Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged latest

Rss Feed Group items tagged

Paul Merrell

Glenn Greenwald  "The Goal Of The U.S. Government Is To Eliminate ALL Privacy... - 0 views

  • When Edward Snowden leaked American intelligence secrets the whole world became aware of the extent of US-UK surveillance of global phone and internet traffic. Have the revelations flagged up a corrosive infringement of individual liberty, or undermined efforts to protect the world from terrorism? Hardtalk speaks to journalist, Glenn Greenwald - the man who broke the Snowden story. His mission, he says, is to hold power to account. Is this a journalistic crusade that's gone too far?
  •  
    The latest hilarious chapter in the ongoing saga of BBC commentators trying to best Glenn Greenwald in an interview. This time with a stuffed-shirt, pompous type who does an exceedingly poor job of concealing that his is the voice of GCHQ. How many documents do you have? Who else has them? How are they protected? Don't you think that you should give them back to NSA? What makes you think you are qualified to make decisions about what to publish? Haven't you endangered the security of millions of people with your sensational, advocacy journalism. Don't you know that Bob Woodward has severely criticized the way you have handled this?   Greenwald, of course, makes mincemeat of the latest BBC talking head to tackle him without knowing the subject matter and always turns the questions back onto the real story: that government agencies have created an Orwellian surveillance state, that goverrnent can't be trusted to operate in secrecy. Greenwald so thoroughly danced on the fellow's brain that he probably missed that Greenwald had not only demonstrated that the guy was a government stooge but then told him flat out that he was.   When the guy tried the old shouting match trick, Greenwald calmly informed him that if he wanted to filibuster that Greenwald would hang up and let him filibuster to his heart's content but that if he wanted to conduct an interview he would darned well allow Greenwald to answer the questions before changing the subject. All in all, a masterful performance by a U.S. constitutional lawyer, uncowed by the interviewer's highbrow received pronunciation. See http://en.wikipedia.org/wiki/Received_Pronunciation This reminded me of federal District Court Judge Owen Panner's First Law of Trial Conduct: Never try to cross-examine an expert. In my time I've met a very few lawyers capable of doing so but it takes an incredible amount of research and consultation with another expert or five, and the setting of meticulous traps. Glenn Greenwald's latest B
Paul Merrell

Reading the Runes in the Latest Report on Iran's Nuclear Program « LobeLog - 0 views

  • The latest report from the International Atomic Energy Agency on Iran’s nuclear program contains much that is worth emphasizing. Iran is continuing to account for all its declared nuclear material (and the agency appears to have no reason to suspect the existence of undeclared nuclear material). Iran is also continuing to comply fully with the commitments it made to the United States and others on November 24, 2013 and which it has renewed since. Much of the commentary on the report on Iran will inevitably highlight Iran’s continuing failure to resolve two concerns the IAEA raised in May 2014. I, however, am surprised, that the IAEA director general omits all mention of two Iranian attempts, since the last IAEA report in mid-November, to address those and some other allegations that the IAEA is investigating. On December 2, Reuters reported that in a statement to the IAEA Iran had rejected accusations that it was stonewalling IAEA investigations. Instead, Iran had affirmed that it had given the IAEA “pieces of evidence” indicating that documents adduced by the IAEA as reasons for concern were “full of mistakes and contain fake names with specific pronunciations which only point towards a certain IAEA member as their forger.” (The member Iran probably had in mind was Israel). Yet there is no mention whatsoever of this Iranian rebuttal in the latest report, still less any detailed IAEA rebuttal of the rebuttal. Instead, the director general resorts to an exceptionally bland (and in the circumstances misleading) phrase: “Iran has not provided any explanations that enable the Agency to clarify the two outstanding practical measures [concerns].”
  • In effect Iran is being asked to prove its innocence. But when it tries to do so, the evidence it submits is rejected out of hand because it calls into question the evidence that is being used to justify the suspicion of guilt. Is that consistent with due process? Also surprising is the omission of any mention of Iran’s offer of access to a suspected nuclear site at Marivan, reported by Reuters on December 11. A controversial annex to the IAEA’s November 2011 report referred to one member state having informed the agency that major high-explosives tests were conducted at Marivan in the first part of the last decade. Since the IAEA has not taken Iran up on the offer, it presumably believes that a visit to Marivan would serve no useful purpose. If that is the case, do they not owe it to Iran to withdraw the November 2011 charge relating to Marivan? If the agency isn’t arranging a site visit, it should explain to IAEA member states that it considers the information provided by “a member state” to have been unreliable or irrelevant.
  • raise these questions not to criticise the IAEA secretariat, which continues to do a first-class job in Iran, as professional and objective as ever. Rather, I want to offset the hue and cry that opponents of a nuclear deal will raise over the reference in the latest report to Iran’s failure to provide explanations. I’m suggesting that there is more to this than meets the eye.
  • ...1 more annotation...
  • Turning back to the positive, Iran is continuing to allow exceptional access to centrifuge assembly workshops, centrifuge rotor production workshops, and storage facilities. This access has enabled the IAEA to conclude that centrifuge rotor manufacturing and assembly are consistent with Iran’s replacement program for failed centrifuges. In other words, Iran is not manufacturing and diverting rotors to some clandestine enrichment facility. This is highly significant. Amid the endless furor over the number of centrifuges that Iran should retain under a comprehensive agreement, the public could be forgiven for failing to appreciate that, theoretically, Iran is far more likely to “sneak out”—using a clandestine enrichment facility—than to “break out” under the eyes of IAEA inspectors, using the centrifuges it wants to retain. I inserted “theoretically” to emphasize that at this point there is no evidence that Iran intends either to break out or to sneak out. And as long as the IAEA retains access to Iran’s rotor manufacturing, assembly, and storage facilities—which it will lose if the opponents of a deal have their way—we can all feel confident of a continuing absence of intention. In essence, the latest IAEA report contains nothing that would justify the United States and its allies declining to close a deal with Iran in the course of the coming four weeks. I, for one, am rooting for their success.
Gary Edwards

Obama gives himself control of all communication systems in America - RT - 0 views

  •  
    Awful stuff.  Another Obama executive order suspending the Constitution and terminating the Bill of Rights. Revoking the right of habeas corpus is unconstitutional. So is declaring a national emergency without congressional approval. The Constitution declares, "The Privilege of the Writ of Habeas Corpus shall not be suspended, unless when in cases of rebellion or invasion the public safety may require it." While Congress has passed many an unConstitutional Law regarding "National Emergency Powers", there is nothing in the Constitution granting any branch of the Federal government to tear up the Constitution and Bill of Rights.  Atrocities like FiSA, The Military Commissions Act, NSP51, HSPD20, the John Warner Defense Authorization Act, the National Emergencies Act, and the Patriot Act are un Constitutional to the core.   Only the American people, through their representatives in Congress, can declare a national emergency.  With the exception of the habeas corpus clause, the Constitution makes no allowance for the suspension of any of its provisions during a national emergency.  Many statist seeking to breach the Constitution and Bill of Rights argue that the granting of emergency powers by Congress is implicit in its Article I, section 8 authority to "provide for the common Defense and general Welfare," the commerce clause, its war, armed forces, and militia powers, and the "necessary and proper" clause empowering it to make such laws as are required to fulfill the executions of "the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof." But this issue of "implied" powers defies an actual reading of the Constitution, and seeks to breach the meaning of that most basic of all Madisonian  Constitutional concepts embedded into the framework of limited government: "enumerated powers".  The United States is a government of enumerated powers.  N
Paul Merrell

