Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged kenya

Rss Feed Group items tagged

Gary Edwards

The Vetting - Exclusive - Obama's Literary Agent in 1991 Booklet: 'Born in Kenya and ra... - 0 views

  •  
    excerpt: Breitbart News has obtained a promotional booklet produced in 1991 by Barack Obama's then-literary agency, Acton & Dystel, which touts Obama as "born in Kenya and raised in Indonesia and Hawaii."  The booklet, which was distributed to "business colleagues" in the publishing industry, includes a brief biography of Obama among the biographies of eighty-nine other authors represented by Acton & Dystel.  Kill shot quote from Obama's Literary Agency promo booklet: Barack Obama, the first African-American president of the Harvard Law Review, was born in Kenya and raised in Indonesia and Hawaii.  The son of an American anthropologist and a Kenyan finance minister, he attended Columbia University and worked as a financial journalist and editor for Business International Corporation.   He served as project coordinator in Harlem for the New York Public Interest Research Group, and was Executive Director of the Developing Communities Project in Chicago's South Side. His commitment to social and racial issues will be evident in his first book, Journeys in Black and White.
Joe La Fleur

Obama was Born in Kenya and is NOT Legally President - YouTube - 0 views

  •  
    OBAMA BORN IN KENYA
Paul Merrell

Kerry insists latest US raid in Libya is 'legal', and will 'do it again' - 0 views

  • This past weekend, US forces did a raid in Tripoli to nab suspected senior Al-Qaeda leader, Nazih Abdul-Hamed Ruqai, aka Abu Anas el-Liby, for his alleged role in the 1998 US Embassy bombings in Kenya and Tanzania. In addition, Hollywood’s own Navy SEALs attempted a “surgical” raid the Somali home of a leader of the al-Shabab group that allegedly planned the attack on a Kenyan Mall. According to reports today, the NAVY SEAL Somalia raid ended in complete failure, with US SEALs making a dramatic entrance on to the beach in amphibious speed boats, only to end up running away after encountering (shock, horror) incoming fire.
  • After the celebrated hoax dubbed the “Bin Laden Raid”, it’s hard to believe anything about what Washington says its Navy SEALs did, or did not do. This report, however, seems accurate according to al Shabab posts on the internet boasting about how that kicked out US soldiers – again. US Secretary of State has come out defending the act as ‘legal’. So according the logic put forth by Ivy League elitist and mediocre statesman, John Kerry himself (photo, left), we should ask: would a Russian raid on Qatar be justified due to Qatar’s own open support of imported terrorist armies in Syria?
  •  
    The official transcript of Kerry's remarks is at http://www.state.gov/secretary/remarks/2013/10/215160.htm Russia Times has more here. http://rt.com/news/libya-us-raid-terrorism-832/ As described, these are U.S. acts of military aggression against the nations of Libya and Kenya, the most serious of war crimes. The legal procedure involved is formal extradition, not military invasion.  
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Gary Edwards

Obama's Occidental College transcripts provides concrete evidence to annul his presiden... - 1 views

