Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged light

Rss Feed Group items tagged

Gary Edwards

Startup turns carbon dioxide into fuels - 0 views

  • The research has received funding from the Air Force Office of Scientific Research (AFSOR), the National Science Foundation and the Department of Energy (DOE). The collaboration between Liquid Light and the University was supported by the DOE Small Business Innovation Research program and the AFOSR Small Business Technology Transfer program. Princeton's agreement with Liquid Light allowed the company to continue to collaborate with Bocarsly and his research team. Before long, new discoveries were emerging. "They started noticing interesting chemistry that we wouldn't have predicted," said Bocarsly.
  • The Princeton scientists did some additional studies, and made a surprising discovery: They could turn CO2, which contains only one carbon, into a compound with a carbon-carbon bond, which vastly increases the possibilities for creating commercial applications. This was radical because although the reaction is certainly possible, it is highly unlikely to happen because so many other competing reactions are occurring. "Everyone who electrochemically reduces CO2 today makes compounds with only one carbon," said Bocarsly. "Nobody makes things with carbon-carbon bonds." He paused. "But we can." "That was a very 'wow' moment," recalled Cole, "because we thought that our process could only make methanol. But now we were finding that we could make a variety of products, and that is what makes this technology commercially interesting." She said Liquid Light scientists can now make more than 20 different products from CO2.
  • One of the chemicals Liquid Light can make is isopropanol, commonly known as rubbing alcohol and an important industrial chemical. Another is butanol, which could be commercially important as a fuel. Liquid Light's technology offers the potential to make these chemicals at lower cost than today's methods, which involve starting with fossil fuels such as petroleum and natural gas.
  • ...3 more annotations...
  • Why does pyridinium work so well as a catalyst for the reaction? Based on its structure, the ring-shaped molecule is an unlikely catalyst for this reaction because it shuttles just one electron at a time. But to convert CO2 to methanol requires six electrons, and to make higher-carbon molecules takes even more electrons. Bocarsly and his team — in collaboration with Steven Bernasek, professor of chemistry — are doing studies to understand the steps in the chemical reaction, and they are making rapid progress. "There are clearly some intermediate products formed during the reaction that do not sit around for a long time and are not there in very high concentrations," said Bocarsly.
  • The Princeton team also is studying the factors that determine which products can be made from CO2. The researchers have found that very subtle changes in the electrode surface can lead to production of different chemicals. For example, CO2 plus a pyridinium catalyst and a platinum electrode make methanol. However, the same catalyst and a different electrode give a different product. The team published its findings on how the reaction is affected by catalyst concentration, temperature and pressure in the journal ChemSusChem last year.
  • Citing government statistics that the United States generates about 5.5 billion metric tons of CO2 per year, Teamey said it will not be hard to obtain the starting materials for this new industry. However, the CO2 needs to be relatively pure, a requirement that rules out gasoline tailpipes and coal-fired power plants. Instead, said Teamey, the CO2 could come from manufacturing facilities, such as fertilizer manufacturers and cement plants, which according to Teamey emit some 100 million tons of high-purity CO2 each year.
  •  
    "Today, carbon dioxide (CO2) is a hot topic. Scientists around the globe are searching for ways to store, dispose of, or prevent the formation of the greenhouse gas, which is a major driver of global climate change. Liquid Light hopes to take this concept one step further and harness waste CO2 as a source of carbon to make industrial chemicals and fuels. The technology behind the process is simple: Take CO2 and mix it in a water-filled chamber with an electrode and a catalyst. The ensuing chemical reaction converts CO2 into a new molecule, methanol, which can be used as a fuel, an industrial solvent or a starting material for the manufacture of other chemicals. Liquid Light's founders include Bocarsly and his former graduate student Emily Cole, who earned her Ph.D. from Princeton in 2009. Cole helped revive efforts in Bocarsly's lab to study the conversion of CO2 into usable fuels, which led to the launch of Liquid Light and an ongoing collaboration that Bocarsly said has been extremely positive for his research team at the University. "We've made some discoveries that wouldn't have been made in a university setting, and this has really accelerated the research," Bocarsly said. "It is a very productive relationship." Back in the 1990s, a former Ph.D. student of Bocarsly's named Chao Lin conducted some of the earliest experiments on turning CO2 into methanol. He used palladium metal as the electrode and pyridinium, an inexpensive ring-shaped molecule, as the catalyst. By plugging the electrode into an electrical outlet, he could drive an electrochemical reaction that converted CO2 into methanol. As Bocarsly recalled, Lin was quite excited about his success. However, said Bocarsly, "We published that finding in 1994 and there was approximately zero interest in it." The work languished until 2005 when Cole, then a new graduate student, told Bocarsly she wanted to work on a clean-energy project. She took up the challenge of reproducing Lin's results, but this time
Paul Merrell

Natural Disasters Are Revealing The True Promise Of Green Energy - 0 views

  • After Hurricane Irma in Florida, millions have been without electricity. But those Floridians who had solar panels plus an inverter or a Tesla powerwall were able to recover electricity immediately. Likewise, cities used solar to power traffic lights and other essential services after the huge storm had blown past. Solar panels kept the lights on in India during the horrific storms and floods of monsoon this year. The CEO of REC, Steve O’Neil which makes solar panels, reveals some amazing progress on green energy:
  • In 2010, there were 50 gigawatts of solar power in the world. Today it is 305 gigawatts. Globally, solar installations increased by 50% in 2016 alone. The average cost of solar-generated electricity worldwide is currently 8 cents a kilowatt hour. That is down 70% since 2010.
  • ome on down to 2 cents a kilowatt hour in only a few years. India, a country of 1.2 billion people, has the seventh largest gross domestic product in the world (ahead of Italy and Brazil and just behind France). India has gone from having 2.65 gigawatts of solar in 2014 to having 13 gigawatts of solar capacity in 2017.
Gary Edwards