Russia May Hit Back at Saudi Arabia for Volgogard Attacks - 0 views

  • Russian intelligence has now reportedly obtained solid proof that Saudi Arabia was directly involved in the twin terror attacks on the city of Volgograd. The attacks killed more than 32 people and injured over 100 others. Most of the victims were civilians. According to an informed Russian official source, reported by the Fars News Agency, Russia’s Federal Security Service (FSB) has informed President Vladimir Putin of the Saudi link to the Volgograd massacre. This will come as no surprise to Putin. The Russian leader was warned by the Saudi intelligence chief Prince Bandar Bin Sultan during a heated four-hour private meeting back in July that Wahhabi-sponsored terrorists based in the North Caucasus region of Russia would be targeting the Sochi Winter Olympics.
  • The Sochi Games are due to open on February 7. Volgograd is a key transport hub linking Moscow with the southern Russian territory and the Black Sea resort city of Sochi in particular, where the Winter Olympics are to be held. The double bombings on Volgograd’s transport system on 29-30 December were therefore unmistakably an assault on Russia’s hosting of the Olympics. The atrocity caused the deaths of several women and children, and in the aftermath President Putin was livid in his disgust at the attacks. He said there was no justification, whatsoever, for the killing of innocent civilians and he vowed to “destroy the terrorists” behind the bombings. This raises the onerous question: What will Putin do next if he has, in fact, been told that the authors of the Volgograd crime against humanity are connected to the Saudi rulers? This could be construed as an act of war. There are unconfirmed reports that Putin and his senior intelligence officers have already drawn up plans to “destroy Saudi Arabia” over its systematic sponsoring of terrorism on Russian territory.
  • The Volgograd atrocity is just the latest in a long series of terrorist acts connected to Saudi-sponsored radicals in the North Caucasus. Back in October, another suicide bomb on a packed bus in Volgograd left six dead. The group believed to be behind these attacks is known as the Caucasus Caliphate, led by Doko Umarov. Saudi Arabia is a major source of funds for the Caucasus Caliphate, which espouses the same fundamentalist ideology as the Saudi-sponsored Takfiris operating in Syria, Lebanon, Pakistan, Yemen and Iraq. Based in Chechnya and Dagestan, Umarov has publicly stated that “all means necessary would be used to derail” the Sochi Olympics. Previously, the same network carried out suicide bomb attacks on Moscow’s metro system in 2010 and 2011, which caused dozens of deaths. The Caucasus extremists are known to have close logistical connection with both American and Saudi military intelligence.
  • ...3 more annotations...
  • Indeed, from the early 1990s following the breakup of the Soviet Union, the Americans and the Saudis redeployed their Afghan Al Qaeda tactics into the southern Russian territories as a way to further destabilize Moscow. One of the architects of this plan was former CIA chief William Casey. This US and Saudi covert operations fuelled the two Chechen wars of 1994-95 and 1999-2000. Although Moscow has since managed to subdue the large-scale violence, the Caucasus Caliphate remains a potent source of terrorism and sabotage, as the latest horror in Volgograd all too grimly attests. Saudi spy chief Bandar’s earlier threat to Putin that the Sochi Games were at risk of attack from the Caucasus-based terror groups was thus no idle threat. In retrospect his words amount to self-indictment. Bandar reportedly boasted to Putin: “We control them (the Caucasus militants).” This implies that Saudi Arabia can turn on and off the conduct of these terror groups. That places Saudi Arabia as the ultimate author of a catalogue of crimes that Russia has endured for the most part of 20 years, the latest being in the city of Volgograd.
  • It is not known what precise evidence Russian intelligence has lately uncovered that allegedly pinpoints Saudi Arabia’s involvement in the Volgograd massacre. But there is already copious circumstantial evidence, as well as Bandar’s own braggadocio. One of the suicide bombers in the Volgograd double attack has been identified as Russian national Pavel Pechyonkin (32). He reportedly traveled to Syria last year and fought in the ranks of Saudi-backed extremists trying to topple the government of Bashar al Assad.
  • If the Russians have acquired hard evidence of Saudi collusion in terrorism on their soil, there is firm legal ground for Russia to exact retaliation under the doctrine of self-defense. In a second meeting between Bandar and Putin, the Russian leader reportedly told the Saudi in no uncertain terms that his support for terrorism was “a double-edged sword” that would eventually inflict damage on those who wield it. For years now Saudi Arabia has gotten away with covert state-sponsored terrorism disrupting its Middle East neighbors. Syria, Lebanon and Iraq are but the latest victims. The Saudis have done this with impunity in the service of American imperialism, just as Zionist Israel has likewise functioned as an imperial crime syndicate. But now Saudi Arabia may have swung its double-edged sword too recklessly. It has apparently been caught red-handed in an outrage against the Russian bear. Prince Bandar, we can be sure, will from now on be making extra checks beneath his car.
  •  
    Note that it has long been known that Chechen revolutionaries in Russia have been the beneficiaries of Saudi and U.S. assistance, with firm evidence of Saudi command and control.  
Gary Edwards

The Lawless President - 0 views

  •  
    Excellent read!  Peter Ferrara walks us through the latest Obama assault on the Constitution, this time his refusal to enforce laws he disagrees with.  Surprisingly, this now includes the employer mandate portion of ObamaCare!!!  Why he has to do this however is a stunning story. Bottom line:  The latest jobs report has the economy producing 195,000 new jobs in the past quarter.  The problem is, 100% of these new jobs are part-time.  Thanks to ObamaCare.   "The duties of the President of the United States are spelled out in Article II, Section 3 of the Constitution, which states, inter alia, that the President "shall take Care that the laws be faithfully executed." As Stanford Law Professor and former federal judge Michael McConnell explained in yesterday's Wall Street Journal, "This is a duty, not a discretionary power. While the president does have substantial discretion about how to enforce a law, he has no discretion about whether to do so." Section 1513(d) of the Unaffordable Care Act (aka "Obamacare") states unequivocally, "The amendments made by this section shall apply to months beginning after December 31, 2013." In other words, the provisions of Obamacare become fully effective in 2014, as a matter of duly enacted federal law. But over the long Fourth of July weekend, in a "Never Mind" moment, the Obama Administration announced, through a Deputy Assistant Secretary of the Treasury, that contrary to federal law, the employer mandate of Obamacare shall not become fully effective in months beginning after December 31, 2013, but only in months beginning after December 31, 2014. Making the announcement through such a low level Administration official to me says that Obama has contempt for the American people, and for the rule of law. Barack Obama: Lawbreaker But it does not matter who announces it. The President is the one responsible. And the announcement constitutes the assumption of authoritarian powers by President Obama. McCo
Paul Merrell

