explanation for why the troops suspected of firing the fateful missile may have been wearing Ukrainian army uniforms. On Tuesday, mainstream journalists, including for the Los Angeles Times and the Washington Post, were given a briefing about the U.S. intelligence information that supposedly points the finger of blame at the rebels and Russia. While much of this circumstantial case was derived from postings on “social media,” the briefings also addressed the key issue of who fired the Buk anti-aircraft missile that is believed to have downed the airliner killing all 298 people onboard.
  • After last Thursday’s shoot-down, I was told that U.S. intelligence analysts were examining satellite imagery that showed the crew manning the suspected missile battery wearing what looked like Ukrainian army uniforms, but my source said the analysts were still struggling with whether that essentially destroyed the U.S. government’s case blaming the rebels. The Los Angeles Times article on Tuesday’s briefing seemed to address the same information this way: “U.S. intelligence agencies have so far been unable to determine the nationalities or identities of the crew that launched the missile. U.S. officials said it was possible the SA-11 [anti-aircraft missile] was launched by a defector from the Ukrainian military who was trained to use similar missile systems.” That statement about a possible “defector” might explain why some analysts thought they saw soldiers in Ukrainian army uniforms tending to the missile battery in eastern Ukraine. But there is another obvious explanation that the U.S. intelligence community seems unwilling to accept: that the missile may have been launched by someone working for the Ukrainian military.
  • In other words, we may be seeing another case of the U.S. government “fixing the intelligence” around a desired policy outcome, as occurred in the run-up to war with Iraq. The Los Angeles Times also reported: “U.S. officials have not released evidence proving that Russia’s military played a direct role in the downing of the jet or in training separatists to use the SA-11 missile system. But they said Tuesday that the Russian military has been training Ukrainian separatists to operate antiaircraft batteries at a base in southwestern Russia.” Though that last charge also has lacked verifiable proof – and could refer to training on less powerful anti-aircraft weapons like so-called Manpads – the key question is whether the Russian government trained the rebels in handling a sophisticated anti-aircraft system, like the SA-11, and then was reckless enough to supply one or more of those missile batteries to the rebels — knowing that these rockets could reach above 30,000 feet where passenger airlines travel. The Russian government has denied doing anything that dangerous, if not crazy, and the eastern Ukrainian rebels also deny ever possessing such a missile battery. But the question that needs answering is: Are the Russians and the rebels lying?
  • ...2 more annotations...
  • That requires a serious and impartial investigation, but what the Obama administration and most of the mainstream U.S. news media have delivered so far is another example of “information warfare,” assembling a case to make an adversary look bad regardless of the actual evidence — and then marginalizing any dissents to the desired conclusion. That was exactly the “group think” that led the United States into the disastrous invasion of Iraq – and it appears that few if any lesson were learned.
  • [For more on this topic of prejudging who’s to blame for the Malaysia Airlines tragedy, see Consortiumnews.com’s “Kerry’s Latest Reckless Rush to Judgment.”]
  •  
    The Obama Administration's answer to the question of who shot down MH17 seems to be more and more questionable. 
Paul Merrell

Israeli attacks designed to "terrorize" Gaza population, international law experts say ... - 0 views

  • “The civilian population in the Gaza Strip is under direct attack,” dozens of international law experts have warned in a statement laying out numerous Israeli violations of the laws of war, some amounting to war crimes.
  • “Most of the recent heavy bombings in Gaza lack an acceptable military justification and, instead, appear to be designed to terrorize the civilian population,” says the statement, signed by more than 140 international and criminal law scholars, human rights defenders, legal and other experts. Among them are John Dugard and Richard Falk, both former UN special rapporteurs on the human rights situation in the occupied Palestinian territories.
  • “Gaza’s civilian population has been victimized in the name of a falsely construed right to self-defense,” the statement adds. Israel’s illegal attacks include its assault on the Gaza City neighborhood of [Shujaiya], which the statement says “was one of the bloodiest and most aggressive operations ever conducted by Israel in the Gaza Strip, a form of urban violence constituting a total disrespect of civilian innocence.”
  • ...5 more annotations...
  • The statement also points to Israel’s deliberate destruction of the homes of thousands of people and Israel’s practice of giving “warnings” either in the form of smaller projectiles fired at a building, or via text message or telephone. Despite such warnings, “it remains illegal to willfully attack a civilian home without a demonstration of military necessity as it amounts to a violation of the principle of proportionality,” the experts say.
  • “Not only are these ‘warnings’ generally ineffective, and can even result in further fatalities,”the statement notes, “they appear to be a pre-fabricated excuse by Israel to portray people who remain in their homes as ‘human shields.’” “Israel’s illegal policy of absolute closure imposed on the Gaza Strip has relentlessly continued, under the complicit gaze of the international community of States,” the statement says. The statement also denounces “the launch of rockets from the Gaza Strip, as every indiscriminate attack against civilians, regardless of the identity of the perpetrators, is not only illegal under international law but also morally intolerable.”
  • “However,” it adds, “the two parties to the conflict cannot be considered equal, and their actions – once again – appear to be of incomparable magnitude.”
  • Calling for accountability, the statement blames “several UN Member States and the UN” for pressuring de facto Palestinian Authority leader Mahmoud Abbas not to seek “recourse to the International Criminal Court (ICC).” The statement calls on “the Governmental leaders of Palestine” – presumably a reference to Abbas – to ratify the ICC treaty.
  • It also urges the UN Security Council to “exercise its responsibilities in relation to peace and justice by referring the situation in Palestine to the Prosecutor of the ICC” – an action that would require the support of veto-wielding countries such as the US, France and UK, all of which have defended Israel’s assault on Gaza. The full statement and list of signers follow.
Paul Merrell

