Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged military-effectiveness

Rss Feed Group items tagged

1More

Saul Alinsky Leaves the White House | The American Spectator - 0 views

  •  
    "When Barack Obama leaves the White House tomorrow, he leaves with his worst dreams unrealized. Still, what he leaves behind is awful. Thank goodness he'll be gone. The very day after Obama was elected in 2008, I predicted in this space that his team would steal the Senate by hook and crook (see: Al Franken); nuke the filibuster at least for judicial nominees; liberalize voting laws (or enforcement thereof) to make fraud easier while charging opponents with "vote suppression"; drum up spurious allegations of civil rights violations; punish anti-abortion protesters; enact "copious new regulations, especially environmental, to be used selectively to ensnare other conservative malcontents"; invasively use the IRS to harass conservative organizations; and tacitly encourage civil unrest in furtherance of Obamite goals. All those predictions of course came true. Obama and company also waged bureaucratic war against independent inspectors general; tried their hardest (even illegally) to hobble fossil fuels industries; evaded Congress's intent by sending cash and uranium to a near-nuclear-ready Iran; fumbled and stumbled while veterans suffered virtually criminal neglect; wasted hundreds of billions of taxpayer dollars on projects that were not "shovel-ready" and did not create many jobs; oversaw an economy in which the workforce participation rate dropped to historically low levels while real median household income also fell and personal debt rose, and in which food stamp rolls grew to a number larger than the population of Spain; horrendously politicized the Justice Department; and saw race relations worsen for the first time in decades. In what should have been treated by the media as major scandals (or more major than the media represented them), the Obama administration encouraged illegal gun-running to Mexican cartels, with untold numbers of resultant deaths; failed to provide adequate security before or rescue during the Benghazi tragedy; provide
6More

Drone strikes counterproductive, says secret CIA report - 0 views

  • Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.The leaked document is classified secret and "NoForn" (meaning not to be distributed to non-US nationals) and reviews attacks by the United States and other countries engaged in counter-insurgency operations over the past 50 years.The CIA assessment is the first leaked secret intelligence document published by WikiLeaks since 2011. Led by Australian publisher Julian Assange, the anti-secrecy group says the CIA assessment is the first in what will be a new series of leaked documents relating to the US agency.
  • The 2009 CIA study lends support to critics of US drone strikes in Afghanistan, Iraq, Pakistan, Somalia and Yemen by warning that such operations "may increase support for the insurgents, particularly if these strikes enhance insurgent leaders' lore, if non-combatants are killed in the attacks, if legitimate or semi-legitimate politicians aligned with the insurgents are targeted, or if the government is already seen as overly repressive or violent".
  • The CIA study observes that the US-led coalition in Afghanistan made "a sustained effort since 2001 to target Taliban leaders", but "Afghan government corruption and lack of unity, insufficient strength of Afghan and NATO security forces, and the country's endemic lawlessness have constrained the effectiveness of these counter-insurgency elements"."Senior Taliban leaders' use of sanctuary in Pakistan has also complicated the HVT effort," the CIA says. "Moreover, the Taliban has a high overall ability to replace lost leaders, a centralised but flexible command and control overlaid with egalitarian Pashtun structures, and good succession planning and bench strength, especially at the middle levels."The CIA study also reports mixed results for such tactics in Iraq, noting that al-Qaeda in Iraq "initially lost several iterations of its senior leadership and numerous local emirs, but these losses initially did little to slow AQI's momentum".
  • ...2 more annotations...
  • Similarly, the CIA observes that Israel's "targeted-killings campaign" against Hamas and Hezbollah was of limited effectiveness owing to "decentralised command structures, compartmented leadership, strong succession planning, and deep ties to their communities, making the[se] groups highly resilient to leadership losses".The CIA review does suggest that targeted killings can be useful when they are part of a broader counter-insurgency strategy that employs other military and non-military counter-insurgency instruments. 
  • Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.
  •  
    The report is at http://www.wikileaks.org/cia-hvt-counterinsurgency/ Apparently we have a new leaker with access to top secret/no foreign documents.  
15More

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
9More

WASHINGTON: CIA's use of harsh interrogation went beyond legal authority, Senate report... - 0 views

  • A still-secret Senate Intelligence Committee report calls into question the legal foundation of the CIA’s use of waterboarding and other harsh interrogation techniques on suspected terrorists, a finding that challenges the key defense on which the agency and the Bush administration relied in arguing that the methods didn’t constitute torture.The report also found that the spy agency failed to keep an accurate account of the number of individuals it held, and that it issued erroneous claims about how many it detained and subjected to the controversial interrogation methods. The CIA has said that about 30 detainees underwent the so-called enhanced interrogation techniques.
  • The CIA’s claim “is BS,” said a former U.S. official familiar with evidence underpinning the report, who asked not to be identified because the matter is still classified. “They are trying to minimize the damage. They are trying to say it was a very targeted program, but that’s not the case.”The findings are among the report’s 20 main conclusions. Taken together, they paint a picture of an intelligence agency that seemed intent on evading or misleading nearly all of its oversight mechanisms throughout the program, which was launched under the Bush administration after the Sept. 11, 2001, attacks and ran until 2006.
  • Some of the report’s other conclusions, which were obtained by McClatchy, include:_ The CIA used interrogation methods that weren’t approved by the Justice Department or CIA headquarters._ The agency impeded effective White House oversight and decision-making regarding the program._ The CIA actively evaded or impeded congressional oversight of the program._ The agency hindered oversight of the program by its own Inspector General’s Office.
  • ...6 more annotations...
  • The investigation determined that the program produced very little intelligence of value and that the CIA misled the Bush White House, the Congress and the public about the effectiveness of the interrogation techniques, committee members have said.The techniques included waterboarding, which produces a sensation of drowning, stress positions, sleep deprivation for up to 11 days at a time, confinement in a cramped box, slaps and slamming detainees into walls. The CIA held detainees in secret “black site” prisons overseas and abducted others who it turned over to foreign governments for interrogation.The CIA, which contends that it gained intelligence from the program that helped identify al Qaida terrorists and averted plots against the United States, agreed with some of the report’s findings but disputed other conclusions in an official response sent to the committee in June 2013.
  • Some current and former U.S. officials and military commanders, numerous experts and foreign governments have condemned the harsh interrogation methods as violations of international and U.S. laws against torture, a charge denied by the CIA and the Bush administration.They’ve based their defense on a series of top-secret legal opinions issued by the Justice Department beginning in August 2002. At that time, the agency sought advice on whether using the harsh techniques on Zayn al Abidin Muhammad Husayn, a close aide to Osama bin Laden who went by the nom de guerre Abu Zubaydah, would violate U.S. law against torture.The Justice Department’s Office of Legal Counsel found that the methods wouldn’t breach the law because those applying them didn’t have the specific intent of inflicting severe pain or suffering.The Senate report, however, concluded that the Justice Department’s legal analyses were based on flawed information provided by the CIA, which prevented a proper evaluation of the program’s legality.
  • “The CIA repeatedly provided inaccurate information to the Department of Justice, impeding a proper legal analysis of the CIA’s Detention and Interrogation Program,” the report found.Several human rights experts said the conclusion called into question the program’s legal foundations.“If the CIA fundamentally misrepresented what it was doing and that was what led (Justice Department) lawyers to conclude that the conduct was legal, then the legal conclusions themselves were inaccurate,” said Andrea Prasow, senior national security counsel for Human Rights Watch. “The lawyers making those assessments were relying on the facts that were laid before them.”“This just reinforces the view that everyone who has said the torture program was legal has been selling a bill of goods and it’s time to revisit the entire conventional wisdom being pushed by those who support enhanced interrogation that this program was safe, humane and lawful,” said Raha Wala, a lawyer with Human Rights First’s Law and Public Safety Program.
  • Among other findings, the report said that CIA personnel used interrogation methods that weren’t approved by the Justice Department or their headquarters.The conclusion that the CIA provided inaccurate information to the Justice Department reflects the findings of a top-secret investigation of the program by the CIA Inspector General’s Office that was triggered by allegations of abuse.The CIA inspector general’s May 7, 2004, report, which was declassified, found that in waterboarding Zubaydah and Khalid Sheikh Mohammad, deemed the chief architect of the 9/11 attacks, the CIA went beyond the parameters it outlined to the Justice Department’s Office of Legal Counsel, which wrote the legal opinions.Zubaydah was waterboarded 83 times, while Mohammad underwent the procedure 183 times.Those cases clashed with the CIA’s assertion _ outlined in the now-declassified top-secret August 2002 Office of Legal Counsel opinion _ that repetition of the methods “will not be substantial because the techniques generally lose their effectiveness after several repetitions.”
  • The Office of Legal Counsel opinion stated that its finding that the harsh interrogation techniques didn’t constitute torture was based on facts provided by the CIA, and that “if these facts were to change, this advice would not necessarily apply.”The CIA inspector general’s report found that the “continued applicability of the DOJ opinion” was in question because the CIA told the Justice Department that it would use waterboarding in the same way that it was used in training U.S. military personnel to evade capture and resist the enemy. In fact, the inspector general’s report continued, the CIA used waterboarding in a “manner different” from U.S. military training.The CIA also failed to keep track of the number of individuals it captured under the program, the Senate report concluded. Moreover, it said, the agency held people who didn’t meet the legal standard for detention. The report puts that number at 26, McClatchy has learned.
  • “The CIA did not conduct a comprehensive or accurate accounting of the number of individuals it detained and held individuals who did not meet the legal standard for detention,” it found. “The CIA’s claims about the number of detainees held and subjected to its enhanced interrogation techniques were inaccurate.”“The CIA’s records were hazy, inconsistent and at times inaccurate,” said the former U.S. official.
21More