Syria, the Latest Crusade » CounterPunch: Tells the Facts, Names the Names - 0 views

  • The West is striking again; it is stabbing the very center, the heart of the Arab World. This time it is targeting the group – ISIS – which it created itself, and which it had been arming, feeding and pampering until just very recently. Airplanes and missiles are flying, and bombs are falling. The war has begun.
  •  
    This one is a must-read. Andre Vltchek is a novelist, filmmaker and investigative journalist. He covered wars and conflicts in dozens of countries. The result is his latest book: "Fighting Against Western Imperialism". 'Pluto' published his discussion with Noam Chomsky: On Western Terrorism. His critically acclaimed political novel Point of No Return is re-edited and available. Oceania is his book on Western imperialism in the South Pacific. His provocative book about post-Suharto Indonesia and the market-fundamentalist model is called "Indonesia - The Archipelago of Fear". His feature documentary, "Rwanda Gambit" is about Rwandan history and the plunder of DR Congo. After living for many years in Latin America and Oceania, Vltchek presently resides and works in East Asia and Africa.  
Paul Merrell

US withdraws Patriots despite Turkey's appeal to keep them - 0 views

  • A day after Ankara urged NATO to keep up Patriot defense systems in Turkey following Russian incursions into Turkish airspace over the weekend, the US began withdrawing its Patriot batteries from the country, on Friday, in line with its earlier announcement of pulling out on technical grounds -- for updating its systems -- and its assessment of the downgrading threat level from Syria. Dozens of US trucks transported pieces of batteries and other systems to the port of İskenderun for shipment to the US on Friday. While the US made the decision to withdraw its Patriot systems for mere technical reasons and due to the decreasing threats from Syria, imminent threats in northern Syria precipitated by Russian air strikes against rebel-held areas and the Russian violation of Turkish airspace twice over the weekend expose a troubling reality for Turkey. Having lacked a genuine air defense system, Turkey solely relies on NATO's cover against any missile threat in its vicinity and several times over the course of the past two decades, Ankara has appealed to the alliance to deploy Patriots on its soil, first against Saddam Hussein's Iraq and then Bashar al-Assad's Syria.
  • Turkish Foreign Ministry spokesman Tanju Bilgiç said NATO-member Turkey is continuing talks with the alliance and its bilateral partners on enhancing its defense capabilities, including Patriot missile systems, but has not made a request for NATO to send military forces to Turkey.
  •  
    Looks like no-fly zones and "safe zones" in Syria are no longer in U.S. foreign policy plans.
Gary Edwards

The PJ Tatler » Yes, it's true: The birth certificate is built in layers. And... - 0 views

  •  
    Photoshop expert: and author of more than 17 books on computer graphics Mara Zebest: Obama's Latest Long-Form Birth Certificate Is a Fake! http://gatewaypundit.rightnetwork.com/2011/04/critics-obamas-latest-long-form-birth-certificate-is-a-fake/
Paul Merrell

Latest FBI Claim of Disrupted Terror Plot Deserves Much Scrutiny and Skepticism - The I... - 0 views

  • The Justice Department on Wednesday issued a press release trumpeting its latest success in disrupting a domestic terrorism plot, announcing that “the Joint Terrorism Task Force has arrested a Cincinnati-area man for a plot to attack the U.S. Capitol and kill government officials.” The alleged would-be terrorist is 20-year-old Christopher Cornell (above), who is unemployed, lives at home, spends most of his time playing video games in his bedroom, still addresses his mother as “Mommy” and regards his cat as his best friend; he was described as “a typical student” and “quiet but not overly reserved” by the principal of the local high school he graduated in 2012.
  • The DOJ’s press release predictably generated an avalanche of scary media headlines hailing the FBI. CNN: “FBI says plot to attack U.S. Capitol was ready to go.” MSNBC: “US terror plot foiled by FBI arrest of Ohio man.” Wall St. Journal: “Ohio Man Charged With Plotting ISIS-Inspired Attack on U.S. Capitol.”
  • Just as predictably, political officials instantly exploited the news to justify their powers of domestic surveillance. House Speaker John Boehner claimed yesterday that “the National Security Agency’s snooping powers helped stop a plot to attack the Capitol and that his colleagues need to keep that in mind as they debate whether to renew the law that allows the government to collect bulk information from its citizens.” He warned: “We live in a dangerous country, and we get reminded every week of the dangers that are out there.”  The known facts from this latest case seem to fit well within a now-familiar FBI pattern whereby the agency does not disrupt planned domestic terror attacks but rather creates them, then publicly praises itself for stopping its own plots.
  • ...2 more annotations...
  • First, they target a Muslim: not due to any evidence of intent or capability to engage in terrorism, but rather for the “radical” political views he expresses. In most cases, the Muslim targeted by the FBI is a very young (late teens, early 20s), adrift, unemployed loner who has shown no signs of mastering basic life functions, let alone carrying out a serious terror attack, and has no known involvement with actual terrorist groups. They then find another Muslim who is highly motivated to help disrupt a “terror plot”: either because they’re being paid substantial sums of money by the FBI or because (as appears to be the case here) they are charged with some unrelated crime and are desperate to please the FBI in exchange for leniency (or both). The FBI then gives the informant a detailed attack plan, and sometimes even the money and other instruments to carry it out, and the informant then shares all of that with the target. Typically, the informant also induces, lures, cajoles, and persuades the target to agree to carry out the FBI-designed plot. In some instances where the target refuses to go along, they have their informant offer huge cash inducements to the impoverished target. Once they finally get the target to agree, the FBI swoops in at the last minute, arrests the target, issues a press release praising themselves for disrupting a dangerous attack (which it conceived of, funded, and recruited the operatives for), and the DOJ and federal judges send their target to prison for years or even decades (where they are kept in special GITMO-like units). Subservient U.S. courts uphold the charges by applying such a broad and permissive interpretation of “entrapment” that it could almost never be successfully invoked. As AP noted last night, “defense arguments have repeatedly failed with judges, and the stings have led to many convictions.”
  • There are countless similar cases where the FBI triumphantly disrupts its own plots, causing people to be imprisoned as terrorists who would not and could not have acted on their own. Trevor Aaronson has comprehensively covered what amounts to the FBI’s own domestic terror network, and has reported that “nearly half [of all DOJ terrorism] prosecutions involved the use of informants, many of them incentivized by money (operatives can be paid as much as $100,000 per assignment) or the need to work off criminal or immigration violation.” He documents “49 [terrorism] defendants [who] participated in plots led by an agent provocateur—an FBI operative instigating terrorist action.” In 2012, Petra Bartosiewicz in The Nation reviewed the post-9/11 body of terrorism cases and concluded: Nearly every major post-9/11 terrorism-related prosecution has involved a sting operation, at the center of which is a government informant. In these cases, the informants — who work for money or are seeking leniency on criminal charges of their own — have crossed the line from merely observing potential criminal behavior to encouraging and assisting people to participate in plots that are largely scripted by the FBI itself. Under the FBI’s guiding hand, the informants provide the weapons, suggest the targets and even initiate the inflammatory political rhetoric that later elevates the charges to the level of terrorism.
Paul Merrell