  • f Obama didn’t legally have his name changed from Barry to Barack then the birth certificate he passed to Congress is a fake, a forgery.
  • If his name was registered as Barry Soetoro even though Obama claims his real name is Barack Obama then Obama defrauded the state of California in order to receive college funding. 
  • Obama knowingly presented a false document to the state wherein he claimed to be a foreign student in order to illegally acquire financial aid.
  •  
    Interesting update on Obama.  His Occidental College Registration records are on file with the State of California.  They reveal that he is indeed ineligible to President of the US. The registration form shows that he is an Indonesian national (citizen), and his religion is Islam.   There is no record of a Barack Obama or Barry Soetoro having applied for US Citizenship, or even attempting to renew/re file his citizenship claim of having been born in Hawaii.  Either way though, Obama fails the Constitutional "natural born Citizen" test, as his father was a British colonial citizen of Kenya.  The term "natural born Citizen" requires that both parent be US Citizens. The Occidental College Registration also shows that Obama, aka Barry Soetoro, applied for financial aid and was awarded a fellowship for foreign students from Fulbright Foundation Scholarship program. "Occidental Registration transcript states ~ Name: Barry Soetoro - Religion: Islam - Nationality: Indonesian The smoking gun evidence that annuls Obama's presidency is Obama's college transcripts regarding his application for and receiving of foreign student aid.  Obama's college transcripts from Occidental College indicates that Obama, under the name Barry Soetoro, received financial aid as a foreign student from Indonesia as an undergraduate at the school. The transcript from Occidental College shows that Obama (Barry Soetoro) applied for financial aid and was awarded a fellowship (scholarship) for foreign students from the Fulbright Foundation Scholarship program - an international educational exchange program sponsored by the U.S. government.  Grants are available for U.S. citizens to go abroad and for non-U.S. citizens with no U.S. permanent residence to come to the U.S.  To qualify, for the non-US citizen scholarship to study in the U.S., a student applicant must claim and provide proof of foreign citizenship. This document would seem to provide the smoking gun that many of Obama
Paul Merrell

BBC News - South Sudan moves closer to oil pipeline to the south - 0 views

  • South Sudan has moved closer to its target of gaining access to a pipeline to export its oil to the south. The presidents of Uganda, Kenya and Rwanda have agreed to build two pipelines across East Africa. One would run from South Sudan to the Kenyan port city of Lamu and the other would stretch from Rwanda to Mombasa.
Paul Merrell

No consensus on who was behind Sept 11: global poll | Reuters - 0 views

  • The survey of 16,063 people in 17 nations found majorities in only nine countries believe al Qaeda was behind the attacks on New York and Washington that killed about 3,000 people in 2001.U.S. officials squarely blame al Qaeda, whose leader Osama bin Laden has boasted of organizing the suicide attacks by his followers using hijacked commercial airliners.On average, 46 percent of those surveyed said al Qaeda was responsible, 15 percent said the U.S. government, 7 percent said Israel and 7 percent said some other perpetrator. One in four people said they did not know who was behind the attacks.The poll was conducted by WorldPublicOpinion.org, a collaborative project of research centers in various countries managed by the Program on International Policy Attitudes at the University of Maryland in the United States.In Europe, al Qaeda was cited by 56 percent of Britons and Italians, 63 percent of French and 64 percent of Germans. The U.S. government was to blame, according to 23 percent of Germans and 15 percent of Italians.
  • Respondents in the Middle East were especially likely to name a perpetrator other than al Qaeda, the poll found.Israel was behind the attacks, said 43 percent of people in Egypt, 31 percent in Jordan and 19 percent in the Palestinian Territories. The U.S. government was blamed by 36 percent of Turks and 27 percent of Palestinians.In Mexico, 30 percent cited the U.S. government and 33 percent named al Qaeda.The only countries with overwhelming majorities blaming al Qaeda were Kenya with 77 percent and Nigeria with 71 percent.Interviews were conducted in China, Indonesia, Nigeria, Russia, Egypt, France, Germany, Britain, Italy, Jordan, Kenya, Mexico, the Palestinian Territories, South Korea, Taiwan, Turkey and Ukraine.The poll, taken between July 15 and August 31, had a margin of error of plus or minus 3 to 4 percent.
  •  
    Poll from 2008. 
Paul Merrell

Israel's Africa policies 'an exercise in cynicism' - Al Jazeera English - 0 views