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional committee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial institutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms with Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency with which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of its largest.19 The political clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [Italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘It was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 It also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the Italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter Maritime Bank, which interlocked with BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 It is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. It is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. It may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
2More

Department of Defense Confronts Climate Change - 0 views

  • The Department of Defense is organizing itself to address the effects of climate change on the U.S. military, some of which are already being felt. “The DoD must be able to adapt current and future operations to address the impacts of climate change in order to maintain an effective and efficient U.S. military,” according to a Pentagon directive that was issued last week. See Climate Change Adaptation and Resilience, DoD Directive 4715.21, January 14, 2016. Among other things, the new directive requires the Under Secretary of Defense for Intelligence and the Director of National Intelligence to coordinate on “risks, potential impacts, considerations, vulnerabilities, and effects [on defense intelligence programs] of altered operating environments related to climate change and environmental monitoring.” “The Department of Defense sees climate change as a present security threat, not strictly a long-term risk,” DoD said last year in a report to Congress. “We are already observing the impacts of climate change in shocks and stressors to vulnerable nations and communities, including in the United States, and in the Arctic, Middle East, Africa, Asia, and South America…. Although DoD and the Combatant Commands cannot prepare for every risk and situation, the Department is beginning to include the implications of a changing climate in its frameworks for managing operational and strategic risks prudently.” See National Security Implications of Climate-Related Risks and a Changing Climate, DoD report to Congress, July 2015.
  • “We are almost done with a baseline survey to assess the vulnerability of our military’s more than 7,000 bases, installations, and other facilities,” wrote then-Secretary of Defense Chuck Hagel in a 2014 Climate Change Adaptation Roadmap. “In places like the Hampton Roads region in Virginia, which houses the largest concentration of US military sites in the world, we see recurrent flooding today, and we are beginning work to address a projected sea-level rise of 1.5 feet over the next 20 to 50 years.” “Politics or ideology must not get in the way of sound planning,” Secretary Hagel wrote.
5More

The Latest European Court of Human Rights Ruling on Accountability for Torture | Just S... - 0 views