Why Does the FBI Have to Manufacture its Own Plots if Terrorism and ISIS Are Such Grave... - 0 views

  • The FBI and major media outlets yesterday trumpeted the agency’s latest counterterrorism triumph: the arrest of three Brooklyn men, ages 19 to 30, on charges of conspiring to travel to Syria to fight for ISIS (photo of joint FBI/NYPD press conference, above). As my colleague Murtaza Hussain ably documents, “it appears that none of the three men was in any condition to travel or support the Islamic State, without help from the FBI informant.” One of the frightening terrorist villains told the FBI informant that, beyond having no money, he had encountered a significant problem in following through on the FBI’s plot: his mom had taken away his passport. Noting the bizarre and unhinged ranting of one of the suspects, Hussain noted on Twitter that this case “sounds like another victory for the FBI over the mentally ill.” In this regard, this latest arrest appears to be quite similar to the overwhelming majority of terrorism arrests the FBI has proudly touted over the last decade. As my colleague Andrew Fishman and I wrote last month — after the FBI manipulated a 20-year-old loner who lived with his parents into allegedly agreeing to join an FBI-created plot to attack the Capitol — these cases follow a very clear pattern
  • Once again, we should all pause for a moment to thank the brave men and women of the FBI for saving us from their own terror plots.
  • We’re constantly bombarded with dire warnings about the grave threat of home-grown terrorists, “lone wolf” extremists and ISIS. So intensified are these official warnings that The New York Times earlier this month cited anonymous U.S. intelligence officials to warn of the growing ISIS threat and announce “the prospect of a new global war on terror.” But how serious of a threat can all of this be, at least domestically, if the FBI continually has to resort to manufacturing its own plots by trolling the Internet in search of young drifters and/or the mentally ill whom they target, recruit and then manipulate into joining? Does that not, by itself, demonstrate how over-hyped and insubstantial this “threat” actually is? Shouldn’t there be actual plots, ones that are created and fueled without the help of the FBI, that the agency should devote its massive resources to stopping? This FBI tactic would be akin to having the Drug Enforcement Agency (DEA) constantly warn of the severe threat posed by drug addiction while it simultaneously uses pushers on its payroll to deliberately get people hooked on drugs so that they can arrest the addicts they’ve created and thus justify their own warnings and budgets (and that kind of threat-creation, just by the way, is not all that far off from what the other federal law enforcement agencies, like the FBI, are actually doing). As we noted the last time we wrote about this, the Justice Department is aggressively pressuring U.S. allies to employ these same entrapment tactics in order to create their own terrorists, who can then be paraded around as proof of the grave threat.
  • ...1 more annotation...
  • UPDATE: The ACLU of Massachusetts’s Kade Crockford notes this extraordinarily revealing quote from former FBI assistant director Thomas Fuentes, as he defends one of the worst FBI terror “sting” operations of all (the Cromitie prosecution we describe at length here): If you’re submitting budget proposals for a law enforcement agency, for an intelligence agency, you’re not going to submit the proposal that “We won the war on terror and everything’s great,” cuz the first thing that’s gonna happen is your budget’s gonna be cut in half. You know, it’s my opposite of Jesse Jackson’s ‘Keep Hope Alive’—it’s ‘Keep Fear Alive.’ Keep it alive. That is the FBI’s terrorism strategy — keep fear alive — and it drives everything they do.
Paul Merrell

US-Saudi Plan: Let 9,000 ISIS Fighters Walk Free from Mosul - to Fight in Syria - 0 views