  • Secret documents obtained by Al Jazeera's Investigative Unit expose a deep disdain by South Africa's spies for their Israeli counterparts, with intelligence assessments accusing Israel of conducting "cynical" polices in Africa that include "fuelling insurrection", "appropriating diamonds" and even sabotaging Egypt's water supply. Political wariness on the part of the South Africans is hardly surprising given Israel's extensive military and security cooperation with the apartheid regime ousted in 1994. The current South African government is led by the African National Congress, which aligned itself with the Palestine Liberation Organisation. A secret analysis from South African intelligence dismisses a tour of African countries by the Israeli foreign minister in 2009 as "an exercise in cynicism".
  • It says Avigdor Lieberman's nine-day trip to Ethiopia, Nigeria, Ghana, Uganda, and Kenya laid the groundwork for arms deals and the appropriation of African resources, while hiding behind "a philanthropic façade".
  • Israel has long maintained ties with African countries based on its own security and diplomatic needs. Its ties with the old apartheid regime in South Africa were strongly based on military needs, and reportedly included cooperation in the development of nuclear weapons.
  • ...4 more annotations...
  • South Africa's "Geopolitical Country and Intelligence Assessment" of October 2009 accused Israel of pursuing "destructive policies" in Africa that include: Compromising Egypt's water security : Israeli scientists, the report claimed, "created a type of plant that flourishes on the surface or the banks of the Nile and that absorbs such large quantities of water as to significantly reduce the volume of water that reaches Egypt." The report offers no additional evidence for this claim. Fuelling insurrection in Sudan: Israel is "working assiduously to encircle and isolate Sudan from the outside," the report  wrote, "and to fuel insurrection inside Sudan." Mossad agents have also "set up a communications system which serves to both eavesdrop on and secure the security of presidential telecommunications." Israel had long been at loggerheads with Khartoum, and supported the secessionist movement that eventually broke away and created South Sudan, with which it has diplomatic ties. Khartoum continues to accuse the Israelis of being responsible for attacks in Sudan.
  • Reports in the Israeli and Nigerian media last month said the US had blocked Israel's planned sale of military helicopters to Nigeria. Israeli media hailed Israel's deepening ties with President Goodluck Jonathan for putting an end to a December 30 UN Security Council resolution setting a timetable for Israeli withdrawal from occupied Palestinian territories. Nigeria had signalled it would support the Palestinian-backed resolution, but its switch to an abstention denied the resolution the necessary majority in the Council.
  • Co-opting Kenyan intelligence: "As part of Mossad's safari in Central Africa it had exposed to the Kenyans the activities of other foreign spy networks". In return, the report wrote, Kenya granted permission for a safe house in Nairobi and gave "ready access to Kenya's intelligence service". Arms proliferation : Israel has been "instrumental in arming some African regimes and allegedly aggravating crises among others, including Somalia, Sudan, Eritrea and South Africa", according to the document. Today it "is looking for new markets for its range of lightweight weapons" and covertly supplies armaments to "selected countries inter alia India" including "nuclear, chemical, laser and conventional warfare technologies". Acquiring African mineral wealth: Israel "plans to appropriate African diamonds", the South African spies alleged, as well as "African uranium, thorium and other radioactive elements used to manufacture nuclear fuel".
  • Training armed groups: "A few Israeli military pensioners are on the lookout for job opportunities as trainers of African militias," the report said, "while other members of the delegation were facilitating contracts for Israelis to train various militias."
Paul Merrell

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
Paul Merrell

Snowden Leak: British Intelligence Calls Israel "True Threat" To Middle East - 0 views

  • According to leaked documents released by Edward Snowden, British intelligence spied on Israeli diplomats and military officials in 2008 and 2009, the French newspaper Le Monde and Israel’s Haaretz reported on Wednesday. One of the files from 2009 said that “Britain’s GCHQ intelligence-gathering apparatus defined Israel as ‘a true threat’ to the Middle East”. “The Israelis constitute a true threat to regional security, notably because of the country’s position on the Iran issue,” the file said. The UK spy agency gathered data on the “second-highest ranking official in the Israeli foreign ministry”, who went unidentified by Le Monde and Haaretz. The two outlets also said that the UK gathered surveillance on the Palestinian Authority. GCHQ tapped the phone of Palestinian Authority President Mahmoud Abbas in December 2008, weeks before Israel launched an offensive the following month. GCHQ also monitored emails between Israel’s ambassadors to Kenya and Nigeria and the private Israel defence company Ophir Optronics. During those two years, the UK spied on the Palestinian Liberation Organisation’s secretary general and several Palestinian diplomatic delegations, including former Palestinian prime minister Ahmed Qurei and Israeli-Palestinian parliamentarian Dr Ahmad Tibi.
Paul Merrell