Did the White House Help Plan the Syrian Chemical Attack? - 0 views

  •  
    "by Yossef Bodansky excerpt: There is a growing volume of new evidence from numerous sources in the Middle East - mostly affiliated with the Syrian opposition and its sponsors and supporters - which makes a very strong case, based on solid circumstantial evidence, that the August 21, 2013, chemical strike in the Damascus suburbs was indeed a pre-meditated provocation by the Syrian opposition. The extent of US foreknowledge of this provocation needs further investigation because available data puts the "horror" of the Barack Obama White House in a different and disturbing light. On August 13-14, 2013, Western-sponsored opposition forces in Turkey started advance preparations for a major and irregular military surge. Initial meetings between senior opposition military commanders and representatives of Qatari, Turkish, and US Intelligence ["Mukhabarat Amriki"] took place at the converted Turkish military garrison in Antakya, Hatay Province, used as the command center and headquarters of the Free Syrian Army (FSA) and their foreign sponsors. Very senior opposition commanders who had arrived from Istanbul briefed the regional commanders of an imminent escalation in the fighting due to "a war-changing development" which would, in turn, lead to a US-led bombing of Syria. The opposition forces had to quickly prepare their forces for exploiting the US-led bombing in order to march on Damascus and topple the Bashar al-Assad Government, the senior commanders explained. The Qatari and Turkish intelligence officials assured the Syrian regional commanders that they would be provided with plenty of weapons for the coming offensive. Indeed, unprecedented weapons distribution started in all opposition camps in Hatay Province on August 21-23, 2013. In the Reyhanli area alone, opposition forces received well in excess of 400 tons of weapons, mainly anti-aircraft weaponry from shoulder-fired missiles to ammunition for light-guns and machine guns. The weapons were distri
  •  
    "by Yossef Bodansky excerpt: There is a growing volume of new evidence from numerous sources in the Middle East - mostly affiliated with the Syrian opposition and its sponsors and supporters - which makes a very strong case, based on solid circumstantial evidence, that the August 21, 2013, chemical strike in the Damascus suburbs was indeed a pre-meditated provocation by the Syrian opposition. The extent of US foreknowledge of this provocation needs further investigation because available data puts the "horror" of the Barack Obama White House in a different and disturbing light. On August 13-14, 2013, Western-sponsored opposition forces in Turkey started advance preparations for a major and irregular military surge. Initial meetings between senior opposition military commanders and representatives of Qatari, Turkish, and US Intelligence ["Mukhabarat Amriki"] took place at the converted Turkish military garrison in Antakya, Hatay Province, used as the command center and headquarters of the Free Syrian Army (FSA) and their foreign sponsors. Very senior opposition commanders who had arrived from Istanbul briefed the regional commanders of an imminent escalation in the fighting due to "a war-changing development" which would, in turn, lead to a US-led bombing of Syria. The opposition forces had to quickly prepare their forces for exploiting the US-led bombing in order to march on Damascus and topple the Bashar al-Assad Government, the senior commanders explained. The Qatari and Turkish intelligence officials assured the Syrian regional commanders that they would be provided with plenty of weapons for the coming offensive. Indeed, unprecedented weapons distribution started in all opposition camps in Hatay Province on August 21-23, 2013. In the Reyhanli area alone, opposition forces received well in excess of 400 tons of weapons, mainly anti-aircraft weaponry from shoulder-fired missiles to ammunition for light-guns and machine guns. The weapons were distri
Gary Edwards

Bombshell: Federal judge suddenly green-lights lawsuit that could stop Obamacare in its... - 0 views

  •  
    excerpt: "Bombshell: Federal judge suddenly green-lights lawsuit that could stop Obamacare in its tracks ... Small-business plaintiffs say the government is treating all 50 states the same even though Congress allowed them to opt out - and 36 did .... The IRS is granting insurance subsidies to taxpayers in the 'refusenik' states, even though the text of the Obamacare law doesn't allow it ... A federal judge denied the government's motion to dismiss the case on Tuesday .... He also refused, however, to issue an injunction barring the Obama administration from implementing the law while the case moves forward"
Paul Merrell

U.S. Embassy in Ankara Headquarter for ISIS War on Iraq - Hariri Insider | nsnbc intern... - 0 views

  • The green light for the use of ISIS brigades to carve up Iraq, widen the Syria conflict into a greater Middle East war and to throw Iran off-balance was given behind closed doors at the Atlantic Council meeting in Turkey, in November 2013, told a source close to Saudi – Lebanese billionaire Saad Hariri, adding that the U.S. Embassy in Ankara is the operation’s headquarter.
  • A “trusted source” close to the Saudi – Lebanese multi-billionaire and former Lebanese P.M. Saad Hariri told on condition of anonymity, that the final green light for the war on Iraq with ISIS or ISIL brigades was given behind closed doors, at the sidelines of the Atlantic Council’s Energy Summit in Istanbul, Turkey, on November 22 – 23, 2013. The Atlantic Council is one of the most influential U.S. think tanks with regard to U.S. and NATO foreign policy and geopolitics.
  • “Had Baghdad been more cooperative about the Syrian oil fields at Deir-Ez-Zor in early 2013 and about autonomy for the North [Iraq’s northern, predominantly Kurdish region] they would possibly not have turned against al-Maliki; Or he would have been given more time”, said the Hariri insider during the almost two-hour-long conversation.
  • ...6 more annotations...
  • In March 2013, U.S. Secretary of State John Kerry demanded that Iraq “stops the arms flow to Syria”, while U.S. weapons were flowing to ISIS via Saudi Arabia into Iraq and Jordan. On Monday, April 22, 2013, 27 of the 28 E.U. foreign ministers agreed to lift the ban on the import of Syrian oil from opposition-held territories to allow the “opposition” to finance part of its campaign. “ISIS that was supposed to control [the region around] Deir Ez-Zor. [Turkish Energy Minister Taner] Yildiz and [Kurdish] Energy Minister Ashti] Hawrami were to make sure the oil could flow via the Kirkuk – Ceyhan [pipeline];… Ankara put al-Maliki under a lot of pressure about the Kurdish autonomy and oil, too much pressure, too early, if you’d ask me”, the source said. He added that the pressure backfired.
  • Previous reports confirmed that Baghdad started intercepting weapons and insurgents along the Saudi – Iraqi border, cutting off important supply lines for ISIS brigades around Deir Ez-Zor, and that Al-Maliki began complaining about a Saudi – Qatari-backed attempt to subvert the Iraqi State since late 2012. Noting my remark he replied: “That is right, but the heavy increase in attacks came in May – June 2013, after al-Maliki ordered the military to al-Anbar “. A previous article in nsnbc explains how Baghdad’s blockade caused problems in Jordan, because many of the transports of weapons, fighters and munitions had to be rerouted via Jordan. The Hariri insider added that the oil fields should have been under ISIS control by August 2013, but that the plan failed for two reasons. The UK withdrew its support for the bombing of Syria. That in turn enabled the Syrian army to dislodge both ISIS and Jabhat al-Nusrah from Deir Ez-Zor in August.
  • “The situation was a disaster because in June Hariri, Yidiz, Hawrami, Scowcroft, and everybody was ready to talk about how to share the oil between the U.S., Turkey and E.U.. The Summit in November should have dealt with a fait accompli”, the Hariri source stressed, adding that Washington put a gun to al-Maliki’s head when he was invited to the White House.
  • “Certain circles in Washington put a hell of a lot of pressure on Obama to put a gun to al-Maliki’s head”, said the Hariri source, adding that “time was running out and Obama was hesitant”. Asked what he meant with “time was running out” and if he could specify who it was that pushed Obama, he said: “Barzani was losing his grip in the North (Kurdish Iraq); the election [in September] was a setback. All plans for distributing Iraqi oil via Turkey and for sidelining Baghdad were set between Kirkuk and Ankara in early November… “Who exactly pressured Obama? I don’t know who delivered the message to Obama. I suspect Kerry had a word. It’s more important from where the message came, Kissinger, Scowcroft, Nuland and the Keagan clan, Stavridis, Petreaus, Riccardione, and the neo-con crowd at the [Atlantic] Council. … As far as I know ´someone` told Obama that he’d better pressure al-Maliki to go along with Kurdish autonomy by November or else. Who exactly ´advised` Obama is not as important as the fact that those people let him know that they would go ahead, with, or without him”.
  • Asked whether he knew details, how the final green light for the ISIS campaign was given, he said: ” Behind closed doors, in the presence of both Scowcroft, Hariri, and a couple of other people”. To my question “if he could be more specific” he replied “I could; I want to stay alive you know; Riccardione was tasked with the operation that day”. Noting that a prominent member of Saudi Arabia’s royal family, Prince Abdul Rachman al-Faisal has been named as the one being “in command” of the ISIS brigades, and if he could either confirm or deny, he nodded, adding that “the Prince” is responsible for financing the operation and for part of the command structure, but that the operations headquarter is the U.S. Embassy in Ankara Turkey. “As far as I know, nothing moves without Ambassador Riccardione”, he added.
  • The green light for the use of ISIS brigades to carve up Iraq, widen the Syria conflict into a greater Middle East war and to throw Iran off-balance was given behind closed doors at the Atlantic Council meeting in Turkey, in November 2013, told a source close to Saudi – Lebanese billionaire Saad Hariri, adding that the U.S. Embassy in Ankara is the operation’s headquarter.
  •  
    From June 2014, an important one I forgot to bookmark before. 
Paul Merrell