  • In another important decision on European participation in the US war on terrorism, the European Court of Human Rights (ECtHR) issued a judgment late last month against Italy for its role in the extraordinary rendition of Egyptian cleric Osama Mustafa Hassan Nasr, better known as Abu Omar. (An English-language summary of ruling is here; the full decision, presently available only in French, is here.) The ruling not only represents a further contribution to the Strasbourg Court’s growing accountability jurisprudence, but also highlights the United States’ own failure to provide any redress to victims of the torture program that it primarily created and operated. The ECtHR’s decision in Nasr v. Italy concerns one of the most notorious instances of extraordinary rendition (i.e., the extrajudicial transfer of an individual to another country for purposes of abusive interrogation). In 2003, Nasr, who had been granted political asylum in Italy, was abducted in broad daylight from a street in Milan and taken to Aviano air base, which is operated by the US Air Force. Nasr was subsequently taken, by way of the US’s Ramstein air base in Germany, to Cairo where he was interrogated by Egyptian intelligence services. Egyptian authorities held Nasr in secret for more than a year and subjected him to repeated torture before releasing him in April 2004. Approximately 20 days after his release — and after submitting a statement to Milan’s public prosecutor describing his abuse — Nasr was rearrested and detained without charges. He was released in 2007, but prohibited from leaving Egypt.
  • The ECtHR ruling centers on Italy’s role in Nasr’s abduction in Milan, his rendition to Egypt where he faced a real risk of abuse, and its subsequent failure to conduct an effective domestic investigation or to provide any redress. The ECtHR found Italy liable for multiple violations of the European Convention on Human Rights (ECHR), including article 3 (the prohibition on inhuman or degrading treatment), article 5 (the right to liberty and security), and article 13 (the right to an adequate remedy). It ordered Italy to pay €70,000 to Nasr and €15,000 to his wife, Nabila Ghali, for the suffering and anguish caused by her husband’s enforced disappearance. The Milan public prosecutor had previously investigated and prosecuted 25 CIA officers, including the agency’s Milan station chief, Robert Seldon Lady, and seven Italian military intelligence officers, for aiding and abetting in Nasr’s abduction and rendition. The United States strenuously opposed the prosecution, warning that it would harm US-Italian relations, and the Italian government successfully challenged much of the evidence on the grounds it could jeopardize national security. The trial court convicted 22 CIA agents in absentia and gave them prison sentences of between six to nine years; a Milan appeals court upheld the convictions and overturned the acquittals of the other three US defendants. Italy’s highest court, however, overturned the conviction of five of the Italian military intelligence agents based on state secrecy grounds. The Italian government has refused to seek the extradition of the convicted US nationals. (For more details, Human Rights Watch has an excellent summary of the proceedings in Italy here.)
  • The ECtHR’s ruling in Nasr strengthens accountability by reinforcing state responsibility for participation in abuses committed during the war on terrorism. It builds on the Strasbourg Court’s prior decisions in El-Masri v. Macedonia and Al-Nashiri v. Poland/Husayn (Abu Zubaydah) v. Poland, which held Macedonia and Poland, respectively, liable for their role in CIA torture and rendition, including (in the case of Poland) for hosting a CIA black site. Nasr, together with El-Masri and al-Nashiri/Husayn, should help discourage a state’s future participation in cross-border counterterrorism operations conducted in flagrant violation of human rights guarantees. While the deterrent value of legal judgments may be uncertain, the recent line of Strasbourg Court decisions raises the costs of aiding and abetting illegal operations, even in the national security context.
  • ...2 more annotations...
  • Nasr also advances the jurisprudence surrounding a state’s duty to conduct an effective domestic investigation into torture. The Strasbourg Court noted that Italian courts had conducted a detailed investigation and that the evidence disregarded by Italy’s highest court on grounds of state secrecy had been sufficient to convict the five Italian military intelligence defendants. It further observed that because the evidence inculpating those defendants had been widely available in the press and on the Internet, the court’s invocation of state secrecy doctrine was not only unpersuasive, but designed to grant impunity to the defendants. Further, the Strasbourg Court noted that the Italian government had never sought the extradition of the convicted CIA agents. As result, the court ruled that despite the efforts of Italian investigators and judges, which had identified the responsible individuals and secured their convictions, the domestic proceedings failed to satisfy the procedural requirements of article 3 of the European Convention (prohibiting torture and other ill-treatment), due to the actions of the executive. This ruling is important because it imposes liability not only where a state takes no steps towards a genuine domestic investigation and prosecution (as in El-Masri and Al-Nashiri/Husayn), but also where efforts by a state’s judges and prosecutors are thwarted in the name of state secrecy.
  • The ECtHR’s rulings on the CIA torture program also highlight the continued absence of accountability in the United States. The US has failed both to conduct an effective criminal investigation of those most responsible for CIA torture and to provide any remedies to victims. In fact, the Obama administration has vigorously opposed the latter at every turn, invoking the same sweeping state secrecy doctrines the ECtHR rejected in El-Masri and Nasr. These rulings will likely catalyze future litigation before the Strasbourg Court and in European domestic courts as well. (Recent actions filed against Germany for its participation in US targeted killings through use of the Ramstein Air Base provide one example of such litigation.) While the ECtHR’s rulings may not spur further efforts in the United States, they reinforce the perception of the United States as an outlier on the important question of accountability for human rights violations.
10More