Trump's 'Wag the Dog' Moment - Consortiumnews - 0 views

  • Just two days after news broke of an alleged poison-gas attack in northern Syria, President Trump brushed aside advice from some U.S. intelligence analysts doubting the Syrian regime’s guilt and launched a lethal retaliatory missile strike against a Syrian airfield.
  • Trump immediately won plaudits from Official Washington, especially from neoconservatives who have been trying to wrestle control of his foreign policy away from his nationalist and personal advisers since the days after his surprise victory on Nov. 8. There is also an internal dispute over the intelligence. On Thursday night, Secretary of State Rex Tillerson said the U.S. intelligence community assessed with a “high degree of confidence” that the Syrian government had dropped a poison gas bomb on civilians in Idlib province. But a number of intelligence sources have made contradictory assessments, saying the preponderance of evidence suggests that Al Qaeda-affiliated rebels were at fault, either by orchestrating an intentional release of a chemical agent as a provocation or by possessing containers of poison gas that ruptured during a conventional bombing raid. One intelligence source told me that the most likely scenario was a staged event by the rebels intended to force Trump to reverse a policy, announced only days earlier, that the U.S. government would no longer seek “regime change” in Syria and would focus on attacking the common enemy, Islamic terror groups that represent the core of the rebel forces.
  • The source said the Trump national security team split between the President’s close personal advisers, such as nationalist firebrand Steve Bannon and son-in-law Jared Kushner, on one side and old-line neocons who have regrouped under National Security Adviser H.R. McMaster, an Army general who was a protégé of neocon favorite Gen. David Petraeus. White House Infighting In this telling, the earlier ouster of retired Gen. Michael Flynn as national security adviser and this week’s removal of Bannon from the National Security Council were key steps in the reassertion of neocon influence inside the Trump presidency. The strange personalities and ideological extremism of Flynn and Bannon made their ousters easier, but they were obstacles that the neocons wanted removed. Though Bannon and Kushner are often presented as rivals, the source said, they shared the belief that Trump should tell the truth about Syria, revealing the Obama administration’s CIA analysis that a fatal sarin gas attack in 2013 was a “false-flag” operation intended to sucker President Obama into fully joining the Syrian war on the side of the rebels — and the intelligence analysts’ similar beliefs about Tuesday’s incident. Instead, Trump went along with the idea of embracing the initial rush to judgment blaming Assad for the Idlib poison-gas event. The source added that Trump saw Thursday night’s missile assault as a way to change the conversation in Washington, where his administration has been under fierce attack from Democrats claiming that his election resulted from a Russian covert operation. If changing the narrative was Trump’s goal, it achieved some initial success with several of Trump’s fiercest neocon critics, such as neocon Senators John McCain and Lindsey Graham, praising the missile strike, as did Israeli Prime Minister Benjamin Netanyahu. The neocons and Israel have long sought “regime change” in Damascus even if the ouster of Assad might lead to a victory by Islamic extremists associated with Al Qaeda and/or the Islamic State.
  • ...6 more annotations...
  • Trump employing a “wag the dog” strategy, in which he highlights his leadership on an international crisis to divert attention from domestic political problems, is reminiscent of President Bill Clinton’s threats to attack Serbia in early 1999 as his impeachment trial was underway over his sexual relationship with intern Monica Lewinsky. (Clinton also was accused of a “wag-the-dog” strategy when he fired missiles at supposed Al Qaeda bases in Afghanistan and Sudan in 1998 in retaliation for the bombing of U.S. embassies in Kenya and Tanzania.)
