Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged map

Rss Feed Group items tagged

Paul Merrell

See for yourself: Aerial and panoramic views show devastation in Gaza | The Electronic ... - 0 views

  • A total of 2,168 people were killed, 521 of them children, during Israel’s 51-day bombardment of the Gaza Strip that ended in a ceasefire agreement on 26 August. Such images help us to understand the reality behind the shocking statistics about the physical destruction: 108,000 people have had their homes destroyed or severely damaged and will need permanent rehousing, according to the UN Office for the Coordination of Humanitarian Affairs (UN OCHA). As the ceasefire allows for more in-depth assessments “it is clear that the scale of damage is unprecedented, with approximately 13 percent of the housing stock affected,” UN OCHA says. “Five percent of the housing stock is uninhabitable – an estimated 18,000 housing units have been either destroyed or severely damaged.” This on top of a shortage of 71,000 housing units before the Israeli attack. Since there is no functioning airport in Gaza and Israel controls the skies, many people have wondered how the aerial video was taken. Another video published by MediaTown in March shows the company’s crew demonstrating their use of a quadcopter remote control aircraft similar to this one to make a video:
  • The photojournalist Lewis Whyld created the “The Gaza War Map,” a website that allows the viewer to see panoramic scenes of various places in Gaza.
  • The viewer can select and virtually stand in any of 20 sites in Gaza from Rafah in the south to Beit Hanoun in the north and see a 360-degree view of the destruction all around. Short of being in Gaza it is an effective way to get a sense of the scale of devastation Israeli bombing has caused. Try it yourself.
  • ...3 more annotations...
  • The United Nations Institute for Training and Research (UNITAR) has published a series of satellite images showing areas of Gaza before and after the Israeli bombardment. Such maps are used by international agencies to make overall damage assessments. For instance, using satellite images, the UN estimated that as of 25 July, the Israeli bombardment had completely destroyed 700 structures and severely damaged 316 others in (a “structure” might be an individual house or an entire apartment block with a number of individual units) in the eastern Gaza City districts of Shujaiya, Tuffah and Shaaf (see the PDF below).
  • For instance, using satellite images, the UN estimated that as of 25 July, the Israeli bombardment had completely destroyed 700 structures and severely damaged 316 others in (a “structure” might be an individual house or an entire apartment block with a number of individual units) in the eastern Gaza City districts of Shujaiya, Tuffah and Shaaf (see the PDF below).
  • UN OCHA has published another invaluable resource, the Gaza Crisis Atlas. Viewable online, it contains numerous maps and satellite images with neighborhood-by-neighborhood information about the destruction in Gaza.
  •  
    No blood and gore in any of these. Just a useful collection of video, satellite photos, and maps of the aftermath of summer 2014's Israeli military devastation of Gaza, the world's most densely populated area. Some of the satellite photos have before and after views of the destruction. The only worse devastation of urban areas that I have seen are photos of Dresden and Berlin at the end of World War II. So much for Israel's claims of careful targeting using precision methods of delivery. Wide areas of utter devastation. Using weapons and funds provided by the U.S.  I'm thinking about launching a political action for the U.S. to pay for Gaza reconstruction and humanitarian relief and to deduct that expense from Israel's annual $3 billion in U.S. military aid.  Contrary to widely republished Israeli propaganda, Israel, not Hamas, started this mess. http://america.aljazeera.com/opinions/2014/7/israel-hamas-palestiniansconflictunitedstatesinternationallaw.html  see also Adam Horowitz and Phil Weiss, Claim that Hamas killed 3 teens is turning out to be the WMD of Gaza onslaught, Mondoweiss (26 July 2014),
Paul Merrell

N.S.A. Report Outlined Goals for More Power - NYTimes.com - 0 views

  • Officials at the National Security Agency, intent on maintaining its dominance in intelligence collection, pledged last year to push to expand its surveillance powers, according to a top-secret strategy document.
  • In a February 2012 paper laying out the four-year strategy for the N.S.A.’s signals intelligence operations, which include the agency’s eavesdropping and communications data collection around the world, agency officials set an objective to “aggressively pursue legal authorities and a policy framework mapped more fully to the information age.” Written as an agency mission statement with broad goals, the five-page document said that existing American laws were not adequate to meet the needs of the N.S.A. to conduct broad surveillance in what it cited as “the golden age of Sigint,” or signals intelligence. “The interpretation and guidelines for applying our authorities, and in some cases the authorities themselves, have not kept pace with the complexity of the technology and target environments, or the operational expectations levied on N.S.A.’s mission,” the document concluded. Using sweeping language, the paper also outlined some of the agency’s other ambitions. They included defeating the cybersecurity practices of adversaries in order to acquire the data the agency needs from “anyone, anytime, anywhere.” The agency also said it would try to decrypt or bypass codes that keep communications secret by influencing “the global commercial encryption market through commercial relationships,” human spies and intelligence partners in other countries. It also talked of the need to “revolutionize” analysis of its vast collections of data to “radically increase operational impact.”
  • The N.S.A. document, titled “Sigint Strategy 2012-2016,” does not make clear what legal or policy changes the agency might seek. The N.S.A.’s powers are determined variously by Congress, executive orders and the nation’s secret intelligence court, and its operations are governed by layers of regulations. While asserting that the agency’s “culture of compliance” would not be compromised, N.S.A. officials argued that they needed more flexibility, according to the paper. Senior intelligence officials, responding to questions about the document, said that the N.S.A. believed that legal impediments limited its ability to conduct surveillance of terrorism suspects inside the United States. Despite an overhaul of national security law in 2008, the officials said, if a terrorism suspect who is under surveillance overseas enters the United States, the agency has to stop monitoring him until it obtains a warrant from the Foreign Intelligence Surveillance Court. “N.S.A.’s Sigint strategy is designed to guide investments in future capabilities and close gaps in current capabilities,” the agency said in a statement. “In an ever-changing technology and telecommunications environment, N.S.A. tries to get in front of issues to better fulfill the foreign-intelligence requirements of the U.S. government.”
  • ...4 more annotations...
  • Critics, including some congressional leaders, say that the role of N.S.A. surveillance in thwarting terrorist attacks — often cited by the agency to justify expanded powers — has been exaggerated. In response to the controversy about its activities after Mr. Snowden’s disclosures, agency officials claimed that the N.S.A.’s sweeping domestic surveillance programs had helped in 54 “terrorist-related activities.” But under growing scrutiny, congressional staff members and other critics say that the use of such figures by defenders of the agency has drastically overstated the value of the domestic surveillance programs in counterterrorism. Agency leaders believe that the N.S.A. has never enjoyed such a target-rich environment as it does now because of the global explosion of digital information — and they want to make certain that they can dominate “the Sigint battle space” in the future, the document said. To be “optimally effective,” the paper said, “legal, policy and process authorities must be as adaptive and dynamic as the technological and operational advances we seek to exploit.” Intent on unlocking the secrets of adversaries, the paper underscores the agency’s long-term goal of being able to collect virtually everything available in the digital world. To achieve that objective, the paper suggests that the N.S.A. plans to gain greater access, in a variety of ways, to the infrastructure of the world’s telecommunications networks.
  • Yet the paper also shows how the agency believes it can influence and shape trends in high-tech industries in other ways to suit its needs. One of the agency’s goals is to “continue to invest in the industrial base and drive the state of the art for high performance computing to maintain pre-eminent cryptanalytic capability for the nation.” The paper added that the N.S.A. must seek to “identify new access, collection and exploitation methods by leveraging global business trends in data and communications services.” And it wants to find ways to combine all of its technical tools to enhance its surveillance powers. The N.S.A. will seek to integrate its “capabilities to reach previously inaccessible targets in support of exploitation, cyberdefense and cyberoperations,” the paper stated. The agency also intends to improve its access to encrypted communications used by individuals, businesses and foreign governments, the strategy document said. The N.S.A. has already had some success in defeating encryption, The New York Times has reported, but the document makes it clear that countering “ubiquitous, strong, commercial network encryption” is a top priority. The agency plans to fight back against the rise of encryption through relationships with companies that develop encryption tools and through espionage operations. In other countries, the document said, the N.S.A. must also “counter indigenous cryptographic programs by targeting their industrial bases with all available Sigint and Humint” — human intelligence, meaning spies.
  • Above all, the strategy paper suggests the N.S.A.’s vast view of its mission: nothing less than to “dramatically increase mastery of the global network.” Other N.S.A. documents offer hints of how the agency is trying to do just that. One program, code-named Treasure Map, provides what a secret N.S.A. PowerPoint presentation describes as “a near real-time, interactive map of the global Internet.” According to the undated PowerPoint presentation, disclosed by Mr. Snowden, Treasure Map gives the N.S.A. “a 300,000 foot view of the Internet.”  Relying on Internet routing data, commercial and Sigint information, Treasure Map is a sophisticated tool, one that the PowerPoint presentation describes as a “massive Internet mapping, analysis and exploration engine.” It collects Wi-Fi network and geolocation data, and between 30 million and 50 million unique Internet provider addresses — code that can reveal the location and owner of a computer, mobile device or router — are represented each day on Treasure Map, according to the document. It boasts that the program can map “any device, anywhere, all the time.”  The documents include addresses labeled as based in the “U.S.,” and because so much Internet traffic flows through the United States, it would be difficult to map much of the world without capturing such addresses.
  • The program takes advantage of the capabilities of other secret N.S.A. programs. To support Treasure Map, for example, the document states that another program, called Packaged Goods, tracks the “traceroutes” through which data flows around the Internet. Through Packaged Goods, the N.S.A. has gained access to “13 covered servers in unwitting data centers around the globe,” according to the PowerPoint. The document identifies a list of countries where the data centers are located, including Germany, Poland, Denmark, South Africa and Taiwan as well as Russia, China and Singapore.
Paul Merrell