  • Judging by both the words, and deeds of the Obama White House and its political ‘diplomatic’ appointees led by perfidious John Kerry and caustic Samantha Power – all evidence to date points to the US wanting to escalate its war on Syria – while happily baiting a military confrontation, and ‘World War‘ scenario with Russia and its allies in the process.  If this latest leak is indeed true – and time will certainly tell whether or not it is, it would constitute one of the most egregious violations of both US and international law – by the United States government and its theocratic dictator partner in Saudi Arabia. Washington’s own anti-terror legislation expressly forbids colluding to provide logistical or material support for terrorist groups, and this US-Saudi venture would be the latest in a long list of violations…
  • Here’s what makes this a potential shocker: the operation allows for safe passage for 9,000 ISIS fighters on the proviso that they are transferred from Iraq to eastern Syria in order to help US plans for “regime change” there.  “At the time of the assault, coalition aircraft would strike only on a pre-agreed detached buildings in the city, which are empty, the source said.” “According to him [the source], the plan of Washington and Riyadh also provides that the rebels move from Mosul to Syria for the attack on the government-controlled town of troops.” Essentially, Washington and Saudi Arabia, will allow 9,000 ISIS (Islamic State) fighter FREE passage into Syria if they agree to join Washington’s “regime change” operations there. This could also include, “… eastern regions of Syria to follow a major offensive operation, which involves the capture of Deir ez-Zor and Palmyra,” the source added. Before you write this story off as some ornate Russian psychological operation, consider the long trend arch. The US along with its generous Gulf sidekicks, have already established a solid track record of aiding and abetting ISIS – not just in Syria, but in Iraq too. The record shows that the US is guilty on a number of counts…
  • If the Mosul leak is true, then it wouldn’t be the first time that the US has provided cover in the military pantomime the world has come to know as “the fight against ISIS.” When large ISIS convoys crossed the Syrian desert to invade and occupy the ancient Syrian city of Palmyra in May 2015, the US ‘Coalition’ airforce did nothing, and allowed ISIS to take and destroy part of the world’s great historic cultural heritage, along with the murder of scores of innocent civilians. Professor Tim Anderson from Sydney University states: “U.S. weapons with Israeli ammunition were used by Islamic State group when taking over Palmyra. The extremists also had U.S. military rations.” “The U.S., which since 2014 claimed to be conducting a war against ISIS in Iraq and Syria, and which had air power and sophisticated surveillance of the region, did nothing to stop the huge ISIS advance on Palmyra.” The US isn’t even shy about its laissez-faire policy with ISIS in the field, with the New York Times openly boasting, “Any airstrikes against Islamic State militants in and around Palmyra would probably benefit the forces of President Bashar al-Assad. So far, United States-led airstrikes in Syria have largely focused on areas far outside government control, to avoid the perception of aiding a leader whose ouster President Obama has called for.”
  • ...4 more annotations...
  • More importantly however, is what kind of message an US statement like that sends to ISIS, as well as Al Nusra and other terrorist brigades inside Syria, which is basically, “we do not need to worry about US air strikes, only Syrian Army and Russian strikes.” This situation really sums up the utter fraud and contempt of the US deception in Syria, and it’s no surprise that the Russian Foreign Ministry are reticent to extend themselves any more where the US is concerned. Then, in March 2016, when ISIS fled Palmyra, back across the desert towards Deir ez-Zor and Raqqa – the great and powerful US ‘Coalition’ airforce actually helped ISIS in a number of ways, including allowing them free passage once more. In late August, we were told that the Turkish Army, alongside “allied Syrian rebels” (terrorist group Faylaq al-Sham) backed by the US air cover, invaded Syria in order to capture the “ISIS-held” town of Jarabulus, Syria, this supposedly to cut off ISIS’s last open route into Turkey. But what happened to ISIS? The NYT even admitted that, “… it appeared that most of the militants had fled without a fight.” Here, ISIS appears to have been given advanced warning – by either US or Turkish intelligence, as they left the contested town of Jarabulus quietly, but in droves. In reality, Turkey twisted this operation in order to attack and degrade Kurdish militias including the US-backed artificial construct called the Syrian Democratic Forces (SDF), and pro-Kurdish People’s Protection Units (YPG) and Kurdish Democratic Union Party (PYD), the Syrian affiliate of the militant Kurdistan Workers’ Party (PKK) in Iraq and Turkey – all of whom are meant to be fighting ISIS. Instead, they are now busy dodging Turkish artillery rounds. Confusing, yes, but true nonetheless.
  • It’s also common knowledge now, that top of the line US weaponry is being used by ISIS, both in Iraq, in Afghanistan and in Syria as well. In fact, if not for US weapons and supplies (along with US air intervention, or noninterventions), ISIS would have struggled to maintain many of the strategic positions it enjoys today. For the last 3 years, US officials have been dodging this issue, and when they do admit this is true, their patronizing party line is that, “this must be a mistake, if they do have US weapons, we didn’t mean it.” As if the world was born yesterday. Perhaps the most flagrant violation by the US-led forces in aiding and abetting ISIS took place on Sept 17, 2016, when the US-led Coalition bombed Syrian Army positions outside of Deir ez-Zor near al-Tharda Mountain, killing some 80 soldiers and injuring 100 more.  As if by design, an ISIS offensive began immediately following the US massacre of Syrian soldiers. Clearly, this bold move by the Pentagon paved the way for a major ISIS advance. To any normal observer, the US attack was a belligerent act of war that effective destroyed an already fragile bilateral ceasefire agreement, and yet the US response was to somehow blame Russia for calling an emergency UNSC meeting to discuss the incident. Judging by this response, it’s pretty clear that US wants to see the Syrian Conflict carry on for a while, and it will need groups like ISIS to make that happen.
  • The other problem with Washington’s hollow righteousness in the Middle East is that there are key members of the US-led “Coalition” who are financing ISIS, Al Nusra Front, Nour al Din Zinki, and Arar al Sham (all ‘moderate’ terrorists we’re told) militants in Syria, Iraq and beyond. This fact was recently admitted by former US Secretary of State and Democratic candidate Hillary Clinton, as revealed in this week’s batch of Wikileaks emails. Clinton writes: “While this military/para-military operation is moving forward, we need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region.”  Add to that the multiple exposures over the last 3 years of the US CIA illegally trafficking lethal arms to Al Nusra and other terrorists through covert operations like Timber Sycamore. Still, US and NATO member state officials and their media gatekeepers continue to deny it and play dumb, rather than come clean that the United States and its ‘partners’ in the region are helping, not hindering ISIS terrorism. Some might ask: why would they do a thing like that? By now, the answer should be simple, but threefold:
  • ISIS is still one of Washington’s best hope for continuing instability, and “regime change” in Syria. The existence of ISIS in Syria and Iraq guarantees that Washington can invite itself to the party.  The ISIS brand has been a boon for the global military industrial complex and all of its bottom-feeder businesses and ‘security’ contract firms. What’s so comical yet even more tragic, is how prominent the topic of “ISIS” factors into all of the vapid ‘national security’ debates and media panels in this year’s US Presidential election, and in the dumbed-down ‘coverage’ of the delusional US mainstream media, led by Pentagon surrogate CNN, and hopeless FOX News. Judging by their prosaic ‘coverage’, neither the networks, nor Hillary Clinton or Donald Trump have the slightest clue of what the reality on the ground is. Instead we here, “My ISIS plan is better than yours!” The US political conversation has gone beyond ridiculousness. The corps of US military and CIA media spokesman aren’t much better. The sad part is some of them do know what is really happening, but would rather lie to the American public. With so much double dealing, who can you trust? Certainly not anyone in Washington. More on the White House’s latest dangerous proposition….
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
Paul Merrell

Kerry insists latest US raid in Libya is 'legal', and will 'do it again' - 0 views

  • This past weekend, US forces did a raid in Tripoli to nab suspected senior Al-Qaeda leader, Nazih Abdul-Hamed Ruqai, aka Abu Anas el-Liby, for his alleged role in the 1998 US Embassy bombings in Kenya and Tanzania. In addition, Hollywood’s own Navy SEALs attempted a “surgical” raid the Somali home of a leader of the al-Shabab group that allegedly planned the attack on a Kenyan Mall. According to reports today, the NAVY SEAL Somalia raid ended in complete failure, with US SEALs making a dramatic entrance on to the beach in amphibious speed boats, only to end up running away after encountering (shock, horror) incoming fire.
  • After the celebrated hoax dubbed the “Bin Laden Raid”, it’s hard to believe anything about what Washington says its Navy SEALs did, or did not do. This report, however, seems accurate according to al Shabab posts on the internet boasting about how that kicked out US soldiers – again. US Secretary of State has come out defending the act as ‘legal’. So according the logic put forth by Ivy League elitist and mediocre statesman, John Kerry himself (photo, left), we should ask: would a Russian raid on Qatar be justified due to Qatar’s own open support of imported terrorist armies in Syria?
  •  
    The official transcript of Kerry's remarks is at http://www.state.gov/secretary/remarks/2013/10/215160.htm Russia Times has more here. http://rt.com/news/libya-us-raid-terrorism-832/ As described, these are U.S. acts of military aggression against the nations of Libya and Kenya, the most serious of war crimes. The legal procedure involved is formal extradition, not military invasion.  
Gary Edwards

The US Dollar is Doomed: from The Daily Reckoning - 0 views

  • The truth is that the US is insolvent and its policymakers will stop at nothing in order to avoid sovereign default. So, it should come as no surprise that at its latest meeting, the Federal Reserve downplayed the risk of inflation, thereby setting the stage for another round of money creation.
  •  
    10/22/10 Hong Kong, China - Austerity be damned, at this rate Mr. Bernanke will go down in the history books as one of the greatest money creators ever to have walked this planet! Never mind sky-high deficits and a crushing debt overhang, at its most recent FOMC meeting, the Federal Reserve all but guaranteed another round of quantitative easing. The truth is that the US is insolvent and its policymakers will stop at nothing in order to avoid sovereign default. So, it should come as no surprise that at its latest meeting, the Federal Reserve downplayed the risk of inflation, thereby setting the stage for another round of money creation.
Gary Edwards

Sony leaks reveal Hollywood is trying to break DNS, the backbone of the internet | The ... - 0 views