  • Trump’s advisers, in briefing the press on Thursday night, went to great lengths to highlight Trump’s compassion toward the victims of the poison gas and his decisiveness in bombing Assad’s military in contrast to Obama’s willingness to allow the intelligence community to conduct a serious review of the evidence surrounding the 2013 sarin-gas case. Ultimately, Obama listened to his intelligence advisers who told him there was no “slam-dunk” evidence implicating Assad’s regime and he pulled back from a military strike at the last minute – while publicly maintaining the fiction that the U.S. government was certain of Assad’s guilt. In both cases – 2013 and 2017 – there were strong reasons to doubt Assad’s responsibility. In 2013, he had just invited United Nations inspectors into Syria to investigate cases of alleged rebel use of chemical weapons and thus it made no sense that he would launch a sarin attack in the Damascus suburbs, guaranteeing that the U.N. inspectors would be diverted to that case. Similarly, now, Assad’s military has gained a decisive advantage over the rebels and he had just scored a major diplomatic victory with the Trump administration’s announcement that the U.S. was no longer seeking “regime change” in Syria. The savvy Assad would know that a chemical weapon attack now would likely result in U.S. retaliation and jeopardize the gains that his military has achieved with Russian and Iranian help. The counter-argument to this logic – made by The New York Times and other neocon-oriented news outlets – essentially maintains that Assad is a crazed barbarian who was testing out his newfound position of strength by baiting President Trump. Of course, if that were the case, it would have made sense that Assad would have boasted of his act, rather than deny it.
  • Alarm within the U.S. intelligence community about Trump’s hasty decision to attack Syria reverberated from the Middle East back to Washington, where former CIA officer Philip Giraldi reported hearing from his intelligence contacts in the field that they were shocked at how the new poison-gas story was being distorted by Trump and the mainstream U.S. news media.
  • Giraldi told Scott Horton’s Webcast: “I’m hearing from sources on the ground in the Middle East, people who are intimately familiar with the intelligence that is available who are saying that the essential narrative that we’re all hearing about the Syrian government or the Russians using chemical weapons on innocent civilians is a sham.” Giraldi said his sources were more in line with an analysis postulating an accidental release of the poison gas after an Al Qaeda arms depot was hit by a Russian airstrike. “The intelligence confirms pretty much the account that the Russians have been giving … which is that they hit a warehouse where the rebels – now these are rebels that are, of course, connected with Al Qaeda – where the rebels were storing chemicals of their own and it basically caused an explosion that resulted in the casualties. Apparently the intelligence on this is very clear.” Giraldi said the anger within the intelligence community over the distortion of intelligence to justify Trump’s military retaliation was so great that some covert officers were considering going public. “People in both the agency [the CIA] and in the military who are aware of the intelligence are freaking out about this because essentially Trump completely misrepresented what he already should have known – but maybe he didn’t – and they’re afraid that this is moving toward a situation that could easily turn into an armed conflict,” Giraldi said before Thursday night’s missile strike. “They are astonished by how this is being played by the administration and by the U.S. media.”
  • Regarding this week’s events, Trump’s desperation to reverse his negative media coverage and the dubious evidence blaming Assad for the Idlib incident could fit with the “Wag the Dog” movie from 1997 in which an embattled president creates a phony foreign crisis in Albania.
  • In the movie, the White House operation is a cynical psychological operation to convince the American people that innocent Albanian children, including an attractive girl carrying a cat, are in danger when, In reality, the girl was an actor posing before a green screen that allowed scenes of fiery ruins to be inserted as background. Today, because Trump and his administration are now committed to convincing Americans that Assad really was responsible for Tuesday’s poison-gas tragedy, the prospects for a full and open investigation are effectively ended. We may never know if there is truth to those allegations or whether we are being manipulated by another “wag the dog” psyop.
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional committee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial institutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms with Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency with which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of its largest.19 The political clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [Italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘It was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 It also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the Italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter Maritime Bank, which interlocked with BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 It is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. It is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. It may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
Paul Merrell