One Map That Explains the Dangerous Saudi-Iranian Conflict - 0 views

  • The Kingdom of Saudi Arabia executed Shiite Muslim cleric Nimr al-Nimr on Saturday. Hours later, Iranian protestors set fire to the Saudi embassy in Tehran. On Sunday, the Saudi government, which considers itself the guardian of Sunni Islam, cut diplomatic ties with Iran, which is a Shiite Muslim theocracy. To explain what’s going on, the New York Times provided a primer on the difference between Sunni and Shiite Islam, informing us that “a schism emerged after the death of the Prophet Muhammad in 632” — i.e., 1,383 years ago. But to the degree that the current crisis has anything to do with religion, it’s much less about whether Abu Bakr or Ali was Muhammad’s rightful successor and much more about who’s going to control something more concrete right now: oil.
  • In fact, much of the conflict can be explained by a fascinating map created by M.R. Izady, a cartographer and adjunct master professor at the U.S. Air Force Special Operations School/Joint Special Operations University in Florida. What the map shows is that, due to a peculiar correlation of religious history and anaerobic decomposition of plankton, almost all the Persian Gulf’s fossil fuels are located underneath Shiites. This is true even in Sunni Saudi Arabia, where the major oil fields are in the Eastern Province, which has a majority Shiite population. As a result, one of the Saudi royal family’s deepest fears is that one day Saudi Shiites will secede, with their oil, and ally with Shiite Iran.
  • This fear has only grown since the 2003 U.S. invasion of Iraq overturned Saddam Hussein’s minority Sunni regime, and empowered the pro-Iranian Shiite majority. Nimr himself said in 2009 that Saudi Shiites would call for secession if the Saudi government didn’t improve its treatment of them.
  • ...2 more annotations...
  • As Izady’s map so strikingly demonstrates, essentially all of the Saudi oil wealth is located in a small sliver of its territory whose occupants are predominantly Shiite. (Nimr, for instance, lived in Awamiyya, in the heart of the Saudi oil region just northwest of Bahrain.) If this section of eastern Saudi Arabia were to break away, the Saudi royals would just be some broke 80-year-olds with nothing left but a lot of beard dye and Viagra prescriptions. Nimr’s execution can be partly explained by the Saudis’ desperation to stamp out any sign of independent thinking among the country’s Shiites. The same tension explains why Saudi Arabia helped Bahrain, an oil-rich, majority-Shiite country ruled by a Sunni monarchy, crush its version of the Arab Spring in 2011. Similar calculations were behind George H.W. Bush’s decision to stand by while Saddam Hussein used chemical weapons in 1991 to put down an insurrection by Iraqi Shiites at the end of the Gulf War. As New York Times columnist Thomas Friedman explained at the time, Saddam had “held Iraq together, much to the satisfaction of the American allies Turkey and Saudi Arabia.”
  • Of course, it’s too simple to say that everything happening between Saudis and Iranians can be traced back to oil. Disdain and even hate for Shiites seem to be part of the DNA of Saudi Arabia’s peculiarly sectarian and belligerent version of Islam. In 1802, 136 years before oil was discovered in Saudi Arabia, the ideological predecessors to the modern Saudi state sacked Karbala, a city now in present-day Iraq and holy to Shiites. The attackers massacred thousands and plundered the tomb of Husayn ibn Ali, one of the most important figures in Shiite Islam. Without fossil fuels, however, this sectarianism toward Shiites would likely be less intense today. And it would definitely be less well-financed. Winston Churchill once described Iran’s oil – which the U.K. was busy stealing at the time — as “a prize from fairyland far beyond our brightest hopes.” Churchill was right, but didn’t realize that this was the kind of fairytale whose treasures carry a terrible curse.
  •  
    A very interesting map, indeed. It explains a lot the situation in the Mideast. And if Pepe Escobar is right about the U.S. moving to reduce its dependency on Saudi oil with a corresponding tilt toward Iran, the map tells a lot about why the U.S. would do so. But to make it work, I can't see the U.S. pulling it off unless a deal is cut with Iran for it to step into the Saudi's shoes in maintaining the petrodollar, i.e., Iran would have to insist on being paid in U.S. dollars for all of its oil and gas. Was a side deal made to that effect during the negotiations over Iran's nuclear energy development program? If so, that's bad news for the Saudis and for its new ally, the right-wing government of Israel, which has ambitions to be dominant military *and* economic power in the Mideast and to extend its borders from the Nile River in Egypt to the Euphrates River in Iraq and east across the Arabian Peninsula. But what Israel cannot bring to the table is large oil and gas reserves. Iran can.  
Gary Edwards

Paul D. Ryan: A GOP Road Map for America's Future - WSJ.com - 0 views

  •  
    America needs an alternative. For that reason, I have reintroduced my plan to tackle our nation's most pressing domestic challenges-updated to reflect the dramatic decline in our economic and fiscal condition. The plan, called A Road Map for America's Future and first introduced in 2008, is a comprehensive proposal to ensure health and retirement security for all Americans, to lift the debt burdens that are mounting every day because of Washington's reckless spending, and to promote jobs and competitiveness in the 21st century global economy. The difference between the Road Map and the Democrats' approach could not be more clear. From the enactment of a $1 trillion "stimulus" last February to the current pass-at-all costs government takeover of health care, the Democratic leadership has followed a "progressive" strategy that will take us closer to a tipping point past which most Americans receive more in government benefits than they pay in taxes-a European-style welfare state where double-digit unemployment becomes a way of life. Americans don't have to settle for this path of decline. There's still time to choose a different future. That is what the Road Map offers. It is based on a fundamentally different vision from the one now prevailing in Washington. It focuses the government on its proper role. It restrains government spending, and hence limits the size of government itself. It rejuvenates the vibrant market economy that made America the envy of the world. And it restores an American character rooted in individual initiative, entrepreneurship and opportunity. Here are the principal elements:
Paul Merrell

The Engineered Destruction and Political Fragmentation of Iraq. Towards the Creation of... - 0 views

