Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged intel

Rss Feed Group items tagged

Paul Merrell

Intel chief quits House for talk radio | TheHill - 0 views

  • The chairman of the House Intelligence Committee is leaving Congress for a career in talk radio.Rep. Mike Rogers (R-Mich.) said Friday he will not seek reelection in 2014, and will instead take a job as a syndicated talk radio host with Cumulus Radio.
  •  
    FBI's bribery investigation getting too close?
Paul Merrell

Asia Times Online :: The Caliph fit to join OPEC - 0 views

  • Islamic State leader Caliph Ibrahim - aka Abu Bakr al-Baghdadi - never ceases to amaze us - and most of all his powerful petrodollar-stuffed backers. The Caliph is for all practical purposes now an oil major worth of membership of the Organization of the Petroleum Exporting Countries (OPEC). His takfiri/mercenary goons - in theory - have for some time been extracting, refining, shipping and/or smuggling and clinching juicy deals involving vast quantities of oil, reaping profits of roughly US$2 million a day. The Caliph's oil prices are to die (be beheaded?) for; after all, he's implementing the same low-price strategy concocted by the people he wants to dethrone in Mecca, the House of Saud. The <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> caliphate's GDP across "Syraq" has only one way to go: up. And oh, the irony Top customers for The Caliph's cheap oil happen to be "Sultan" Recep Tayyip Erdogan's Earthly paradise, aka Turkey - a North Atlantic Treaty Organization ally - and that King "Playstation" Abdullah II ibn al-Hussein's domain impersonating a country, aka Jordan.
  • What Kerry did give was the Master's Voice seal of approval to the Saudi strategy of low oil prices, thinking short-term about US oil consumers at the pump, and medium-term on putting pressure on the revenues of both Iran and Russia. Yet he obviously played down the blow to the US shale gas industry. The Saudis, for their part, have other key considerations, not least how to recover their market share across Asia - where their biggest customers are located. They are losing market share because of discounted crude sold by both Iran and Iraq. Thus, both must be "punished", on top of the House of Saud's pathological aversion to all things Shi'ite. As for the big picture in Syria, Obama's capo for dealing with The Caliph, General John Allen, laid down the law to Saudi newspaper Asharq Al-Awasat. He said, "[T]here is not going to be a military solution here [in Syria]". And he also said, "The intent is not to create a field force to liberate Damascus."
  • Yo sheikh, talk to the hand Then there's that fateful Secretary of State John Kerry/House of Saud capo hand-kissing fest that took place in Riyadh last month. In this masterful piece, William Engdahl goes no-holds-barred on the supposed Saudi-US cheap oil/bomb Bashar al-Assad/undermine Russia deal. Yet there may not have been a direct deal; more like Washington and Riyadh working in tandem towards common objectives: regime change in Syria in the long term, and undermining both Iran and Russia in the short term. As for that crucial Pipelineistan gambit central to the Syrian riddle - a gas pipeline running from Qatar to regime-changed Syria, instead of Iran-Iraq-Syria - that's not exactly a Saudi, but a rival Qatari priority.
  • ...4 more annotations...
  • Meanwhile, the awesome, immensely sophisticated military apparatus/intel agency acronym fest deployed by "free" US/NATO somehow is simply unable to register/intercept this racket. Not surprising, when they somehow had not previously registered/intercepted The Caliph's goons taking over large swaths of "Syraq" this summer with their cross-desert version of rolling thunder - that gleaming white Toyota promo ad. As for the Empire of Chaos "solution" to intercept The Caliph's oil profits, the only decision so far has been to bomb oil pipelines that belong to the Syrian Arab Republic, that is, ultimately, the Syrian people. Never underestimate the capacity of US President Barack Obama's "Don't Do Stupid Stuff" foreign policy doctrine to soar towards unreachable stupidity heights.
  • Short translation: those old goons of the previously "winning against Assad" Free Syrian Army (FSA) are now six feet under. And the new FSA goons to be trained in - of all places - Saudi Arabia are not exactly being regarded as holy saviors. For all practical purposes, the medium-term scenario spells out more US bombing (of infrastructure belonging to the Syrian nation); no regime change in Damascus; and The Caliph steadily consolidating his wins. And finally, the Hollywood factor Imagine if shabby "historical" al-Qaeda had these ultra-slick PR skills. Bearded has-beens with old Kalashnikovs in Afghan caves is so passe. The Caliph not only smuggles tens of thousands of barrels of oil a day undetected, but he also deploys a British hostage turned foreign correspondent (and who may have converted to the Salafi version of Islam) reporting from a hollowed out Kobani about to be totally captured by a bunch of takfiris and mercenaries (they certainly are not mujahideen).
  • Meanwhile, on the ground, only now has Ankara allowed roughly 200 peshmergas from Iraqi Kurdistan - whose slippery leaders do business with Turkey - to cross the border to, in theory, help Kobani. No soldiers, weapons or supplies are allowed for the Kurdish PKK/PYD forces which have been actually defending Kobani all along. Sultan Erdogan's endless procrastination will be judged by any independent investigation as the key element in allowing the possible fall of Kobani. Turkish Prime Minister Ahmet Davutoglu once again has laid down the "conditions" for his country to help with the - so far spectacularly innocuous - US campaign against The Caliph; the possible liberators of Kobani must only be Iraqi peshmergas, and remaining FSA goons, not "terrorists" (as in PKK/PYD). In the end, Kobani - precisely on the border between southeast Anatolia and northern Syria - is highly strategic. The situation on the ground is dire. There may be a little over 1,000 residents left, barricaded in their houses. Protecting them, a little over 2,000 Syrian Kurd fighters, including the female Ishtar brigade. Only 200 peshmergas coming from Iraqi Kurdistan are not going to make a huge difference against a few thousand heavily weaponized caliph goons deploying as many as 20 tanks. It does not look good, even though, unlike in the Caliph-approved Brit hostage report, the fake "mujahideen" are not in total control.
  • The Caliph, anyway, is bound to remain on a roll. Absolutely none of the above would be remotely possible without US/Western overt/covert complicity, proving once and for all that The Caliph is the ultimate gift that keeps on giving in the eternal GWOT (Global War On Terra). How come the Dick Cheney regime never thought about that?
Paul Merrell

Washington concealed US troops exposure to chemical weapons in Iraq - intel docs - RT News - 1 views

  • American soldiers discovered more than 4,990 chemical munitions in Iraq, according to Iraqi and US officials and previously classified intelligence documents, which may now be in the hands of Islamic State militants. For much of the duration of the Iraq War, which saw US soldiers open a military invasion against the Ba’athist country in March 2003 amid tremendous international outcry, US forces "repeatedly encountered, and on six occasions were wounded by, chemical weapons” leftover from the Iraq-Iran War, reported the New York Times.
  • The hefty eight-part report, largely based on interviews and highly redacted intelligence documents, said “17 American service members and seven Iraqi police officers…were exposed to nerve or mustard agents” between 2004 and 2011. The article detailed the harrowing chemical encounters of several servicemen, including Sergeant Duling, who in August 2008 unwittingly led his unit into a munitions pit outside Baghdad. “This is mustard agent,” he said, after carrying out an examination of the contents of the rusting artillery. “We’ve all been exposed.” At first blush, it may seem inconceivable that the United States, which had argued for an invasion of Iraq on the grounds that it was harboring weapons of mass destruction (an accusation that the UN weapons inspectors on the ground in Iraq prior to the American invasion/occupation had proven to be incorrect), would want to keep the discovery of WMDs in Iraq under wraps.
  • One reason for the hush-up, the report suggests, is that the United States was largely responsible for Iraq having chemical weapons in the first place. “In five of six incidents in which troops were wounded by chemical agents, the munitions appeared to have been designed in the United States, manufactured in Europe and filled in chemical agent production lines built in Iraq by Western companies,” it said. Many of the casings were M110s, which the United States military had developed decades ago to disperse white phosphorous or mustard gas.
  • ...2 more annotations...
  • “The United States also exported the shells and the technology behind them,” the Times reported. “When Iraq went arms shopping in the 1980s, it found manufacturers in Italy and Spain willing to deal their copies. By 1988, these two countries alone had sold Iraq 85,000 empty M110-type shells, according to confidential United Nations documents.” This is where the story begins to get very disturbing. During the Iraq-Iran War (1980-1988), Baghdad actively sought the development of chemical weapons with the help of a number of Western countries, including the United States, West Germany, the Netherlands, the United Kingdom, and France, according to internal Iraqi documents.
  • It is has already been widely documented that at least 50,000 Iranian civilians and soldiers were killed by Iraqi chemical weapons in the course of the war. As the Times report detailed, many of the chemical weapons incidents were centered around the now largely destroyed Muthanna State Establishment, which was “the center of Iraqi chemical agent production in the 1980s.” This is especially worrying because since June, that sensitive area has been in the possession of the Islamic State,
Paul Merrell