  • You could still type http://www.piratebay.se into your browser, but without a working DNS record, you wouldn't be able to find the site itself. If a takedown notice could blacklist a site from every available DNS provider, the URL would be effectively erased from the internet.
  • No one's ever tried to issue a takedown notice like that, but this latest memo suggests the MPAA is looking into it as a potentially powerful new tool in the fight against piracy. "A takedown notice program, therefore, could threaten ISPs with potential secondary liability in the event that they do not cease connecting users to known infringing material through their own DNS servers," the letter reads. "While not making it impossible for users to reach pirate sites (i.e., a user could still use a third-party DNS server), it could make it substantially more complicated for casual infringers to reach pirate sites if their ISPs decline to assist in the routing of communications to those sites." The full document is embedded below.
  • The MPAA’s legal argument centers on the claim that DNS records are working as an index or directory rather than simply routing data. If that argument holds, then the DNS links could be vulnerable to the same takedown notices used to strike torrent links from Google searches. The net effect would be similar to site-blocking, making it as easy to unplug a URL as it is to take down a YouTube video. It would also cast DNS providers as legally responsible for all the sites on the web, the same way YouTube is responsible for every video uploaded to its network. For many providers, simply managing the flood of notices might create a logistical nightmare.
  •  
    "Most anti-piracy tools take one of two paths: they either target the server that's sharing the files (pulling videos off YouTube or taking down sites like The Pirate Bay) or they make it harder to find (delisting offshore sites that share infringing content). But leaked documents reveal a frightening line of attack that's currently being considered by the MPAA: What if you simply erased any record that the site was there in the first place? A BOLD CHALLENGE TO THE BASIC ENGINEERING OF THE INTERNET To do that, the MPAA's lawyers would target the Domain Name System (DNS) that directs traffic across the internet. The tactic was first proposed as part of the Stop Online Piracy Act (SOPA) in 2011, but three years after the law failed in Congress, the MPAA has been looking for legal justification for the practice in existing law and working with ISPs like Comcast to examine how a system might work technically. If the system works, DNS-blocking could be the key to the MPAA's long-standing goal of blocking sites from delivering content to the US. At the same time, it represents a bold challenge to the basic engineering of the internet, threatening to break the very backbone of the web and drawing the industry into an increasingly nasty fight with Google. The Domain Name System is a kind of phone book for the internet, translating URLs like http://www.theverge.com into IP addresses like 192.5.151.3. Given a URL string, your computer will turn to a DNS server (often run by a local ISP or a third party like Google) to find the IP address of the corresponding server. Much like the phone book, that function is usually treated as a simple an engineering task - but a memo commissioned by the MPAA this August sketches out a legal case for blocking infringing sites from the DNS records entirely, like wiping unsavory addresses out of the phone book. You could still type http://www.piratebay.se into your browser, but without a working DNS record, you wouldn't be able to find the
Paul Merrell

Netanyahu-Mossad Split Divides U.S. Congress on Iran Sanctions - Bloomberg View - 0 views

  • The Israeli intelligence agency Mossad has broken ranks with Prime Minister Benjamin Netanyahu, telling U.S. officials and lawmakers that a new Iran sanctions bill in the U.S. Congress would tank the Iran nuclear negotiations. Already, the Barack Obama administration and some leading Republican senators are using the Israeli internal disagreement to undermine support for the bill, authored by Republican Mark Kirk and Democrat Robert Menendez, which would enact new sanctions if current negotiations falter. Bob Corker, chairman of the Senate Foreign Relations Committee  -- supported by Republican Senators Lindsay Graham and John McCain -- is pushing for his own legislation on the Iran nuclear deal, which doesn't contain sanctions but would require that the Senate vote on any pact that is agreed upon in Geneva. The White House is opposed to both the Kirk-Menendez bill and the Corker bill; it doesn't want Congress to meddle at all in the delicate multilateral diplomacy with Iran.
  • Israeli intelligence officials have been briefing both Obama administration officials and visiting U.S. senators about their concerns on the Kirk-Menendez bill, which would increase sanctions on Iran only if the Iranian government can't strike a deal with the so-called P5+1 countries by a June 30 deadline or fails to live up to its commitments. Meanwhile, the Israeli prime minister’s office has been supporting the Kirk-Menendez bill, as does the American Israel Public Affairs Committee, ahead of what will be a major foreign policy confrontation between the executive and legislative branches of the U.S. government in coming weeks. Evidence of the Israeli rift surfaced Wednesday when Secretary of State John Kerry said that an unnamed Israeli intelligence official had said the new sanctions bill would be “like throwing a grenade into the process.” But an initial warning from Israeli Mossad leaders was also delivered last week in Israel to a Congressional delegation -- including Corker, Graham, McCain and fellow Republican John Barrasso; Democratic Senators Joe Donnelly and Tim Kaine; and independent Angus King -- according to lawmakers who were present and staff members who were briefed on the exchange. When Menendez (who was not on the trip) heard about the briefing, he quickly phoned Israeli Ambassador to the U.S. Ron Dermer to seek clarification. Barrasso told us Tuesday that different parts of the Israeli government told the delegation different things. “We met with a number of government officials from many different parts of the government. There’s not a uniform view there,” he said.
  • Menendez is so livid at the administration, he decried its efforts to avert Congressional action on Iran at the hearing, telling Deputy Secretary of State Tony Blinken: “You know, I have to be honest with you, the more I hear from the administration in its quotes, the more it sounds like talking points that come straight out of Tehran.” Tuesday night, Obama threatened to veto the Kirk-Menendez bill if it passes Congress. Wednesday morning, House Speaker John Boehner responded by announcing that Netanyahu has accepted his invitation to address a joint session of Congress on Feb. 11, just as Congress is likely to be embroiled in a legislative fight over both bills. Boehner told fellow Republicans that he was specifically inviting Netanyahu to address the threat posed by radical Islam and Iran. Netanyahu is expected to deliver full-throated support for sanctions. The administration is upset that Netanyahu accepted Boehner’s invitation without notifying them, the latest indication of the poor relationship between the Israeli government and the White House. Two senior U.S. officials tell us that the Mossad has also shared its view with the administration that if legislation that imposed a trigger leading to future sanctions on Iran was signed into law, it would cause the talks to collapse.
  • ...3 more annotations...
  • The Israeli view shared with Corker and other senators also mirrors the assessment from the U.S. intelligence community. “We’ve had a standing assessment on this,” one senior administration official told us. “We haven’t run the new Kirk-Menendez bill through the process, but the point is that any bill that triggers sanctions would collapse the talks. That’s what the assessment is.” Another intelligence official said that the Israelis had come to the same conclusion.  This is not the first time Israel’s Mossad has been at odds with Netanyahu on Iran. In December 2010, former Mossad chief Meir Dagan told Israeli reporters that he had openly opposed an order from Netanyahu to prepare a military attack on Iran. At the time, Obama was also working to persuade the Israeli prime minister to hold off on attacking Iran. Iranian diplomats have also routinely threatened to leave the talks if new sanctions were imposed. Javad Zarif, Iran’s foreign minister, at the end of December said new sanctions would “violate the spirit” of the negotiations that have been going on for more than a year now. Despite the intelligence analyses, however, predicting Iranian behavior is no exact science. There is still much about Iran’s program that U.S. spies do not know. In November, former CIA director Michael Hayden told Congress that U.S. intelligence assessments do not have a “complete picture” of the extent of Iran’s nuclear program.
  • On Capitol Hill, the fight over how to proceed against the administration is far from over. The Senate Banking Committee was supposed to mark up the Kirk-Menendez bill on Thursday, but the session was delayed by one week. Some Senate staffers told us that Democrats asked for the delay because Menendez wants to get more Democrats to commit to his bill before he goes public. A main pitch of the Kirk-Menendez bill is that is could garner bipartisan -- even perhaps veto-proof -- support in the face of Obama's disapproval. So far, most Democrats have stayed on the sidelines, especially after Obama and Menendez got into a heated argument over the bill at last week’s private Democratic retreat. Kirk and Menendez softened their proposal to make it more palatable to Democrats, by giving the president more flexibility than the previous version and providing the administration waivers after the fact. Corker, Graham and McCain are trying to woo Democrats to their side by arguing that avoiding sanctions language altogether and simply mandating that the Senate get a vote is a more bipartisan approach. There are only a handful of Democrats that will support any Iran bill, so competition for these votes is heated.
  • Update, 12 p.m. Jan. 22:  The Israeli prime minister's office released a statement Thursday about Mossad chairman Tamir Pardo’s meeting with the U.S. Senate delegation last weekend. The statement said Pardo didn’t oppose new sanctions on Iran but acknowledged that Pardo used the term “hand grenade” to describe the effect new sanctions would have on the nuclear negotiations with Iran. “He used this term to describe the possibility of creating a temporary breakdown in the talks, at the end of which the negotiations will be restarted under better conditions,” the statement said. “The Mossad chairman explicitly pointed out that the agreement that is being reached with Iran is bad, and may lead to a regional arms race.”
  •  
    My advice to Obama: tell John Kerry  to change Netanyahu's visa to impose travel restrictions, allowing him to travel only  to New York City  (where the U.N. is located). within the U.S. The U.S. did that routinely with Soviet Union officials during the Cold War days. That will teach Netanyahu a lesson he will remember, that  in the U.S. the Executive Branch has control of diplomatic relations. Netanyahu has already faced heavy criticism in Israel for straining relations with Obama. He's currently facing heavy criticism for forcing his way  into the Charlie Hebdo march in Paris after President Hollande had specifically requested that he not take part and for having the idocy to tell French Jews that they could never have a home if they did not emigrate to Israel. If  the Obama Administration makes a public issue out of Netanyahu's latest affront, it might well cost Netanyahu re-eloection as Prime Minister next month. That decision lies in the hands of a single Israeli official who will choose which party is to try to form a new ruling coalition of parties. Mr. Netanyahu's Likud Party has no guarantee of getting that nod.  
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