  • The Capture of Mosul:  US-NATO Covert Support to the Islamic State of Iraq and Syria (ISIS) Something unusual occurred in Mosul which cannot be explained in strictly military terms. On June 10, the insurgent forces of the Islamic State of Iraq and the Levant (ISIS) captured Mosul, Iraq’s second largest city, with a population of close to 1.5 million people.  While these developments were “unexpected” according to the Obama administration, they were known to the Pentagon and US intelligence, which were not only providing weapons, logistics and financial support to the ISIS rebels, they were also coordinating, behind the scenes, the ISIS attack on the city of Mosul. While ISIS is a well equipped and disciplined rebel army when compared to other Al Qaeda affiliated formations, the capture of Mosul, did not hinge upon ISIS’s military capabilities. Quite the opposite: Iraqi forces which outnumbered the rebels by far, equipped with advanced weapons systems could have easily repelled the ISIS rebels. There were 30,000 government forces in Mosul as opposed to 1000 ISIS rebels, according to reports. The Iraqi army chose not to intervene. The media reports explained without evidence that the decision of the Iraqi armed forces not to intervene was spontaneous characterized by mass defections.
  • Iraqi officials told the Guardian that two divisions of Iraqi soldiers – roughly 30,000 men – simply turned and ran in the face of the assault by an insurgent force of just 800 fighters. Isis extremists roamed freely on Wednesday through the streets of Mosul, openly surprised at the ease with which they took Iraq’s second largest city after three days of sporadic fighting. (Guardian, June 12, 2014, emphasis added) The reports point to the fact that Iraqi military commanders were sympathetic with the Sunni led ISIS insurgency: Speaking from the Kurdish city of Erbil, the defectors accused their officers of cowardice and betrayal, saying generals in Mosul “handed over” the city over to Sunni insurgents, with whom they shared sectarian and historical ties. (Daily Telegraph,  13 June 2014) What is important to understand, is that both sides, namely the regular Iraqi forces and the ISIS rebel army are supported by US-NATO. There were US military advisers and special forces including operatives from private military companies on location in Mosul working with Iraq’s regular armed forces. In turn, there are Western special forces or mercenaries within ISIS (acting on contract to the CIA or the Pentagon) who are in liaison with US-NATO (e.g. through satellite phones).
  • Under these circumstances, with US intelligence amply involved, there would have been routine communication, coordination, logistics and exchange of intelligence between a US-NATO military and intelligence command center, US-NATO military advisers forces or private military contractors on the ground assigned to the Iraqi Army and Western special forces attached to the ISIS brigades. These Western special forces operating covertly within the ISIS could have been dispatched by a private security company on contract to US-NATO.
  • ...14 more annotations...
  • In this regard, the capture of Mosul appears to have been a carefully engineered operation, planned well in advance. With the exception of a few skirmishes, no fighting took place. Entire divisions of the Iraqi National Army –trained by the US military with advanced weapons systems at their disposal– could have easily repelled the ISIS rebels. Reports suggest that they were ordered by their commanders not to intervene. According to witnesses, “Not a single shot was fired”. The forces that had been in Mosul have fled — some of which abandoned their uniforms as well as their posts as the ISIS forces swarmed into the city. Fighters with the Islamic State of Iraq and Syria (ISIS), an al-Qaeda offshoot, overran the entire western bank of the city overnight after Iraqi soldiers and police apparently fled their posts, in some instances discarding their uniforms as they sought to escape the advance of the militants. http://hotair.com/archives/2014/06/10/mosul-falls-to-al-qaeda-as-us-trained-security-forces-flee/
  • A contingent of one thousand ISIS rebels take over a city of more than one million? Without prior knowledge that the US controlled Iraqi Army (30,000 strong) would not intervene, the Mosul operation would have fallen flat, the rebels would have been decimated. Who was behind the decision to let the ISIS terrorists take control of Mosul? Had the senior Iraqi commanders been instructed by their Western military advisers to hand over the city to the ISIS terrorists? Were they co-opted?
  • The formation of the caliphate may be the first step towards a broader conflict in the Middle East, bearing in mind that Iran is supportive of the Al Maliki government and the US ploy may indeed be to encourage the intervention of Iran. The proposed redivision of Iraq is broadly modeled on that of the Federation of Yugoslavia which was split up into seven “independent states” (Serbia, Croatia, Bosnia-Herzegovina, Macedonia (FYRM), Slovenia, Montenegro, Kosovo). According to Mahdi Darius Nazemroaya, the re division of Iraq into three separate states is part of a broader process of redrawing the Map of the Middle East.
  • US forces could have intervened. They had been instructed to let it happen. It was part of a carefully planned agenda to facilitate the advance of the ISIS rebel forces and the installation of the ISIS caliphate. The whole operation appears to have been carefully staged.
  • In Mosul, government buildings, police stations, schools, hospitals, etc are formally now under the control of the Islamic State of Iraq and Syria (ISIS). In turn, ISIS has taken control of military hardware including helicopters and tanks which were abandoned by the Iraqi armed forces. What is unfolding is the installation of a US sponsored Islamist ISIS caliphate alongside the rapid demise of the Baghdad government. Meanwhile, the Northern Kurdistan region has de facto declared its independence from Baghdad. Kurdish peshmerga rebel forces (which are supported by Israel) have taken control of the cities of Arbil and Kirkuk. (See map above) Concluding Remarks There were no Al Qaeda rebels in Iraq prior to the 2003 invasion. Moreover, Al Qaeda was non-existent in Syria until the outset of the US-NATO-Israeli supported insurgency in March 2011. The ISIS is not an independent entity. It is a creation of US intelligence. It is a US intelligence asset, an instrument of non-conventional warfare.
  • The ultimate objective of this ongoing US-NATO engineered conflict opposing Maliki government forces to the ISIS insurgency is to destroy and destabilize Iraq as a Nation State. It is part of an intelligence operation, an engineered process of  transforming countries into territories. The break up of Iraq along sectarian lines is a longstanding policy of the US and its allies. The ISIS is a caliphate project of creating a Sunni Islamist state. It is not a project of the Sunni population of Iraq which historically has been committed to a secular system of government. The caliphate project is a US design. The advances of ISIS forces is intended to garnish broad support within the Sunni population directed against the Al Maliki government The division of Iraq along sectarian-ethnic lines has been on the drawing board of the Pentagon for more than 10 years.
  • Was the handing over of Mosul to ISIS part of a US intelligence agenda? Were the Iraqi military commanders manipulated or paid off into allowing the city to fall into the hands of the ISIS rebels without “a single shot being fired”. Shiite General Mehdi Sabih al-Gharawi who was in charge of the Mosul Army divisions “had left the city”. Al Gharawi had worked hand in glove with the US military. He took over the command of Mosul in September 2011, from US Col Scott McKean. Had he been co-opted, instructed by his US counterparts to abandon his command?
  • The above map was prepared by Lieutenant-Colonel Ralph Peters. It was published in the Armed Forces Journal in June 2006, Peters is a retired colonel of the U.S. National War Academy. (Map Copyright Lieutenant-Colonel Ralph Peters 2006). Although the map does not officially reflect Pentagon doctrine, it has been used in a training program at NATO’s Defense College for senior military officers”. (See Plans for Redrawing the Middle East: The Project for a “New Middle East” By Mahdi Darius Nazemroaya, Global Research, November 2006)
  • The Western media in chorus have described the unfolding conflict in Iraq as a “civil war” opposing the Islamic State of Iraq and al-Sham against the Armed forces of the Al-Maliki government. (Also referred to as Islamic State of Iraq and the Levant (ISIL) or Islamic State of Iraq and Syria (ISIS)) The conflict is casually described as “sectarian warfare” between Radical Sunni and Shia without addressing “who is behind the various factions”.  What is at stake is a carefully staged US military-intelligence agenda. Known and documented, Al Qaeda affiliated entities have been used by US-NATO in numerous conflicts as “intelligence assets” since the heyday of the Soviet-Afghan war. In Syria, the Al Nusrah and ISIS rebels are the foot-soldiers of the Western military alliance, which oversees and controls the recruitment and training of paramilitary forces.
  • The Al Qaeda affiliated Islamic State of Iraq (ISI) re-emerged in April 2013 with a different name and acronym, commonly referred to as the Islamic State of Iraq and Syria (ISIS). The formation of a terrorist entity encompassing both Iraq and Syria was part of a US intelligence agenda. It responded to geopolitical objectives. It also coincided with the advances of Syrian government forces against the US sponsored insurgency in Syria and the failures of both the Free Syrian Army (FSA) and its various “opposition” terror brigades. The decision was taken by Washington to channel its support (covertly) in favor of a terrorist entity which operates in both Syria and Iraq and which has logistical bases in both countries. The Islamic State of Iraq and al-Sham’s Sunni caliphate project coincides with a longstanding US agenda to carve up both Iraq and Syria into three separate territories: A Sunni Islamist Caliphate, an Arab Shia Republic, and a Republic of Kurdistan.
  • Whereas the (US proxy) government in Baghdad purchases advanced weapons systems from the US including F16 fighter jets from Lockheed Martin, the Islamic State of Iraq and al-Sham –which is fighting Iraqi government forces– is supported covertly by Western intelligence. The objective is to engineer a civil war in Iraq, in which both sides are controlled indirectly by US-NATO. The scenario is to arm and equip them, on both sides, finance them with advanced weapons systems and then “let them fight”.
  • The Islamic caliphate is supported covertly by the CIA in liaison with Saudi Arabia, Qatar and Turkish intelligence. Israel is also involved in channeling support to both Al Qaeda rebels in Syria (out of the Golan Heights) as well to the Kurdish separatist movement in Syria and Iraq.
  • First published by GR on June 14, 2014.  President Barack Obama has initiated a series of US bombing raids in Iraq allegedly directed towards the rebel army of the Islamic State (IS). The Islamic State terrorists are portrayed as an enemy of America and the Western world. Amply documented, the Islamic State is a creation of Western intelligence, supported by the CIA and Israel’s Mossad and financed by Saudi Arabia and Qatar. We are dealing with a diabolical military agenda whereby the United States is targeting a rebel army which is directly funded by the US and its allies. The incursion into Iraq of the Islamic State rebels in late June was part of a carefully planned intelligence operation. The rebels of the Islamic state, formerly known as the ISIS, were covertly supported by US-NATO-Israel  to wage a terrorist insurgency against the Syrian government of Bashar Al Assad.  The atrocities committed in Iraq are similar to those committed in Syria. The sponsors of IS including Barack Obama have blood on their hands.
  • The killings of innocent civilians by the Islamic state terrorists create a pretext and the justification for US military intervention on humanitarian grounds. Lest we forget, the rebels who committed these atrocities and who are a target of US military action are supported by the United States. The bombing raids ordered by Obama are not intended to eliminate the terrorists. Quite the opposite, the US is targeting the civilian population as well as the Iraqi resistance movement. The endgame is to destabilize Iraq as a nation state and trigger its partition into three separate entities.
  •  
    The destabilization and fragmentation of Israel's neighboring nations has indeed been on the Zionist/Neocon drawing board for a very long time. http://goo.gl/Z1gdoA In the Mideast, it's important to remember that there are no significant Islamist forces that are not under the control of the U.S. or its allies Saudi Arabia and Qatar. The Iraqi Army's withdrawal of the two divisions from the defense of Mosul is indeed curious. In that regard, Col. Peters' map of a future Mideast is almost certainly more than a coincidence. 
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Paul Merrell