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
Paul Merrell

Prosecute Torturers and Their Bosses - NYTimes.com - 0 views

  • The American Civil Liberties Union and Human Rights Watch are to give Attorney General Eric Holder Jr. a letter Monday calling for appointment of a special prosecutor to investigate what appears increasingly to be “a vast criminal conspiracy, under color of law, to commit torture and other serious crimes.”
  • The question everyone will want answered, of course, is: Who should be held accountable? That will depend on what an investigation finds, and as hard as it is to imagine Mr. Obama having the political courage to order a new investigation, it is harder to imagine a criminal probe of the actions of a former president. Continue reading the main story Write A Comment But any credible investigation should include former Vice President Dick Cheney; Mr. Cheney’s chief of staff, David Addington; the former C.I.A. director George Tenet; and John Yoo and Jay Bybee, the Office of Legal Counsel lawyers who drafted what became known as the torture memos. There are many more names that could be considered, including Jose Rodriguez Jr., the C.I.A. official who ordered the destruction of the videotapes; the psychologists who devised the torture regimen; and the C.I.A. employees who carried out that regimen.
  •  
    New York Times calls editorially for criminal prosecutions of all involved in the CIA's torture program.
Paul Merrell

ISIS: Made in Washington, Riyadh - and Tel Aviv by Justin Raimondo -- Antiwar.com - 0 views

  • The Islamic State in Iraq and Syria (ISIS) is being touted as the newest "threat" to the American homeland: hysterics have pointed to Chicago as the locus of their interest, and we are told by everyone from the President on down that if we don’t attack them – i.e. go back into Iraq (and even venture into Syria) to root them out – they’ll soon show up on American shores.
  • If we step back from the hysteria generated by the beheading of US journalist James Foley, what’s clear is that this new bogeyman is the creation of the United States and its allies in the region. ISIS didn’t just arise out of the earth like some Islamist variation on the fabled Myrmidons: they needed money, weapons, logistics, propaganda facilities, and international connections to reach the relatively high level of organization and lethality they seem to have achieved in such a short period of time. Where did they get these assets? None of this is any secret: Saudi Arabia, Qatar, and the rest of the oil-rich Gulf states have been backing them all the way. Prince Bandar al-Sultan, until recently the head of the Kingdom’s intelligence agency – and still the chief of its National Security Council – has been among their biggest backers. Qatar and the Gulf states have also been generous in their support for the Syrian jihadists who were too radical for the US to openly back. Although pressure from Washington – only recently exerted – has reportedly forced them to cut off the aid, ISIS is now an accomplished fact – and how can anyone say that support has entirely evaporated instead of merely going underground?
  • Washington’s responsibility for the success of ISIS is less direct, but no less damning. The US was in a de facto alliance with the groups that merged to form ISIS ever since President Barack Obama declared Syria’s Bashar al-Assad "must go" – and Washington started funding Syrian rebel groups whose composition and leadership kept changing. By funding the Free Syrian Army (FSA), our "vetted" Syrian Islamists, this administration has actively worked to defeat the only forces capable of rooting out ISIS from its Syrian nest – Assad’s Ba’athist government. Millions of dollars in overt aid – and who knows how much covertly? – were pumped into the FSA. How much of that seeped into the coffers of ISIS when constantly forming and re-forming chameleon-like rebel groups defected from the FSA? These defectors didn’t just go away: they joined up with more radical – and militarily effective – Islamist militias, some of which undoubtedly found their way to ISIS. How many ISIS cadres who started out in the FSA were trained and equipped by American "advisors" in neighboring Jordan? We’ll never know the exact answer to that question, but the number is very likely not zero – and this Mother Jones piece shows that, at least under the Clinton-Petraeus duo, the "vetting" process was a joke. Furthermore, Senator Rand Paul (R-Kentucky) may have been on to something when he confronted Hillary with the contention that some of the arms looted from Gaddafi’s arsenals may well have reached the Syrian rebels. There was, after all, the question of where that mysterious "charity ship," the Al Entisar, carrying "humanitarian aid" to the Syrian rebels headquartered in Turkey, sailed from.
  • ...3 more annotations...
  • In a recent public event held at the Aspen Institute, former Israeli ambassador to the US Michael Oren bluntly stated that in any struggle between the Sunni jihadists and their Iranian Shi’ite enemies, the former are the "lesser evil." They’re all "bad guys," says Oren, but "we always wanted Bashar Assad to go, we always preferred the bad guys who weren’t backed by Iran to the bad guys who were backed by Iran." Last year, Sima Shine, Israel’s Minister of Strategic Affairs, declared: "The alternative, whereby [Assad falls and] Jihadists flock to Syria, is not good. We have no good options in Syria. But Assad remaining along with the Iranians is worse. His ouster would exert immense pressure on Iran." None of this should come as much of a surprise to anyone who has been following Israel’s machinations in the region. It has long been known that the Israelis have been standing very close to the sidelines of the Syrian civil war, gloating and hoping for "no outcome," as this New York Times piece put it.
  • Secondly, the open backing by the US of particular Syrian rebel groups no doubt discredited them in the eyes of most Islamist types, driving them away from the FSA and into the arms of ISIS. When it became clear Washington wasn’t going to provide air support for rebel actions on the ground, these guys left the FSA in droves – and swelled the ranks of groups that eventually coalesced into ISIS. Thirdly, the one silent partner in all this has been the state of Israel. While there is no evidence of direct Israeli backing, the public statements of some top Israeli officials lead one to believe Tel Aviv has little interest in stopping the ISIS threat – except, of course, to urge Washington to step deeper into the Syrian quagmire.
  • Israel’s goal in the region has been to gin up as much conflict and chaos as possible, keeping its Islamic enemies divided, making it impossible for any credible challenge to arise among its Arab neighbors – and aiming the main blow at Tehran. As Ambassador Oren so brazenly asserted – while paying lip service to the awfulness of ISIS and al-Qaeda – their quarrel isn’t really with the Arabs, anyway – it’s with the Persians, whom they fear and loathe, and whose destruction has been their number one objective since the days of Ariel Sharon. Why anyone is shocked that our Middle Eastern allies have been building up Sunni radicals in the region is beyond me – because this has also been de facto US policy since the Bush administration, which began recruiting American assets in the Sunni region as the linchpin of the Iraqi "surge." This was part and parcel of the so-called "Sunni turn," or "redirection," in Seymour Hersh’s phrase, which, as I warned in 2006, would become Washington’s chosen strategy for dealing with what they called the "Shia crescent" – the crescent-shaped territory spanning Iran, Iraq, Syria, and parts of Lebanon under Hezbollah’s control, which the neocons began pointing to as the Big New Threat shortly after Saddam Hussein’s defeat.
  •  
    If one were to attempt to write the most damning yet throughly referenced report on U.S. involvement with ISIL, this manuscript would make a very good first draft.  But probably unintentionally, the author gives less credit to Israel than it is due. At least twice (and I think more but would have to check), the Israeli Air Force has struck Syria, destroying Russian heavy weaponry, missiles capable of reaching Israel, being delivered to the Lebanonese Hezbollah in Syria. Hesbollah is fighting side-by-side with the Syrian government forces in Syria. So Israel has had a direct and overt hand in the Syrian war. 
Paul Merrell