Privacy Guard: Scientists Develop Goggles That Block Facial Recognition Systems [VIDEO] - 0 views

  • Scientists have developed a means of ultimate privacy: glowing glasses that block photographs and facial recognition systems. Developed by Japan's National Institute of Informatics, these privacy goggles include eleven LEDs that blast a privacy curtain of near-infrared light into the wearer's face. The light thereby prevents facial-recognition systems from registering the wearer's face. According to Gizmodo, the light is undetectable to the human eye; unlike most glasses, the LEDs are placed to illuminate the eyes and nose, which facial recognition systems depend on to identify a face.
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
Paul Merrell

Senate CIA torture report could throw Gitmo hearings into chaos | Al Jazeera America - 0 views

  • The possible declassification and release of a Senate report into the CIA’s detention and interrogation program — begun in the wake of the 9/11 terrorist attacks — could have a huge impact on the controversial military tribunals happening at Guantánamo Bay, experts and lawyers believe. The proceedings have been moving at a snail’s pace at the U.S.-held military base on the island of Cuba, amid widespread condemnation that they are being held in a legal limbo and outside the U.S. criminal justice system. Details surrounding the CIA’s activities have been one of the most contentious issues concerning the commissions at Guantánamo, where the alleged mastermind of the 9/11 attacks, Khalid Sheikh Mohammed, and his co-defendants are on trial. Their alleged treatment while in CIA custody has been a key stumbling block in the hearings’ progress. The same goes for the man alleged to be behind the USS Cole bombing, Abd al-Rahim al-Nashiri, another former CIA captive. In both cases, there have been dozens of delays — mainly due to the fact that the attorneys have been battling military prosecutors over access to classified information about the CIA interrogation program that the attorneys want to use as evidence. Both cases have been dragging on for two years and are still in the pretrial evidentiary phase.
  • But now that the Senate Intelligence Committee appears set to vote on releasing its long-awaited 6,300-page, $50 million study — or at least some portion of it — the defense attorneys will finally get the opportunity to talk openly at the military commissions about torture. That could prove disastrous for military prosecutors. According to defense attorneys and human rights observers who have been monitoring the proceedings, it might also derail the government’s attempts to convince a jury that the detainees, if convicted, deserve to be executed. “The U.S. government has gone to great lengths to classify evidence of crimes — crimes committed by U.S. actors,” said Army Maj. Jason Wright, one of Mohammed’s military defense attorneys. “Were this information in this Senate report to be revealed … it would completely gut the classification architecture currently in place before the commissions.” The panel is expected to vote April 3, and it is widely believed the panel will approve release of its 400-page executive summary. If that happens, Wright said, he anticipates petitioning the military court to amend the protective order that treats all information about the CIA torture program as classified.
  • The report is likely to contain reams of information that has not yet come to light. Intelligence Committee Chairwoman Sen. Dianne Feinstein has said the report “includes details of each detainee in CIA custody, the conditions under which they were detained, how they were interrogated, the intelligence they actually provided and the accuracy — or inaccuracy — of CIA descriptions about the program to the White House, Department of Justice, Congress and others.” Wright said that in addition to seeking a change to the protective order, he would file discovery motions to gain access to the 6.2 million pages of documents the Senate had. Such a move would lead to further legal wrangling and delay the start of the trial, which the government hopes will get underway in September. “We have an absolute right to review that and have it produced in discovery,” Wright said.
  • ...4 more annotations...
  • Richard Kammen, al-Nashiri’s civilian defense attorney, meanwhile, has already filed a motion with the military court to obtain a complete, unredacted copy of the Senate Intelligence Committee’s report. The motion, submitted in September prior to the revelations that have surfaced about infighting between the CIA and Senate committee investigators, said the report “will be central to the accused’s defense on the merits, in impeaching the credibility of the evidence against him and in mitigation of the death sentence the government is seeking to impose.” If the entire report were declassified by the Intelligence Committee, it “would be huge because it would really eliminate the ‘need’ for military commissions, which are in my view mainly a vehicle to have what will look like trials but will keep whatever evidence of torture the judge ultimately allows secret from or sanitized to the public,” Kammen said.
  • But not everyone expects the report to be released in great detail. Air Force Capt. Michael Schwartz, the attorney for alleged 9/11 co-conspirator Walid bin Attash, doesn’t believe the Senate committee’s report will ever see the light of day. If it is released, he said it will be highly redacted, rendering it useless to the public and Attash’s defense team. “This whole military commissions system is designed to make sure this information is never known to the public,” Schwartz said. “No one in my office is naive enough to think this report will come out in any unredacted form. Certainly that report contains a lot of mitigating information that would be relevant to the defense of this case. But I don’t believe for a second that we will see anything in that report that actually sheds light on the crimes committed by the CIA against our clients between 2003 and 2006.” Air Force Col. Morris Davis, the former chief prosecutor at Guantánamo and a staunch critic of the military commissions, doesn’t believe the Senate committee’s report “is legally relevant” to the military commission trial of Mohammed and the other high-value detainees. But he does believe it will force the hearings more into the public.
  • “Where I do think it will have an impact is in the assessment of whether those legal relevance proceedings take place in open court or in secret closed sessions,” he said. “The report is likely to officially reinforce and amplify what the public already knows about this regrettable chapter in our history. It should further undercut the government’s claim that all this absolutely must stay hidden behind closed doors or else cataclysmic things will happen.” Army. Lt. Col. Todd Breasseale, a Pentagon spokesman who deals with detainee matters at Guantánamo, declined to discuss the Senate report or how its release may affect the commissions. "I can't imagine a world where competent counsel — be they from the government or defense — would announce in advance, any strategy they might pursue or make predictions on how any given issue might affect the progress of their case," Breasseale said.
  • Daphne Eviatar, a lawyer for Human Rights First who has closely observed and written about the military commission proceedings, said whether the Senate’s report is a game changer will ultimately depend on what is declassified. Perhaps details of the interrogations will be released, or they may be heavily redacted. “Either way, you can be sure the defense lawyers will try to reopen this issue, and the government will fight it, and the case will get bogged down once again in months of argument in pretrial hearings that are already taking forever,” she said.
  •  
    A ray of sunlight ahead in the Gitmo detainee prosecutions?
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