U.S. Strategy to Fight Terrorism Increasingly Uses Proxies - NYTimes.com - 0 views

  • During the height of the wars in Iraq and Afghanistan, the United States military often carried out dozens of daily operations against Al Qaeda and other extremist targets with heavily armed commandos and helicopter gunships.But even before President Obama’s speech on Wednesday sought to underscore a shift in counterterrorism strategy — away from the Qaeda strongholds in and near those countries — American forces had changed their tactics in combating Al Qaeda and its affiliates, relying more on allied or indigenous troops with a limited American combat role.
  • Navy SEAL or Army Delta Force commandos will still carry out raids against the most prized targets, such as the seizure last fall of a Libyan militant wanted in the 1998 bombings of two United States Embassies in East Africa. But more often than not, the Pentagon is providing intelligence and logistics assistance to proxies, including African troops and French commandos fighting Islamist extremists in Somalia and Mali. And it is increasingly training foreign troops — from Niger to Yemen to Afghanistan — to battle insurgents on their own territory so that American armies will not have to.
  • To confront several crises in Africa, the United States has turned to helping proxies. In Somalia, for instance, the Pentagon and the State Department support a 22,000-member African force that has driven the Shabab from their former strongholds in Mogadishu, the capital, and other urban centers, and continues to battle the extremists in their mountain and desert redoubts.
  • ...4 more annotations...
  • In the Central African Republic, American transport planes ferried 1,700 peacekeepers from Burundi and Rwanda to the strife-torn nation earlier this year, but refrained from putting American boots on the ground.The United States flies unarmed reconnaissance drones from a base in Niger to support French and African troops in Mali, but it has conspicuously stayed out of that war, even after the conflict helped spur a terrorist attack in Algeria in which Americans were taken hostage.In addition to proxies, the Pentagon is training and equipping foreign armies to tackle their own security challenges. In the past two years, the Defense Department has gradually increased its presence in Yemen, sending about 50 Special Operations troops to train Yemeni counterterrorism and security forces, and a like number of commandos to help identify and target Qaeda suspects for drone strikes, according to American officials.
  • Across Africa this year, soldiers from a 3,500-member brigade in the Army’s First Infantry Division are conducting more than 100 missions, ranging from a two-man sniper team in Burundi to humanitarian exercises in South Africa.
  • Last October, for instance, American troops assisted by F.B.I. and C.I.A. agents seized a suspected Qaeda leader on the streets of Tripoli, Libya, while on the same day a Navy SEAL team raided the seaside villa of a militant leader in a firefight on the coast of Somalia. The Navy commandos exchanged gunfire with militants at the home of a senior leader of the Shabab but were ultimately forced to withdraw.The Libyan militant captured in Tripoli was indicted in 2000 for his role in the 1998 bombings of the United States Embassies in Kenya and Tanzania. The militant, born Nazih Abdul-Hamed al-Ruqai and known by his nom de guerre, Abu Anas al-Libi, had a $5 million bounty on his head; his capture at dawn ended a 15-year manhunt.
  • Mr. Ruqai was taken to Manhattan for trial after being held for a week in military custody aboard a Navy vessel in the Mediterranean, where he was reportedly interrogated for intelligence purposes. He has pleaded not guilty and is scheduled to go to trial in November.
Paul Merrell