Cost of Medical Bills for Baby Hit by SWAT Grenade? Over $800,000. County's Refusal to ... - 0 views

  • Remember back in May when a gang of uniformed thugs from the  Habersham County SWAT team threw a flash-bang grenade right on top of a sleeping baby? Well, stellar group that they are, they’ve refused to pay the over $800,000 in medical bills for the child that they permanently disfigured and nearly killed. That’s right. They aren’t paying the bills and are leaving the family to try and cover the costs for the toddler’s care. Our militarized police forces are claiming too many innocent victims, and they aren’t being held accountable.
  • The family’s attorneys, from the Davis Bozeman Law Firm in Decatur, Georgia, released a statement this morning: The family of Bounkham “Baby Bou Bou” Phonesavanh, the child severely injured on May 28, 2014 by a flash bang grenade thrown in his play pen during a botched police raid while his family was staying in Georgia, received a copy of the notice sent to their son’s doctor’s office that Habersham County reneges on their public promise to pay for the medical expenses of this working class family’s child. “Bounkham “Baby Bou Bou” Phonesavanh has to date incurred an estimated $800,000 worth of expenses due to his injuries. Shortly after severely burning “Baby Bou Bou” with a flash bang grenade the Habersham County Sheriff’s Department vowed to pay for the child’s medical expenses.  Last week the family discovered through medical providers that the county will not pay any medical bills.  The county stated that it would be “illegal” to pay. Recently, Alecia Phonesavanh shared her son’s injuries are so severe that doctors predict several more surgeries throughout his life to repair the hole in his chest and major facial injuries.
  • he Habersham County Attorney responded on behalf of the county Board of Commissioners with this vague explanation. “The question before the board was whether it is legally permitted to pay these expenses. After consideration of this question following advice of counsel, the board of commissioners has concluded that it would be in violation of the law for it to do so.”
  • ...2 more annotations...
  • It’s important to remember a few things regarding this case. 1.) There is no question or denial that the SWAT team threw a grenade right on top of a sleeping baby. 2.) No drugs were found on the premises. 3.) The person they were looking for was not present at the time of the no-knock raid. It’s bad enough that it happened.  But to cripple the family financially with nearly a million dollars in medical expenses on top of that? This isn’t even about the shoddy police work, the bad intel, or the poor decision to throw a grenade (that was designed to be rolled) into a room full of children. Nor is it about the slimy sheriff of Habersham County, who, if you recall, defended the actions of his SWAT team.
  • This is about a complete lack of accountability. A refusal to take responsibility for a horrible mistake that crosses into criminal negligence, at the very least. What an absolutely repulsive group of individuals. They blew a hole through the face and chest cavity of a 19 month old child, permanently disfigured him,  put him through an unfathomable amount of agony with treatments and repeated surgeries, and now, the family, which was already struggling financially after losing their home in a fire, is stuck with the bill, which will continue to climb, since Bou Bou is looking at several more operations.
Paul Merrell

​It was Putin's missile? - RT Op-Edge - 0 views

  • Here’s the spin war verdict: the current Malaysian Airlines tragedy – the second in four months – is “terrorism” perpetrated by “pro-Russian separatists” armed by Russia and Putin is the main culprit. End of story. Anyone who believes otherwise, shut up. Why? Because the CIA said so. Because Hillary ‘We came, we saw, he died’ Clinton said so. Because crazy Samantha ‘R2P’ Power said so – thundering at the UN, everything duly printed by the neo-con infested Washington Post. Because Anglo-American corporate media – from CNN to Fox (who tried to buy Time Warner, which owns CNN) – said so. Because the President of the United States (POTUS) said so. And mostly because Kiev had vociferously said so in the first place. Right off the bat they were all lined up – the invariably hysterical reams of ‘experts’ of the ‘US intelligence community’ literally foaming at their palatial mouths at ‘evil’ Russia and ‘evil’ Putin; intel ‘experts’ who could not identify a convoy of gleaming white Toyotas crossing the Iraqi desert to take Mosul. And yet they have already sentenced; they don’t need to look any further, instantly solving the MH17 riddle. It doesn’t matter that President Putin has stressed the MH17 tragedy must be investigated objectively. And ‘objectively’ certainly does not mean that fictional ‘international community’ notion construed by Washington – the usual congregation of pliable vassals/patsies.
  •  
    Catching up on a bunch of Pepe Escobar posts on rt.com that Google Alerts forgot to tell me about. Here, he has a nice roundup of the evidence that Kiev shot down MH17, although he omits the evidence that the flight was brought down by a combination of an air-to-air missile and aerial cannon strafing, which I found quite persuasive.
Paul Merrell

Asia Times Online :: A chessboard drenched in blood - 0 views

  • "The intelligence and facts were being fixed around the policy." Everyone remembers the Downing Street Memo, which unveiled the Bush/Blair "policy" in the run-up to the 2003 bombing/invasion/occupation of Iraq. The "policy" was to get rid of Saddam Hussein via a lightning war. The justification was "terrorism" and (non-existent) weapons of mass destruction (WMD), which had "disappeared", mounted in trucks, deep into Syria. Forget about intelligence and facts. The tragedy of MH17 - turned, incidentally, into a WMD - might be seen as a warped rerun of imperial policy in Iraq. No need for a memo this time. The "policy" of the Empire of Chaos is clear, and <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> multi-pronged; diversify the "pivot to Asia" by establishing a beachhead in Ukraine to sabotage trade between Europe and Russia; expand the North Atlantic Treaty Organization to Ukraine; break the Russia-China strategic partnership; prevent by all means the trade/economic integration of Eurasia, from the Russia-Germany partnership to the New Silk Roads converging from China to the Ruhr; keep Europe under US hegemony.
  • The key reason why Russian President Vladimir Putin did not "invade" Eastern Ukraine - as much as he's been enticed to by Washington/NATO - to stop a US military adviser-facilitated running slaughter of civilians is that he does not want to antagonize the European Union, Russia's top trading partner.
  • The MH17 tragedy may have been a horrendous mistake. But it may also have been a desperate gambit by the Kiev minions of the Empire of Chaos. By now, Russian intel may have already mastered the key facts. Washington's predictable modus operandi was to shoot from the hip, igniting and in theory winning the spin war, and doubling down by releasing the proverbial army of "top officials" brimming with social media evidence. Moscow will take time to build a meticulous case, and only then lay it out in detail.
  • ...4 more annotations...
  • Now compare a fearful Dr Zbig with Immanuel Wallerstein - who was a huge influence in my 2007 warped geopolitical travel book Globalistan. In this piece (in Spanish) Wallerstein argues that the Empire of Chaos simply can't accept its geopolitical decadence - and that's why it has become so dangerous. Restoring its hegemony in the world-system has become the supreme obsession; and that's where the whole "policy" that is an essential background to the MH17 tragedy reveals Ukraine as the definitive do or die battleground. In Europe, everything hinges on Germany. Especially after the National Security Agency scandal and its ramifications, the key debate raging in Berlin is how to position itself geopolitically bypassing the US. And the answer, as pressed by large swathes of German big business, lies in a strategic partnership with Russia
  • The damaged MH17 starboard jet engine suggests a shape charge from an air-to-air missile - and not a Buk; that's consistent with the Russian Ministry of Defense presentation graphically highlighting an Ukrainian SU-25 shadowing MH17. Increasingly, the Buk scenario - hysterically peddled by the Empire of Chaos - is being discarded. Not to mention, again, that not a single eyewitness saw the very graphic, thick missile trace that would have been clearly visible had a Buk been used.
  • As much as Bashar al-Assad in Syria had absolutely no motive to "gas his own people" - as the hysterical narrative went at the time - the Eastern Ukraine federalists have no motive to down a civilian airliner. And as much as Washington doesn't give a damn about the current civilian slaughter in Gaza, it doesn't give a damn about the MH17 civilian deaths; the one and only obsession is to force Europeans to sanction Russia to death. Translation: break up Europe-Russia commercial and geopolitical integration.
  • Moscow, in building its case on the MH17 tragedy, will bide its time to debunk Kiev's claims and maximize its own credibility. The game now moves to the black boxes and the cockpit voice recorder. Still Ukraine will remain the do or die battlefield - a chessboard drenched in blood.
  •  
    Pepe Escobar, with the big picture view of the downing of MH17. I especially appreciated this perspective: "Restoring [U.S.] hegemony in the world-system has become the supreme obsession; and that's where the whole "policy" that is an essential background to the MH17 tragedy reveals Ukraine as the definitive do or die battleground."
Paul Merrell

