Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged kidnapping

Rss Feed Group items tagged

Paul Merrell

Asia Times Online :: Middle East News, Iraq, Iran current affairs - 0 views

  • And why did Islamic State, formerly ISIS, become winners? Because the "West" regimented, schooled, trained, logistically helped and weaponized most of IS's Takfiri goons with a mission at hand: to destroy Syria. The "West" lauded them as "Syrian rebels". Freedom fighters. Washington even promoted Jabhat al-Nusra (the official al-Qaeda franchise in Syria, and a "terrorist organization", according to the State Department) as "good" jihadis, as well as the preferred Saudi combo, the Islamic Front.
  • The House of Saud, directly and indirectly, and the proverbial wealthy Gulf Cooperation Council donors are the Mom and Dad of ISIS. All duly vetted/approved by the industrial-military-Orwellian-Panopticon complex. And yet "Assad must go" had other ideas for Syria. He didn't go. He and his army resisted and counter-attacked. So the original mission in Syria morphed across the (non-existent) desert border towards Iraq. ISIS kept expanding - via extortion, kidnapping, captured oil fields, tribal smuggling networks.
  • How convenient that IS strategy is totally divide and rule. Totally balkanization of Iraq. Totally mum on Israel's slow-motion ethnic cleansing of Gaza. Totally useful in wagging the (beheading) dog to make the world forget about Gaza. Moroever, IS/ISIS strategy, stripped to the bone, is Pentagon manual; clear, hold and build - then expand (to an area larger than Great Britain). It's even Pentagon manual redux - as in building "coalitions of the willing" (see the alliance with "remnants" - Rummy talk - of the Saddam regime propelling their northern Iraq summer offensive.) How convenient that the mighty Orwellian/Panopticon complex satellite maze could not identify a long convoy of gleaming white Toyotas crossing the desert towards their summer conquests. And how convenient that a Briton beheading an American - what a "special relationship" plot twist! - fully sanctions the Return of Iraq Bombing ("for months", in Obama's words); more strikes; more drones; perhaps more boots on the ground; perhaps, in the near future, a Syria extension. IS also took over Tikrit, the birthplace of Saddam, in their summer adventure. Now Baghdad's military are trying to take it back. IS welcomed them with minefields, booby-trapped buildings, an array of snipers and hardcore mortar fire. How convenient that Obama's "humanitarian" bombs are not involved in R2P ("responsibility to protect") Saddam's birthplace. What really matters is the US consulate in Erbil, scores of CIA operatives and vast Big Oil interests in Iraqi Kurdistan.
  •  
    Pepe Escbar catches a whiff of the same rat Tony Cartalucci caught, but sees it ending badly for the House of Saud. I've said it before, but I'll say it again: Escobar has earned very high credibility with me. 
Paul Merrell

Tomgram: Nick Turse, American Monuments to Failure in Africa? | TomDispatch - 0 views

  • As I sit in a room filled with scores of high-ranking military officers resplendent in their dress uniforms -- Kenyans in their khakis, Burundians and Ugandans clad in olive, Tanzanians in deep forest green sporting like-colored berets and red epaulets with crossed rifles on their shoulders -- chances are that the U.S. military is carrying out some mission somewhere on this vast continent.  It might be a kidnapping raid or a training exercise.  It could be an airstrike or the construction of a drone base.  Or, as I wait for the next speaker to approach the lectern at the “Land Forces East Africa” conference in Dar es Salaam, Tanzania, it could be a humanitarian operation run not by civilians in the aid business, but by military troops with ulterior motives -- part of a near-continent-wide campaign utilizing the core tenets of counterinsurgency strategy. The U.S. is trying to win a war for the hearts and minds of Africa.  But a Pentagon investigation suggests that those mystery projects somewhere out there in Djibouti or Ethiopia or Kenya or here in Tanzania may well be orphaned, ill-planned, and undocumented failures-in-the-making.  According to the Department of Defense’s watchdog agency, U.S. military officials in Africa “did not adequately plan or execute” missions designed to win over Africans deemed vulnerable to the lures of violent extremism. 
  • This evidence of failure in the earliest stages of the U.S. military’s hearts-and-minds campaign should have an eerie resonance for anyone who has followed its previous efforts to use humanitarian aid and infrastructure projects to sway local populations in Vietnam, Iraq, or Afghanistan.  In each case, the operations failed in spectacular ways, but were only fully acknowledged after years of futility and billions of dollars in waste.  In Africa, a war zone about which most Americans are completely unaware, the writing is already on the wall.  Or at least it should be.  While Pentagon investigators identified a plethora of problems, their report has, in fact, been kept under wraps for almost a year, while the command responsible for the failures has ignored all questions about it from TomDispatch.
Paul Merrell

Video: Palestinians cheer as Israeli "skunk" truck crashes into ravine | The Electronic... - 0 views

  • It has been described as smelling like “a chunk of rotting corpse from a stagnant sewer” placed in a blender. It is the foul-smelling liquid the “skunk” truck, one of Israel’s weapons of occupation and oppression, routinely sprays at Palestinians. One of these skunk trucks can be seen in the video above spraying a jet of the disgusting liquid in eastern occupied Jerusalem on Saturday. “Apart from the repulsive nausea-inducing stench, the skunk liquid can cause pain and redness if it comes into contact with eyes, irritation if it comes into contact with skin and if swallowed can cause abdominal pain requiring medical treatment,” according to the Association for Civil Rights in Israel (ACRI).
  • As can be seen in the video, the skunk truck appears to be spraying a jet of its foul liquid over a wide area and at houses, an act that can have no effect other than to further provoke and aggravate the Palestinian victims of the Israeli occupation. On 26 August, the Wadi Hilweh Information Center, a local Jerusalem news agency, reported that Israeli occupation forces had severely escalated their use of skunk trucks over the last two months. Jerusalemites complained about the routine and indiscriminate spraying of the foul liquid at their homes, cars and businesses and said that the occupation has done this with increasing frequency since the 2 July kidnapping and murder by Israeli settlers of the Jerusalemite teenager Muhammad Abu Khudair.
  • On 10 August, ACRI said it had contacted the commander of Jerusalem’s occupation police “to request that he urgently clarify the details” of Israel’s use of the substance. “Witness testimony reveals that the police indiscriminately sprayed the skunk liquid towards houses, people, restaurants brimming with people and in crowded streets, causing harm to innocent residents,” ACRI said. “Evidence suggests that in some cases the skunk repellent was arbitrarily used with no apparent justification and in the absence of any public disturbances.” It’s no wonder Palestinians were so delighted to see at least one Israeli skunk truck put out of action.
  •  
    What can I say? Life in an apartheid state.
Paul Merrell

Tacoma, Wash. police use 'Stingray' system to sweep cellphone data | Al Jazeera America - 0 views