Reported US-Syrian Accord on Air Strikes | Consortiumnews - 1 views

  • Exclusive: A problem with President Obama’s plan to expand the war against ISIS into Syria was always the risk that Syrian air defenses might fire on U.S. warplanes, but now a source says Syria’s President Assad has quietly agreed to permit strikes in some parts of Syria, reports Robert Parry.
  • The Obama administration, working through the Russian government, has secured an agreement from the Syrian regime of Bashar al-Assad to permit U.S. airstrikes against Islamic State targets in parts of Syria, according to a source briefed on the secret arrangements. The reported agreement would clear away one of the chief obstacles to President Barack Obama’s plan to authorize U.S. warplanes to cross into Syria to attack Islamic State forces – the concern that entering Syrian territory might prompt anti-aircraft fire from the Syrian government’s missile batteries.
  • In essence, that appears to be what is happening behind the scenes in Syria despite the hostility between the Obama administration and the Assad government. Obama has called for the removal of Assad but the two leaders find themselves on the same side in the fight against the Islamic State terrorists who have battled Assad’s forces while also attacking the U.S.-supported Iraqi government and beheading two American journalists.
  • ...13 more annotations...
  • The usual protocol for the U.S. military – when operating in territory without a government’s permission – is to destroy the air defenses prior to conducting airstrikes so as to protect American pilots and aircraft, as was done with Libya in 2011. However, in other cases, U.S. intelligence agencies have arranged for secret permission from governments for such attacks, creating a public ambiguity usually for the benefit of the foreign leaders while gaining the necessary U.S. military assurances.
  • In a national address last week, Obama vowed to order U.S. air attacks across Syria’s border without any coordination with the Syrian government, a proposition that Damascus denounced as a violation of its sovereignty. So, in this case, Syria’s behind-the-scenes acquiescence also might provide some politically useful ambiguity for Obama as well as Assad. Yet, this secret collaboration may go even further and include Syrian government assistance in the targeting of the U.S. attacks, according to the source who spoke on condition of anonymity. That is another feature of U.S. military protocol in conducting air strikes – to have some on-the-ground help in pinpointing the attacks. As part of its public pronouncements about the future Syrian attacks, the Obama administration sought $500 million to train “vetted” Syrian rebels to handle the targeting tasks inside Syria as well as to carry out military ground attacks. But that approach – while popular on Capitol Hill – could delay any U.S. airstrikes into Syria for months and could possibly negate Assad’s quiet acceptance of the U.S. attacks, since the U.S.-backed rebels share one key goal of the Islamic State, the overthrow of Assad’s relatively secular regime.
  • Just last month, Obama himself termed the strategy of arming supposedly “moderate” Syrian rebels “a fantasy.” He told the New York Times’ Thomas L. Friedman: “This idea that we could provide some light arms or even more sophisticated arms to what was essentially an opposition made up of former doctors, farmers, pharmacists and so forth, and that they were going to be able to battle not only a well-armed state but also a well-armed state backed by Russia, backed by Iran, a battle-hardened Hezbollah, that was never in the cards.” Obama’s point would seem to apply at least as much to having the “moderate” rebels face down the ruthless Islamic State jihadists who engage in suicide bombings and slaughter their captives without mercy. But this “fantasy” of the “moderate” rebels has a big following in Congress and on the major U.S. op-ed pages, so Obama has included the $500 million in his war plan despite the risk it poses to Assad’s acquiescence to American air attacks.
  • Without Assad’s consent, the U.S. airstrikes might require a much wider U.S. bombing campaign to first target Syrian government defenses, a development long sought by Official Washington’s influential neoconservatives who have kept “regime change” in Syria near the top of their international wish list. For the past several years, the Israeli government also has sought the overthrow of Assad, even at the risk of Islamic extremists gaining power. The Israeli thinking had been that Assad, as an ally of Iran, represented a greater threat to Israel because his government was at the center of the so-called Shiite crescent reaching from Tehran through Damascus to Beirut and southern Lebanon, the base for Hezbollah.
  • The thinking was that if Assad’s government could be pulled down, Iran and Hezbollah – two of Israel’s principal “enemies” – would be badly damaged. A year ago, then-Israeli Ambassador to the United States Michael Oren articulated this geopolitical position in an interview with the Jerusalem Post. “The greatest danger to Israel is by the strategic arc that extends from Tehran, to Damascus to Beirut. And we saw the Assad regime as the keystone in that arc,” Oren said. “We always wanted Bashar Assad to go, we always preferred the bad guys who weren’t backed by Iran to the bad guys who were backed by Iran.” He said this was the case even if the other “bad guys” were affiliated with al-Qaeda. More recently, however, with the al-Qaeda-connected Nusra Front having seized Syrian territory adjacent to the Israeli-occupied Golan Heights – forcing the withdrawal of UN peacekeepers – the balance of Israeli interests may be tipping in favor of preferring Assad to having Islamic extremists possibly penetrating directly into Israeli territory.
  • Direct attacks on Israel would be a temptation to al-Nusra Front, which is competing for the allegiance of young jihadists with the Islamic State. While the Islamic State, known by the acronyms ISIS or ISIL, has captured the imaginations of many youthful extremists by declaring the creation of a “caliphate” with the goal of driving Western interests from the Middle East, al-Nusra could trump that appeal by actually going on the offensive against one of the jihadists’ principal targets, Israel. Yet, despite Israel’s apparent rethinking of its priorities, America’s neocons appear focused still on their long-held strategy of using violent “regime change” in the Middle East to eliminate governments that have been major supporters of Lebanon’s Hezbollah and Palestine’s Hamas, i.e. Syria and Iran. One reason why Obama may have opted for a secretive overture to the Assad regime, using intelligence channels with the Russians as the middlemen, is that otherwise the U.S. neocons and their “liberal interventionist” allies would have howled in protest.