Wyden Ponders Release of CIA Torture Report Without White House Consent | The World's G... - 0 views

  • A senior Senate Democrat is firing a warning shot at the White House against stalling the release of a report about the past use of torture by the U.S. intelligence community. Sen. Ron Wyden is talking with his colleagues about the possibility of using a seldom-invoked procedure to declassify an Intelligence Committee report on the use of torture in the event the White House does not move ahead quickly. Speaking with reporters on a variety of subjects Thursday, the Oregon Democrat referred to the Senate’s “Resolution 400″ — the Abraham A. Ribicoff-sponsored resolution that established the Intelligence Committee back in 1976. Wyden said he was discussing invoking the resolution “in order to move this along if we have to, through the committee process, to get it declassified.” Matt Bai of Yahoo! News reported earlier Thursday that Wyden mentioned the same procedure to him. And it was not the first time he’s discussed the possibility. Wyden previously explained the provision in October 2013, KATU reported. The Senate Intelligence Committee voted on April 3 to provide for declassification of the report into the use of harsh interrogation practices by the CIA during the administration of President George W. Bush. That action set the gears in motion for declassification review. The report is now in the hands of the White House.
  •  
    Senate Resolution 400 provides in relevant part that the Intelligence Committee can vote to declassify documents, giving the White House 5 days to object. If such an objection is made, then the full Senate votes on whether to declassify. It should be recognized, however, that senators' immunity from prosecution for statements made in Congress or in committee hearings in effect grants any member of Congress the ability to declassify documents simply by reading them into the Congressional Record.   
Paul Merrell

Can you smell what The Caliph is cooking? - RT Op-Edge - 0 views

  • Obama’s “coalition of the willing”, about to fight ISIS/IS/The Caliph, includes Britain, Australia, Qatar, Saudi Arabia, Turkey, Jordan and the United Arab Emirates. No less than five out of these seven happen the be the ones who trained/weaponized/facilitated the “flowers of evil” of ISIS/IS blooming in Syria. So it’s no wonder the Arab Street is drowning in skepticism about who’s really running the ISIS/IS show. It can’t be Abu Bakr al-Baghdadi, a.k.a Caliph Ibrahim, all by himself. How come The Caliph, out of the blue, crosses the desert with a skilled, full-fledged army crammed with advanced artillery to capture a territory larger than the UK?
  • Meanwhile, the powerful House of Saud’s PR lobby is absolutely monolithic; Wahhabism – which has been boosting/funding fanatics worldwide since the early days of the anti-Soviet jihad in Afghanistan – is simply not to be blamed for what The Caliph has been up to. And yet it’s Saudi ideology which ultimately spawned the Frankenstein Caliph leading the freak sons of the Syrian “revolution”.
  • Being so flush, no wonder The Caliph’s armies are heading towards Aleppo; they are less than 50 km away, and could soon easily take over some eastern suburbs. The Obama administration, meanwhile, prefers to excel at sanctioning Russia. If they were really serious at targeting The Caliph, they’d be following the money, deploying local intel to track where the money actually is (certainly not in a bank). Instead, all the rhetoric in the Beltway is about more bombing of - another historical irony - made in USA hardware left behind by the Iraq army; more drones; and eventually, more “boots on the ground”.
  • ...3 more annotations...
  • The “known known” – to quote Donald “Rummy” Rumsfeld – in the Beltway “debate” is that for the CIA and the Pentagon, fighting The Caliph is the absolutely perfect excuse to eventually impose regime change in both Iraq and Syria. Washington has already got regime change-lite in Baghdad. The CIA and the Pentagon are thinking in terms of We bomb The Caliph/Caliph fights Assad/Hezbollah gets involved/Divide and Rule and More Chaos/We bomb a little to the side/Assad falls. It won’t work, though. Washington thought – until the capture of Mosul – that The Caliph was under control. But he has a mind of his own - and a lot of cash still flowing from powerful Saudi and Kuwaiti backers, apart from the oil smuggling. The Caliph dreams of being intimately involved in the House of Saud’s succession, and even making a play for power himself.
  • Thus the myth was born that ISIS/IS is way more hardcore than Al-Qaeda – a sterling PR move by The Caliph to bolster his and his outfit’s charisma. For the multinational Google Jihad generation, if the grand mufti of Egypt, the grand mufti of Saudi Arabia, and the Organization of Islamic Cooperation (OIC) all dismiss ISIS/IS, that’s because it’s the real deal. And it’s wealthy, armed to the teeth and rules over a vast territory. It is reducing the Sykes-Picot agreement to dust. So yes, The Caliph is indeed implementing Osama’s trap – in his own way. Zarqawi tried to implement it. And Zarqawi is the predecessor of al-Baghdadi. But that’s only part of the story.
  • The real juice is how The Caliph has now legitimized the Global War on Terror (GWOT) for “decades”, in British Prime Minister David Cameron’s words. The indefatigable “senior US military officials” have gone on red alert, warning that ISIS/IS will soon “threaten” the US and Europe. The Caliph is the new Osama. And this only just a year after Obama – armed with his self-imposed red line – was about to bomb Syria because “Assad must go” had “gassed his own people.” And the ones who actually talked Obama out of this insanity were none other than Russian President Vladimir Putin and Foreign Minister Sergei Lavrov - now demonized with a vengeance by the Empire of Chaos. Hollywood couldn’t come up with a more far-fetched script. Deep in the bowels of a palatial abode in “Syraq”, one can distinctly hear the sound of The Caliph laughing.
  •  
    Pepe Escobar, who proves over and over again that sarcasm is a much-underrated art form.
Paul Merrell

The U.S. Government's Secret Plans to Spy for American Corporations - The Intercept - 0 views

  • Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. So critical is this denial to the U.S. government that last August, an NSA spokesperson emailed The Washington Post to say (emphasis in original): “The department does ***not*** engage in economic espionage in any domain, including cyber.” After that categorical statement to the Post, the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations.
  • Director of National Intelligence James Clapper, for instance, responded to the Petrobras revelations by claiming: “It is not a secret that the Intelligence Community collects information about economic and financial matters…. What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of—or give intelligence we collect to—U.S. companies to enhance their international competitiveness or increase their bottom line.” But a secret 2009 report issued by Clapper’s own office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies as they identify future threats to the U.S. and lay out the actions the U.S. intelligence community should take in response. It anticipates a series of potential scenarios the U.S. may face in 2025, from a “China/Russia/India/Iran centered bloc [that] challenges U.S. supremacy” to a world in which “identity-based groups supplant nation-states,” and games out how the U.S. intelligence community should operate in those alternative futures—the idea being to assess “the most challenging issues [the U.S.] could face beyond the standard planning cycle.”
  • One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” Such a development, the report says “could put the United States at a growing—and potentially permanent—disadvantage in crucial areas such as energy, nanotechnology, medicine, and information technology.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence” (emphasis added). In particular, the DNI’s report envisions “cyber operations” to penetrate “covert centers of innovation” such as R&D facilities.
  • ...3 more annotations...
  • In a graphic describing an “illustrative example,” the report heralds “technology acquisition by all means.” Some of the planning relates to foreign superiority in surveillance technology, but other parts are explicitly concerned with using cyber-espionage to bolster the competitive advantage of U.S. corporations. The report thus envisions a scenario in which companies from India and Russia work together to develop technological innovation, and the U.S. intelligence community then “conducts cyber operations” against “research facilities” in those countries, acquires their proprietary data, and then “assesses whether and how its findings would be useful to U.S. industry” (click on image to enlarge):
  • he report describes itself as “an essential long-term piece, looking out between 10 and 20 years” designed to enable ”the IC [to] best posture itself to meet the range of challenges it may face.” Whatever else is true, one thing is unmistakable: the report blithely acknowledges that stealing secrets to help American corporations secure competitive advantage is an acceptable future role for U.S. intelligence agencies. In May, the U.S. Justice Department indicted five Chinese government employees on charges that they spied on U.S. companies. At the time, Attorney General Eric Holder said the spying took place “for no reason other than to advantage state-owned companies and other interests in China,” and “this is a tactic that the U.S. government categorically denounces.” But the following day, The New York Times detailed numerous episodes of American economic spying that seemed quite similar. Harvard Law School professor and former Bush Justice Department official Jack Goldsmith wrote that the accusations in the indictment sound “a lot like the kind of cyber-snooping on firms that the United States does.” But U.S. officials continued to insist that using surveillance capabilities to bestow economic advantage for the benefit of a country’s corporations is wrong, immoral, and illegal.
  • Yet this 2009 report advocates doing exactly that in the event that ”that the technological capacity of foreign multinational corporations outstrip[s] that of U.S. corporations.” Using covert cyber operations to pilfer “proprietary information” and then determining how it ”would be useful to U.S. industry” is precisely what the U.S. government has been vehemently insisting it does not do, even though for years it has officially prepared to do precisely that.
  •  
    DNI James Clapper caught telling another whopper. 
Paul Merrell

Obama Declares War on Syria » CounterPunch: Tells the Facts, Names the Names - 0 views

  • Invoking the same ominous language as his predecessor, Barack Obama used a prime time presidential address on Wednesday to announce the beginning of a war on Syria. And while there’s no doubt that many Americans will be confused by Obama’s misleading focus on the terrorist organization named ISIL, the real purpose of the speech was to garner support for another decade of homicidal conflicts in the Middle East. The administration is as determined as ever to plunge the region into chaos, erase existing borders, and install its puppets wherever it can.  ISIL–which is mainly an invention of western Intel agencies and their treacherous counterparts in the Gulf– conveniently creates the justification for another bloody invasion followed by years of occupation, subjugation, and revolt.
  •  
    Mike Whitney dissects Obama's speech declaring war on ISIL and Syria in detail.  
Paul Merrell

The Latest Rules on How Long NSA Can Keep Americans' Encrypted Data Look Too Familiar |... - 0 views

  • Does the National Security Agency (NSA) have the authority to collect and keep all encrypted Internet traffic for as long as is necessary to decrypt that traffic? That was a question first raised in June 2013, after the minimization procedures governing telephone and Internet records collected under Section 702 of the Foreign Intelligence Surveillance Act were disclosed by Edward Snowden. The issue quickly receded into the background, however, as the world struggled to keep up with the deluge of surveillance disclosures. The Intelligence Authorization Act of 2015, which passed Congress this last December, should bring the question back to the fore. It established retention guidelines for communications collected under Executive Order 12333 and included an exception that allows NSA to keep ‘incidentally’ collected encrypted communications for an indefinite period of time. This creates a massive loophole in the guidelines. NSA’s retention of encrypted communications deserves further consideration today, now that these retention guidelines have been written into law. It has become increasingly clear over the last year that surveillance reform will be driven by technological change—specifically by the growing use of encryption technologies. Therefore, any legislation touching on encryption should receive close scrutiny.
  • Section 309 of the intel authorization bill describes “procedures for the retention of incidentally acquired communications.” It establishes retention guidelines for surveillance programs that are “reasonably anticipated to result in the acquisition of [telephone or electronic communications] to or from a United States person.” Communications to or from a United States person are ‘incidentally’ collected because the U.S. person is not the actual target of the collection. Section 309 states that these incidentally collected communications must be deleted after five years unless they meet a number of exceptions. One of these exceptions is that “the communication is enciphered or reasonably believed to have a secret meaning.” This exception appears to be directly lifted from NSA’s minimization procedures for data collected under Section 702 of FISA, which were declassified in 2013. 
  • While Section 309 specifically applies to collection taking place under E.O. 12333, not FISA, several of the exceptions described in Section 309 closely match exceptions in the FISA minimization procedures. That includes the exception for “enciphered” communications. Those minimization procedures almost certainly served as a model for these retention guidelines and will likely shape how this new language is interpreted by the Executive Branch. Section 309 also asks the heads of each relevant member of the intelligence community to develop procedures to ensure compliance with new retention requirements. I expect those procedures to look a lot like the FISA minimization guidelines.
  • ...6 more annotations...
  • This language is broad, circular, and technically incoherent, so it takes some effort to parse appropriately. When the minimization procedures were disclosed in 2013, this language was interpreted by outside commentators to mean that NSA may keep all encrypted data that has been incidentally collected under Section 702 for at least as long as is necessary to decrypt that data. Is this the correct interpretation? I think so. It is important to realize that the language above isn’t just broad. It seems purposefully broad. The part regarding relevance seems to mirror the rationale NSA has used to justify its bulk phone records collection program. Under that program, all phone records were relevant because some of those records could be valuable to terrorism investigations and (allegedly) it isn’t possible to collect only those valuable records. This is the “to find a needle a haystack, you first have to have the haystack” argument. The same argument could be applied to encrypted data and might be at play here.
  • This exception doesn’t just apply to encrypted data that might be relevant to a current foreign intelligence investigation. It also applies to cases in which the encrypted data is likely to become relevant to a future intelligence requirement. This is some remarkably generous language. It seems one could justify keeping any type of encrypted data under this exception. Upon close reading, it is difficult to avoid the conclusion that these procedures were written carefully to allow NSA to collect and keep a broad category of encrypted data under the rationale that this data might contain the communications of NSA targets and that it might be decrypted in the future. If NSA isn’t doing this today, then whoever wrote these minimization procedures wanted to at least ensure that NSA has the authority to do this tomorrow.
  • There are a few additional observations that are worth making regarding these nominally new retention guidelines and Section 702 collection. First, the concept of incidental collection as it has typically been used makes very little sense when applied to encrypted data. The way that NSA’s Section 702 upstream “about” collection is understood to work is that technology installed on the network does some sort of pattern match on Internet traffic; say that an NSA target uses example@gmail.com to communicate. NSA would then search content of emails for references to example@gmail.com. This could notionally result in a lot of incidental collection of U.S. persons’ communications whenever the email that references example@gmail.com is somehow mixed together with emails that have nothing to do with the target. This type of incidental collection isn’t possible when the data is encrypted because it won’t be possible to search and find example@gmail.com in the body of an email. Instead, example@gmail.com will have been turned into some alternative, indecipherable string of bits on the network. Incidental collection shouldn’t occur because the pattern match can’t occur in the first place. This demonstrates that, when communications are encrypted, it will be much harder for NSA to search Internet traffic for a unique ID associated with a specific target.
  • This lends further credence to the conclusion above: rather than doing targeted collection against specific individuals, NSA is collecting, or plans to collect, a broad class of data that is encrypted. For example, NSA might collect all PGP encrypted emails or all Tor traffic. In those cases, NSA could search Internet traffic for patterns associated with specific types of communications, rather than specific individuals’ communications. This would technically meet the definition of incidental collection because such activity would result in the collection of communications of U.S. persons who aren’t the actual targets of surveillance. Collection of all Tor traffic would entail a lot of this “incidental” collection because the communications of NSA targets would be mixed with the communications of a large number of non-target U.S. persons. However, this “incidental” collection is inconsistent with how the term is typically used, which is to refer to over-collection resulting from targeted surveillance programs. If NSA were collecting all Tor traffic, that activity wouldn’t actually be targeted, and so any resulting over-collection wouldn’t actually be incidental. Moreover, greater use of encryption by the general public would result in an ever-growing amount of this type of incidental collection.
  • This type of collection would also be inconsistent with representations of Section 702 upstream collection that have been made to the public and to Congress. Intelligence officials have repeatedly suggested that search terms used as part of this program have a high degree of specificity. They have also argued that the program is an example of targeted rather than bulk collection. ODNI General Counsel Robert Litt, in a March 2014 meeting before the Privacy and Civil Liberties Oversight Board, stated that “there is either a misconception or a mischaracterization commonly repeated that Section 702 is a form of bulk collection. It is not bulk collection. It is targeted collection based on selectors such as telephone numbers or email addresses where there’s reason to believe that the selector is relevant to a foreign intelligence purpose.” The collection of Internet traffic based on patterns associated with types of communications would be bulk collection; more akin to NSA’s collection of phone records en mass than it is to targeted collection focused on specific individuals. Moreover, this type of collection would certainly fall within the definition of bulk collection provided just last week by the National Academy of Sciences: “collection in which a significant portion of the retained data pertains to identifiers that are not targets at the time of collection.”
  • The Section 702 minimization procedures, which will serve as a template for any new retention guidelines established for E.O. 12333 collection, create a large loophole for encrypted communications. With everything from email to Internet browsing to real-time communications moving to encrypted formats, an ever-growing amount of Internet traffic will fall within this loophole.
  •  
    Tucked into a budget authorization act in December without press notice. Section 309 (the Act is linked from the article) appears to be very broad authority for the NSA to intercept any form of telephone or other electronic information in bulk. There are far more exceptions from the five-year retention limitation than the encrypted information exception. When reading this, keep in mind that the U.S. intelligence community plays semantic games to obfuscate what it does. One of its word plays is that communications are not "collected" until an analyst looks at or listens to partiuclar data, even though the data will be searched to find information countless times before it becomes "collected." That searching was the major basis for a decision by the U.S. District Court in Washington, D.C. that bulk collection of telephone communications was unconstitutional: Under the Fourth Amendment, a "search" or "seizure" requiring a judicial warrant occurs no later than when the information is intercepted. That case is on appeal, has been briefed and argued, and a decision could come any time now. Similar cases are pending in two other courts of appeals. Also, an important definition from the new Intelligence Authorization Act: "(a) DEFINITIONS.-In this section: (1) COVERED COMMUNICATION.-The term ''covered communication'' means any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage."       
Paul Merrell