  • A Washington state police department just south of Seattle has for years been quietly using controversial surveillance equipment that can collect records of all cellphone calls, text messages and data transfers within a half-mile radius, according to local media. The Stingray surveillance system, deployed by the Tacoma Police Department since 2009, “tricks cellphones into thinking it’s a cell tower and draws in their information,” local news website The Olympian reported Wednesday. The device is reportedly capable of indiscriminate data collection, which worries civil rights advocates. The American Civil Liberties Union (ACLU) said it has identified at least 43 police departments in 18 states that use Stingray equipment. The rights group said on its website that police use of such a device may violate the U.S. Constitution's Fourth Amendment, and with taxpayers’ money.
  • "The result is that police gather the electronic serial numbers and other information about phones, as well as the direction and strength of each phone's signal, allowing precise location tracking,” the ACLU said. “Stingrays can also gather information about people's communications, such as which phone numbers they call. Because we carry our cellphones with us virtually everywhere we go, Stingrays can paint a precise picture of where we are and who we spend time with, including our location in a lover's house, in a psychologist's office or at a political protest." Tacoma Police Department’s Assistant Police Chief Kathy McAlpine said that officers only use Stingray with permission from a judge, and that they do not collect data. “It is used in felony-level crimes to locate suspects wanted for crimes such as homicide, rape, robbery, kidnapping, and narcotics trafficking,” McAlpine said. The department said the device has been used nearly 200 times since June.
  • The Tacoma City Council approved buying an updated version of the equipment in March 2013 on the grounds that it would be used to find improvised explosive devices. McAlpine said they have never used the Stingray to locate such a device. Civil rights groups said they are concerned about the possibility of indiscriminate data collection, and worry that police could store the data of innocent citizens. “They are essentially searching the homes of innocent Americans to find one phone used by one person,” said Christopher Soghoian, principal technologist with the ACLU in Washington, D.C. “It’s like they’re kicking down the doors of 50 homes and searching 50 homes because they don’t know where the bad guy is.” A similar controversy erupted in nearby Seattle last November, when  alternative news website The Stranger reported that a new apparatus capable of geo-locating and tracking the movement of any wireless device that passes it was quietly installed in a Seattle neighborhood.
  • ...1 more annotation...
  • The U.S. Supreme Court unanimously ruled in June that warrantless searches of cellphone data were illegal in most cases. It is unclear how the ruling would apply to such a device that is capable of indiscriminate data collection, but police say it is not used for that purpose.
Paul Merrell

Cooperation between British spies and Gaddafi's Libya revealed in official papers | UK ... - 0 views

  • Britain’s intelligence agencies engaged in a series of previously unknown joint operations with Colonel Muammar Gaddafi’s government and used the information extracted from rendition victims as evidence during partially secret court proceedings in London, according to an analysis of official documents recovered in Tripoli since the Libyan revolution. The exhaustive study of the papers from the Libyan government archives shows the links between MI5, MI6 and Gaddafi’s security agencies were far more extensive than previously thought and involved a number of joint operations in which Libyan dissidents were unlawfully detained and allegedly tortured. At one point, Libyan intelligence agents were invited to operate on British soil, where they worked alongside MI5 and allegedly intimidated a number of Gaddafi opponents who had been granted asylum in the UK.
  • the research suggests that the fruits of a series of joint clandestine operations also underpinned a significant number of court hearings in London between 2002 and 2007, during which the last Labour government unsuccessfully sought to deport Gaddafi’s opponents on the basis of information extracted from people who had been “rendered” to his jails. In addition, the documents show that four men were subjected to control orders in the UK – a form of curfew – on the basis of information extracted from victims of rendition who had been handed over to the Gaddafi regime.
  • Gaddafi’s agents recorded MI5 as warning in September 2006 that the two countries’ agencies should take steps to ensure that their joint operations would never be “discovered by lawyers or human rights organisations and the media”. In fact, papers that detail the joint UK-Libyan rendition operations were discovered by the New York-based NGO Human Rights Watch in September 2011, at the height of the Libyan revolution, in an abandoned government office building in Tripoli. Since then, hundreds more documents have been discovered in government files in Tripoli. A team of London-based lawyers has assembled them into an archive that is forming the basis of a claim for damages on behalf of 12 men who were allegedly kidnapped, tortured, subject to control orders or tricked into travelling to Libya where they were detained and mistreated.
  • ...2 more annotations...
  • The papers recovered from the dictatorship’s archives include secret correspondence from MI6, MI5 reports on Libyans living in the UK, a British intelligence assessment marked “UK/Libya Eyes Only – Secret” and official Libyan minutes of meetings between the two countries’ intelligence agencies.
  • An attempt by government lawyers to have that claim struck out was rejected by the high court in London on Thursday , with the judge, Mr Justice Irwin, ruling that the allegations “are of real potential public concern” and should be heard and dealt with by the courts.
Paul Merrell

ICC launches initial inquiry into potential war crimes in Palestinian territ... - Israe... - 0 views

  • The prosecutor of the International Criminal Court says she has opened a preliminary probe into possible war crimes in Palestinian territories. Fatou Bensouda said in a statement Friday she will conduct the preliminary examination in "full independence and impartiality."
  • Foreign Minister Avigdor Lieberman said Friday the ICC's scandalous decision intended to hurt Israel's right to defend itself from terror. "The same court which – with more than 200,000 dead in Syria – has not found cause to intervene there, or in Libya, or in other places, finds it appropriate to 'examine' the most moral military in the world, in a decision based entirely on anti-Israeli political considerations."
  • On January 1, a day before requesting ICC membership, the Palestinian government asked the prosecutors to investigate alleged crimes committed on its territory since June 13, 2014, the day three Israeli teens were kidnapped and murdered in the West Bank, leading Israel to launch a military operation in Palestinian territories.   "The office will conduct its analysis in full independence and impartiality," said the prosecution office in a statement, adding that it was a matter of "policy and practice" to open a preliminary examination after receiving such a referral.   "The case is now in the hands of the court," said Nabil Abuznaid, head of the Palestinian delegation in The Hague. "It is a legal matter now and we have faith in the court system."
  • ...1 more annotation...
  • Official sources in Jerusalem said "Israel categorically denies the announcement by the prosecutor on the opening of a preliminary examination based on the scandalous request by the Palestinian Authority."   "The PA is not a country and thus there is no cause for the court, even accords to its rules, to undertake such an inquiry. The decision is absurd, even more so given that the PA cooperates with terror organization Hamas, which commits war crimes against Israel – who is fighting terror," added the sources.   Palestinian Foreign Minister Riad Malki welcomed the move and said the Palestinian Authority would cooperate.
Paul Merrell

Obama to propose legislation to protect firms that share cyberthreat data - The Washing... - 0 views

  • President Obama plans to announce legislation Tuesday that would shield companies from lawsuits for sharing computer threat data with the government in an effort to prevent cyber­attacks. On the heels of a destructive attack at Sony Pictures Entertainment and major breaches at JPMorgan Chase and retail chains, Obama is intent on capitalizing on the heightened sense of urgency to improve the security of the nation’s networks, officials said. “He’s been doing everything he can within his executive authority to move the ball on this,” said a senior administration official who spoke on the condition of anonymity to discuss legislation that has not yet been released. “We’ve got to get something in place that allows both industry and government to work more closely together.”
  • The legislation is part of a broader package, to be sent to Capitol Hill on Tuesday, that includes measures to help protect consumers and students against ­cyberattacks and to give law enforcement greater authority to combat cybercrime. The provision’s goal is to “enshrine in law liability protection for the private sector for them to share specific information — cyberthreat indicators — with the government,” the official said. Some analysts questioned the need for such legislation, saying there are adequate measures in place to enable sharing between companies and the government and among companies.
  • “We think the current information-sharing regime is adequate,” said Mark Jaycox, legislative analyst at the Electronic Frontier Foundation, a privacy group. “More companies need to use it, but the idea of broad legal immunity isn’t needed right now.” The administration official disagreed. The lack of such immunity is what prevents many companies from greater sharing of data with the government, the official said. “We have heard that time and time again,” the official said. The proposal, which builds on a 2011 administration bill, grants liability protection to companies that provide indicators of cyberattacks and threats to the Department of Homeland Security.
  • ...5 more annotations...
  • But in a provision likely to raise concerns from privacy advocates, the administration wants to require DHS to share that information “in as near real time as possible” with other government agencies that have a cybersecurity mission, the official said. Those include the National Security Agency, the Pentagon’s ­Cyber Command, the FBI and the Secret Service. “DHS needs to take an active lead role in ensuring that unnecessary personal information is not shared with intelligence authorities,” Jaycox said. The debates over government surveillance prompted by disclosures from former NSA contractor Edward Snowden have shown that “the agencies already have a tremendous amount of unnecessary information,” he said.
  • The administration official stressed that the legislation will require companies to remove unnecessary personal information before furnishing it to the government in order to qualify for liability protection. It also will impose limits on the use of the data for cybersecurity crimes and instances in which there is a threat of death or bodily harm, such as kidnapping, the official said. And it will require DHS and the attorney general to develop guidelines for the federal government’s use and retention of the data. It will not authorize a company to take offensive cyber-measures to defend itself, such as “hacking back” into a server or computer outside its own network to track a breach. The bill also will provide liability protection to companies that share data with private-sector-developed organizations set up specifically for that purpose. Called information sharing and analysis organizations, these groups often are set up by particular industries, such as banking, to facilitate the exchange of data and best practices.
  • Efforts to pass information-sharing legislation have stalled in the past five years, blocked primarily by privacy concerns. The package also contains provisions that would allow prosecution for the sale of botnets or access to armies of compromised computers that can be used to spread malware, would criminalize the overseas sale of stolen U.S. credit card and bank account numbers, would expand federal law enforcement authority to deter the sale of spyware used to stalk people or commit identity theft, and would give courts the authority to shut down botnets being used for criminal activity, such as denial-of-service attacks.
  • It would reaffirm that federal racketeering law applies to cybercrimes and amends the Computer Fraud and Abuse Act by ensuring that “insignificant conduct” does not fall within the scope of the statute. A third element of the package is legislation Obama proposed Monday to help protect consumers and students against cyberattacks. The theft of personal financial information “is a direct threat to the economic security of American families, and we’ve got to stop it,” Obama said. The plan, unveiled in a speech at the Federal Trade Commission, would require companies to notify customers within 30 days after the theft of personal information is discovered. Right now, data breaches are handled under a patchwork of state laws that the president said are confusing and costly to enforce. Obama’s plan would streamline those into one clear federal standard and bolster requirements for companies to notify customers. Obama is proposing closing loopholes to make it easier to track down cybercriminals overseas who steal and sell identities. “The more we do to protect consumer information and privacy, the harder it is for hackers to damage our businesses and hurt our economy,” he said.
  • In October, Obama signed an order to protect consumers from identity theft by strengthening security features in credit cards and the terminals that process them. Marc Rotenberg, executive director of the Electronic Privacy Information Center, said there is concern that a federal standard would “preempt stronger state laws” about how and when companies have to notify consumers. The Student Digital Privacy Act would ensure that data entered would be used only for educational purposes. It would prohibit companies from selling student data to third-party companies for purposes other than education. Obama also plans to introduce a Consumer Privacy Bill of Rights. And the White House will host a summit on cybersecurity and consumer protection on Feb. 13 at Stanford University.
Paul Merrell