The Latest Snowden Leak Is Devastating to NSA Defenders - Conor Friedersdorf - The Atla... - 0 views

  • Consider the latest leak sourced to Edward Snowden from the perspective of his detractors. The National Security Agency's defenders would have us believe that Snowden is a thief and a criminal at best, and perhaps a traitorous Russian spy. In their telling, the NSA carries out its mission lawfully, honorably, and without unduly compromising the privacy of innocents. For that reason, they regard Snowden's actions as a wrongheaded slur campaign premised on lies and exaggerations. But their narrative now contradicts itself. The Washington Post's latest article drawing on Snowden's leaked cache of documents includes files "described as useless by the analysts but nonetheless retained" that "tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless."
  • I never thought I'd see this day: The founder of Lawfare has finally declared that a national-security-state employee perpetrated a huge civil-liberties violation! Remember this if he ever again claims that NSA critics can't point to a single serious abuse at the agency. Wittes himself now says there's been a serious abuse. The same logic applies to Keith Alexander, James Clapper, Michael Hayden, Stewart Baker, Edward Lucas, John Schindler, and every other anti-Snowden NSA defender. So long as they insist that Snowden is a narcissistic criminal and possible traitor, they have no choice but to admit that the NSA collected and stored intimate photos, emails, and chats belonging to totally innocent Americans and safeguarded them so poorly that a ne'er-do-well could copy them onto thumb drives. 
  • They have no choice but to admit that the NSA was so bad at judging who could be trusted with this sensitive data that a possible traitor could take it all to China and Russia. Yet these same people continue to insist that the NSA is deserving of our trust, that Americans should keep permitting it to collect and store massive amounts of sensitive data on innocents, and that adequate safeguards are in place to protect that data. To examine the entirety of their position is to see that it is farcical. Here's the reality. The NSA collects and stores the full content of extremely sensitive photographs, emails, chat transcripts, and other documents belong to Americans, itself a violation of the Constitution—but even if you disagree that it's illegal, there's no disputing the fact that the NSA has been proven incapable of safeguarding that data. There is not the chance the data could leak at sometime in the future. It has already been taken and given to reporters. The necessary reform is clear. Unable to safeguard this sensitive data, the NSA shouldn't be allowed to collect and store it.
  •  
    Remember Obama's famous, "No one is reading your emails" line. Either he had inadequately investigated the truth of that statement or he was lying. 
Paul Merrell