Land Destroyer: CNN: Libyan "Rebels" Are Now ISIS - 0 views

  • The United States has attempted to claim that the only way to stop the so-called "Islamic State" in Syria and Iraq is to first remove the government in Syria. Complicating this plan are developments in Libya, benefactor of NATO's last successful regime change campaign. In 2011, NATO armed, funded, and backed with a sweeping air campaign militants in Libya centered around the eastern Libyan cities of Tobruk, Derna, and Benghazi. By October 2011, NATO successfully destroyed the Libyan government, effectively handing the nation over to these militants. 
  • What ensued was a campaign of barbarism, genocide, and sectarian extremism as brutal in reality as what NATO claimed in fiction was perpetrated by the Libyan government ahead of its intervention. The so-called "rebels" NATO had backed were revealed to be terrorists led by Al Qaeda factions including the Libyan Islamic Fighting Group (LIFG) and Al-Qaeda in the Islamic Maghreb (AQIM). The so-called "pro-democracy protesters" Libyan leader Muammar Qaddafi was poised to attack in what NATO claimed was pending "genocide" were in fact heavily armed terrorists that have festered for decades in eastern Libya. Almost immediately after NATO successfully destroyed Libya's government, its terrorist proxies were mobilized to take part in NATO's next campaign against Syria. Libyan terrorists were sent first to NATO-member Turkey were they were staged, armed, trained, and equipped, before crossing the Turkish-Syrian border to take part in the fighting. 
  • CNN in an article titled, "ISIS comes to Libya," claims: The black flag of ISIS flies over government buildings. Police cars carry the group's insignia. The local football stadium is used for public executions. A town in Syria or Iraq? No. A city on the coast of the Mediterranean, in Libya.  Fighters loyal to the Islamic State in Iraq and Syria are now in complete control of the city of Derna, population of about 100,000, not far from the Egyptian border and just about 200 miles from the southern shores of the European Union.  The fighters are taking advantage of political chaos to rapidly expand their presence westwards along the coast, Libyan sources tell CNN. Only the black flag of Al Qaeda/ISIS has already long been flying over Libya - even at the height of NATO's intervention there in 2011.  ISIS didn't "come to" Libya, it was always there in the form of Al Qaeda's local franchises LIFG and AQIM - long-term, bitter enemies of the now deposed and assassinated Libyan leader Muammar Qaddafi.
  • ...7 more annotations...
  • CNN's latest article is merely the veneer finally peeling away from the alleged "revolution" it had attempted to convince readers had taken place in 2011.
  • Even amid CNN's own spin, it admits ISIS' presence in Libya is not a new phenomenon but rather the above mentioned sectarian extremists who left Libya to fight in Syria simply returning and reasserting themselves in the eastern Cyrenaica region. CNN also admits that these terrorists have existed in Libya for decades and were kept in check primarily by Libyan leader Muammar Qaddafi. With Qaddafi eliminated and all semblance of national unity destroyed by NATO's intervention in 2011, Al Qaeda has been able to not only prosper in Libya but use the decimated nation as a spingboard for invading and destroying other nations. Worst of all, Al Qaeda's rise in Libya was not merely the unintended consequence of a poorly conceived plan by NATO for military intervention, but a premeditated regional campaign to first build up then use Al Qaeda as a mercenary force to overthrow and destroy a series of nations, beginning with Libya, moving across North Africa and into nations like Egypt, Syria, Lebanon, Iraq, and eventually Iran. From there, NATO's mercenary force would be on the borders of Russia and China ready to augment already Western-backed extremists in the Caucasus and Xinjiang regions. In 2011, geopolitical analyst Dr. Webster Tarpley in his article, "The CIA’s Libya Rebels: The Same Terrorists who Killed US, NATO Troops in Iraq," noted that the US strategy was to:
  • ...use Al Qaeda to overthrow independent governments, and then either Balkanize and partition the countries in question, or else use them as kamikaze puppets against larger enemies like Russia, China, or Iran. Dr. Tarpley would also note in 2011 that: One of the fatal contradictions in the current State Department and CIA policy is that it aims at a cordial alliance with Al Qaeda killers in northeast Libya, at the very moment when the United States and NATO are mercilessly bombing the civilian northwest Pakistan in the name of a total war against Al Qaeda, and US and NATO forces are being killed by Al Qaeda guerrillas in that same Afghanistan-Pakistan theater of war. The force of this glaring contradiction causes the entire edifice of US war propaganda to collapse. The US has long since lost any basis in morality for military force.  In fact, terrorist fighters from northeast Libya may be killing US and NATO troops in Afghanistan right now, even as the US and NATO protect their home base from the Qaddafi government. Indeed, the very terrorists NATO handed the entire nation of Libya over to, are now allegedly prime targets in Syria and Iraq. The "pro-democracy rebels" of 2011 are now revealed to be "ISIS terrorists" with long-standing ties to Al Qaeda.
  • Not even mentioning the fact that Al Qaeda's very inception was to serve as a joint US-Saudi mercenary force to fight a proxy war in Afghanistan against the Soviet Union, the terrorist organization has since played a central role in the Balkans to justify NATO intervention there, and as a divisive force in Iraq during the US occupation to blunt what began as a formidable joint Sunni-Shia'a resistance movement. In 2007, it was revealed by Pulitzer Prize-winning veteran journalist Seymour Hersh that the United States, Israel, and Saudi Arabia were conspiring to use Al Qaeda once again, this time to undermine, destabilize, and destroy the governments of Syria and Iran in what would be a regional sectarian bloodbath. Hersh would report (emphasis added): To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda. 
  • Hersh would note that Iran was perceived to be the greater threat and therefore, despite a constant barrage of propaganda claiming otherwise, Al Qaeda and its various affiliates were "lesser enemies." Even in 2007, Hersh's report would predict almost verbatim the cataclysmic regional sectarian bloodbath that would take place, with the West's extremists waging war not only on Shia'a populations but also on other religious minorities including Christians. His report would note: Robert Baer, a former longtime C.I.A. agent in Lebanon, has been a severe critic of Hezbollah and has warned of its links to Iranian-sponsored terrorism. But now, he told me, “we’ve got Sunni Arabs preparing for cataclysmic conflict, and we will need somebody to protect the Christians in Lebanon. It used to be the French and the United States who would do it, and now it’s going to be Nasrallah and the Shiites.  And this is precisely what is happening, word for word, page by page - everything warned about in Hersh's report has come to pass. In 2011, geopolitical analyst Dr. Webster Tarpley and others would also reiterate the insidious regional campaign Western policymakers were carrying out with Al Qaeda terrorists disguised as "rebels," "activists," and "moderate fighters" for the purpose of arming, funding, and even militarily intervening on their behalf in attempts to effect regime change and tilt the balance in the Middle East and North Africa region against Iran, Russia, and China. CNN's attempt to explain why ISIS is "suddenly" in Libya is one of many attempts to explain the regional rise of this organization in every way possible besides in terms of the truth - that ISIS is the result of multinational state sponsored terrorism including the US, UK, EU, Turkey, Jordan, Saudi Arabia, Qatar, and Israel as its chief backers.
  • Inexplicably, amid allegedly fighting ISIS in Iraq and Syria, the United States now claims it must first overthrow the Syrian government, despite it being the only viable, secular force in the region capable of keeping ISIS and its affiliates in check. CNN, in an article titled, "Sources: Obama seeks new Syria strategy review to deal with ISIS, al-Assad," would report: President Barack Obama has asked his national security team for another review of the U.S. policy toward Syria after realizing that ISIS may not be defeated without a political transition in Syria and the removal of President Bashar al-Assad, senior U.S. officials and diplomats tell CNN. Neither CNN, nor the politicians it cited in its article were able to articulate just why removing Syrian President Bashar al-Assad from power would somehow diminish the fighting capacity of ISIS. With CNN's recent article on ISIS' gains in Libya despite US-led NATO regime change there, after decades of Libyan leader Qaddafi keeping extremists in check, it would appear that NATO is once again attempting not to stop Al Qaeda/ISIS, but rather hand them yet another country to use as a base of operations. The goal is not to stop ISIS or even effect regime change in Syria alone - but rather hand Syria over as a failed, divided state to terrorists to use as a springboard against Iran, then Russia and China.
  • Clearly, ISIS' appearance in Libya negates entirely the already incomprehensible strategy the US has proposed of needing to first depose the Syrian government, then fight ISIS. The Syrian government, like that of Libyan leader Muammar Qaddafi, is the only effective force currently fighting ISIS and Al Qaeda's many other franchises operating in the region. Deposing the government in Damascus would compound the fight against sectarian terrorists - and the West is fully aware of that. Therefore, attempts to topple the secular government in Damascus is in every way the intentional aiding and abetting of ISIS and the sharing in complicity of all the horrific daily atrocities ISIS and its affiliates are carrying out. The morally bankrupt, insidious, dangerous, and very genocidal plans hatched in 2007 and executed in earnest in 2011 illustrate that ISIS alone is not the greatest threat to global peace and stability, but also those that constitute its multinational state sponsors. The very West purportedly defending civilization is the chief protagonist destroying it worldwide.  
8More

New analysis of rocket used in Syria chemical attack undercuts U.S. claims | Nation | N... - 0 views