U.S. spies on millions of cars - The Wall Street Journal - MarketWatch - 0 views

  • The Justice Department has been building a national database to track in real time the movement of vehicles around the U.S., a secret domestic intelligence-gathering program that scans and stores hundreds of millions of records about motorists, according to current and former officials and government documents. The primary goal of the license-plate tracking program, run by the Drug Enforcement Administration, is to seize cars, cash and other assets to combat drug trafficking, according to one government document. But the database’s use has expanded to hunt for vehicles associated with numerous other potential crimes, from kidnappings to killings to rape suspects, say people familiar with the matter. Officials have publicly said that they track vehicles near the border with Mexico to help fight drug cartels. What hasn’t been previously disclosed is that the DEA has spent years working to expand the database “throughout the United States,’’ according to one email reviewed by The Wall Street Journal.
  • Many state and local law-enforcement agencies are accessing the database for a variety of investigations, according to people familiar with the program, putting a wealth of information in the hands of local officials who can track vehicles in real time on major roadways. The database raises new questions about privacy and the scope of government surveillance. The existence of the program and its expansion were described in interviews with current and former government officials, and in documents obtained by the American Civil Liberties Union through a Freedom of Information Act request and reviewed by The Wall Street Journal. It is unclear if any court oversees or approves the intelligence-gathering.
  •  
    Note that this parallels another national surveillance capability of facial recognition fueled by driver-license, jail booking, and other  photos, being developed by the FB I. 
Paul Merrell

Guess who credits the Mossad with producing the 'laptop documents?' | Middle East Eye - 0 views

  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
  • Although it has never been mentioned in news media, former International Atomic Energy Agency (IAEA) Director General, Mohamed El Baradei recalled in his memoirs that he was doubtful of the authenticity of the documents. “No one knew if any of this was real,” he wrote in reference to the laptop documents. Another former senior IAEA official told me, “It just really didn’t add up.  It made more sense that this information originated in another country.”  And as I have detailed in articles and in my book, key documents in the collection bear clear indications of fabrication. Support for that virtually unknown part of the Iran nuclear story has come from a surprising source: a popular Israeli account, celebrating the successes of the Mossad’s covert operations. “Mossad: The Greatest Missions of the Israeli Secret Service,” first published in Hebrew in 2010, and then published in English in 2012, was Israel’s best-selling book for months in 2010. But not only does it acknowledge that it was indeed the MEK that delivered the documents, it also suggests that at least some of the documents came from the Mossad.  
  • The co-authors of the book are far from critics of Israel’s policy toward Iran; One of the co-authors, Michael Bar-Zohar, is a well-connected former member of the Israeli Knesset and former paratrooper, who had previously written an authorised biography of Shimon Peres, as well as the biography of Isser Harel, the Mossad chief who presided over the kidnapping of Adolph Eichmann in Argentina. Much of what Bar-Zohar chronicled in the book had already been reported earlier by Israeli journalists - especially Ronen Bergman of the daily Yedioth Ahronoth.  In fact, Bergman accused Bar-Zohar of plagiarising his articles for much of the book, while changing only a few words.  But one thing that Bar-Zohar and co-author Nisham Mishal did not get from other Israeli journalists, was the role of the Mossad in regard to the laptop documents. 
  • ...5 more annotations...
  • Although they do not flatly state that the Mossad was the source of the documents, they certainly lead the reader to that conclusion. They begin by establishing the fact that the MEK was fronting for the Mossad in its revelation in August 2002 of Iran’s first enrichment facility at Natanz. The CIA, they write, “appeared to believe that the Mossad and the British MI6 were feeding MEK intelligence they had obtained, using the Iranian opposition as a hopefully credible source”.  And they explicitly confirm CIA’s suspicions. “According to Israeli sources,” they write, “It was, in fact, a watchful Mossad officer who had discovered the mammoth centrifuge installation at Natanz.”  Other sources, including Seymour Hersh and Connie Bruck have reported that the MEK got the intelligence on Natanz from the Israelis, but theirs is the first explicit acknowledgement attributed to an Israeli source that the MEK had revealed Natanz on the basis of Mossad intelligence.  What the Israeli co-authors do not say is that the Mossad was simply guessing at the purpose of Natanz, which the MEK mistakenly called a “fuel fabrication” facility, rather than a centrifuge enrichment facility.
  • Bar-Zohar and Mishal are little concerned with whether the Mossad’s laptop caper involved fraud or not. They obviously view the Israeli intelligence agency’s use of an Iranian exile group to get out documents that had been central to the international sanctions regime against Iran as a great triumph. But whatever their reasons, their book adds another layer to the growing body of evidence showing that the Bush administration and its allies hoodwinked the rest of the world with those documents.
  • The authors further suggest that the Mossad was behind information later released by the MEK on Mohsen Fakhrizadeh, the Iranian physics professor said to be shown in the laptop documents as the man in charge of that purported Iranian nuclear weapons research program. The MEK disclosed such personal details as Fakhrizadeh’s passport number and his home telephone number. But the Mossad chroniclers write: “This abundance of detail and means of transmission leads one to believe that, again, “a certain secret service” ever suspected by the West of pursuing its own agenda, painstakingly collected these facts and figures about the Iranian scientists and passed them to the Iranian resistance.” I asked Bar-Zohar’s research assistant, Nilly Ovnat, whether he had Israeli sources for those statements relating to the MEK and the laptop documents. She responded by          e-mail: “Professor Bar Zohar had other sources for most of the material concerning MEK and Natanz [and the] laptop, yet they could not be mentioned and cannot be discussed.”
  • Turning to the laptop documents, they make it clear that western intelligence had indeed obtained the documents from the MEK and suggest that the MEK got them from somewhere else. “The dissidents wouldn’t say how they had gotten hold of the laptop,” they write. They again frame the question of the origins of those documents in terms of CIA suspicions. “[T]he skeptical Americans suspected that the documents had been only recently scanned into the computer,” they write. “They accused the Mossad of having slipped in some information obtained from our own sources - and passing it to the MEK leaders for delivery to the West." Bar-Zohar and Mishal steer clear of any suggestion that the Mossad fabricated any documents, but their account leaves little doubt that they are convinced that the Mossad should be credited for the appearance of the documents. Their approach of referring to US suspicions, rather than stating it directly, appears to be a way of avoiding problems with Israeli military censors, who often clamp down on local reporting on sensitive issues while allowing references to foreign reports.
  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
Paul Merrell