  • The Russian Hand Besides the tactical significance of U.S. intelligence agencies arranging Assad’s tacit acceptance of U.S. airstrikes over Syrian territory, the reported arrangement is also significant because of the role of Russian intelligence serving as the intermediary. That suggests that despite the U.S.-Russian estrangement over the Ukraine crisis, the cooperation between President Obama and Russian President Vladimir Putin has not been extinguished; it has instead just gone further underground. Last year, this growing behind-the-scenes collaboration between Obama and Putin represented a potential tectonic geopolitical shift in the Middle East. In the short term, their teamwork produced agreements that averted a U.S. military strike against Syria last September (by getting Assad to surrender his chemical weapons arsenal) and struck a tentative deal with Iran to constrain but not eliminate its nuclear program.
  • In the longer term, by working together to create political solutions to various Mideast crises, the Obama-Putin cooperation threatened to destroy the neocons’ preferred strategy of escalating U.S. military involvement in the region. There was the prospect, too, that the U.S.-Russian tag team might strong-arm Israel into a peace agreement with the Palestinians. So, starting last September – almost immediately after Putin helped avert a U.S. air war against Syria – key neocons began taking aim at Ukraine as a potential sore point for Putin. A leading neocon, Carl Gershman, president of the U.S.-government-funded National Endowment for Democracy, took to the op-ed pages of the neocon Washington Post to identify Ukraine as “the biggest prize” and explaining how its targeting could undermine Putin’s political standing inside Russia. “Ukraine’s choice to join Europe will accelerate the demise of the ideology of Russian imperialism that Putin represents,” Gershman wrote. “Russians, too, face a choice, and Putin may find himself on the losing end not just in the near abroad but within Russia itself.” At the time, Gershman’s NED was funding scores of political and media projects inside Ukraine.
  • By early 2014, American neocons and their “liberal interventionist” pals were conspiring “to midwife” a coup to overthrow Ukraine’s elected President Viktor Yanukovych, according to a phrase used by U.S. Ambassador Geoffrey Pyatt in an intercepted phone conversation with Assistant Secretary of State for European Affairs Victoria Nuland, who was busy handpicking leaders to replace Yanukovych. A neocon holdover from George W. Bush’s administration, Nuland had been a top aide to Vice President Dick Cheney and is married to prominent neocon Robert Kagan, a co-founder of the Project for a New American Century which prepared the blueprint for the neocon strategy of “regime change” starting with the 2003 U.S.-led invasion of Iraq.
  • The U.S.-backed coup ousted Yanukovych on Feb. 22 and sparked a bloody civil war, leaving thousands dead, mostly ethnic Russians in eastern Ukraine. But the Gershman-Nuland strategy also drove a deep wedge between Obama and Putin, seeming to destroy the possibility that their peace-seeking collaboration would continue in the Middle East. [See Consortiumnews.com’s “Neocons’ Ukraine-Syria-Iran Gambit.”] New Hope for ‘Regime Change’ The surprise success of Islamic State terrorists in striking deep inside Iraq during the summer revived neocon hopes that their “regime change” strategy in Syria might also be resurrected. By baiting Obama to react with military force not only in Iraq but across the border in Syria, neocons like Sens. John McCain and Lindsey Graham put the ouster of Assad back in play.
  • In a New York Times op-ed on Aug. 29, McCain and Graham used vague language about resolving the Syrian civil war, but clearly implied that Assad must go. They wrote that thwarting ISIS “requires an end to the [civil] conflict in Syria, and a political transition there, because the regime of President Bashar al-Assad will never be a reliable partner against ISIS; in fact, it has abetted the rise of ISIS, just as it facilitated the terrorism of ISIS’ predecessor, Al Qaeda in Iraq.” Though the McCain-Graham depiction of Assad’s relationship to ISIS and al-Qaeda was a distortion at best – in fact, Assad’s army has been the most effective force in pushing back against the Sunni terrorist groups that have come to dominate the Western-backed rebel movement – the op-ed’s underlying point is obvious: a necessary step in the U.S. military operation against ISIS must be “regime change” in Damascus.
  • That would get the neocons back on their original track of forcing “regime change” in countries seen as hostile to Israel. The first target was Iraq with Syria and Iran always meant to follow. The idea was to deprive Israel’s close-in enemies, Lebanon’s Hezbollah and Palestine’s Hamas, of crucial support. But the neocon vision got knocked off track when Bush’s Iraq War derailed and the American people balked at extending the conflict to Syria and Iran. Still, the neocons retained their vision even after Bush and Cheney departed. They also remained influential by holding onto key positions inside Official Washington – at think tanks, within major news outlets and even inside the Obama administration. They also built a crucial alliance with “liberal interventionists” who had Obama’s ear. [See Consortiumnews.com’s “The Dangerous Neocon-R2P Alliance.”]
  • The neocons’ new hope arrived with the public outrage over ISIS’s atrocities. Yet, while pushing to get this new war going, the neocons have downplayed their “regime change” agenda, getting Obama to agree only to extend his anti-ISIS bombing campaign from Iraq into Syria. But it was hard to envision expanding the war into Syria without ousting Assad. Now, however, if the source’s account is correct regarding Assad’s quiet assent to U.S. airstrikes, Obama may have devised a way around the need to bomb Assad’s military, an maneuver that might again frustrate the neocons’ beloved goal of “regime change.”
  •  
    Robert Parry lands another major scoop. But beware of government officials who leak government plans because they do not invariably speak the truth.  I am particularly wary of this report because Obama's planned arming and training of the "moderate Syrian opposition" was such a patent lie. The "moderate Syrian opposition" disappeared over two years ago as peaceful protesters were replaced by Saudi, Qatari, Turkish, and American-backed Salafist mercenaries took their place. Up until this article, there has been every appearance that the U.S. was about to become ISIL's Air Force in Syria. In other words, there has been a steady gushing of lies from the White House on fundamental issues of war and peace. In that light, I do not plan to accept this article as truth before I see much more confirmation that ISIL rather than the Assad government is the American target in Syria. We have a serial liar in the White House.
Paul Merrell