  • A series of revelations about the rocket believed to have delivered poison sarin gas to a Damascus suburb last summer are challenging American intelligence assumptions about that attack and suggest that the case U.S. officials initially made for retaliatory military action was flawed.A team of security and arms experts, meeting this week in Washington to discuss the matter, has concluded that the range of the rocket that delivered sarin in the largest attack that night was too short for the device to have been fired from the Syrian government positions where the Obama administration insists they originated.
  • In Washington, the Office of the Director of National Intelligence said its assertion of Syrian government responsibility remains unchanged. “The body of information used to make the assessment regarding the August 21 attack included intelligence pertaining to the regime’s preparations for this attack and its means of delivery, multiple streams of intelligence about the attack itself and its effect, our post-attack observations, and the differences between the capabilities of the regime and the opposition. That assessment made clear that the opposition had not used chemical weapons in Syria,” it said Wednesday in an email.But the authors of a report released Wednesday said that their study of the rocket’s design, its likely payload and its possible trajectories show that it would have been impossible for the rocket to have been fired from inside areas controlled by the government of Syrian President Bashar Assad.
  • To emphasize their point, the authors used a map produced by the White House that showed which areas were under government and rebel control on Aug. 21 and where the chemical weapons attack occurred. Drawing circles around Zamalka to show the range from which the rocket could have come, the authors conclude that all of the likely launching points were in rebel-held areas or areas that were in dispute. The area securely in government hands was miles from the possible launch zones.In an interview, Postol said that a basic analysis of the weapon – some also have described as a looking like a push pop, a fat cylinder filled with sarin atop a thin stick that holds the engine – would have shown that it wasn’t capable of flying the 6 miles from the center of the Syrian government-controlled part of Damascus to the point of impact in the suburbs, or even the 3.6 miles from the edges of government-controlled ground.
  • ...4 more annotations...
  • The report also raised questions whether the Obama administration misused intelligence information in a way similar to the administration of President George W. Bush in the run-up to the 2003 invasion of Iraq. Then, U.S. officials insisted that Iraqi dictator Saddam Hussein had an active program to develop weapons of mass destruction. Subsequent inspections turned up no such program or weapons.“What, exactly, are we spending all this money on intelligence for?” Postol asked.
  • Lloyd, who has spent the past half-year studying the weapons and capabilities in the Syrian conflict, disputed the assumption that the rebels are less capable of making rockets than the Syrian military.“The Syrian rebels most definitely have the ability to make these weapons,” he said. “I think they might have more ability than the Syrian government.”Both said they were not making a case that the rebels were behind the attack, just that a case for military action was made without even a basic understanding of what might have happened.
  • He questioned whether U.S. intelligence officials had actually analyzed the improbability of a rocket with such a non-aerodynamic design traveling so far before Secretary of State John Kerry declared on Sept. 3 that “we are certain that none of the opposition has the weapons or capacity to effect a strike of this scale – particularly from the heart of regime territory.”“I honestly have no idea what happened,” Postol said. “My view when I started this process was that it couldn’t be anything but the Syrian government behind the attack. But now I’m not sure of anything. The administration narrative was not even close to reality. Our intelligence cannot possibly be correct.”
  • PDF: Possible Implications of Faulty US Technical Intelligence in the Damascus Nerve Agent Attack of August 21, 2013 
  •  
    In a mainstream Texas newspaper, no less. 
3More

New military draft starts in Ukraine amid intensified assault on militia-held territori... - 0 views

  • The Ukrainian military draft for 2015 has come into effect. It’s expected to see 100,000 people joining the army in three stages throughout the year. The self-proclaimed Donetsk republic says the process is undermining peace agreements. The first stage of the draft, starting on Tuesday, will last ninety days and will seek 50,000 recruits. Two more stages will follow in April and June. The main aim of the mobilization is said to be replacement for those on the front line in eastern Ukraine, who were recruited last year. Those eligible for draft are primarily reserve servicemen aged from 25 to 60. They are supposed to get a month of training before they actually go to the battlegrounds in eastern Ukraine. Women – mostly nurses and psychologists - are also subject to mobilization, according to the law signed by President Poroshenko on Monday. Joint Staff spokesman Vladimir Talalay has warned those dodging the draft could face up to five years behind bars.
  • The threat hasn’t prevented Ukrainians from venting their anger online at the draft campaign. Many argue mobilization is only possible after martial law has been imposed in the country. The military campaign in Ukraine’s east is officially dubbed an anti-terrorist operation, which people believe is something security forces are supposed to deal with. “While it’s anti-terror operation in Ukraine (and not war), NO!!! mobilization is possible!” a Facebook comment, cited by RIA Novosti, reads. “Declare martial law first and then mobilization.” Last year saw three waves of mobilization in Ukraine. Each was accompanied by massive protests from the draftees’ relatives.
  • Online offers of help to those wanting to avoid army service have also been rife, ranging from legal advice to selling fake medical certificates. The self-proclaimed republic of Donetsk has already slammed the new Ukrainian draft as inconsistent with the peace agreements signed in Minsk in September. The draft comes into effect as Ukrainian troops continue their massive assault on militia-held areas It started on Sunday in accordance with a presidential order.
2More

US War on ISIS a Trojan Horse | New Eastern Outlook - 0 views

  • In August of 2013, even as the words came out of US President Barack Obama’s mouth regarding an “impending” US military strike against the Syrian state, the impotence of American foreign policy loomed over him and those who wrote his speech for him like an insurmountable wall.  So absurd was America’s attempt to once again use the canard of “weapons of mass destruction” to justify yet another military intervention, that many believed America’s proxy war in Syria had finally reached its end. The counterstroke by Russia included Syria’s immediate and unconditional surrendering of its chemical weapons arsenal, and with that, so evaporated America’s casus belli. Few would believe if one told them then, that in 2015, that same discredited US would be routinely bombing Syrian territory and poised to justify the raising of an entire army of terrorists to wage war within Syria’s borders, yet that is precisely what is happening. President Obama has announced plans to formally increase military force in Iraq and Syria “against ISIS,” but of course includes building up huge armies of “rebels” who by all other accounts are as bad as ISIS itself (not to mention prone to joining ISIS’ ranks by the thousands)First appeared: http://journal-neo.org/2015/03/07/us-war-on-isis-a-trojan-horse/
  •  
    All it took for this miraculous turn in fortune was the creation of "ISIS," and serial provocations committed by these Hollywood-style villains seemingly engineered to reinvigorate America's justification to militarily intervene more directly in a war it itself started in Syria beginning in 2011. ISIS could not be a more effective part of America's plans to overthrow the Syrian government and destroy the Syrian state if it had an office at the Pentagon.
6More

Turkey could cut off Islamic State's supply lines. So why doesn't it? | David Graeber |... - 0 views