Crypto-Gram: December 15, 2014 - 0 views

  • There's a new international survey on Internet security and trust, of "23,376 Internet users in 24 countries," including "Australia, Brazil, Canada, China, Egypt, France, Germany, Great Britain, Hong Kong, India, Indonesia, Italy, Japan, Kenya, Mexico, Nigeria, Pakistan, Poland, South Africa, South Korea, Sweden, Tunisia, Turkey and the United States." Amongst the findings, 60% of Internet users have heard of Edward Snowden, and 39% of those "have taken steps to protect their online privacy and security as a result of his revelations." The press is mostly spinning this as evidence that Snowden has not had an effect: "merely 39%," "only 39%," and so on. (Note that these articles are completely misunderstanding the data. It's not 39% of people who are taking steps to protect their privacy post-Snowden, it's 39% of the 60% of Internet users -- which is not everybody -- who have heard of him. So it's much less than 39%.)
  • Even so, I disagree with the "Edward Snowden Revelations Not Having Much Impact on Internet Users" headline. He's having an enormous impact. I ran the actual numbers country by country, combining "data on Internet penetration with data from this survey. Multiplying everything out, I calculate that *706 million people* have changed their behavior on the Internet because of what the NSA and GCHQ are doing. (For example, 17% of Indonesians use the Internet, 64% of them have heard of Snowden and 62% of them have taken steps to protect their privacy, which equals 17 million people out of its total 250-million population.)
  • Note that the countries in this survey only cover 4.7 billion out of a total 7 billion world population. Taking the conservative estimates that 20% of the remaining population uses the Internet, 40% of them have heard of Snowden, and 25% of those have done something about it, that's an additional 46 million people around the world. It's certainly true that most of those people took steps that didn't make any appreciable difference against an NSA level of surveillance, and probably not even against the even more pervasive corporate variety of surveillance. It's probably even true that some of those people didn't take steps at all, and just wish they did or wish they knew what to do. But it is absolutely extraordinary that *750 million people* are disturbed enough about their online privacy that they would represent to a survey taker that they did something about it.
  • ...2 more annotations...
  • Name another issue that has caused over ten percent of the world's population to change their behavior in the past year? Cory Doctorow is right: we have reached "peak indifference to surveillance." From now on, this issue is going to matter more and more, and policymakers around the world need to start paying attention. https://www.cigionline.org/internet-survey Press mentions: http://www.ibtimes.co.uk/...http://www.theguardian.com/technology/2014/nov/25/... Internet penetration by country: http://www.internetlivestats.com/... Cory Docorow: http://boingboing.net/2014/11/12/...
  • Related: a recent Pew Research Internet Project survey on Americans' perceptions of privacy, commented on by Ben Wittes. http://www.pewinternet.org/2014/11/12/...http://www.lawfareblog.com/2014/11/...
Paul Merrell

China stakes claim in Central and Southeast Europe | Business New Europe - 0 views

  • A Chinese agreement to finance a high-speed railway from Belgrade to Bucharest was one of around $10bn worth of investments, mainly in the energy and infrastructure sectors, signed during a China-Central and Eastern Europe summit this week. By funding the railway, Beijing hopes to establish a rapid connection from Greece’s Pireaus Port through the Balkans to the EU member states of Central Europe. Several agreements on the €1.5bn railway, which will be financed by soft loans from state-owned China Exim Bank, were signed between China, Hungary and Serbia on December 17. When the line is operational, the travel time between Belgrade and Budapest will be slashed from the current eight hours to just 2.4 hours. Macedonian counterpart Nikola Gruevski was also in attendance as there are plans to extend the line south to Macedonia and Greece in future. Chinese Prime Minister Li Keqiang, who headed a 200-strong delegation to Belgrade, said he expected the line would benefit both China and the countries of Central and Eastern Europe and the EU, according to a Serbian government statement.
  • Chinese shipping giant Cosco Pacific took over the management rights to half of Piraeus port and is now expanding two container terminals under a 35-year concession agreement, with the aim of turning the Greek port into one of Europe’s top five container ports. However, to take full advantage of Cosco’s investment in Piraeus and its potential to become a gateway to the CEE region, investments into transport links across the Balkans are needed. "We will propose construction of a rapid land and maritime route based on the Budapest-Belgrade railroad and the Greek port of Piraeus to improve regional connectivity," Li told journalists in advance of the summit, South China Morning Post reported. Investments into infrastructure to transport raw materials into China and Chinese manufactured goods to foreign markets is nothing new. Closer to home, Beijing is looking to fund a railway across Central Asia to create a direct rail link between its factories and the massive wholesale bazaars of Kyrgyzstan and Uzbekistan. Further afield, in May 2014, China signed an agreement in Kenya to build a new line from Mombasa to Nairobi that will extend to four other East African states in future.
  • While land rail routes across Eurasia to Europe are also being developed, sea shipping remains the cheapest route from the Far East to Europe, and Piraeus is a convenient entry point to the continent. While growth in the region has been patchy since the recent global economic crisis, in the longer-term the EU member states of Central and Eastern Europe and future entrants from the Balkans are expected to converge with longer-established EU members from Western Europe in terms of spending power. Since 2012, when the first China-CEE summit was held in Warsaw, Chinese attention on the region has steadily increased, with a focus on energy and infrastructure. Aside from the access to new markets, there are further commercial benefits for China, as Chinese companies are selected for lucrative construction contracts on projects funded by Chinese state-owned banks. On December 16, the opening day of the summit, Li told the 16 regional leaders to attend that China would launch a $3bn investment fund for the region.
  • ...2 more annotations...
  • Also on December 16 Albania signed a deal with Exim Bank on funding for the completion of construction works on the Arber motorway that links the capital Tirana with Macedonia. In the energy sector, Serbian and Chinese officials have signed a loan agreement for the second stage of the Kostolac B thermal power project, which includes the construction of a new 350MW plant and the expansion of the adjacent Drmno open-pit coal mine. The value of the project is expected to be $715mn, of which $608mn will come from a 20-year China Exim Bank loan. In neighbouring Bosnia, Eximbank has signed an agreement with the Bosnian Federation government for a €667.8mn credit to fund construction of the 450MW unit 7 at the thermal power plant Tuzla. China's Gezhouba Group is expected to build the unit.
  • The timing of the summit, amid a sharp falling off of Russia’s influence, may also have helped China extend its influence in the region. With some exceptions, notably Serbia, most of the would-be EU member states in Southeast Europe have opted to join EU and US sanctions against Russia over Ukraine. Tit for tat sanctions imposed by Moscow caused trade between Eastern Europe and Russia to drop, a trend that is likely to continue amid the new economic crisis in Russia. Meanwhile, in a further retrenchment from the region, Russian President Vladimir Putin announced on December 1 that Russia will scrap the planned South Stream pipeline that would have supplies numerous states across the region with gas. China, meanwhile, has no political axe to grind in Eastern Europe, but hopes to take advantage of Russia’s weakness to make further inroads commercially. Poland and other countries in the region are, for example, looking to China as a potential market for food products following the Russian embargo. This would add to already booming trade ties. According to Chinese Commerce Minister Gao Hucheng, trade between China and Eastern Europe may top $60bn in 2014 - five times its 2003 level, AFP reported.
Paul Merrell