In NSA-intercepted data, those not targeted far outnumber the foreigners who are - The ... - 0 views

  • Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents.
  • In order to allow time for analysis and outside reporting, neither Snowden nor The Post has disclosed until now that he obtained and shared the content of intercepted communications. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year, senior government officials have depicted it as beyond Snowden’s reach. The Post reviewed roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts.
  • Taken together, the files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge. One program, code-named PRISM, extracts content stored in user accounts at Yahoo, Microsoft, Facebook, Google and five other leading Internet companies. Another, known inside the NSA as Upstream, intercepts data on the move as it crosses the U.S. junctions of global voice and data networks.
  • ...1 more annotation...
  • The Obama administration declines to discuss the scale of incidental collection. The NSA, backed by Director of National Intelligence James R. Clapper Jr., has asserted that it is unable to make any estimate, even in classified form, of the number of Americans swept in. It is not obvious why the NSA could not offer at least a partial count, given that its analysts routinely pick out “U.S. persons” and mask their identities, in most cases, before distributing intelligence reports. If Snowden’s sample is representative, the population under scrutiny in the PRISM and Upstream programs is far larger than the government has suggested. In a June 26 “transparency report,” the Office of the Director of National Intelligence disclosed that 89,138 people were targets of last year’s collection under FISA Section 702. At the 9-to-1 ratio of incidental collection in Snowden’s sample, the office’s figure would correspond to nearly 900,000 accounts, targeted or not, under surveillance.
  •  
    Now that we're getting into the "incidental" search of American's emails and online docs, we're getting much closer to learning *who* is surveilled other than foreign leaders. It isn't a pretty sight. Note that the President's Privacy and Civil Liberties Oversight Board just issued a report on NSA's FISA sec. 702 program and gave it the legal green light. Their Fourth Amendment analysis was stunningly poor.   http://goo.gl/3Ufc9n 
Paul Merrell

The U.S. Government's Secret Plans to Spy for American Corporations - The Intercept - 0 views

  • Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. So critical is this denial to the U.S. government that last August, an NSA spokesperson emailed The Washington Post to say (emphasis in original): “The department does ***not*** engage in economic espionage in any domain, including cyber.” After that categorical statement to the Post, the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations.
  • Director of National Intelligence James Clapper, for instance, responded to the Petrobras revelations by claiming: “It is not a secret that the Intelligence Community collects information about economic and financial matters…. What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of—or give intelligence we collect to—U.S. companies to enhance their international competitiveness or increase their bottom line.” But a secret 2009 report issued by Clapper’s own office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies as they identify future threats to the U.S. and lay out the actions the U.S. intelligence community should take in response. It anticipates a series of potential scenarios the U.S. may face in 2025, from a “China/Russia/India/Iran centered bloc [that] challenges U.S. supremacy” to a world in which “identity-based groups supplant nation-states,” and games out how the U.S. intelligence community should operate in those alternative futures—the idea being to assess “the most challenging issues [the U.S.] could face beyond the standard planning cycle.”
  • One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” Such a development, the report says “could put the United States at a growing—and potentially permanent—disadvantage in crucial areas such as energy, nanotechnology, medicine, and information technology.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence” (emphasis added). In particular, the DNI’s report envisions “cyber operations” to penetrate “covert centers of innovation” such as R&D facilities.
  • ...3 more annotations...
  • In a graphic describing an “illustrative example,” the report heralds “technology acquisition by all means.” Some of the planning relates to foreign superiority in surveillance technology, but other parts are explicitly concerned with using cyber-espionage to bolster the competitive advantage of U.S. corporations. The report thus envisions a scenario in which companies from India and Russia work together to develop technological innovation, and the U.S. intelligence community then “conducts cyber operations” against “research facilities” in those countries, acquires their proprietary data, and then “assesses whether and how its findings would be useful to U.S. industry” (click on image to enlarge):
  • he report describes itself as “an essential long-term piece, looking out between 10 and 20 years” designed to enable ”the IC [to] best posture itself to meet the range of challenges it may face.” Whatever else is true, one thing is unmistakable: the report blithely acknowledges that stealing secrets to help American corporations secure competitive advantage is an acceptable future role for U.S. intelligence agencies. In May, the U.S. Justice Department indicted five Chinese government employees on charges that they spied on U.S. companies. At the time, Attorney General Eric Holder said the spying took place “for no reason other than to advantage state-owned companies and other interests in China,” and “this is a tactic that the U.S. government categorically denounces.” But the following day, The New York Times detailed numerous episodes of American economic spying that seemed quite similar. Harvard Law School professor and former Bush Justice Department official Jack Goldsmith wrote that the accusations in the indictment sound “a lot like the kind of cyber-snooping on firms that the United States does.” But U.S. officials continued to insist that using surveillance capabilities to bestow economic advantage for the benefit of a country’s corporations is wrong, immoral, and illegal.
  • Yet this 2009 report advocates doing exactly that in the event that ”that the technological capacity of foreign multinational corporations outstrip[s] that of U.S. corporations.” Using covert cyber operations to pilfer “proprietary information” and then determining how it ”would be useful to U.S. industry” is precisely what the U.S. government has been vehemently insisting it does not do, even though for years it has officially prepared to do precisely that.
  •  
    DNI James Clapper caught telling another whopper. 
« First ‹ Previous 121 - 140 of 185 Next › Last »
Showing 20 items per page