News Roundup and Notes: August 18, 2014 | Just Security - 0 views

  • Over the weekend, the U.S. military carried out further airstrikes in Iraq, targeting Islamic State militants near the Mosul Dam, involving “a mix of fighter, bomber, attack and remotely piloted aircraft.” The nine strikes on Saturday and 14 strikes on Sunday were carried out under authority “to support humanitarian efforts in Iraq,” to protect U.S. personnel and facilities, and to support Iraqi and Kurdish defense forces [U.S. Central Command]. President Obama notified Congress of the latest American involvement yesterday, stating that “[t]he failure of the Mosul Dam could threaten the lives of large numbers of civilians, endanger U.S. personnel and facilities, including the U.S. Embassy in Baghdad.” Obama said the operations will be “limited in their scope and duration.” The significantly expanded air campaign, including the first reported use of U.S. bombers, has strengthened the Kurdish forces’ ground offensive to reclaim the strategic dam from Islamic State control [Wall Street Journal’s Matt Bradley et al.; Washington Post’s Liz Sly et al.]. Iraqi state television reported early today that Iraqi and Kurdish forces are now in control of the dam [Reuters], although there are reports of continued heavy fighting around the Mosul Dam [Al Jazeera]. Joe Parkinson [Wall Street Journal] covers how the U.S. has gained a “controversial new ally” in the Kurdistan Workers’ Party (PKK), as a number of PKK fighters joined the U.S.-backed Kurdish battle in northern Iraq over the weekend.
  • Israel-Palestine With the five-day truce between Israel and Hamas set to expire tonight, Israeli and Palestinian negotiators are continuing discussions in Cairo, although significant gaps remain between the two sides. While Israel is pushing for tougher security measures, Palestine is demanding an end to the Gaza blockade without preconditions [Associated Press; Reuters’ Nidal Al-Mughrabi and Jeffrey Heller]. Israeli troops have demolished the homes of two Palestinians suspected to have been behind the abduction and killing of the three Israeli teenagers in the West Bank in June [Haaretz’s Gili Cohen]. An IDF spokesperson said that the demolition “conveys a clear message to terrorists and their accomplices that there is a personal price to pay when engaging in terror and carrying out attacks against Israelis” [Al Jazeera]. Haaretz’s editorial board notes how the Israeli offensive in Gaza has generated “a very public crisis in relations between Israel and the United States” and warns that “Netanyahu must ease the tension with Washington and act to repair the rift with Obama.” The Wall Street Journal (Joshua Mitnick) explores how Israeli Prime Minister Benjamin Netanyahu’s “containment strategy” in the ongoing conflict is “a contrast from the tough talk against terrorism that fueled his political ascent.”
  • ulian Borger [The Guardian] notes how the potential International Criminal Court investigation into alleged war crimes in Gaza by both Israeli and Hamas forces has become a “fraught political battlefield.” Marwan Bishara [Al Jazeera] explains how and why the UN has been “sidelined” in the Middle East conflict. Meanwhile, the British government is facing a legal challenge over its decision to not suspend existing licenses for the sale of military hardware to Israel following the launch of Operation Protective Edge in Gaza last month [The Guardian’s Jamie Doward].
  • ...3 more annotations...
  • Texas Governor Rick Perry [Politico Magazine] writes that “[c]learly more strikes will be necessary, with nothing less than a sustained air campaign to degrade and destroy Islamic State forces.” The Hill (Alexander Bolton) notes that Democrats in both chambers have called for a vote in Congress over military strikes in Iraq, while Senate Majority Leader Harry Reid “almost certainly wants to avoid [a vote] as he seeks to keep the upper chamber majority in his party’s hands.” The United Kingdom has also expanded its military involvement in Iraq, with Defence Secretary Michael Fallon confirming that British warplanes are no longer confined to the initial humanitarian mission to assist Iraq’s Yazidi minority [The Guardian’s Nicholas Watt]. The UN Security Council has placed six individuals affiliated with extremist organizations in Iraq and Syria, including the Islamic State, on its sanctions list [UN News Centre]. Army Col. Joel Rayburn, writing in the Washington Post, considers the legacy of Nouri al-Maliki. While Maliki has agreed to step down as prime minister, Rayburn argues that “the damage he has wrought will define his country for decades to come.” Mike Hanna [Al Jazeera America] explains why Maliki’s ouster “is no magic bullet for Iraq,” noting that a “change of prime minister doesn’t in itself alter Iraq’s political or security equation.” And Ali Khedery [New York Times] writes how the latest change in government “really is Iraq’s last chance.”
  • Journalist James Risen, who faces prison over his refusal to reveal the source of a CIA operation story, has called President Obama “the greatest enemy of press freedom in a generation” [New York Times’ Maureen Dowd]. The International Atomic Energy Agency said that Iran has promised to co-operate with an investigation to be carried out by the nuclear watchdog, following a “useful” meeting in Tehran [Reuters’ Fredrik Dahl and Mehrdad Balali]. Sky News reports that WikiLeaks founder Julian Assange is planning to “soon” leave the Ecuadorian embassy in London, after spending more than two years inside the building. Assange said he is planning to meet with the British government to resolve his “lack of legal protection.”
  • If you want to receive your news directly to your inbox, sign up here for the Just Security Early Edition. For the latest information from Just Security, follow us on Twitter (@just_security) and join the conversation on Facebook. To submit news articles and notes for inclusion in our daily post, please email us at news@justsecurity.org. Don’t forget to visit The Pipeline for a preview of upcoming events and blog posts on U.S. national security.
  •  
    Until about a month ago, I thought that Barack Obama would leave only two lasting accomplishments for future history books: [i] first African-American President; and [ii] ending the U.S. war in Iraq. Make it item 1 only now. It's no longer U.S. military "mission creep" in Iraq; it's full bore reinvasion topped off with a U.S. enguineered coup of the Iraqi government.   Just Security is a very high quality politico-legal site for issues involving U.S. and U.S.-sponsored violence and surveillance issues. It's based at the Center for Human Rights and Global Justice at New York University School of Law. Their emailed weekday newsletter is great for the topics I try to follow.  
Paul Merrell

White House wants Republicans to disqualify Trump as reactions snowball - 0 views

  • As international condemnation of Republican Party presidential candidate Donald Trump's proposal to ban Muslims from entering the US snowballs, the White House has called for Trump to be disqualified from the presidential race and urged Republican candidates to reject him. Trump called for blocking Muslims -- including prospective immigrants, students, tourists and other visitors -- from entering the US following a shooting spree in San Bernardino, California, by a Muslim couple whom authorities said had been radicalized. The White House lambasted Trump's proposal for the ban, maintaining on Tuesday that Trump's outburst disqualified him from becoming president and called on Republican Party presidential hopefuls to disavow him with immediate effect. White House spokesman Josh Earnest said Trump's campaign had a "dustbin of history" quality to it and said his comments were offensive and toxic, according to Reuters. "If they are so cowed by Mr. Trump and his supporters that they're not willing to stand by the values enshrined in the Constitution, then they have no business serving as president of the United States themselves," Earnest said, according to The Associated Press (AP).
  • The Pentagon, the headquarters of the US Department of Defense, warned on Tuesday that Trump's anti-Muslim rhetoric undermines US national security, especially fueling the Islamic State in Iraq and the Levant's (ISIL) narrative of a US war with Islam. Asked about Trump's remarks, Pentagon spokesman Peter Cook said Muslims serve in the US armed forces and that America's war strategy to combat the Islamic State hinged on support from Muslim countries, according to a Reuters report. “Anything that bolsters ISIL's narrative and pits the United States against the Muslim faith is certainly not only contrary to our values but contrary to our national security,” Cook told a news briefing, refraining to mention Trump by name. US Homeland Security Secretary Jeh Johnson said Trump's proposal could thwart US efforts to connect with the Muslim community and Secretary of State John Kerry said his ideas were not constructive. The Pentagon counts thousands of service members who self-identify as Muslims. Data released by the US Defense Department showed that 3,817 active-duty members and 2,079 members of the National Guard and reserve identified their faith as “Islam.” However the real number could well be higher as the identifications are voluntary.
  • UN secretary-general strongly opposes Trump comments UN spokesman Farhan Haq said recently UN Secretary-General Ban Ki-moon strongly opposes Trump's call for a ban on Muslims entering the United States. Haq said the secretary-general has repeatedly spoken out against all forms of xenophobia and statements against migrants, racial or religious groups "and that would certainly apply in this case." While political campaigns have their own dynamics, Haq said, according to AP, “we do not believe that any kind of rhetoric that relies on Islamaphobia, xenophobia, any other appeal to hate any groups, really should be followed by anyone.”
  •  
    That figures. Trump is out-polling Hillary at the moment.
1 - 20 of 487 Next › Last »
Showing 20 items per page