Map of the Day: Where the Brits never invaded | Humanosphere - 1 views

  • The British Empire used to be pretty darned big. It was said that the sun never set on England (and it still might not). A new map is making the rounds that shows the places where the British have invaded. Of the nearly 200 countries out there, the Brits have invaded all but 22. That is just about 90% of all countries!
  • The data comes from the new book All the Countries We’ve Ever Invaded: And the Few We Never Got Round To. Author Stuart Laycock went through the history of every country in the world to see where the Brits invaded. The author spoke with The Telegraph about his two years of research and the results. He said France may be in second place with most countries invaded and says he hopes people will challenge his findings to determine whether or not he is right or some countries on the no list were actually invaded.
  • “Other countries could write similar books – but they would be much shorter. I don’t think anyone could match this, although the Americans had a later start and have been working hard on it in the twentieth century.”
Paul Merrell

Tomgram: Todd Miller, The Creation of a Border Security State | TomDispatch - 0 views

  • Sometimes you really do need a map if you want to know where you are.  In 2008, the ACLU issued just such a map of this country and it’s like nothing ever seen before.  Titled “the Constitution-Free Zone of the United States,” it traces our country’s borders.  Maybe you’re already tuning out.  After all, you probably don’t think you live on or near such a border.  Well, think again.  As it happens, in our brave, new, post-9/11 world, as long as we’re talking “homeland security” or “war on terror,” anything can be redefined.  So why not a border? Our borders have, conveniently enough, long been Constitution-free zones where more or less anything goes, including warrantless searches of various sorts.  In the twenty-first century, however, the border itself, north as well as south, has not only been increasingly up-armored, but redefined as a 100-mile-wide strip around the United States (and Alaska).  In other words -- check that map again -- our “borders” now cover an expanse in which nearly 200 million Americans, or two-thirds of the U.S. population, live.  Included are nine of the 10 largest metropolitan areas.  If you live in Florida, Maine, or Michigan, for example, no matter how far inland you may be, you are “on the border.”
  • Imagine that.  And then imagine what it means.  U.S. Customs and Border Protection, as Todd Miller points out today, is not only the largest law enforcement agency in the country you know next to nothing about, but the largest, flat and simple.  Now, its agents can act as if the Constitution has been put to bed up to 100 miles inland anywhere.  This, in turn, means -- as the ACLU has written -- that at new checkpoints and elsewhere in areas no American would once have considered borderlands, you can be stopped, interrogated, and searched “on an everyday basis with absolutely no suspicion of wrongdoing.” Under the circumstances, it’s startling that, since the ACLU made its case back in 2008, this new American reality has gotten remarkably little attention.  So it’s lucky that TomDispatch regular Miller's invaluable and gripping book, Border Patrol Nation: Dispatches from the Front Lines of Homeland Security, has just been published.  It’s an eye opener, and it’s about time that “border” issues stopped being left to those on the old-fashioned version of the border and immigration mavens.  It’s a subject that, by definition, now concerns at least two-thirds of us in a big way.
  • Border Security Expo 2014 catches in one confined space the expansiveness of a “booming” border market. If you include “cross-border terrorism, cyber crime, piracy, [the] drug trade, human trafficking, internal dissent, and separatist movements,” all “driving factor[s] for the homeland security market,” by 2018 it could reach $544 billion globally. It is here that U.S. Homeland Security officials, local law enforcement, and border forces from all over the world talk contracts with private industry representatives, exhibit their techno-optimism, and begin to hammer out a future of ever more hardened, up-armored national and international boundaries. The global video surveillance market alone is expected to be a $40 billion industry by 2020, almost three times its $13.5 billion value in 2013. According to projections, 2020 border surveillance cameras will be capturing 3.4 trillion video hours globally. In case you were wondering, that’s more than 340 million years of video footage if you were watching 24 hours a day.
  • ...3 more annotations...
  • It is in the U.S. borderlands that, as anthropologist Josiah Heyman once wrote, the U.S. government’s modern expertise in creating and tracking "a marked population” was first developed and practiced. It involved, he wrote prophetically, “the birth and development of a... means of domination, born of the mating between moral panics about foreigners and drugs, and a well-funded and expert bureaucracy.” You may not be able to watch them at the Border Security Expo, but in those borderlands -- make no bones about it -- the Department of Homeland Security, with its tripartite missions of drug interdiction, immigration enforcement, and the war on terror, is watching you, whoever you are. And make no bones about this either: our borders are widening and the zones in which the watchers are increasingly free to do whatever they want are growing.
  • In March, U.S. Customs and Border Protection (CBP) awarded a $145 million contract to that Israeli company through its U.S. division. Elbit Systems prides itself on having spent “10+ years securing the world’s most challenging borders,” above all deploying similar “border protection systems” to the separation wall between Israel and Palestine. It is now poised to enter U.S. indigenous lands.
  • Now, thanks to the Elbit Systems contract, a new kind of border will continue to be added to this layering.  Imagine part of the futuristic Phoenix exhibition hall leaving Border Expo with the goal of incorporating itself into the lands of a people who were living here before there was a “New World,” no less a United States or a Border Patrol. Though this is increasingly the reality from Brownsville, Texas, to San Diego, California, on Tohono O’odham land a post-9/11 war posture shades uncomfortably into the leftovers from a nineteenth century Indian war.  Think of it as the place where the homeland security state meets its older compatriot, Manifest Destiny.
Paul Merrell