Tomgram: Nick Turse, American Monuments to Failure in Africa? | TomDispatch - 0 views

  • As I sit in a room filled with scores of high-ranking military officers resplendent in their dress uniforms -- Kenyans in their khakis, Burundians and Ugandans clad in olive, Tanzanians in deep forest green sporting like-colored berets and red epaulets with crossed rifles on their shoulders -- chances are that the U.S. military is carrying out some mission somewhere on this vast continent.  It might be a kidnapping raid or a training exercise.  It could be an airstrike or the construction of a drone base.  Or, as I wait for the next speaker to approach the lectern at the “Land Forces East Africa” conference in Dar es Salaam, Tanzania, it could be a humanitarian operation run not by civilians in the aid business, but by military troops with ulterior motives -- part of a near-continent-wide campaign utilizing the core tenets of counterinsurgency strategy. The U.S. is trying to win a war for the hearts and minds of Africa.  But a Pentagon investigation suggests that those mystery projects somewhere out there in Djibouti or Ethiopia or Kenya or here in Tanzania may well be orphaned, ill-planned, and undocumented failures-in-the-making.  According to the Department of Defense’s watchdog agency, U.S. military officials in Africa “did not adequately plan or execute” missions designed to win over Africans deemed vulnerable to the lures of violent extremism. 
  • This evidence of failure in the earliest stages of the U.S. military’s hearts-and-minds campaign should have an eerie resonance for anyone who has followed its previous efforts to use humanitarian aid and infrastructure projects to sway local populations in Vietnam, Iraq, or Afghanistan.  In each case, the operations failed in spectacular ways, but were only fully acknowledged after years of futility and billions of dollars in waste.  In Africa, a war zone about which most Americans are completely unaware, the writing is already on the wall.  Or at least it should be.  While Pentagon investigators identified a plethora of problems, their report has, in fact, been kept under wraps for almost a year, while the command responsible for the failures has ignored all questions about it from TomDispatch.
1 - 20 of 30 Next ›
Showing 20 items per page