  • n the wake of the murderous attacks in Paris, we can expect western heads of state to do what they always do in such circumstances: declare total and unremitting war on those who brought it about. They don’t actually mean it. They’ve had the means to uproot and destroy Islamic State within their hands for over a year now. They’ve simply refused to make use of it. In fact, as the world watched leaders making statements of implacable resolve at the G20 summit in Antalaya, these same leaders are hobnobbing with Turkey’s president Recep Tayyip Erdoğan, a man whose tacit political, economic, and even military support contributed to Isis’s ability to perpetrate the atrocities in Paris, not to mention an endless stream of atrocities inside the Middle East.
  • How could Isis be eliminated? In the region, everyone knows. All it would really take would be to unleash the largely Kurdish forces of the YPG (Democratic Union party) in Syria, and PKK (Kurdistan Workers’ party) guerillas in Iraq and Turkey. These are, currently, the main forces actually fighting Isis on the ground. They have proved extraordinarily militarily effective and oppose every aspect of Isis’s reactionary ideology. But instead, YPG-controlled territory in Syria finds itself placed under a total embargo by Turkey, and PKK forces are under continual bombardment by the Turkish air force. Not only has Erdoğan done almost everything he can to cripple the forces actually fighting Isis; there is considerable evidence that his government has been at least tacitly aiding Isis itself. It might seem outrageous to suggest that a Nato member like Turkey would in any way support an organisation that murders western civilians in cold blood. That would be like a Nato member supporting al-Qaida. But in fact there is reason to believe that Erdoğan’s government does support the Syrian branch of al-Qaida (Jabhat al-Nusra) too, along with any number of other rebel groups that share its conservative Islamist ideology. The Institute for the Study of Human Rights at Columbia University has compiled a long list of evidence of Turkish support for Isis in Syria.
  • And then there are Erdoğan’s actual, stated positions. Back in August, the YPG, fresh from their victories in Kobani and Gire Spi, were poised to seize Jarablus, the last Isis-held town on the Turkish border that the terror organisation had been using to resupply its capital in Raqqa with weapons, materials, and recruits – Isis supply lines pass directly through Turkey. Commentators predicted that with Jarablus gone, Raqqa would soon follow. Erdoğan reacted by declaring Jarablus a “red line”: if the Kurds attacked, his forces would intervene militarily – against the YPG. So Jarablus remains in terrorist hands to this day, under de facto Turkish military protection.
  • ...3 more annotations...
  • How has Erdoğan got away with this? Mainly by claiming those fighting Isis are “terrorists” themselves. It is true that the PKK did fight a sometimes ugly guerilla war with Turkey in the 1990s, which resulted in it being placed on the international terror list. For the last 10 years, however, it has completely shifted strategy, renouncing separatism and adopting a strict policy of never harming civilians. The PKK was responsible for rescuing thousands of Yazidi civilians threatened with genocide by Isis in 2014, and its sister organisation, the YPG, of protecting Christian communities in Syria as well. Their strategy focuses on pursuing peace talks with the government, while encouraging local democratic autonomy in Kurdish areas under the aegis of the HDP, originally a nationalist political party, which has reinvented itself as a voice of a pan-Turkish democratic left.
  • They have proved extraordinarily militarily effective and with their embrace of grassroots democracy and women’s rights, oppose every aspect of Isis’ reactionary ideology. In June, HDP success at the polls denied Erdoğan his parliamentary majority. Erdoğan’s response was ingenious. He called for new elections, declared he was “going to war” with Isis, made one token symbolic attack on them and then proceeded to unleash the full force of his military against PKK forces in Turkey and Iraq, while denouncing the HDP as “terrorist supporters” for their association with them. There followed a series of increasingly bloody terrorist bombings inside Turkey – in the cities of Diyarbakir, Suruc, and, finally, Ankara – attacks attributed to Isis but which, for some mysterious reason, only ever seemed to target civilian activists associated with the HDP. Victims have repeatedly reported police preventing ambulances evacuating the wounded, or even opening fire on survivors with tear gas.
  • As a result, the HDP gave up even holding political rallies in the weeks leading up to new elections in November for fear of mass murder, and enough HDP voters failed to show up at the polls that Erdoğan’s party secured a majority in parliament. The exact relationship between Erdoğan’s government and Isis may be subject to debate; but of some things we can be relatively certain. Had Turkey placed the same kind of absolute blockade on Isis territories as they did on Kurdish-held parts of Syria, let alone shown the same sort of “benign neglect” towards the PKK and YPG that they have been offering to Isis, that blood-stained “caliphate” would long since have collapsed – and arguably, the Paris attacks may never have happened. And if Turkey were to do the same today, Isis would probably collapse in a matter of months. Yet, has a single western leader called on Erdoğan to do this? The next time you hear one of those politicians declaring the need to crack down on civil liberties or immigrant rights because of the need for absolute “war” against terrorism bear all this in mind. Their resolve is exactly as “absolute” as it is politically convenient. Turkey, after all, is a “strategic ally”. So after their declaration, they are likely to head off to share a friendly cup of tea with the very man who makes it possible for Isis to continue to exist.
5More

What is Israël's project in Argentina?, by Thierry Meyssan - 0 views

  • The Argentinian authorities are wondering about the massive purchase of land in Patagonia by a British billionaire, and the « holidays » that tens of thousands of Israëli soldiers are enjoying on his property.
  • In the 21st century, benefitting from the advantages offered them by the Falklands War Treaty, the United Kingdom and Israël are now setting up a new project Patagonia. British billionaire Joe Lewis has acquired immense territories in the South of Argentina and even neighbouring Chile. His properties cover areas several times larger than the State of Israël. They are situated in Tierra del Fuego, at the extreme Southern point of the continent. In particular, they surround the Lago Escondido, which effectively denies access to the entire region, despite a legal injunction. The billionaire has built a private airport with a two kilometre landing strip, in order to be able to receive civil and military aircraft. Since the Falklands War, the Israëli army has been organising « holiday camps » (sic) in Patagonia for its soldiers. Between 8,000 and 10,000 of them now come every year to spend two weeks on Joe Lewis’ land. While in the 1970’s, the Argentinian army noted the construction of 25,000 empty houses, which gave rise to the myth of the Andinia Plan, hundreds of thousands have been built today.
  • It is impossible for the moment to determine if Israël is engaged in a programme for the exploitation of Antarctica, or if it is building a rear base in case of defeat in Palestine.
  • ...2 more annotations...
  • It is impossible to verify the state of the construction work, since these are private lands, and Google Earth has neutralised the satellite photographs of the area, just as it does with NATO’s military installations. Neighbouring Chile has handed over a submarine base to Israël. Tunnels have been dug in order to survive the polar winter.
  • In the 21st century, benefitting from the advantages offered them by the Falklands War Treaty, the United Kingdom and Israël are now setting up a new project Patagonia. British billionaire Joe Lewis has acquired immense territories in the South of Argentina and even neighbouring Chile. His properties cover areas several times larger than the State of Israël. They are situated in Tierra del Fuego, at the extreme Southern point of the continent. In particular, they surround the Lago Escondido, which effectively denies access to the entire region, despite a legal injunction. The billionaire has built a private airport with a two kilometre landing strip, in order to be able to receive civil and military aircraft. Since the Falklands War, the Israëli army has been organising « holiday camps » (sic) in Patagonia for its soldiers. Between 8,000 and 10,000 of them now come every year to spend two weeks on Joe Lewis’ land. While in the 1970’s, the Argentinian army noted the construction of 25,000 empty houses, which gave rise to the myth of the Andinia Plan, hundreds of thousands have been built today.
1More

Columbine Survivor Pens Bold Open Letter to Obama Rejecting Gun Control: 'Whose Side Ar... - 0 views

  •  
    Amazing letter from Columbine survivor, Evan Todd, to Obama, explaining why Obama's gun control proposals are non sense. Evan Todd's open letter to Obama, below. - Mr. President, As a student who was shot and wounded during the Columbine massacre, I have a few thoughts on the current gun debate. In regards to your gun control initiatives: Universal Background Checks First, a universal background check will have many devastating effects. It will arguably have the opposite impact of what you propose. If adopted, criminals will know that they can not pass a background check legally, so they will resort to other avenues. With the conditions being set by this initiative, it will create a large black market for weapons and will support more criminal activity and funnel additional money into the hands of thugs, criminals, and people who will do harm to American citizens. Second, universal background checks will create a huge bureaucracy that will cost an enormous amount of tax payers dollars and will straddle us with more debt. We cannot afford it now, let alone create another function of government that will have a huge monthly bill attached to it. Third, is a universal background check system possible without universal gun registration? If so, please define it for us. Universal registration can easily be used for universal confiscation. I am not at all implying that you, sir, would try such a measure, but we do need to think about our actions through the lens of time. It is not impossible to think that a tyrant, to the likes of Mao, Castro, Che, Hitler, Stalin, Mussolini, and others, could possibly rise to power in America. It could be five, ten, twenty, or one hundred years from now - but future generations have the natural right to protect themselves from tyrannical government just as much as we currently do. It is safe to assume that this liberty that our forefathers secured has been a thorn in the side of would-be tyrants ever since the Second Amendmen
2More