FINAL - Part II: Evidence Continues to Emerge #MH17 Is a False Flag Operation | No Limi... - 0 views

  • #15 – Dissecting the Fake Intercept Disseminated by SBU (Ukrainian Security Service) https://www.youtube.com/watch?v=V5E8kDo2n6g Note: Half of the Post Translated; The Remaining Half is Speculative Complete Original of the Post (in Russian) Can Be Found at Eugene-DF LiveJournal In the disseminated intercept, the place from which the missile was allegedly launched is clearly indicated: the checkpoint at the settlement of Chernukhino. Pay close attention at the Alleged Map of the MH17 Catastrophe.
  • And, so, we have the background. Let’s see how the picture unfolds: The launch is alleged to have been made from Chernukhino. The maximum distance of the launch is 16 kilometres. The aircraft fell between Snezhnoye and Torez. That’s 37 kilometres, which is 20 kilometres more than the maximum possible point at which the plain could have been hit. You know, even a plane with turned-off engines can’t glide like that. But the trouble is that the aircraft was not whole. According to the pattern of the spread of fuselage fragments and bodies, the plane was ruptured practically with the first shot. Here it must be mentioned that the high-explosive/fragmentation warhead of the rocket has a mass of approximately 50 kilograms (by the way, Ukrainians have an outdated modification, which is only 40 kilograms).
  • Overall, that’s not too little; however, it must be understood that it detonates not when it sticks into an airplane, but when it is still at a certain, and fairly significant distance. Moreover, the main strike factor is not the blast wave, but far more significantly – the stream of fragments. These fragments are previously prepared rods (and in the earlier versions – little cubes, if I recall correctly). And yes, for a jet fighter, that, in itself, is more than sufficient. However, here we are dealing with a huge airliner. Yes, one rocket will rip the casing, cause depressurization, and will kill a lot of passengers. But it will not break up the airliner into pieces. Given certain conditions, the pilots may even be able to land it. And, in fact, there have been precedents (to be provided in future posts). For example – the very same An-28, which is alleged to have been the first victim of a BUK system; even though it was done for, but the crew was able to successfully catapult out. Which, in some way, symbolizes. An An-28, by the way, is far smaller than a Boeing.
  • ...15 more annotations...
  • In other words, the rocket caught up to the plane no closer than 25 kilometres away from Chernukhino. Which is absolutely impossible for a BUK system. By the way, we can’t overlook the fact that, at maximum distances, BUK can be used only provided there is support from an external radar installation for location and guiding purposes. In other words, even if a rockets flies far, BUK’s mobile radar does not cover its entire distance.
  • And that is what is so strange here: SBU literally offers evidence that proves that that the Militia had no part in the shooting down of the Boeing! The fact that they blame themselves in the recording is quite understandable. Unlike the fascists, they have a conscience, which takes its toll until you are sure it was not you who did it. Ok. But somebody did, in fact, shoot down the plane? Of course it was shot down. And here we have another question: what if this recording is a falsification through and through? Then it had to have been prepared somehow? And then disseminated? That’s when smoke starts to clear, and mirrors – to break. That’s the problem with tricks.
  • #14 – An Industry Outlet Confirms Carlos (@spainbuca) as ATC at Borispol Airport in Kiev Original: EturboNews (ETN Global Travel Industry News) – July 17, 2014 ETN received information from an air traffic controller in Kiev on Malaysia Airlines flight MH17. This Kiev air traffic controller is a citizen of Spain and was working in the Ukraine. He was taken off duty as a civil air-traffic controller along with other foreigners immediately after a Malaysia Airlines passenger aircraft was shot down over the Eastern Ukraine killing 295 passengers and crew on board. The air traffic controller suggested in a private evaluation and basing it on military sources in Kiev, that the Ukrainian military was behind this shoot down. Radar records were immediately confiscated after it became clear a passenger jet was shot down. Military air traffic controllers in internal communication acknowledged the military was involved, and some military chatter said they did not know where the order to shoot down the plane originated from.
  • Obviously it happened after a series of errors, since the very same plane was escorted by two Ukrainian fighter jets until 3 minutes before it disappeared from radar. Radar screen shots also show an unexplained change of course of the Malaysian Boeing. The change of course took the aircraft directly over the Eastern Ukraine conflict region.
  • #7 – Eyewitness States Two Planes Following MH17, One Of the Craft Shot Down Boeing Video: Father of Eyewitness Tells of the Crash of Boeing MH17 Over Ukraine https://www.youtube.com/watch?v=rPcbFJSGk7E Transcript of the Video Narrator: Who shot it down? Today it was shot down, on [July] 17th. Narrator: Continuing. The village of Grabovo. How was it? What did you son tell you? Father of Eyewitness: Well, they were sitting there, on a hill. And, from behind the clouds … two airplanes were flying … one of the came out from behind the clouds.
  • #12 – Analysis from an Aerodynamics/Physics Standpoint – Ukrainian Army Responsible RESUME OF ANALYSIS: What all this means is that if a BUK rocket was launched from the territory controlled by the Militia, the Boeing would have fallen much further to the south-east – i.e. will into the Russian territory. Otherwise, there would have been not time to detect the aircraft, perform electronic capture and launch the rocket. If this was a BUK, and not a jet fighter, then it is most likely that the launch was made from the territory controlled by the Ukrainian army, and the rocket was sent “chasing after” the airplane.
  • #10 – Eyewitness Recounts a Fighter Jet and 3 Explosions When MH17 Was Shot Down Audio Recording Link: Cassad Net Transcript of the Eyewitness Phone CallI
  • I saw, personally, that there were 3 explosions. The first, the second and the third. So, after the first explosions I went up on the roof and saw that a plane was falling – it was already almost at the ground. There was an explosion, a black cloud, and two parachutists were descending – one was descending on his parachute on the wing. The second was flying down very fast – like a stone. And that is what I saw. However, at that very same moment, a jet fighter was departing in the direction of Debaltsevo. It was over Rassypnoye and was flying toward Debaltsevo. How I understood it.
  • #8 – Ukrainian Military Reports to Poroshenko That Rebels Have Not Captured any BUKs According to Vitaliy Yarema, in an interview to Ukrainskaya Pravda, military officials reported to President Poroshenko immediately after the shooting down of Malaysian Airlines Boeing 777, Flight MH17, that the rebels have not captured any BUK systems from the Ukrainian Armed Forces. This is further confirmed in a statement by the Ukrainian Ministry of Defence, published on June 30, 2014. Further Information: “Militias do not have Ukrainian Buk missile system – Ukraine general prosecutor“ KIEV, July 18. /ITAR-TASS/. Militias in the self-proclaimed Donetsk and Luhansk people’s republics do not have Ukrainian air defense missile systems Buk and S-300 at their disposal, Ukrainian Prosecutor-General Vitaly Yarema told Ukrainian Pravda newspaper on Friday.
  • “After the passenger airliner was downed, the military reported to the president that terrorists do not have our air defense missile systems Buk and S-300,” the general prosecutor said. “These weapons were not seized,” he added. Ukrainian Interior Minister Anton Gerashchenko said on July 17 that the Malaysia Airlines Boeing 777 airliner had been downed by an air defense missile system Buk.
  • According to other rumors, the black box for this crashed Malaysian Airlines flight was taken by Donetsk separatists. A spokesperson for the rebel group said this black box would be sent to the Interstate Aviation Committee headquartered in Moscow. The First Deputy Prime Minister of the self-proclaimed People’s Republic of Donetsk, Andrew Purgin, stated that the flight recorders of the crashed aircraft will be transferred to Moscow for examination. Sources say the Rebel group leadership hopes this would confirm the Ukrainian military actually shot down this aircraft. This was reported by the news agency Interfax-Ukraine. ETN statement: The information in this article is independently confirmed and based on the statement of one airline controller and other tweets received.
  • Narrator: Military planes emerged? Father of Eyewitness: Well, he does not understand. Then, with one shot, they shot down the second. And that’s it. The second plane, he says – with one shot. There was one shot and that’s it. Narrator: And the one that was shot down was the civilian one? … Father of Eyewitness: And two … one fell down, he says, and the second too … I did not bring my phone here, so I can’t call him. [in the background] Ah, he saw a jet fighter … Of course … Narrator: The village of Grabovo, in the Shakhtersk district. One the approaches to Grabovo, it fell. Keep looking for remains. Everything is burning. Aluminum has melted. All the casing.
  • #4 – Possible Alternative Video of MH17, Right Wing on Fire (via Vaughan Fomularo) UPDATE: Dann Peroni (@roamer43) The video “#4 – Possible Alternative Video of MH17, Right Wing on Fire (via Vaughan Fomularo)” shows a clear blue sky, while in all other videos showing the crash site the sky is overcast! Video: Malaysian Airlines plane being shot down LIVE! (July 17 2014) https://www.youtube.com/watch?v=FKIlueJg4cA
  • #2 – Comparing the Form of the Wing in the Video with the Wings of Boeing @gbazov clearly the wings of the plane in the video are not the ones of a Malaysian Boeing 777 pic.twitter.com/oH9L4WjFqF — Crimea&East (@IndependentKrym) July 18, 2014
  • #1 – Video Purporting to be that of MH17 is Actually the Video of An-26 Shot Down Earlier #FLASH #IMPORTANT – THIS —> https://t.co/e0FiVFdAM2 IS NOT #MH17, it’s most likely the An-26 (sound, elevation, form of the wing). PLZ RT. — Gleb Bazov (@gbazov) July 18, 2014
Paul Merrell