How Global Real Estate Giant Profits from Stolen Palestinian Land | Global Research - C... - 0 views

  • US-based multinational RE/MAX is marketing properties in illegal Jews-only settlements built on stolen Palestinian land such as Ariel, near Salfit in the West Bank. Keren Manor/ActiveStills Agents working for the US-headquartered real estate giant RE/MAX are promoting themselves as specialists in property built in Israel’s settlements on occupied Palestinian land. The Colorado-based corporation which says it operates in nearly 100 countries was identified as responsible by a 2013 United Nations’ probe for how its Israeli franchises sell houses and apartments in the occupied West Bank. Despite that criticism, many RE/MAX representatives are continuing to handle such property.
  • In fact, all of these “communities” are Israeli settlements inside the West Bank and are illegal under international law. Their construction and growth violates the Fourth Geneva Convention, which forbids an occupying power from transferring its civilian population into a territory that it occupies.
  • Scores of properties in the occupied West Bank (including East Jerusalem) are currently listed as for sale on RE/MAX websites. Some of them are on the market for high prices. RE/MAX is trying to sell a three-bedroom house in Jerusalem’s Old City for $1.7 million. According to RE/MAX, the house was “built over 600 years ago by the Turks.” A video for the same property posted to YouTube by Benzaquen, states that the “light train is just nearby.” That is a reference to a tram network which connects Israel’s settlements in East Jerusalem to other parts of the city. The French corporation Veolia has faced years of criticism and activist campaigns for its large-scale involvement in building the Jerusalem light rail, which Palestinians see as a means of tightening Israel’s grip on their city. RE/MAX’s Colorado headquarters did not reply to requests for comment.
  • ...1 more annotation...
  • The firm has generally kept silent when its activities have been highlighted by Palestine solidarity activists. It did, however, issue a terse statement last year. The statement tried to distance the firm’s headquarters from its Israeli franchise and noted that RE/MAX had reduced the number of its offices in the West Bank. It failed to acknowledge that many of the agents handling property in East Jerusalem and the wider West Bank are working from offices in West Jerusalem. But the company seems to be sensitive to activist criticism that it is involved in selling homes in illegal settlements within the Israeli-occupied West Bank. Searches on the RE/MAX Israel website suggest the company may be engaging in deliberate obfuscation of its West Bank settlement listings.
Paul Merrell

NASA's Secret Relationships with U.S. Defense and Intelligence Agencies - 0 views

  • Declassified Records Trace the Many Hidden Interactions Between the U.S. Civilian and National Security Space Programs Secret Cooperation Punctuated by Disputes over Budgets, Encryption of Scientific Data, and Fallout from the Challenger Tragedy National Security Archive Electronic Briefing Book No. 509
  • Furnishing cover stories for covert operations, monitoring Soviet missile tests, and supplying weather data to the U.S. military have been part of the secret side of the National Aeronautics and Space Administration (NASA) since its inception in 1958, according to declassified documents posted for the first time today by the National Security Archive at The George Washington University (www.nsarchive.org). James E. David, a curator in NASA's Division of Space History, obtained the documents in the course of researching his critically praised book, Spies and Shuttles: NASA's Secret Relationships with the DoD and CIA (University Press of Florida, 2015). David has compiled, edited and introduced more than 50 of these records for today's posting. Even though Congress's intention in forming NASA was to establish a purely civilian space agency, according to David a combination of circumstances led the agency to commingle its activities with black programs operated by the U.S. military and Intelligence Community. This often tight cooperation did not, however, keep disputes from bubbling over on issues such as cost sharing, access to classified information, encryption of data originally intended for civilian use, and delays to military satellite launches caused by the Challenger disaster. Over the years, classification restrictions have kept most of the story of NASA's secret activities out of the public eye. Today's posting brings to light previously unpublished primary source material that underpins Spies and Shuttles and other important literature on the subject. The records were acquired through agency declassification review procedures, specific declassification requests, and archival research.
  • The documents presented here were obtained in the research and writing of Spies and Shuttles: NASA's Secret Relationships with the DoD and CIA. Most were declassified by agencies under the automatic/systematic declassification review program or acquired through declassification requests. They are grouped into the following categories: NASA as a consumer of intelligence NASA's assistance to analyzing intelligence on foreign aeronautical and space programs NASA's participation in cover stories NASA's acquisition and use of classified technologies in its lunar exploration program Restrictions on NASA's remote sensing programs NASA's application satellites and national security requirements Space Shuttle
  •  
    For some reason, proponents of space exploration have a tendency to frame their arguments as an issue of moral necessity for human species preservation, often because self-extinction is likely. It's a weak argument. One can more forcefully argue that homo sapiens has no moral right to migrate outside the planet until such time as it learns to not destroy its own life support systems on Earth; in the meantime, the incredible funding devoted to space exploration would be better spent learning that lesson. But evidence of NASA ties to the Dark State, which has often come to mind when reading such drivel, has been wanting. Now we learn that it does exist but had been concealed. In light of these disclosures, we can discuss the moral issues with more clarity. But still missing: the obvious overlap of NASA's mission with the development of ICBMs and deployment of orbiting weapons platforms.   
Paul Merrell

Memo to Potential Whistleblowers: If You See Something, Say Something | Global Research - 0 views