Britain faces exposure over links to CIA secret torture sites | World news | The Observer - 0 views

  • US Senate report may confirm that Diego Garcia was used for extraordinary rendition after 9/11
  • The government stands accused of seeking to conceal Britain's role in extraordinary rendition, ahead of the release of a declassified intelligence report that exposes the use of torture at US secret prisons around the world.
  • Now, in a letter to the human rights group Reprieve, former foreign secretary William Hague has confirmed that the UK government has held discussions with the US about what it intends to reveal in the report which, according to al-Jazeera, acknowledges that the British territory of Diego Garcia was used for extraordinary rendition."We have made representations to seek assurances that ordinary procedures for clearance of UK material will be followed in the event that UK material provide[d] to the Senate committee were to be disclosed," Hague wrote.Cori Crider, a director at Reprieve, accused the UK government of seeking to redact embarrassing information: "This shows that the UK government is attempting to censor the US Senate's torture report. In plain English, it is a request to the US to keep Britain's role in rendition out of the public domain."
  • ...2 more annotations...
  • Lawyers representing a number of terrorist suspects held at Guantánamo Bay believe their clients were rendered via Diego Garcia. Papers found in Libya indicated that the US planned to transport Abdul-Hakim Belhaj, an opponent of Muammar Gaddafi, and his wife via the territory, an atoll in the Indian Ocean leased by Britain to the US. The government has denied Belhaj was rendered via Diego Garcia, but there are suspicions that others were held on the atoll.Crider said the UK's attempts to lobby the US into redacting parts of the report "turns the government's defence in the Libyan renditions case of Abdul-Hakim Belhaj and his wife entirely on its head".The government has consistently sought to block Belhaj from bringing a case against it.
  • "The government protested America would be angered if this kidnap case ever went to trial – and now we learn the British government is leaning on the Americans not to air Britain's dirty laundry. It exposes their litigation stance as mere posturing," she added.Confirmation that a British territory was involved in extraordinary rendition could leave the government vulnerable to legal action. Last month the European court of human rights ruled that the Polish government actively assisted the CIA's European "black site" programme, which saw detainees interrogated in secret prisons across the continent.The court concluded it was "established beyond reasonable doubt" that Abu Zubaydah, a Guantánamo detainee the US mistakenly believed to be a senior member of al-Qaida, was flown from a secret site in Thailand to another CIA prison in Stare Kiejkuty in northern Poland.The judges concluded that not only was Poland "informed of and involved in the preparation and execution of the [High Value Detainee] Programme on its territory", but also "for all practical purposes, facilitated the whole process, created the conditions for it to happen and made no attempt to prevent it", prompting lawyers to ask what else it has been used for since.
Paul Merrell