Transparency Toolkit - 0 views

  • About Transparency Toolkit We need information about governments, companies, and other institutions to uncover corruption, human rights abuses, and civil liberties violations. Unfortunately, the information provided by most transparency initiatives today is difficult to understand and incomplete. Transparency Toolkit is an open source web application where journalists, activists, or anyone can chain together tools to rapidly collect, combine, visualize, and analyze documents and data. For example, Transparency Toolkit can be used to get data on all of a legislator’s actions in congress (votes, bills sponsored, etc.), get data on the fundraising parties a legislator attends, combine that data, and show it on a timeline to find correlations between actions in congress and parties attended. It could also be used to extract all locations from a document and plot them on a map where each point is linked to where the location was mentioned in the document.
  • Analysis Platform On the analysis platform, users can add steps to the analysis process. These steps chain together the tools, so someone could scrape data, upload a document, crossreference that with the scraped data, and then visualize the result all in less than a minute with little technical knowledge. Some of the tools allow users to specify input, but when this is not the case the output of the last step is the input of the next. Tools Existing and planned Transparency Toolkit tools include include scrapers and APIs for accessing data, format converters, extraction tools (for dates, names, locations, numbers), tools for crossreferencing and merging data, visualizations (maps, timelines, network graphs, maps), and pattern and trend detecting tools. These tools are designed to work in many cases rather than a single specific situation. The tools can be linked together on Transparency Toolkit, but they are also available individually. Where possible, we build our tools off of existing open source software. Road Map You can see the plans for future development of Transparency Toolkit here.
  •  
    If you think this isn't a tool for some very serious research, check the short descriptions of the modules here. https://github.com/transparencytoolkit I'll be installing this and doing some test-driving soon. From the source files, the glue for the tools seems to be Ruby on Rails. The development roadmap linked from the last word on this About page is also highly instructive. It ranks among the most detailed dev roadmaps I have ever seen. Notice that it is classified by milestones with scheduled work periods, giving specific date ranges for achievement. Even given the inevitable need to alter the schedule for unforeseen problems, this is a very aggressive (not quite the word I want) development plan and schedule. And the planned changes look to be super-useful, including a lot of "make it easier for the user" changes.   
Paul Merrell

These Are all the Countries Where the US Has a Military Presence | Global Research - Ce... - 0 views

  • On Mar. 24, US president Barack Obama announced that all 9,800 US troops currently stationed in Afghanistan will remain until the end of 2015. This generated a fair amount of criticism: it was, after all, Obama’s promise that the last American troop would leave the country in 2014. How have Obama’s plans for pulling out of Afghanistan fared so far? http://t.co/avoxwJzzQw pic.twitter.com/3S5FJ3lgho — FiveThirtyEight (@FiveThirtyEight) March 26, 2015
  • Those expecting the US to leave Afghanistan, however, should take a minute to consider this: the US still hasn’t left Germany. In fact, there are quite a few places the US hasn’t left, and while certainly most of them don’t pose a threat to American soldiers, they reveal a pattern about the US staying, rather than leaving. According to official information provided by the Department of Defense (DoD) and its Defense Manpower Data Center (DMDC) there are still about 40,000 US troops, and 179 US bases in Germany, over 50,000 troops in Japan (and 109 bases), and tens of thousands of troops, with hundreds of bases, all over Europe. Over 28,000 US troops are present in 85 bases in South Korea, and have been since 1957. Altogether, based on information contained in the DoD’s latest Base Structure Report (BSR), the US has bases in at least 74 countries and troops practically all over the world, ranging from thousands to just one in some countries (it could be a military attaché, for instance).
  • By comparison, France has bases in 10 countries, and the UK has bases in seven. Calculating the extent of the US military presence abroad is not an easy task. The data released by the Department of Defense is incomplete, and inconsistencies are found within documents. Quartz has requested clarification from the Department of Defense, but hasn’t received a response. In his forthcoming book Base Nation: How US Military Bases Abroad Harm America and the World, David Vine, associate professor of anthropology at American University details the difficulties of assessing the US military presence abroad. He writes: according to the most recent publicized count, the U.S. military currently still occupies 686 “base sites” outside the fifty states and Washington, DC. While 686 base sites is quite a figure in its own right, that tally strangely excludes many well-known U.S. bases, like those in Kosovo, Kuwait, and Qatar. Less surprisingly, the Pentagon’s count also excludes secret (or secretive) American bases, like those reported in Israel and Saudi Arabia. There are so many bases, the Pentagon itself doesn’t even know the true total. That is not the only issue—even a definitive count of bases would include a wide range of facilities. “Base” itself is an umbrella term that includes locations referred to as “post,” “station,” “camp,” or “fort” by different military bodies. Vine explains:
  • ...1 more annotation...
  • bases come in all sizes and shapes, from massive sites in Germany and Japan to small radar facilities in Peru and Puerto Rico. […] Even military resorts and recreation areas in places like Tuscany and Seoul are bases of a kind; worldwide, the military runs more than 170 golf courses. The map below represents US military bases abroad, according to the official BSR, and from independent research conducted by Vine (and Quartz) using verified news reports as well as cross-referencing information with Google Maps. This map does not take into account NATO bases, including a rumored base in Turkmenistan and a base in Algeria, reported by Wikileaks to be a suspected US base.
Paul Merrell