America's Real National Security Budget - A Trillion Dollars a Year - War Is ... - 0 views

  • On Feb. 2, the White House rolled out its military and intelligence budget proposal for 2016—and it’s a doozy. The administration wants $534 billion for the Pentagon’s normal “base” budget plus another $51 billion for combat operations in Afghanistan and the Middle East.That’s $585 billion combined, $25 billion more than Congress approved last year. Washington conceals spending on the country’s 16 spy agencies—as much as $80 billion—largely inside the main Pentagon budget.But the official numbers don’t reflect the true cost of America’s wars and national defense. In reality, the United States spends closer to trillion dollars a year on its current and former soldiers, sailors, airmen, Marines, intel agents and their equipment—and also the paramilitary “homeland security” personnel whose equivalents in many other countries are uniformed troops.The U.S. Coast Guard, for instance.
  • Mandy Smithberger, director of the Straus Military Reform Project at the Center for Defense Information—part of the Project on Government Oversight in Washington, D.C.—has helpfully crunched some of the numbers.Smithberger counts $1.003 trillion in national security spending in the administration’s 2016 budget proposal. That includes the Pentagon’s $534-billion base budget and the $51-billion war fund, which Smithberger points out “is traditionally used as a slush fund to pay for [Defense Department] priorities that couldn’t make it into the base budget.”
Paul Merrell

Remaining Snowden docs will be released to avert 'unspecified US war' - ‪Cryp... - 0 views

  • All the remaining Snowden documents will be released next month, according t‪o‬ whistle-blowing site ‪Cryptome, which said in a tweet that the release of the info by unnamed third parties would be necessary to head off an unnamed "war".‬‪Cryptome‬ said it would "aid and abet" the release of "57K to 1.7M" new documents that had been "withheld for national security-public debate [sic]". <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7RchawQrMoAAHIac14AAAKH&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7RchawQrMoAAHIac14AAAKH&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> The site clarified that will not be publishing the documents itself.Transparency activists would welcome such a release but such a move would be heavily criticised by inteligence agencies and military officials, who argue that Snowden's dump of secret documents has set US and allied (especially British) intelligence efforts back by years.
  • As things stand, the flow of Snowden disclosures is controlled by those who have access to the Sn‪o‬wden archive, which might possibly include Snowden confidants such as Glenn Greenwald and Laura Poitras. In some cases, even when these people release information to mainstream media organisations, it is then suppressed by these organisations after negotiation with the authorities. (In one such case, some key facts were later revealed by the Register.)"July is when war begins unless headed off by Snowden full release of crippling intel. After war begins not a chance of release," Cryptome tweeted on its official feed."Warmongerers are on a rampage. So, yes, citizens holding Snowden docs will do the right thing," it said.
  • "For more on Snowden docs release in July watch for Ellsberg, special guest and others at HOPE, July 18-20: http://www.hope.net/schedule.html," it added.HOPE (Hackers On Planet Earth) is a well-regarded and long-running hacking conference organised by 2600 magazine. Previous speakers at the event have included Kevin Mitnick, Steve Wozniak and Jello Biafra.In other developments, ‪Cryptome‬ has started a Kickstarter fund to release its entire archive in the form of a USB stick archive. It wants t‪o‬ raise $100,000 to help it achieve its goal. More than $14,000 has already been raised.The funding drive follows a dispute between ‪Cryptome‬ and its host Network Solutions, which is owned by web.com. Access to the site was bl‪o‬cked f‪o‬ll‪o‬wing a malware infection last week. ‪Cryptome‬ f‪o‬under J‪o‬hn Y‪o‬ung criticised the host, claiming it had ‪o‬ver-reacted and had been sl‪o‬w t‪o‬ rest‪o‬re access t‪o‬ the site, which ‪Cryptome‬ criticised as a form of cens‪o‬rship.In resp‪o‬nse, ‪Cryptome‬ plans to more widely distribute its content across multiple sites as well as releasing the planned USB stick archive. ®
Paul Merrell