Edward Snowden: A 'Nation' Interview | The Nation - 0 views

  • Snowden: That’s the key—to maintain the garden of liberty, right? This is a generational thing that we must all do continuously. We only have the rights that we protect. It doesn’t matter what we say or think we have. It’s not enough to believe in something; it matters what we actually defend. So when we think in the context of the last decade’s infringements upon personal liberty and the last year’s revelations, it’s not about surveillance. It’s about liberty. When people say, “I have nothing to hide,” what they’re saying is, “My rights don’t matter.” Because you don’t need to justify your rights as a citizen—that inverts the model of responsibility. The government must justify its intrusion into your rights. If you stop defending your rights by saying, “I don’t need them in this context” or “I can’t understand this,” they are no longer rights. You have ceded the concept of your own rights. You’ve converted them into something you get as a revocable privilege from the government, something that can be abrogated at its convenience. And that has diminished the measure of liberty within a society.
  • From the very beginning, I said there are two tracks of reform: there’s the political and the technical. I don’t believe the political will be successful, for exactly the reasons you underlined. The issue is too abstract for average people, who have too many things going on in their lives. And we do not live in a revolutionary time. People are not prepared to contest power. We have a system of education that is really a sort of euphemism for indoctrination. It’s not designed to create critical thinkers. We have a media that goes along with the government by parroting phrases intended to provoke a certain emotional response—for example, “national security.” Everyone says “national security” to the point that we now must use the term “national security.” But it is not national security that they’re concerned with; it is state security. And that’s a key distinction. We don’t like to use the phrase “state security” in the United States because it reminds us of all the bad regimes. But it’s a key concept, because when these officials are out on TV, they’re not talking about what’s good for you. They’re not talking about what’s good for business. They’re not talking about what’s good for society. They’re talking about the protection and perpetuation of a national state system. I’m not an anarchist. I’m not saying, “Burn it to the ground.” But I’m saying we need to be aware of it, and we need to be able to distinguish when political developments are occurring that are contrary to the public interest. And that cannot happen if we do not question the premises on which they’re founded. And that’s why I don’t think political reform is likely to succeed. [Senators] Udall and Wyden, on the intelligence committee, have been sounding the alarm, but they are a minority.
  • The Nation: Every president—and this seems to be confirmed by history—will seek to maximize his or her power, and will see modern-day surveillance as part of that power. Who is going to restrain presidential power in this regard? Snowden: That’s why we have separate and co-equal branches. Maybe it will be Congress, maybe not. Might be the courts, might not. But the idea is that, over time, one of these will get the courage to do so. One of the saddest and most damaging legacies of the Bush administration is the increased assertion of the “state secrets” privilege, which kept organizations like the ACLU—which had cases of people who had actually been tortured and held in indefinite detention—from getting their day in court. The courts were afraid to challenge executive declarations of what would happen. Now, over the last year, we have seen—in almost every single court that has had this sort of national-security case—that they have become markedly more skeptical. People at civil-liberties organizations say it’s a sea change, and that it’s very clear judges have begun to question more critically assertions made by the executive. Even though it seems so obvious now, it is extraordinary in the context of the last decade, because courts had simply said they were not the best branch to adjudicate these claims—which is completely wrong, because they are the only nonpolitical branch. They are the branch that is specifically charged with deciding issues that cannot be impartially decided by politicians. The power of the presidency is important, but it is not determinative. Presidents should not be exempted from the same standards of reason and evidence and justification that any other citizen or civil movement should be held to.
  • ...14 more annotations...
  • The Nation: Explain the technical reform you mentioned. Snowden: We already see this happening. The issue I brought forward most clearly was that of mass surveillance, not of surveillance in general. It’s OK if we wiretap Osama bin Laden. I want to know what he’s planning—obviously not him nowadays, but that kind of thing. I don’t care if it’s a pope or a bin Laden. As long as investigators must go to a judge—an independent judge, a real judge, not a secret judge—and make a showing that there’s probable cause to issue a warrant, then they can do that. And that’s how it should be done. The problem is when they monitor all of us, en masse, all of the time, without any specific justification for intercepting in the first place, without any specific judicial showing that there’s a probable cause for that infringement of our rights.
  • Since the revelations, we have seen a massive sea change in the technological basis and makeup of the Internet. One story revealed that the NSA was unlawfully collecting data from the data centers of Google and Yahoo. They were intercepting the transactions of data centers of American companies, which should not be allowed in the first place because American companies are considered US persons, sort of, under our surveillance authorities. They say, “Well, we were doing it overseas,” but that falls under a different Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn’t even authorized by law. It’s just an old-ass piece of paper with Reagan’s signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers—sending hundreds of millions of people’s communications back and forth every day—were completely unprotected, electronically naked. GCHQ, the British spy agency, was listening in, and the NSA was getting the data and everything like that, because they could dodge the encryption that was typically used. Basically, the way it worked technically, you go from your phone to Facebook.com, let’s say—that link is encrypted. So if the NSA is trying to watch it here, they can’t understand it. But what these agencies discovered was, the Facebook site that your phone is connected to is just the front end of a larger corporate network—that’s not actually where the data comes from. When you ask for your Facebook page, you hit this part and it’s protected, but it has to go on this long bounce around the world to actually get what you’re asking for and go back. So what they did was just get out of the protected part and they went onto the back network. They went into the private network of these companies.
  • The Nation: The companies knew this? Snowden: Companies did not know it. They said, “Well, we gave the NSA the front door; we gave you the PRISM program. You could get anything you wanted from our companies anyway—all you had to do was ask us and we’re gonna give it to you.” So the companies couldn’t have imagined that the intelligence communities would break in the back door, too—but they did, because they didn’t have to deal with the same legal process as when they went through the front door. When this was published by Barton Gellman in The Washington Post and the companies were exposed, Gellman printed a great anecdote: he showed two Google engineers a slide that showed how the NSA was doing this, and the engineers “exploded in profanity.” Another example—one document I revealed was the classified inspector general’s report on a Bush surveillance operation, Stellar Wind, which basically showed that the authorities knew it was unlawful at the time. There was no statutory basis; it was happening basically on the president’s say-so and a secret authorization that no one was allowed to see. When the DOJ said, “We’re not gonna reauthorize this because it is not lawful,” Cheney—or one of Cheney’s advisers—went to Michael Hayden, director of the NSA, and said, “There is no lawful basis for this program. DOJ is not going to reauthorize it, and we don’t know what we’re going to do. Will you continue it anyway on the president’s say-so?” Hayden said yes, even though he knew it was unlawful and the DOJ was against it. Nobody has read this document because it’s like twenty-eight pages long, even though it’s incredibly important.
  • The big tech companies understood that the government had not only damaged American principles, it had hurt their businesses. They thought, “No one trusts our products anymore.” So they decided to fix these security flaws to secure their phones. The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone—if a hacker or something images your phone—they can’t read what’s on the phone itself, they can’t look at your pictures, they can’t see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example. It does not stop law enforcement from requesting copies of your texts from the providers via warrant. It does not stop them from accessing copies of your pictures or whatever that are uploaded to, for example, Apple’s cloud service, which are still legally accessible because those are not encrypted. It only protects what’s physically on the phone. This is purely a security feature that protects against the kind of abuse that can happen with all these things being out there undetected. In response, the attorney general and the FBI director jumped on a soap box and said, “You are putting our children at risk.”
  • The Nation: Is there a potential conflict between massive encryption and the lawful investigation of crimes? Snowden: This is the controversy that the attorney general and the FBI director were trying to create. They were suggesting, “We have to be able to have lawful access to these devices with a warrant, but that is technically not possible on a secure device. The only way that is possible is if you compromise the security of the device by leaving a back door.” We’ve known that these back doors are not secure. I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI. And even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it. Anyway, it’s not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
  • The Nation: Some years ago, The Nation did a special issue on patriotism. We asked about a hundred people how they define it. How do you define patriotism? And related to that, you’re probably the world’s most famous whistleblower, though you don’t like that term. What characterization of your role do you prefer? Snowden: What defines patriotism, for me, is the idea that one rises to act on behalf of one’s country. As I said before, that’s distinct from acting to benefit the government—a distinction that’s increasingly lost today. You’re not patriotic just because you back whoever’s in power today or their policies. You’re patriotic when you work to improve the lives of the people of your country, your community and your family. Sometimes that means making hard choices, choices that go against your personal interest. People sometimes say I broke an oath of secrecy—one of the early charges leveled against me. But it’s a fundamental misunderstanding, because there is no oath of secrecy for people who work in the intelligence community. You are asked to sign a civil agreement, called a Standard Form 312, which basically says if you disclose classified information, they can sue you; they can do this, that and the other. And you risk going to jail. But you are also asked to take an oath, and that’s the oath of service. The oath of service is not to secrecy, but to the Constitution—to protect it against all enemies, foreign and domestic. That’s the oath that I kept, that James Clapper and former NSA director Keith Alexander did not. You raise your hand and you take the oath in your class when you are on board. All government officials are made to do it who work for the intelligence agencies—at least, that’s where I took the oath.
  • The Nation: Creating a new system may be your transition, but it’s also a political act. Snowden: In case you haven’t noticed, I have a somewhat sneaky way of effecting political change. I don’t want to directly confront great powers, which we cannot defeat on their terms. They have more money, more clout, more airtime. We cannot be effective without a mass movement, and the American people today are too comfortable to adapt to a mass movement. But as inequality grows, the basic bonds of social fraternity are fraying—as we discussed in regard to Occupy Wall Street. As tensions increase, people will become more willing to engage in protest. But that moment is not now.
  • The Nation: You really think that if you could go home tomorrow with complete immunity, there wouldn’t be irresistible pressure on you to become a spokesperson, even an activist, on behalf of our rights and liberties? Indeed, wouldn’t that now be your duty? Snowden: But the idea for me now—because I’m not a politician, and I do not think I am as effective in this way as people who actually prepare for it—is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what “digital rights” should be. What values should we be protecting, and how do we assert them? What I can do—because I am a technologist, and because I actually understand how this stuff works under the hood—is to help create the new systems that reflect our values. Of course I want to see political reform in the United States. But we could pass the best surveillance reforms, the best privacy protections in the history of the world, in the United States, and it would have zero impact internationally. Zero impact in China and in every other country, because of their national laws—they won’t recognize our reforms; they’ll continue doing their own thing. But if someone creates a reformed technical system today—technical standards must be identical around the world for them to function together.
  • As for labeling someone a whistleblower, I think it does them—it does all of us—a disservice, because it “otherizes” us. Using the language of heroism, calling Daniel Ellsberg a hero, and calling the other people who made great sacrifices heroes—even though what they have done is heroic—is to distinguish them from the civic duty they performed, and excuses the rest of us from the same civic duty to speak out when we see something wrong, when we witness our government engaging in serious crimes, abusing power, engaging in massive historic violations of the Constitution of the United States. We have to speak out or we are party to that bad action.
  • The Nation: Considering your personal experience—the risks you took, and now your fate here in Moscow—do you think other young men or women will be inspired or discouraged from doing what you did? Snowden: Chelsea Manning got thirty-five years in prison, while I’m still free. I talk to people in the ACLU office in New York all the time. I’m able to participate in the debate and to campaign for reform. I’m just the first to come forward in the manner that I did and succeed. When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense. The charges they brought against me, for example, explicitly denied my ability to make a public-interest defense. There were no whistleblower protections that would’ve protected me—and that’s known to everybody in the intelligence community. There are no proper channels for making this information available when the system fails comprehensively.
  • The government would assert that individuals who are aware of serious wrongdoing in the intelligence community should bring their concerns to the people most responsible for that wrongdoing, and rely on those people to correct the problems that those people themselves authorized. Going all the way back to Daniel Ellsberg, it is clear that the government is not concerned with damage to national security, because in none of these cases was there damage. At the trial of Chelsea Manning, the government could point to no case of specific damage that had been caused by the massive revelation of classified information. The charges are a reaction to the government’s embarrassment more than genuine concern about these activities, or they would substantiate what harms were done. We’re now more than a year since my NSA revelations, and despite numerous hours of testimony before Congress, despite tons of off-the-record quotes from anonymous officials who have an ax to grind, not a single US official, not a single representative of the United States government, has ever pointed to a single case of individualized harm caused by these revelations. This, despite the fact that former NSA director Keith Alexander said this would cause grave and irrevocable harm to the nation. Some months after he made that statement, the new director of the NSA, Michael Rogers, said that, in fact, he doesn’t see the sky falling. It’s not so serious after all.
  • The Nation: You also remind us of [Manhattan Project physicist] Robert Oppenheimer—what he created and then worried about. Snowden: Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people. It is interesting that so many people who become disenchanted, who protest against their own organizations, are people who contributed something to them and then saw how it was misused. When I was working in Japan, I created a system for ensuring that intelligence data was globally recoverable in the event of a disaster. I was not aware of the scope of mass surveillance. I came across some legal questions when I was creating it. My superiors pushed back and were like, “Well, how are we going to deal with this data?” And I was like, “I didn’t even know it existed.” Later, when I found out that we were collecting more information on American communications than we were on Russian communications, for example, I was like, “Holy shit.” Being confronted with the realization that work you intended to benefit people is being used against them has a radicalizing effect.
  • The Nation: We have a sense, or certainly the hope, we’ll be seeing you in America soon—perhaps sometime after this Ukrainian crisis ends. Snowden: I would love to think that, but we’ve gone all the way up the chain at all the levels, and things like that. A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they’re really sore—the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment—they’re the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don’t like that at all. The Obama administration almost appears as though it is afraid of the intelligence community. They’re afraid of death by a thousand cuts—you know, leaks and things like that.
  • The Nation: You’ve given us a lot of time, and we are very grateful, as will be The Nation’s and other readers. But before we end, any more thoughts about your future? Snowden: If I had to guess what the future’s going to look like for me—assuming it’s not an orange jumpsuit in a hole—I think I’m going to alternate between tech and policy. I think we need that. I think that’s actually what’s missing from government, for the most part. We’ve got a lot of policy people, but we have no technologists, even though technology is such a big part of our lives. It’s just amazing, because even these big Silicon Valley companies, the masters of the universe or whatever, haven’t engaged with Washington until recently. They’re still playing catch-up. As for my personal politics, some people seem to think I’m some kind of archlibertarian, a hyper-conservative. But when it comes to social policies, I believe women have the right to make their own choices, and inequality is a really important issue. As a technologist, I see the trends, and I see that automation inevitably is going to mean fewer and fewer jobs. And if we do not find a way to provide a basic income for people who have no work, or no meaningful work, we’re going to have social unrest that could get people killed. When we have increasing production—year after year after year—some of that needs to be reinvested in society. It doesn’t need to be consistently concentrated in these venture-capital funds and things like that. I’m not a communist, a socialist or a radical. But these issues have to be 
addressed.
  •  
    Remarkable interview. Snowden finally gets asked some questions about politics. 
Paul Merrell