  • Blowing the whistle on wrongdoing creates a moral frequency that vast numbers of people are eager to hear. We don’t want our lives, communities, country and world continually damaged by the deadening silences of fear and conformity. I’ve met many whistleblowers over the years, and they’ve been extraordinarily ordinary. None were applying for halos or sainthood. All experienced anguish before deciding that continuous inaction had a price that was too high. All suffered negative consequences as well as relief after they spoke up and took action. All made the world better with their courage. Whistleblowers don’t sign up to be whistleblowers. Almost always, they begin their work as true believers in the system that conscience later compels them to challenge. “It took years of involvement with a mendacious war policy, evidence of which was apparent to me as early as 2003, before I found the courage to follow my conscience,” Matthew Hoh recalled this week.“It is not an easy or light decision for anyone to make, but we need members of our military, development, diplomatic and intelligence community to speak out if we are ever to have a just and sound foreign policy.”
  • Hoh describes his record this way: “After over 11 continuous years of service with the U.S. military and U.S. government, nearly six of those years overseas, including service in Iraq and Afghanistan, as well as positions within the Secretary of the Navy’s Office as a White House Liaison, and as a consultant for the State Department’s Iraq Desk, I resigned from my position with the State Department in Afghanistan in protest of the escalation of war in 2009.” Another former Department of State official, the ex-diplomat and retired Army colonel Ann Wright, who resigned in protest of the Iraq invasion in March 2003, is crossing paths with Hoh on Friday as they do the honors at a ribbon-cutting — half a block from the State Department headquarters in Washington — for a billboard with a picture of Pentagon Papers whistleblower Daniel Ellsberg. Big-lettered words begin by referring to the years he waited before releasing the Pentagon Papers in 1971. “Don’t do what I did,” Ellsberg says on the billboard.  “Don’t wait until a new war has started, don’t wait until thousands more have died, before you tell the truth with documents that reveal lies or crimes or internal projections of costs and dangers. You might save a war’s worth of lives.
  • The billboard – sponsored by the ExposeFacts organization, which launched this week — will spread to other prominent locations in Washington and beyond. As an organizer for ExposeFacts, I’m glad to report that outreach to potential whistleblowers is just getting started. (For details, visit ExposeFacts.org.) We’re propelled by the kind of hopeful determination that Hoh expressed the day before the billboard ribbon-cutting when he said: “I trust ExposeFacts and its efforts will encourage others to follow their conscience and do what is right.” The journalist Kevin Gosztola, who has astutely covered a range of whistleblower issues for years, pointed this week to the imperative of opening up news media. “There is an important role for ExposeFacts to play in not only forcing more transparency, but also inspiring more media organizations to engage in adversarial journalism,” he wrote. “Such journalism is called for in the face of wars, environmental destruction, escalating poverty, egregious abuses in the justice system, corporate control of government, and national security state secrecy. Perhaps a truly successful organization could inspire U.S. media organizations to play much more of a watchdog role than a lapdog role when covering powerful institutions in government.”
  • ...2 more annotations...
  • Overall, we desperately need to nurture and propagate a steadfast culture of outspoken whistleblowing. A central motto of the AIDS activist movement dating back to the 1980s – Silence = Death – remains urgently relevant in a vast array of realms. Whether the problems involve perpetual war, corporate malfeasance, climate change, institutionalized racism, patterns of sexual assault, toxic pollution or countless other ills, none can be alleviated without bringing grim realities into the light. “All governments lie,” Ellsberg says in a video statement released for the launch of ExposeFacts, “and they all like to work in the dark as far as the public is concerned, in terms of their own decision-making, their planning — and to be able to allege, falsely, unanimity in addressing their problems, as if no one who had knowledge of the full facts inside could disagree with the policy the president or the leader of the state is announcing.” Ellsberg adds: “A country that wants to be a democracy has to be able to penetrate that secrecy, with the help of conscientious individuals who understand in this country that their duty to the Constitution and to the civil liberties and to the welfare of this country definitely surmount their obligation to their bosses, to a given administration, or in some cases to their promise of secrecy.”
  • Right now, our potential for democracy owes a lot to people like NSA whistleblowers William Binney and Kirk Wiebe, and EPA whistleblower Marsha Coleman-Adebayo. When they spoke at the June 4 news conference in Washington that launched ExposeFacts, their brave clarity was inspiring. Antidotes to the poisons of cynicism and passive despair can emerge from organizing to help create a better world. The process requires applying a single standard to the real actions of institutions and individuals, no matter how big their budgets or grand their power. What cannot withstand the light of day should not be suffered in silence. If you see something, say something.
  •  
    While some governments -- my own included -- attempt to impose an Orwellian Dark State of ubiquitous secret surveillance, secret wars, the rule of oligarchs, and public ignorance, the Edward Snowden leaks fanned the flames of the countering War on Ignorance that had been kept alive by civil libertarians. Only days after the U.S. Supreme Court denied review in a case where a reporter had been ordered to reveal his source of information for a book on the Dark State under the penalties for contempt of court (a long stretch in jail), a new web site is launched for communications between sources and journalists where the source's names never need to be revealed. This article is part of the publicity for that new weapon fielded by the civil libertarian side in the War Against Ignorance.  Hurrah!
Paul Merrell

Tomgram: Nick Turse, America's Non-Stop Ops in Africa | TomDispatch - 0 views

  • The numbers tell the story: 10 exercises, 55 operations, 481 security cooperation activities. For years, the U.S. military has publicly insisted that its efforts in Africa are small scale. Its public affairs personnel and commanders have repeatedly claimed no more than a “light footprint” on that continent, including a remarkably modest presence when it comes to military personnel.  They have, however, balked at specifying just what that light footprint actually consists of.  During an interview, for instance, a U.S. Africa Command (AFRICOM) spokesman once expressed worry that tabulating the command’s deployments would offer a “skewed image” of U.S. efforts there. It turns out that the numbers do just the opposite. Last year, according AFRICOM commander General David Rodriguez, the U.S. military carried out a total of 546 “activities” on the continent -- a catch-all term for everything the military does in Africa.  In other words, it averages about one and a half missions a day.  This represents a 217% increase in operations, programs, and exercises since the command was established in 2008. In testimony before the Senate Armed Services Committee earlier this month, Rodriguez noted that the 10 exercises, 55 operations, and 481 security cooperation activities made AFRICOM “an extremely active geographic command.”  But exactly what the command is “active” in doing is often far from clear.
  • AFRICOM releases information about only a fraction of its activities.  It offers no breakdown on the nature of its operations.  And it allows only a handful of cherry-picked reporters the chance to observe a few select missions.  The command refuses even to offer a count of the countries in which it is “active,” preferring to keep most information about what it’s doing -- and when and where -- secret. While Rodriguez’s testimony offers but a glimpse of the scale of AFRICOM’s activities, a cache of previously undisclosed military briefing documents obtained by TomDispatch sheds additional light on the types of missions being carried out and their locations all across the continent.  These briefings prepared for top commanders and civilian officials in 2013 demonstrate a substantial increase in deployments in recent years and reveal U.S. military operations to be more extensive than previously reported.  They also indicate that the pace of operations in Africa will remain robust in 2014, with U.S. forces expected again to average far more than a mission each day on the continent.
Paul Merrell

The Geopolitics of Gas and the Syrian Crisis: Syrian "Opposition" Armed to Thwart Const... - 0 views

  • What has one of the most democratic countries of the Middle East, Syria, done to tick off some of its neighbors in the West, the fierce fighters for democracy? The irrationality and unscrupulousness of the approaches Western countries have taken to the Syrian crisis, when the same people who in Europe are considered terrorists are declared «freedom fighters» when it comes to Syria, becomes clearer in light of the economic dimension of the Syrian tragedy. There is every reason to think that by helping destroy its own cultural and historical roots in Syria, Europe is first and foremost fighting for energy resources. And a special role is played by natural gas, which is emerging as the main fuel of the 21st century. The geopolitical problems connected with its production, transportation and use are perhaps more than any other topic on the radar of Western strategists. 
  •  
    Best detailed account of the reasons for the Syrian War I've yet encountered. Referenced.
Paul Merrell