UK Government Proposed Chemtrails/Geoengineering as Early as 1970-With U.N. Approval | ... - 0 views

  •  
    "Parliamentary records confirm that the British government considered using cirrus clouds as a means of climate modification as early as 1970. In those days, climatologists thought that the climate was cooling and sought ways to warm it. Geoffrey Johnson Smith MP said: 'to counteract the cooling effect of atmospheric dust the more jets there are in the atmosphere emitting heat-producing carbon dioxide the better, but some scientists, not all, hold the view that jet contrails-vapour trails as we usually call them-because they can lead to the extensive formation of cirrus clouds, could increase the cloud cover and thus effectively cut off the sun's rays and reduce the earth's temperature'.1 The military already had secret devices for creating contrails as early as the 1950s, as the National Archives at Kew reveal. One document is called 'Artificial Contrail Generator'. It includes information on 'Artificial vapour trails: contrail suppression equipment; vapour trails from Hunter aircraft at 50,000ft as seen from the ground, and from another aircraft flying at 8,000ft'.2 Think about it. Fake contrails could be made at altitudes as low as 8,000 ft. Disturbingly, the contrail generators were tested at the UK's biochemical warfare laboratory, Porton Down, which sprayed chemicals on the British public intermittently from 1940 to 1979 in 'trials'.3"
  •  
    Nice catch by marbux. Very detailed and referenced explanation of the where and why behind chemtrails. Chemical analysis shows heavy concentrations of ionized nano sized particles of aluminium, barium, and fluoride.
21More

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
6More

International Media Regurgitating Syrian Rebel Propaganda - 0 views

  • Outside Syria there have been repeated media and diplomatic forecasts of imminent victory for the rebels and defeat for Bashar al-Assad. Ignored in this speculation is the important point that Assad's forces still hold, wholly or in large part, all the main cities and towns of Syria. The difference in perceptions inside and outside Damascus is explained partly by the way the international and regional media describes the war. There are few foreign journalists in the Syrian capital because it is difficult to get visas. By way of contrast, the rebels have a highly sophisticated media operation – often also foreign-based – proffering immediate details of every incident, often backed up by compelling, if selective, YouTube footage. Understandably, the rebel version of events is heavily biased towards their own side and demonises the Syrian government. More surprising is the willingness of the international media, based often in Beirut but also in London and New York, to regurgitate with so little scepticism what is essentially good-quality propaganda. It is as if, prior to the US presidential election in November, foreign journalists had been unable to obtain visas to enter the US and had instead decided to rely on Republican Party militants for their information on the campaign – moreover, Republican activists based in Mexico and Canada.
  • The revolution has turned into a civil war. The uprising of Syrians against a cruel police state that started in March 2011 increasingly looks to Alawites, Christians, Druze and other minorities like a sectarian campaign aimed at their elimination. They watch YouTube pictures of Alawite officers being ritually decapitated and wonder what fate awaits them if Assad is defeated.
  • The policy of the US and its allies is increasingly bizarre: on the one hand, they recognise the opposition National Coalition as the legitimate government of Syria but, on the other, they label its most effective fighting force, the al-Nusra Front, as "a terrorist organisation" linked to al-Qa'ida. Just as in Iraq after 2003, Syria has become a magnet for jihadi fighters across the Muslim world. Washington is showing ever-decreasing enthusiasm for an outright rebel military victory that would strengthen jihadi militants and dissolve the governing machinery of the Syrian state.
  • ...2 more annotations...
  • The Syrian crisis is further complicated and exacerbated by being at the centre of two long-running regional struggles. These are the growing confrontation between Sunni and Shia across the Muslim world and, secondly, the conflict that pits the US, Israel, Saudi Arabia and their allies against Iran and its few friends. It is difficult to see how the present stalemate is going to be broken.
  • Barring full-scale foreign intervention, a negotiated settlement is becoming inevitable though it may be a long time coming.
  •  
    From my ongoing monitoring of news in the Mid-East, this article accurately summarizes the situation in Syria, except for involvement of the Russians on the side of Syria's established government. A fairly large portion of the Russian Navy is now positioned within Syrian ports and Russian ground to air missile systems are positioned around the country, serving as a strong deterrent to Libya-style U.S.-British air support for the "rebel" forces that largely consist of Jihadi foreigners. But U.S. mainstream media continues to falsely paint the situation in Syria as one in which the established Syrian government stands on the precipice of a just military defeat by oppressed native Syrian rebels. For the most part, one must go to foreign news sources to arrive at something closer to the truth, an invasion of Syria instigated and supplied by the U.S., the U.K., Turkey, the Sunni Arab states of Saudi Arabia and Kuwait, and Israel. Syria, a member of a small bloc of nations supportive of Iran, is being used in a surrogate war against Iran, which dares to require payment for its oil exports in gold, silver, or currencies more stable that the U.S. dollar.   
5More

In massive shift, Lutherans vote to halt US aid to Israel | The Electronic Intifada - 0 views

  • The Evangelical Lutheran Church in America has become the latest US denomination to take economic action against the Israeli occupation. At its triennial assembly last week in Baton Rouge, Louisiana, the four million-member church, one of the largest in the US, voted on two separate resolutions targeting Israel’s occupation and human rights abuses, passing each by a landslide. The first resolution calls for the end of US aid to Israel until it ceases violations of international human rights norms, specifically the ongoing construction of settlements on occupied Palestinian land. It passed by a 751-162 vote, or 82 percent, on 12 August. The US gives Israel more than $3 billion every year, despite laws that prohibit aid to countries with persistent records of human rights violations. The Obama administration has vowed to increase that sum over the coming decade in what would be the largest military aid package the US has ever given any country.
  • Fries cited huge majority support for resolutions also put to vote at the assembly about supporting refugees and immigrants (by an 842-48 vote), and expressing solidarity with Black Lives Matter (846-73). Resolutions on fossil fuel divestment and opposition to US military spending also passed with overwhelming support. Still, the votes on the Israeli occupation marked a notable shift in position. Dale Loepp, an Isaiah 58 leader, noted that at the previous church assembly in 2013, there was visible and organized opposition from the Zionist activist group Christians for Fair Witness on the Middle East. At that time, Loepp told The Electronic Intifada, the main strategy to defeat such measures was to introduce amendments that removed any economic consequences, allowing such “toothless” resolutions to pass easily. Similar tactics were used to effectively deflect divestment actions targeting occupation-linked firms during the United Methodist Church convention earlier this year.
  • “The surprising story here is that there has been a massive shift in the stance of the Evangelical Lutheran Church in America on the occupation in only three short years – 70 percent opposed to economic tools to end the occupation, versus 90 percent in favor today,” Loepp said. “Though these are three years that I’m sure seem like two eternities to Palestinians.”
  • ...1 more annotation...
  • At this year’s assembly, Loepp observed no such visible organized opposition. At the same time, grassroots organizers from the US Campaign to End the Israeli Occupation joined Isaiah 58 and allies from the Israel Palestine Mission Network of the Presbyterian Church (USA), American Friends Service Committee, Friends of Sabeel North America, New Orleans Palestinian Solidarity Committee and Jewish Voice for Peace to support the resolutions.
  •  
    BDS continues to grow exponentially.
5More