Ceasefire Announced Between Nigerian Government & Boko Haram - The Long War Journal - 0 views

  • Negotiations in Saudi Arabia between Boko Haram and the government of Nigeria have reportedly reached a ceasefire agreement. While the exact terms of the ceasefire have yet to be fully disclosed, it does appear that the 219 school girls kidnapped by the terrorist group in April are a part of the bargain. According to Nigerian presidential aide Hassan Tukur, Boko Haram "assured us they have the girls and they will release them." He further noted that he was "cautiously optimistic."
Paul Merrell

Evo Morales Slams Washington During Speech at Summit | News | teleSUR - 0 views

  • Bolivian president Evo Morales harshly condemned the United States Government for creating chaos, for promoting destabilization, and for attacking the sovereignty of nations as it continues to move forward with imperialist attitudes against countries around the world. Morales also spoke about poverty in Latin America, saying that it was important to point out that the causes of the problem lie in Washington and their imposition of neoliberal measures in the region. “The United States continues to see Latin America and the Caribbean as its backyard and the people of the region as its slaves, and this is the cause of extreme poverty in the region,” Morales said. The Bolivian president accused Washington of all the military coups that affected Latin America during the second half of the 20th century. “It is important to remember,” he stated, “that in the relations between the U.S. and Latin America and the Caribbean there are more failures than successes. The relations are loaded with armed interventions by the United States, invasions and constant aggressions.”
  • He criticized the United States for labeling the countries of the region as villains, when all these nations want to do is defend their people, their sovereignty, their right to freedom and democracy. “I want to tell [President Barack] Obama that empires disappear, while democracies last for ever,” he stated. “I want to express that mistake the U.S. makes when calling the Latin American and Caribbean countries the evil ones, when all they want to do is defend their sovereignty, their resources and their people.” Morales rejected the attacks by Washington and its allies against the region, accusing them of promoting wars, terrorism and poverty around the world. “I ask the United States what have we done to deserve being treated as slaves in our own countries?” he said. “We want to tell you Obama that Latin America has changed forever.” He called on Obama to stop extorting and attacking the countries of Latin America.
  • The president also state that, “Latin America has been kidnapped by the United States and we no longer want this. We no longer want presidential decrees that call us a threat to their country, we no longer want to be spied on … we want to live in peace.” Morales, therefore, called on Obama to engage in peaceful talks with the countries of region and to leave its double standards behind. “The United States should dispose of that double morale, because, for example, it is the country that resorts to torture more than any other country,” he said, questioning the human rights discourse of Washington when justifying interventionist policies against another nation. “We ask that (The United States) stop destroying complete civilizations and to stop looking for ghosts … we want to live in peace because it is less painful and more satisfying.”
  • ...1 more annotation...
  • Morales also questioned Washington's discourse of democracy. “How can you speak of democracy when you label countries of peace and democracy a threat to your security? … How can you speak of democracy when you send troops around the world menacing the sovereignty of other nations … How can you speak of threats to your security when your country is the largest producer of weapons in the world … weapons that are killing hundreds of thousands.” Morales also questioned Washington's discourse on human rights, saying it is the country that resorts to torture more than any other around the world, and when in the United States they have a grave crisis of racial discrimination and a serious human rights issue involving police against minorities. Evo Morales told Obama that the United States doesn't need to help Cuba, “what it needs to do is repair all the damages it has caused in that country.” Toward the end of his speech during the second day of the Summit of the Americas in Panama City, Morales criticized the United States for insisting on the aggressions against Venezuela despite the fact that 33 countries in the region have rejected them, while only two have agreed with them.
Paul Merrell

Ten years on, Iraq Lies in Ruins as New Evidence confirms U.S. used Death Squads to Man... - 0 views