Porter Ranch Methane Leak Spreads Across LA's San Fernando Valley - 0 views

  • It now looks like the catastrophic Porter Ranch gas leak, which has spewed more than 83,000 metric tons of noxious methane for nearly three months, has spread across Los Angeles’s San Fernando Valley. On Wednesday, Los Angeles City Councilman Mitchell Englander called on the Southern California Gas Co. to extend residential relocation assistance to residents in Granada Hills, Chatsworth and Northridge who live near the Aliso Canyon gas leak above Porter Ranch. These residents reported symptoms related to the exposure of natural gas such as nausea, vomiting, headaches and respiratory problems.
  • This latest development compounds with a new analysis from Home Energy Efficiency Team (HEET). The Cambridge-based nonprofit sent Boston University Professor Nathan Phillips and Bob Ackley of Gas Safety to take methane measurements around the San Fernando Valley for several days and their findings were disturbing. As the Los Angeles Daily News wrote, “the researchers recorded elevated levels of the main ingredient in natural gas—10 miles away from the nation’s largest gas leak.” “It’s not just in Porter Ranch, it’s going all the way across the [San Fernando] Valley,” Ackley told Inside Climate News. According to HEET, the researchers drove a high precision GIS-enabled natural gas analyzer down the roads around the gas leak to create a comprehensive map of the leak around San Fernando Valley. The red on the map indicates where they drove and the levels of methane they found is shown by the height of the peaks. Their monitors showed methane levels at 3.4 parts per billion, about twice the level of natural clean air, the Los Angeles Daily News reported. Another measurement showed 127 ppm, or an astounding 67 times above normal. “Whatever else may be in the gas—benzene, toluene, xylene—that is what people may be breathing,” Phillips told Inside Climate News. “Even though we’re not measuring things other than methane, there is a legitimate concern that there is that other nasty stuff in there.”
Paul Merrell

Boundless Informant: the NSA's secret tool to track global surveillance data | World ne... - 0 views

  • The National Security Agency has developed a powerful tool for recording and analysing where its intelligence comes from, raising questions about its repeated assurances to Congress that it cannot keep track of all the surveillance it performs on American communications. The Guardian has acquired top-secret documents about the NSA datamining tool, called Boundless Informant, that details and even maps by country the voluminous amount of information it collects from computer and telephone networks.
  • The heatmap gives each nation a color code based on how extensively it is subjected to NSA surveillance. The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance).The disclosure of the internal Boundless Informant system comes amid a struggle between the NSA and its overseers in the Senate over whether it can track the intelligence it collects on American communications. The NSA's position is that it is not technologically feasible to do so.
  • A snapshot of the Boundless Informant data, contained in a top secret NSA "global heat map" seen by the Guardian, shows that in March 2013 the agency collected 97bn pieces of intelligence from computer networks worldwide.
  • ...4 more annotations...
  • The focus of the internal NSA tool is on counting and categorizing the records of communications, known as metadata, rather than the content of an email or instant message. The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. One document says it is designed to give NSA officials answers to questions like, "What type of coverage do we have on country X" in "near real-time by asking the SIGINT [signals intelligence] infrastructure."An NSA factsheet about the program, acquired by the Guardian, says: "The tool allows users to select a country on a map and view the metadata volume and select details about the collections against that country."
  • At a hearing of the Senate intelligence committee In March this year, Democratic senator Ron Wyden asked James Clapper, the director of national intelligence: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" "No sir," replied Clapper.
  • Other documents seen by the Guardian further demonstrate that the NSA does in fact break down its surveillance intercepts which could allow the agency to determine how many of them are from the US. The level of detail includes individual IP addresses.
  • Senators have expressed their frustration at the NSA's refusal to supply statistics. In a letter to NSA director General Keith Alexander in October last year, senator Wyden and his Democratic colleague on the Senate intelligence committee, Mark Udall, noted that "the intelligence community has stated repeatedly that it is not possible to provide even a rough estimate of how many American communications have been collected under the Fisa Amendments Act, and has even declined to estimate the scale of this collection."At a congressional hearing in March last year, Alexander denied point-blank that the agency had the figures on how many Americans had their electronic communications collected or reviewed. Asked if he had the capability to get them, Alexander said: "No. No. We do not have the technical insights in the United States." He added that "nor do we do have the equipment in the United States to actually collect that kind of information".
  •  
    Have NSA and other Administration officials perjured themselves in testimony to Congress? It look that way. Next question: will they be prosecuted?  See also related article at and the leaked FAQ on BoundlessInformant itself at . 
Paul Merrell

Trump Plan to Gut Stream Protections Imperils Tap Water of 117 Million Americans | EWG - 0 views

  • The Trump administration is threatening to remove safeguards that protect the drinking water of more than one-third of Americans. Some 117 million people get at least some of their drinking water from small streams.[1] For 72 million people in 1,033 counties, more than half of their drinking water comes from small streams. Ensuring that their water is safe means keeping the water in these streams clean. (See map below. Click here for a more detailed interactive map.)
  • Right now, the Clean Water Act protects these streams from pollution. But this week President Trump issued an executive order directing Environmental Protection Agency Administrator Scott Pruitt to rescind or revise the Clean Water Rule, or replace it with a new rule. This critically important rule determines which streams, rivers and lakes are protected from pollution by the Clean Water Act. The rule also extends protection for millions of acres of wetlands that filter drinking water. Industry and agribusiness have been pushing for years to roll back the Clean Water Rule and protect only the biggest streams and rivers. Now they’ve found a friend in the Trump administration. Small streams are where big rivers start, and the best science confirms that dirty streams means even dirtier rivers. Millions of Americans drink water directly connected to 234,000 miles of small, potentially unprotected streams. In 21 different states, small streams provide drinking water for 1 million or more people. (See chart below.) More than 5 million people in each New York, Texas and Pennsylvania get drinking water from small streams, as do more than 3 million in each California, Georgia, Maryland, Ohio, North Carolina and Arizona.
  • President Trump’s executive order immediately threatens drinking water for millions of Americans, but it’s not the only threat. Dozens of lawsuits seeking to gut the Clean Water Rule have been filed by industry and agribusiness, and states catering to those interests. Congress could meddle with the Clean Water Act itself to deny protection to small streams and wetlands. The Clean Water Rule is a common-sense safeguard supported by a majority of Americans. It is supported by many cities and towns that depend on unpolluted drinking water sources and natural infrastructure like wetlands to filter pollutants and absorb floodwaters. Small businesses that rely on clean water and healthy wildlife habitats, such as craft breweries and outdoor recreation companies, also strongly support the Clean Water Rule. Undermining, weakening or rescinding this vital rule is a gift to corporate polluters and Big Ag, and a threat to public health and the environment.
Paul Merrell

Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data | World news ... - 0 views