DoD Cut Security Clearances by 15% in Last Two Years - 0 views

  • In a significant retrenchment of the national security bureaucracy, the Department of Defense has reduced the number of employees and contractors who hold security clearances in the past two years by more than 700,000 persons, a cut of 15% in the total security-cleared population in DoD. The previously undisclosed reductions were reported in data provided by DoD to the Office of the Director of National Intelligence. This is the first documented drop in the overall number of security clearances since FY 2010, when the systematic collection of statistical data on clearances began, and it is probably the first major decline in the number of cleared personnel since 9/11. Most of the new reductions involved persons who had been investigated and deemed “eligible” (or “cleared”) for access to classified information but who did not have or need such access in fact. But a sizable 117,000 persons who were “in access” (i.e. who actually did have access to classified information) were also dropped from the clearance rolls between FY 2013 and FY 2015, according to the new statistics. A 2014 report from the Office of Management and Budget recommended reductions in the cleared population since the “growth in the number of clearance-holders increases costs and exposes classified national security information, often at very sensitive levels, to an increasingly large population.” A cut in clearances may also lead indirectly to reduced production of classified information.
  • In the first quarter of FY 2015, following the new reductions, there were 3.9 million DoD personnel (employees and contractors) with security clearances, down from 4.6 million in FY 2013, for a drop of 15.3%. The total number of clearance holders government-wide is about 0.5 million higher than the DoD figure. The new data were disclosed last week in the latest quarterly report on implementation of the Insider Threat Program. The data also indicated that the backlog of Top Secret/SCI clearance holders whose periodic reinvestigations were overdue (or “out of scope”) had been reduced by 63,000. However, there are still 356,000 TS/SCI clearance holders that remain “out of scope” and in need of an updated reinvestigation, according to the DoD data.
  •  
    The Dark State responds to Edward Snowden and Chelsea Manning's disclosures. 
Paul Merrell

What's the big deal between Russia and the Saudis? - RT Op-Edge - 0 views

  • Amidst the wilderness of mirrors surrounding the Syrian tragedy, a diamond-shaped fact persists: Despite so many degrees of separation, the Saudis are still talking to the Russians. Why? A key reason is because a perennially paranoid House of Saud feels betrayed by their American protectors who, under the Obama administration, seem to have given up on isolating Iran.
  • From the House of Saud’s point of view, three factors are paramount. 1) A general sense of ‘red alert’ as they have been deprived from an exclusive relationship with Washington, thus becoming incapable of shaping US foreign policy in the Middle East; 2) They have been mightily impressed by Moscow’s swift counter-terrorism operation in Syria; 3) They fear like the plague the current Russia-Iran alliance if they have no means of influencing it.
  • That explains why King Salman’s advisers have pressed the point that the House of Saud has a much better chance of checking Iran on all matters - from “Syraq” to Yemen - if it forges a closer relationship with Moscow. In fact, King Salman may be visiting Putin before the end of the year.
  • ...6 more annotations...
  • One of the untold stories of the recent Syria-driven diplomatic flurry is how Moscow has been silently working on mollifying both Saudi Arabia and Turkey behind the scenes. That was already the case when the foreign ministers of US, Russia, Turkey and Saudi Arabia met before Vienna.Vienna was crucial not only because Iran was on the table for the first time but also because of the presence of Egypt – incidentally, fresh from recent discovery of new oil reserves, and engaging in a reinforced relationship with Russia.The absolute key point was this paragraph included in Vienna’s final declaration: “This political process will be Syrian-led and Syrian-owned, and the Syrian people will decide the future of Syria.”It’s not by accident that only Russian and Iranian media chose to give the paragraph the appropriate relevance. Because this meant the actual death of the regime change obsession, much to the distress of US neocons, Erdogan and the House of Saud.
  • The main point is the death of the regime change option, brought about by Moscow. And that leaves Putin free to further project his extremely elaborate strategy. He called Erdogan on Wednesday to congratulate him on his and the AKP’s election landslide. This means that now Moscow clearly has someone to talk to in Ankara. Not only about Syria. But also about gas.Putin and Erdogan will have a crucial energy-related meeting at the G20 summit on November 15 in Turkey; and there’s an upcoming visit by Erdogan to Moscow. Bets are on that the Turk Stream agreement will be – finally – reached before the end of the year. And on northern Syria, Erdogan has been forced to admit by Russian facts on the ground and skies that his no-fly zone scheme will never fly.
  • That leaves us with the much larger problem: the House of Saud.There’s a wall of silence surrounding the number one reason for Saudi Arabia to bomb and invade Yemen, and that is to exploit Yemen’s virgin oil lands, side by side with Israel – no less. Not to mention the strategic foolishness of picking a fight with redoubtable warriors such as the Houthis, which have sowed panic amidst the pathetic, mercenary-crammed Saudi army.Riyadh, following its American reflexes, even resorted to recruiting Academi – formerly Blackwater - to round up the usual mercenary suspects as far away as Colombia.It was also suspected from the beginning, but now it's a done deal that the responsible actor for the costly Yemen military disaster is none other than Prince Mohammad bin Salman, the King’s son who, crucially, was sent by his father to meet Putin face-to-face.
  • Meanwhile, Qatar will keep crying because it was counting on Syria as a destination point for its much-coveted gas pipeline to serve European customers, or at least as a key transit hub on the way to Turkey.Iran on the other hand needed both Iraq and Syria for the rival Iran-Iraq-Syria gas pipeline because Tehran could not rely on Ankara while it was under US sanctions (this will now change, fast). The point is Iranian gas won’t replace Gazprom as a major source for the EU anytime soon. If it ever did, or course, that would be a savage blow to Russia.
  • In oil terms, Russia and the Saudis are natural allies. Saudi Arabia cannot export natural gas; Qatar can. To get their finances in order – after all even the IMF knows they are on a highway to hell - the Saudis would have to cut back around ten percent of production with OPEC, in concert with Russia; the oil price would more than double. A 10 percent cutback would make a fortune for the House of Saud.So for both Moscow and Riyadh, a deal on the oil price, to be eventually pushed towards $100 a barrel, would make total economic sense. Arguably, in both cases, it might even mean a matter of national security.But it won’t be easy. OPEC’s latest report assumes a basket of crude oil to be quoted at only $55 in 2015, and to rise by $5 a year reaching $80 only by 2020. This state of affairs does not suit either Moscow or Riyadh.
  • Meanwhile, fomenting all sorts of wild speculation, ISIS/ISIL/Daesh still manages to collect as much as $50 million a month from selling crude from oilfields it controls across “Syraq”, according to the best Iraq-based estimates.The fact that this mini-oil caliphate is able to bring in equipment and technical experts from “abroad” to keep its energy sector running beggars belief. “Abroad” in this context means essentially Turkey – engineers plus equipment for extraction, refinement, transport and energy production.One of the reasons this is happening is that the US-led Coalition of the Dodgy Opportunists (CDO) – which includes Saudi Arabia and Turkey - is actually bombing the Syrian state energy infrastructure, not the mini oil-Caliphate domains. So we have the proverbial “international actors” in the region de facto aiding ISIS/ISIL/Daesh to sell crude to smugglers for as low as $10 a barrel.Saudis – as much as Russian intel - have noted how ISIS/ISIL/Daesh is able to take over the most advanced US equipment that takes months to master, and instead integrate it into their ops at once. This implies they must have been extensively trained. The Pentagon, meanwhile, sent and will be sending top military across “Syraq” with an overarching message: if you choose Russia we won’t help you.ISIS/ISIL/Daesh, for their part, never talks about freeing Jerusalem. It’s always about Mecca and Medina.
  •  
    Pepe Escobar brings us up to speed on big changes in the Mideast, including the decline of U.S. influence. Not mentioned, but the Saudis' feelings of desertion by the Washington Beltway and its foreplay with Russia could bring about an end to the Saudis insistence on being paid for oil in U.S. dollars, and there goes the western economy. 
Paul Merrell

Three House panels to investigate whether ISIS intelligence was cooked | TheHill - 0 views