  • Last week, the UK Guardian newspaper published the results of a 15-month investigation by the Guardian and BBC Arabic. Euphemistically titled ‘James Steele: America’s mystery man in Iraq‘, the video report presents fairly damning evidence that, in the immediate aftermath of the US invasion of Iraq, the US Government and military began to assemble a 10,000 strong ‘Shia militia’ that, under US command, would be used to do three things: Kidnap, torture, murder and maim members of the Iraq resistance and those members of the Iraqi population that supported them. Plants bombs that targeted predominantly Sunni and Shia areas in an effort to divide the population and thereby any unified resistance to the US occupation. Create the impression of a ‘civil war’ in Iraq that could be used by the US and European governments and militaries to justify the continued occupation of Iraq for ‘peace-keeping’ purposes. While the 50 minute documentary is proof enough that Rumsfeld, Cheney, General Petraeus, and all the other NeoCon warhawks and CIA monsters consciously employed the services of former US Army Colonel James Steele in the organisation of death squads against the Iraqi grass-roots resistance (a tactic that he, Steele, had used against resistance movements in South America in the 1970s and 90′s), it panders to the official narrative that ‘sectarianism’ in Iraq was the root cause of the carnage that unfolded.
  • The so-called ‘Shia militia’ used by the American government (with the help and advice of British and Israeli counter-insurgency ‘experts’) were recruited directly by the CIA and people like James Steele to carry out extra-judicial murders of anyone they could loosely identify as ‘resistance’. In order to cloak this strategy, indiscriminate attacks on Iraqi civilians, Shia and Sunni alike, were carried out on a massive scale. Some of these individuals, in another setting, would be called ‘al-Qaeda’. Their usefulness in the employ of US warhawks in the Pentagon was doubly valuable because they both justified continued US occupation and provided ‘proof’ for the American War on Terror mythology, ex post facto, that the US was at war with the perpetrators of 9/11. Whereas before the invasion in 2003 there was absolutely nothing to link 9/11 to Saddam Hussein’s Iraq, the creation of death squads (real) labelled ‘al Qaeda in Iraq’ (fictitious) ‘made real’ the lie that America and all Western civilization was at war against hordes of irrational and violent Muslims, and became the template for instigating terrorism to suppress popular uprisings in Yemen, Mali and elsewhere. Once they have people violent, they can wear down and manage the national popular resistance, ensuring no opposition to the real strategic objectives (namely the control of Middle Eastern oil). The US forces of occupation, along with their British counterparts, had long experience in what actually happens when you militarily invade and occupy a sovereign nation: the people resist, and not just one ethnic or religious group, but more or less the whole population. There is nothing quite like a foreign occupation for uniting a country.
  • In Iraq, these US-controlled ‘Shia’ death squads have been operating in much the same way, and while the media is content to portray them as ordinary Shias motivated by religious bias, they are in fact hired thugs who value only the money they are paid by their US masters and the promise of positions of power in a future Iraqi government. Like the rank and file of the ‘Libyan rebels’ and the ‘Free Syrian Army’, these people form the dregs of Arab and Middle Eastern societies. Led by spellbinders who veil their barbaric actions with religious prose, secular leaders in the region, like Ghaddafi and Assad, and Nasser and Arafat before them, struggled in vain to keep them at bay. The reason for this is because the US, Britain, France and Israel have consistently supported – in the form of weapons, money, training and blatant lies – the extremists against the rational voices. Throughout the US occupation of Iraq, the main representative of Shias in Iraq, Muqtada al-Sadr, has repeatedly called for unity among Shia and Sunni Iraqis in the face of foreign occupation and deception in the form of efforts to divide the resistance. These efforts included the bombing of bridges in Baghdad and other Iraqi cities in an effort to prevent communication between Iraqis, the use of widespread terror tactics to force Sunni and Shia Iraqis to flee their homes, and the bombing of religious shrines, either Shia or Sunni, in an effort to create the reality of ‘sectarian strife’. Iraq today is in ruins. The country has been ripped apart socially, mainly by way of the literal ripping apart of tens of thousands of civilians, with many being first brutally and systematically tortured by US-sponsored death squads. Hundreds of thousands more have been summarily murdered, either by the bombs of US aircraft, the bullets of US soldiers, or those ubiquitous and very effective ‘car bombs‘ planted by US and British operatives and their hired thugs.
Paul Merrell

Hillary Clinton, With Little Notice, Vows to Embrace an Extremist Agenda on Israel - 0 views

  • Photo: Alex Brandon/APFormer President Bill Clinton on Monday met in secret (no press allowed) with roughly 100 leaders of South Florida’s Jewish community, and, as the Times of Israel reports, “He vowed that, if elected, Hillary Clinton would make it one of her top priorities to strengthen the U.S.-Israel alliance.” He also “stressed the close bond that he and his wife have with the State of Israel.” It may be tempting to dismiss this as standard, vapid Clintonian politicking: adeptly telling everyone what they want to hear and making them believe it. After all, is it even physically possible to “strengthen the U.S.-Israel alliance” beyond what it already entails: billions of dollars in American taxpayer money transferred every year, sophisticated weapons fed to Israel as it bombs its defenseless neighbors, blindly loyal diplomatic support and protection for everything it does? But Bill Clinton’s vow of even greater support for Israel is completely consistent with what Hillary Clinton herself has been telling American Jewish audiences for months. In November, she published an op-ed in The Forward in which she vowed to strengthen relations not only with Israel, but also with its extremist prime minister, Benjamin Netanyahu.
  • Her comments on Israel have similarly contained implicit criticisms of Obama’s foreign policy: namely, that he has created or at least allowed too much animosity with Netanyahu. In her Forward op-ed, she wrote that the Israeli prime minister’s “upcoming visit to Washington is an opportunity to reaffirm the unbreakable bonds of friendship and unity between the people and governments of the United States and Israel.” She pointedly added: “The alliance between our two nations transcends politics. It is and should always be a commitment that unites us, not a wedge that divides us.” And in case her message is unclear, she added this campaign promise: “I would also invite the Israeli prime minister to the White House in my first month in office.” Last month, Clinton wrote an even more extreme op-ed in the Jewish Journal, one that made even clearer that she intends to change Obama’s policy to make it even more “pro-Israel.” It begins: “In this time of terrorism and turmoil, the alliance between the United States and Israel is more important than ever. To meet the many challenges we face, we have to take our relationship to the next level.”
  • “With every passing year, we must tie the bonds tighter,” she wrote. Tie those bonds tighter. Thus: As part of this effort, we need to ensure that Israel continues to maintain its qualitative military edge. The United States should further bolster Israeli air defenses and help develop better tunnel detection technology to prevent arms smuggling and kidnapping. We should also expand high-level U.S.-Israel strategic consultations. As always, there is not a word about the oppression and brutality imposed on Palestinians as part of Israel’s decadeslong occupation. She does not even acknowledge, let alone express opposition to, Israel’s repeated, civilian-slaughtering bombing of the open-air prison in Gaza. That’s because for Clinton — like the progressive establishment that supports her — the suffering and violence imposed on Palestinians literally do not exist. None of this is mentioned, even in passing, in the endless parade of pro-Clinton articles pouring forth from progressive media outlets.
  • ...1 more annotation...
  • Clinton partisans — being Clinton partisans — would, if they ever did deign to address Israel/Palestine, undoubtedly justify Clinton’s hawkishness on the ground of political necessity: that she could never win if she did not demonstrate steadfast devotion to the Israeli government. But for all his foreign policy excesses, including on Israel, Obama has proven that a national politician can be at least mildly more adversarial to Israeli leaders and still retain support. And notably, there is at least one politician who rejects the view that one must cling to standard pro-Israel orthodoxy in order to win; just yesterday, Donald Trump vowed “neutrality” on Israel/Palestine. As I noted a couple of weeks ago, Clinton advocates are understandably desperate to manufacture the most trivial controversies because the alternative is to defend her candidacy based on her prior actions and current beliefs (that tactic was actually pioneered by then-Clinton operative Dick Morris, who had his client turn the 1996 election into a discussion of profound topics such as school uniforms). If you were a pro-Clinton progressive, would you want to defend her continuous vows to “strengthen” U.S. support for the Netanyahu government and ensure that every year “we must tie the bonds tighter”?
  •  
    Glen Greenwald (a Jew) tackles Hillary's promise to increase support for Israel's right-wing government, at the expense of Palestinian liberty. With friends like Israel, who needs enemies?
Paul Merrell

Palestinian Legislator Jarrar Sentenced To 15 Months - nsnbc international | nsnbc inte... - 0 views

  • An Israeli court sentenced, Sunday, democratically-elected leftist Palestinian legislator, and a senior political leader of the Popular Front for the Liberation of Palestine (PFLP), Khalida Jarrar to 15 months imprisonment.
  • The army kidnapped the legislator on April 2nd of this year, and on April 5th, she was sentenced for six months imprisonment, under arbitrary Administrative Detention orders, without charges. On April 15, the Israeli military prosecutor’s office filed an indictment of twelve charges against Khalida Jarrar, including what it called “membership in an illegal organization,” in addition to “holding and participating in protests” in solidarity with Palestinian political prisoners. The PFLP denounced the ruling and said it shows the unjust, chaotic and arbitrary nature of Israeli courts and the legal system in dealing with Palestinian political prisoners. The PFLP reiterated its firm stance in not recognizing Israeli military courts, as they are part of the illegal occupation of Palestine. It also demanded referring the file of all detained legislators to the United Nations, in addition to calling for an urgent meeting of the Security Council to discuss the issues of Palestinian political prisoners, including detained women facing constant violations.
  • “Israel is deliberately targeting elected and senior political leaders of various factions in Palestine,” the PFLP said, “Jarrar is an important political figure, a symbol for steadfastness and determination; she always held her head high and challenged the Israeli abuse and violations.” The PFLP also stated that Israel is trying to increase its pressure, and is escalating its violations, against Palestinian women, holding important roles in leading the national struggle against the occupation.
Paul Merrell