Redactions in U.S. Memo Leave Doubts on Data Surveillance Program - NYTimes.com - 0 views

  • The Justice Department has released a newly declassified version of a May 2004 legal memo approving the National Security Agency’s Stellarwind program, a set of warrantless surveillance and data collection activities that President George W. Bush secretly authorized after the terrorist attacks of Sept. 11, 2001. But questions about the program remain.A more heavily redacted version of the memo had been released in 2011 as part of Freedom of Information Act lawsuits by the American Civil Liberties Union and the Electronic Privacy Information Center. The new version includes previously censored references to the existence of the data collection related to Americans’ phone calls and emails.
  • The Obama administration voluntarily reprocessed the memo from Jack Goldsmith, the head of the Justice Department’s Office of Legal Counsel, in light of the fact that it had declassified the existence of the bulk phone and email data programs last year after leaks by Edward J. Snowden, a former N.S.A. contractor.The fuller release adds to the public record of an important historical episode. However, the government continued to redact crucial portions of the memo that would answer a primary remaining question about the history of Stellarwind: What prompted the Justice Department to conclude in early 2004 that one aspect of the program, which collected records about Americans’ emails in bulk, was illegal — even though it permitted other aspects, like warrantless wiretapping and the bulk collection of Americans’ phone records, to continue?“They have continued to keep redacted something very significant,” said Jameel Jaffer, a lawyer with the A.C.L.U.
  • The Justice Department’s conclusion that the email metadata program was illegal led to a March 2004 confrontation between White House and department officials in the hospital room of Attorney General John Ashcroft, after which nearly the entire top leadership of the department threatened to resign, prompting President Bush to agree to changes.
  • ...1 more annotation...
  • parts of what had happened began to become public, starting with a December 2005 article in The New York Times that revealed the warrantless wiretapping portion of the program. The bulk phone and email metadata programs, however, remained secret until 2013, when they came to light in leaks by Mr. Snowden.While the basic existence of the March 2004 crisis has been known, it was not until Mr. Snowden’s leaks that it became clear that it pertained only to the Internet metadata program. However, it has remained murky what Mr. Goldsmith objected to in light of his willingness to bless the rest of Stellarwind based on a sweeping theory of presidential wartime powers.Those portions of the memo remain redacted in the newly released version.
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

Bragging that she and Israel were born within months, Clinton praises its 'prowess in war' - 0 views

  • Yesterday Hillary Clinton gave a speech in Washington at the Saban Forum of Brookings that included more pandering to Israel than any speech I’ve heard from any American politician. It was endless. Israel is a brave democracy, a light unto the nations, a miracle, its “prowess in war” is “inspiring,” and we must take the US-Israel relationship to the “next level.”
  • Just as the Republican candidates had attacked Boycott, Divestment and Sanctions movement (BDS) at the Republican Jewish Coalition last week, Clinton said that BDS was hurting the U.S.’s ability to fight terrorism. This is language straight out of Benjamin Netanyahu’s office. Speaking of Netanyahu, Clinton was asked by Saban what she would do on her first day in office and she said dutifully: on the first day I would extend an invitation to the Israeli prime minister to come to the United States hopefully within the first month, certainly as soon as it could be arranged to do exactly what I briefly outlined. To work toward very much strengthening and intensifying our relationship on military matters, on terrorism and on everything else that we can do more to cooperate on that will send a strong message to our own peoples as well as the rest of the world. So that is on my list for the first day. Here are more incredible pander quotes.
  • The boycott movement against Israel is making our alliance with Israel “more indispensable than ever”. Here is where she suggests that BDS is hurting US efforts to fight terrorism: In this period of period of peril, Israel needs a strong America by its side, and America needs a strong and secure Israel by our side. It’s in our national interest to have an Israel that remains a bastion of stability and a core ally in a region in chaos. An Israel strong enough to deter its enemies, and strong enough to take steps in the pursuit of peace. We need a brave democracy whose perseverance and pluralism are a rebuke to every extremist and tyrant. We need a light unto the nations as darkness threatens. Today three trends in the region and the world are converging and making our alliance with Israel more indispensable than ever. The first is a rising tide of extremism across a wide arc of instability, from North Africa to South Asia. The second is Iran’s continued aggression. The third is the growing effort to delegitimize Israel on the world stage. America and Israel need to address these threats together. We must take an already strong relationship to the next level. We have to develop a common, strategic vision and pursue a coordinated approach, deepen our cooperation and consultation across the board.
  • ...3 more annotations...
  • Why is fighting BDS an American interest? Clinton never says, though she links the movement with anti-Semitism globally. As Secretary of State I called out systemic structural anti-Israel basis at the UN and fought to block the one sided Goldstone report particularly at a time when anti-semitism is on the rise across the world especially in Europe. We need to repudiate efforts to malign and undermine Israel and the Jewish people. The boycott, divestment and sanctions  movement known as BDS is the latest front in this battle. Demonizing Israeli scientists and intellectuals, even young students, comparing Israel to South African apartheid, now no nation is above criticism. But this is wrong and it should stop immediately.
  • And as for diplomacy, she says that no outside pressure should be brought on Israel: Some proponents of BDS may hope that pressuring Israel may lead to peace. Well that’s wrong too. No outside force is going to resolve the conflict between Israeli’s and Palestinian’s. Only a two state solution can provide Palestinian’s independence, sovereignty and dignity and provide Israelis the secure and recognized borders of a democratic Jewish state.
  • Some of this language is defensive. Clinton knows that the Democratic base doesn’t care about Israel: With every passing year we must tie bonds tighter, reach out to the next generation to bring them with us and do the hard necessary work of friendship because there is a new generation in both countries today that does not remember that shared past… Ben Gurion once said, “In Israel, in order to be a realist you must believe in miracles.” Well, tonight is the first night of Hanukah and the Jewish people and Israel and all over the world praise the almighty for the miracles, for the redemption, for the mighty deeds, for the saving acts. This season and this moment in history is a time once again for mighty deeds and saving acts. For us to rededicate and renew our great alliance. For us once again to light candles of hope that will shine through the darkness for our peoples and all peoples if we do it together. So Clinton is completely flouting the Democratic base. Because she feels secure inside the party on this issue. Imagine if she insulted Black Lives Matter in the way she’s insulting Palestinian-Americans and Arab-Americans. There would be an uprising in her own base. I have to believe that uprising will come on this issue too. As it is, Clinton is using fear to try and strengthen the U.S. Israel relationship even more.
  •  
    Hillary isn't giving the swing vote much incentive to vote for her other than being female and having name familiarity.
1 - 20 of 308 Next › Last »
Showing 20 items per page