  • The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents.The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect
  • Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes.Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools – such as cable taps, or from international mobile networks – rather than solely from hacking into individual mobile handsets. Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies' collection efforts.
  • Depending on what profile information a user had supplied, the documents suggested, the agency would be able to collect almost every key detail of a user's life: including home country, current location (through geolocation), age, gender, zip code, marital status – options included "single", "married", "divorced", "swinger" and more – income, ethnicity, sexual orientation, education level, and number of children.The agencies also made use of their mobile interception capabilities to collect location information in bulk, from Google and other mapping apps. One basic effort by GCHQ and the NSA was to build a database geolocating every mobile phone mast in the world – meaning that just by taking tower ID from a handset, location information could be gleaned.A more sophisticated effort, though, relied on intercepting Google Maps queries made on smartphones, and using them to collect large volumes of location information.So successful was this effort that one 2008 document noted that "[i]t effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system."
  • ...3 more annotations...
  • One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled "Golden Nugget!" – sets out the agency's "perfect scenario": "Target uploading photo to a social media site taken with a mobile device. What can we get?"The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a "possible image", email selector, phone, buddy lists, and "a host of other social working data as well as location".
  • The latest disclosures could also add to mounting public concern about how the technology sector collects and uses information, especially for those outside the US, who enjoy fewer privacy protections than Americans. A January poll for the Washington Post showed 69% of US adults were already concerned about how tech companies such as Google used and stored their information.The documents do not make it clear how much of the information that can be taken from apps is routinely collected, stored or searched, nor how many users may be affected. The NSA says it does not target Americans and its capabilities are deployed only against "valid foreign intelligence targets".The documents do set out in great detail exactly how much information can be collected from widely popular apps. One document held on GCHQ's internal Wikipedia-style guide for staff details what can be collected from different apps. Though it uses Android apps for most of its examples, it suggests much of the same data could be taken from equivalent apps on iPhone or other platforms.The GCHQ documents set out examples of what information can be extracted from different ad platforms, using perhaps the most popular mobile phone game of all time, Angry Birds – which has reportedly been downloaded more than 1.7bn times – as a case study.
  • Other apps choose to transmit much more data, meaning the agency could potentially net far more. One mobile ad platform, Millennial Media, appeared to offer particularly rich information. Millennial Media's website states it has partnered with Rovio on a special edition of Angry Birds; with Farmville maker Zynga; with Call of Duty developer Activision, and many other major franchises.
  •  
    Don't miss the linked companion articles at New York Times and ProPublica. 
Paul Merrell

Israel: Gas, Oil and Trouble in the Levant | Global Research - 0 views

  • Israel is set to become a major exporter of gas and some oil, if all goes to plan. The giant Leviathan natural gas field, in the eastern Mediterranean, discovered in December 2010, is widely described as “off the coast of Israel.”
  • Coupled with Tamar field, in the same location, discovered in 2009, the prospects are for an energy bonanza for Israel, for Houston, Texas based Noble Energy and partners Delek Drilling, Avner Oil Exploration and Ratio Oil Exploration.
  • However, even these estimates may prove modest. In their: “Assessment of Undiscovered Oil and Gas Resources of the Levant Basin Province, Eastern Mediterranean”, the US Department of the Interior’s US Geological Survey, wrote in 2010: “We estimated a mean of 1.7 billion barrels of recoverable oil and a mean of 122 trillion cubic feet of recoverable gas in this province using a geology based assessment methodology.”
  • ...3 more annotations...
  • Whilst Israel claims them as her very own treasure trove, only a fraction of the sea’s wealth lies in Israel’s bailiwick as maps (iv, v, see below) clearly show. Much is still unexplored, but currently Palestine’s Gaza and the West Bank between them show the greatest discoveries, with anything found in Lebanon and Syria’s territorial waters sure to involve claims from both countries.
  • In a pre-emptive move, on Christmas Day, Syria announced a deal with Russia to explore 2,190 kilometres (850 Sq. miles) for oil and gas off its Mediterranean coast, to be: “… financed by Russia, and should oil and gas be discovered in commercial quantities, Moscow will recover the exploration costs.” Syrian Oil Minister, Ali Abbas said during the signing ceremony that the contract covers “25 years, over several phases.”
  • The agreement is reported to have resulted from “months of long negotiations” between the two countries. Russia, as one of the Syrian government’s main backers, looks set to also become a major player in the Levant Basin’s energy wealth. (vi) Lebanon disputes Israel’s map of the Israeli-Lebanese maritime border, filing their own map and claims with the UN in 2010. Israel claims Lebanon is in the process of granting oil and gas exploration licenses in what Israel claims as its “exclusive economic zone.” That the US in the guise of Vice President Joe Biden, as honest broker, acting peace negotiator in the maritime border dispute would be laughable, were it not potential for Israel to attack their neighbour again. In a visit to Israel in March 2010, Biden announced: “There is absolutely no space between the United States and Israel when it comes to Israel’s security- none at all”, also announcing on arrival in Israel:”It’s good to be home.” Given US decades of  “peace brokering” between Israel and Palestine, this is already a road of pitfalls, one sidedness and duplicity, well traveled. There is trouble ahead.
  •  
    More evidence that oil and gas natural resources play a role in Mideast politics and wars. And Joe Biden's "It's good to be home" remark on arrival in Israel adds further evidence that the U.S. is not an honest negotiator/mediator when it comes to Israel/Palestine and the Syrian peace process. It's actually pretty outrageous that a U.S. Vice  President would stoop so low as to call Israel his "home." It's indicative of divided loyalty at best.
Paul Merrell

Binney: the NSA is destroying democracy | ITWeb - 0 views

  • The US's National Security Agency is destroying democracy by collecting data on everyone in the world, says the agency's former technical director, William Binney. This, he says, is a situation he feels partly responsible for.
  • "I have a good idea of the problems they were having and actually I started a lot of the programmes they are using to spy on everybody. So I am feeling kind of responsible for this, so I'm trying to turn it around. And we are starting to have some success, by the way." Binney explained the NSA is seeking to map everybody in the electronic world, so any electronic transaction can be used, stored and manipulated. "I would say they are very good at collecting data and storing data, but they are very bad at analysing it, because they are collecting everything."
  • Binney explained US media had covered the NSA's PRISM programme extensively when details emerged. "Well, the PRISM programme was just a miniscule amount of data compared to the Upstream [programme]. The Upstream was the big programme and that's where they are tapping the fibre lines and pulling the data off as it floats by. "Of course, that is the real programme that is collecting the massive amounts of data that's all done under Executive Order 1333, meaning it has no oversight by courts of Congress in the United States. So they're collecting everything on everybody." Binney also outlined an NSA programme named Treasure Map, aimed at mapping the entire global communications network and every device on it, all the time. "What this means is they want to monitor the location of everybody in the world using a device; that being approximately four billion people. "And they want to have that knowledge every minute of the day."
  • ...1 more annotation...
  • Binney said he refers to the NSA as a new Stasi agency, saying its work is effectively destroying democracy, as the NSA is collecting files on everyone in the world. "This was an adoption of totalitarian state procedures. "They're doing this in secret, with secret interpretations of laws, in a secret court, making secret decisions on constitutionality, and all of that behind closed doors. That really is a threat to everybody."
Paul Merrell

Mapping the growth of bases worldwide | Investigative Reporting Workshop - 0 views

  • Even though the U.S. military has fewer bases that it did at the end of the Cold War, it has increasingly inserted itself into new corners of the globe with the help of small, often secretive “lily pad” bases; today, there are bases in around 80 countries and U.S. territories — roughly twice as many as in 1989. Formally called “cooperative security locations,” lily pads are small, spartan installations that often house prepositioned weaponry and allow troops to deploy quickly into battle, like frogs jumping across a pond. While the new bases appear to offer a low-cost, low-profile alternative to giant, city-sized installations, lily pads can easily transform into larger bases and commitments, potentially plunging the country into new, little-known conflicts.
  • The sheer number of bases as well as the secrecy and lack of transparency of the overseas base network make any graphic depiction challenging. Lily pad bases are frequently secretive and difficult to distinguish from host-nation facilities, making an authoritative list especially hard to assemble. This map reflects the number and positioning of bases given the best available information as of August 2015. Installations vary in size from giant “Little Americas,” hosting tens of thousands of troops and family members, to small, radar facilities and lily pads built or acquired since around the turn of the 21st century.
Paul Merrell

MAP: The U.S. military currently has troops in these African countries - 0 views

  • President Obama's announcement that United States has deployed 80 troops to Chad came as a surprise to many. But as my colleague Craig Whitlock points out, the United States already has boots on the ground in a surprising number of African countries. This map shows what sub-Saharan nations currently have a U.S. military presence engaged in actual military operations.
  • It should be noted that in most of these countries, there is a pretty small number of troops. But it is a clear sign of the U.S. Africa Command's increasingly broad position on the continent in what could be described as a growing shadow war against al-Qaeda affiliates and other militant groups. It also shows an increasingly blurred line between U.S. military operations and the CIA in Africa. More details of the troops deployed are below.
Gary Edwards

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
1 - 20 of 136 Next › Last »
Showing 20 items per page