Israel Assassinates Senior Hezbollah Leader In Syria - nsnbc international | nsnbc inte... - 0 views

  • The Israeli Air Force assassinated, on Saturday at night, the former political prisoner and senior Hezbollah leader, Samir al-Kuntar, in an air strike in the Jermana area of the Syrian capital Damascus.
  • The Hezbollah party in Lebanon said the Israeli Air Force violated Syrian air space at around 10:30 at night, and fired five missiles into a residential building, killing six people, including al-Kuntar, and wounding at least twelve others. The Civil Defense Forces in Jermana said two Israeli war jets violated Syrian airspace and struck the building with four missiles. Initial reports were first unconfirmed, but his brother later announced on his Twitter account the confirmed dead of al-Kuntar. Samir al-Kuntar spent 29 years in Israeli prisons, and was released on July 16 2008, under a prisoner-swap agreement reached through negotiation between Hezbollah and the Israeli government through a third party. As part of the agreement, Israel released al-Kuntar and four other Hezbollah members, who were taken prisoner during the July 2006 war between Hezbollah and Israel, in which Israeli troops invaded and bombed Southern Lebanon, and Hezbollah fired rockets across the border into Israel. Hezbollah is the leading party in southern Lebanon, and has a fighting force that works to deflect further Israeli invasions into Lebanon.
  • The 2008 agreement also included the transfer of the remains of 199 fighters, including Palestinian and Lebanese fighters, in exchange for Hezbollah releasing the remains of Israeli soldiers killed during the war. Retired Israeli major general and current Member of Knesset (Parliament) with the Zionist Union party, Major. Gen. Eyal Ben-Reuven, hailed the reports of the assassination, and said that the Air Force and all others involved in the incident “should be commended for the successful operation.” Ben-Reuven, the former head of the Northern Command on the Israeli army, said the Israeli government is preparing for retaliatory attacks by Hezbollah. Israel held al-Kuntar responsible for the April 22nd 1979 attack that led to the death of four Israelis: a police officer, an Israeli civilian and his 4-year-old daughter, while the man’s other daughter, 2, was accidentally suffocated by her mother, while trying to keep her quiet. The attackers allegedly kidnapped the family in Nahariya and took them to a beach, then tried to load their hostages on a rubber boat.
  • ...1 more annotation...
  • Israeli police decided to attack with full force instead of attempting to negotiate, and the father of the family and a police officer were killed. The 4-year old was killed when her head hit a rock during the scuffle. Two fighters, identified as Abdul-Majid Aslan and Moayyad Mhanna, were killed, while al-Kuntar and Ahmad al-Abrass were captured. Al-Abrass was later released, along with 1150 detainees, in a prisoner swap agreement, led by the Popular Front for the Liberation of Palestine – General Command (PFLP-GC). After capturing al-Kuntar, an Israeli court sentenced him to five life-terms, Upon his release in the prisoner swap deal, he returned to Lebanon and joined Hezbollah, then went on to live in Syria.
  •  
    More Israeli impunity to international law.
Paul Merrell

Civil Rights Coalition files FCC Complaint Against Baltimore Police Department for Ille... - 0 views

  • This week the Center for Media Justice, ColorOfChange.org, and New America’s Open Technology Institute filed a complaint with the Federal Communications Commission alleging the Baltimore police are violating the federal Communications Act by using cell site simulators, also known as Stingrays, that disrupt cellphone calls and interfere with the cellular network—and are doing so in a way that has a disproportionate impact on communities of color. Stingrays operate by mimicking a cell tower and directing all cellphones in a given area to route communications through the Stingray instead of the nearby tower. They are especially pernicious surveillance tools because they collect information on every single phone in a given area—not just the suspect’s phone—this means they allow the police to conduct indiscriminate, dragnet searches. They are also able to locate people inside traditionally-protected private spaces like homes, doctors’ offices, or places of worship. Stingrays can also be configured to capture the content of communications. Because Stingrays operate on the same spectrum as cellular networks but are not actually transmitting communications the way a cell tower would, they interfere with cell phone communications within as much as a 500 meter radius of the device (Baltimore’s devices may be limited to 200 meters). This means that any important phone call placed or text message sent within that radius may not get through. As the complaint notes, “[d]epending on the nature of an emergency, it may be urgently necessary for a caller to reach, for example, a parent or child, doctor, psychiatrist, school, hospital, poison control center, or suicide prevention hotline.” But these and even 911 calls could be blocked.
  • The Baltimore Police Department could be among the most prolific users of cell site simulator technology in the country. A Baltimore detective testified last year that the BPD used Stingrays 4,300 times between 2007 and 2015. Like other law enforcement agencies, Baltimore has used its devices for major and minor crimes—everything from trying to locate a man who had kidnapped two small children to trying to find another man who took his wife’s cellphone during an argument (and later returned it). According to logs obtained by USA Today, the Baltimore PD also used its Stingrays to locate witnesses, to investigate unarmed robberies, and for mysterious “other” purposes. And like other law enforcement agencies, the Baltimore PD has regularly withheld information about Stingrays from defense attorneys, judges, and the public. Moreover, according to the FCC complaint, the Baltimore PD’s use of Stingrays disproportionately impacts African American communities. Coming on the heels of a scathing Department of Justice report finding “BPD engages in a pattern or practice of conduct that violates the Constitution or federal law,” this may not be surprising, but it still should be shocking. The DOJ’s investigation found that BPD not only regularly makes unconstitutional stops and arrests and uses excessive force within African-American communities but also retaliates against people for constitutionally protected expression, and uses enforcement strategies that produce “severe and unjustified disparities in the rates of stops, searches and arrests of African Americans.”
  • Adding Stingrays to this mix means that these same communities are subject to more surveillance that chills speech and are less able to make 911 and other emergency calls than communities where the police aren’t regularly using Stingrays. A map included in the FCC complaint shows exactly how this is impacting Baltimore’s African-American communities. It plots hundreds of addresses where USA Today discovered BPD was using Stingrays over a map of Baltimore’s black population based on 2010 Census data included in the DOJ’s recent report:
  • ...2 more annotations...
  • The Communications Act gives the FCC the authority to regulate radio, television, wire, satellite, and cable communications in all 50 states, the District of Columbia and U.S. territories. This includes being responsible for protecting cellphone networks from disruption and ensuring that emergency calls can be completed under any circumstances. And it requires the FCC to ensure that access to networks is available “to all people of the United States, without discrimination on the basis of race, color, religion, national origin, or sex.” Considering that the spectrum law enforcement is utilizing without permission is public property leased to private companies for the purpose of providing them next generation wireless communications, it goes without saying that the FCC has a duty to act.
  • But we should not assume that the Baltimore Police Department is an outlier—EFF has found that law enforcement has been secretly using stingrays for years and across the country. No community should have to speculate as to whether such a powerful surveillance technology is being used on its residents. Thus, we also ask the FCC to engage in a rule-making proceeding that addresses not only the problem of harmful interference but also the duty of every police department to use Stingrays in a constitutional way, and to publicly disclose—not hide—the facts around acquisition and use of this powerful wireless surveillance technology.  Anyone can support the complaint by tweeting at FCC Commissioners or by signing the petitions hosted by Color of Change or MAG-Net.
  •  
    An important test case on the constitutionality of stingray mobile device surveillance.
« First ‹ Previous 61 - 78 of 78
Showing 20 items per page