  • Three House committees will jointly investigate allegations U.S. Central Command altered intelligence reports, their chairmen announced Friday.“Today, the House Armed Services Committee, the House Permanent Select Committee on Intelligence and the House Appropriations Committee established a Joint Task Force to investigate allegations that senior U.S. Central Command (CENTCOM) officials manipulated intelligence products,” Reps. David Nunes (R-Calif.), Mac Thornberry (R-Texas) and Rodney Frelinghuysen (R-N.J.) said in a joint statement.Analysts at Centcom have alleged that senior officials altered their reports to paint a rosier picture of the fight against the Islamic State in Iraq and Syria (ISIS).The Pentagon’s inspector general is already conducting an investigation into the allegations.Magazine Foreign Policy reported last month that the task force would be formed.
  • In their statement, Nunes, Thornberry and Frelinghuysen said the task force would look into the specific allegations, as well as whether there are “systemic problems across the intelligence enterprise in CENTCOM or any other pertinent intelligence organizations.”Reps. Ken Calvert (R-Calif.), Mike Pompeo (R-Kan.) and Brad Wenstrup (R-Ohio) will lead the investigation.“Any accusation of intelligence being altered to fit a political narrative must be fully investigated and those responsible held accountable,” Pompeo said in a written statement. “This matters both to those who gather the intelligence, often at great risk to their personal safety, and to the policymakers who use this intelligence to make what are often life threatening decisions.”In an interview on Fox News, Thornberry said the issue was too important to wait to investigate until after the inspector general.
  • Democrats are participating, too, he said in the interview.  “They are participating in the investigation,” he said. “Their staff had been involved in the discussions we have had with a variety of folks from Centcom and elsewhere. So again we want to be careful and do it right, but it's important.” The task force expects to have preliminary results early next year, according to the chairmen’s statement.
Paul Merrell

Putin's Revenge? The Fight for the Border - 0 views

  • “We have received additional information confirming that the oil controlled by Islamic State militants (ISIS) enters Turkish territory on an industrial scale. We have every reason to believe that the decision to down our plane was guided by a desire to ensure the security of this oil’s delivery routes to ports where they are shipped in tankers.” –Russian President Vladimir Putin, Paris, 11-30-15
  • In candid remarks to the Russian media, Putin implicated the US in the downing of the Su-24 stating that the US military was briefed on the warplane’s flight path and then immediately passed along that information to Turkey. Here’s what he said: “We told our US partners in advance where, when at what altitudes our pilots were going to operate. The US-led coalition, which includes Turkey, was aware of the time and place where our planes would operate. And this is exactly where and when we were attacked. Why did we share this information with the Americans? Either they don’t control their allies, or they just pass this information left and right without realizing what the consequences of such actions might be. We will have to have a serious talk with our US partners.” Putin’s damning remarks have not appeared in any of the western media. The censorship of this information is similar to the blackout of comments Putin made just two weeks earlier at the G-20 summit where he announced that “40 countries” are financing ISIS including members of the G-20.
  • Here’s an except of Putin’s bombshell announcement: “I provided examples based on our data on the financing of different Islamic State units by private individuals. This money, as we have established, comes from 40 countries and, there are some of the G20 members among them,” Putin told the journalists. “I’ve shown our colleagues photos taken from space and from aircraft which clearly demonstrate the scale of the illegal trade in oil and petroleum products. The motorcade of refueling vehicles stretched for dozens of kilometers, so that from a height of 4,000 to 5,000 meters they stretch beyond the horizon,” Putin added, comparing the convoy to gas and oil pipeline systems.” (Putin: ISIS financed from 40 countries, including G20 members, RT)
  • ...4 more annotations...
  • It’s clear that Russia’s bombardment of jihadi groups operating near the Turkish-Syrian border has Turkish President Recep Tayyip Erdogan worried. Erdogan has long hoped that the area would be turned into a Safe Zone where Sunni militants– committed to removing Assad from power– could receive weapons and other support from their sponsors while coming and going as they pleased. The Russian-led coalition’s attempt to retake the area and seal the border to stop the flow of terrorists from Turkey, is probably what precipitated the attack on the Russian warplane. It was a desperate attempt to wave-off the Russian offensive and reverse the course of the war which has turned decisively in Assad’s favor. As for the militant groups that are operating in this area, analyst Pepe Escobar sums it up like this in a recent post at Sputnik News: “The Su-24s were actually after Chechens and Uzbeks — plus a few Uyghurs — smuggled in with fake Turkish passports (Chinese intel is also on it), all of these operating in tandem with a nasty bunch of Turkish Islamo-fascists. Most of these goons transit back and forth between the CIA-weaponized Free Syrian Army (FSA) and Jabhat al-Nusra. These were the goons who machine-gunned the Russian pilots as they parachuted down after the hit on the Su-24…. Turkey, for all practical purposes, has been a handy, sprawling Salafi-jihadi Infrastructure and Logistics Center; it offers everything from porous borders enabling countless jihadi return tickets from Syria to Europe, facilitated by corrupt police, to a convenient crossroads for all kinds of smuggling and a hefty money laundering ops.” (Sultan Erdogan’s War on…Russia, Pepe Escobar, Sputnik)
  • Escobar sums up Ankara’s role in Syria as succinctly as anyone. Erdogan has been ISIS best friend, of that, there is little doubt. The problem that Turkey faces now is that the Russian-led coalition is rapidly destroying the infrastructure that provides funding for ISIS, (oil refineries, fields and transport) while gradually retaking territory that was formally-controlled by the many anti-regime or al Qaida-linked groups in the north, west and central parts of the country. In the last few days alone, Russia and Co. have concluded the encirclement of Syria’s biggest city, Aleppo, vaporized a convoy of over 500 oil trucks in the vicinity of Raqqa, and intensified their bombing in the Turkmen Mountains, the Kurdish Mountains, and the Prophet Jonah Mountains. The coalition has moved as far north as Azaz along the Turkish border and recaptured the strategic Aleppo-Raqqa highway which completely cuts off ISIS supply-route from the east in Raqqa. All of the recent progress comes in the wake of the retaking of the strategic Kuweris Airbase which was the tipping point in the 4 and a half year-long conflict. Now the Russian coalition has focused on closing the border, a move that will sever vital supply-lines to pro-Turkish militias operating in Syria and force the terrorists to either flee or surrender. Russian Foreign Minister Sergei Lavrov emphasized this point last week saying, “We are convinced that by blocking the border we will in many respects solve the tasks to eradicate terrorism on Syrian soil.”
  • Keep in mind, that Erdogan is not the only one with designs on the so-called “Afrin-Jarabulus corridor” east of the Euphrates. Powerful politicians in the US, including John McCain, Lindsay Graham, Jeb Bush, Hillary Clinton and others, have all alluded to this area as the most suitable location for a no-fly zone. And, despite the fact that Obama refuses to send US ground forces to fight in Syria, he has continued to fuel the conflict in other less conspicuous ways. Just last Wednesday, under the cover of the Thanksgiving holiday when the media was preoccupied with other matters, Obama signed the National Defense Authorization Act of 2016 which provides another $800 million in aid to armed extremists in Syria and Ukraine. The NDAA, which effectively prevents the closing down of US concentration camp at Guantanamo Bay (Gitmo), reflects Obama’s determination to continue Washington’s vicious policy in Syria which has resulted in the deaths of more than 250,000 and the displacement of 11 million more. This helps to explain why the Russian offensive has set alarms off in Washington; it’s because the US plan to establish a permanent staging ground for terrorists in N Syria is quickly going up in smoke.
  • Seen in this light, Obama’s recent request for Turkey to deploy “30,000 (troops) to seal the border on the Turkish side”, (See: Wall Street Journal) should be viewed with extreme skepticism. Clearly, Washington has not relented in its “Assad must go” policy at all, in fact, Obama reiterated that mantra less than a week ago. That means the Obama crew may be hoping that Turkish ground forces can succeed where his jihadi proxies failed, that is, that the 30,000 troops will be used to clear and hold a 60×20-mile stretch of Syrian territory that can be used as the proposed safe zone. All Turkey would need is a pretext to invade and a little bit of air cover from the USAF. It wouldn’t be the first time a false flag was used to start a war. The bottom line is this: Putin had better move quickly before Washington and Ankara get their ducks in a row and begin to mobilize. The time to seize the border is now.
« First ‹ Previous 81 - 100 of 103 Next ›
Showing 20 items per page