Baltimore Police Have Been Secretly Spying On Entire City From The Air - 0 views

  • Baltimore Police didn’t bother to inform the public (or anyone, for that matter) when they implemented a privately-funded mass surveillance program in January using a wide-angle camera-equipped plane flying above the city — which instantly uploaded and stored everything it recorded, just in case they needed it later. As Bloomberg’s Monte Reel reports, a small Cessna plane equipped with “a sophisticated array of cameras” capable of capturing “an area of roughly 30 square miles,” funded by an a private donor and provided by Dayton, Ohio-based Persistent Surveillance Systems, sometimes circled above the city for up to 10 hours per day recording and storing everything without anyone being privy to its presence. Since January, Reel noted, the Baltimore Police Department has been using this covert Big Brother’s eye-in-the-sky “to investigate all sorts of crimes, from property thefts to shootings.” Gone, apparently, are the days when the government’s surveillance state drew ire for attempting to ferret out potential terrorists — residents of Baltimore have been guinea pigs for an altogether more insidious spy dragnet. Persistent Surveillance Systems’ technology automatically stores all the footage on massive hard drives, making it available to law enforcement long afterward — but the idea police could access this information to solve a simple property crime is no less than alarming.
  • Particularly considering the company’s founder has an intense military background. Ross McNutt, Bloomberg reports, “is an Air Force Academy graduate, physicist, and MIT-trained astronautical engineer who in 2004 founded the Air Force’s Center for Rapid Product Development. The Pentagon asked him if he could develop something to figure out who was planting the roadside bombs that were killing and maiming American soldiers in Iraq. In 2006 he gave the military Angel Fire, a wide-area, live-feed surveillance system that could cast an unblinking eye on an entire city.” Though the technology had imperfections — even determining the gender of a person on the ground was impossible — its TiVo-like capabilities more than made up for any shortcomings. A person of interest could be followed by rewinding footage after, say, an IED exploded roadside, to track their movements — even if the cameras weren’t focused directly on the explosion at the moment it occurred. If the cameras were in the air at the time, anything that happened was fully trackable both back and forward in time. McNutt’s pitch for his technology concisely summarized, “Imagine Google Earth with TiVo capability.” Angel Fire truly evolved at the Los Alamos National Laboratory in New Mexico after 2007, when upgrades allowed for “all-weather and nighttime capabilities and then was used as the basis for another system, called Blue Devil, which coupled wide-area cameras with narrow-focus zoom lenses in the same package.”
  • Over time, after McNutt retired from the military, he worked to further improve the camera array and attended security conferences in hopes of garnering clients. After a brief but effective test run over the skies of Ciudad Juárez, Los Angeles became the first U.S. city to employ Persistent Surveillance’ system — and just as covertly as what has been taking place in Baltimore for the last eight months.
  • ...1 more annotation...
  • McNutt believes in the legitimacy of the services Persistent Surveillance can provide, and insists the technology isn’t as invasive as it might sound since individual identifying details, among other aspects, aren’t discernible, and because the every keystroke and action taken by analysts — like video footage — are logged and archived.
  •  
    Just imagine what it will be like when the bugs in the focal system are gone, which undoubtedly is a goal. Couple it with facial recognition and what do we have?
5More

Afghanistan Exit Is Seen as Peril to C.I.A. Drone Mission - NYTimes.com - 0 views

  • The risk that President Obama may be forced to pull all American troops out of Afghanistan by the end of the year has set off concerns inside the American intelligence agencies that they could lose their air bases used for drone strikes against Al Qaeda in Pakistan and for responding to a nuclear crisis in the region. Until now, the debate here and in Kabul about the size and duration of an American-led allied force in Afghanistan after 2014 had focused on that country’s long-term security. But these new concerns also reflect how troop levels in Afghanistan directly affect long-term American security interests in neighboring Pakistan, according to administration, military and intelligence officials.
  • The concern has become serious enough that the Obama administration has organized a team of intelligence, military and policy specialists to devise alternatives to mitigate the damage if a final security deal cannot be struck with the Afghan president, Hamid Karzai, who has declined to enact an agreement that American officials thought was completed last year. If Mr. Obama ultimately withdrew all American troops from Afghanistan, the C.I.A.’s drone bases in the country would have to be closed, according to administration officials, because it could no longer be protected. Their concern is that the nearest alternative bases are too far away for drones to reach the mountainous territory in Pakistan where the remnants of Al Qaeda’s central command are hiding. Those bases would also be too distant to monitor and respond as quickly as American forces can today if there were a crisis in the region, such as missing nuclear material or weapons in Pakistan and India.
  • Their base inside Pakistan was closed after a shooting involving a C.I.A. security contractor, Raymond Davis, and the raid into Pakistani territory that killed Osama bin Laden, both in 2011. Crucial to the surveillance of Bin Laden’s house in Abbottabad was the use of an RQ-170 drone. Pakistani officials talked openly in the weeks after that raid about their fear that the unmanned aircraft was also being used to monitor their nuclear arsenal, now believed to be the fastest growing in the world. The raid, and those drones, came out of American facilities just over the Afghan border.
  • ...2 more annotations...
  • The C.I.A.’s drone bases in Afghanistan, including one in the eastern part of the country, allow operators to respond quickly to fresh intelligence. The proximity to Pakistan’s tribal areas also allows the Predator drones and their larger, faster cousin, the Reaper, to fly longer missions without having to return to base.
  • The Reapers, the newest, largest and most capable of the unmanned armed vehicles, have a range of up to 1,100 miles. That puts Pakistan’s tribal areas within range of some bases the American military has flown from, especially in Kyrgyzstan, where for more than a decade the Pentagon has conducted air operations, include cargo and troop flights, out of a base at Manas. But the United States said last fall that it would pull out of that base in July. Other allied countries are within the Reaper’s range — in the Persian Gulf, for example. But the distances would be too great to carry out drone operations effectively, officials said, and it is very unlikely that any of those nations would approve launching the diplomatically sensitive strikes missions from their soil.“There’s no easy alternative to Afghanistan,” one former senior American counterterrorism official said.
« First ‹ Previous 101 - 120 of 279 Next › Last »
Showing 20 items per page