Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged military-testing

Rss Feed Group items tagged

Gary Edwards

So Who's Up For A Round Of Messenger-Shooting? | RedState - 0 views

  •  
    The US Government will continue to borrow over $100 Billion per month.  Thanks to the grand borrowing plan, the ruling class assures us that spending cuts for 2012 will total $7 Billion (for the year).  2013 is whopping $2 Billion.  What a deal!!!  It's convert to GOLD or kiss it goodbye time my friends. excerpt:  The prospect of having S&P downgrading US debt has politicians scrambling to prevent such a Bonfire of The Keynesians. To forestall the coming horror, they worked tirelessly to pass a Balanced Budget Amendment, means test entitlement programs, close unnecessary military bases which were doled out as Congressional Pork, and repealed ObamaCare to the ringing cheers of small businesses all over America. Pysch! No they didn't. They immediately mounted a rhetorical assault against S&P for having the temerity to question the creditworthiness of an organization that has borrowed $5Tr dollars in the past five years, seen a precipitous and enduring decline in its corporate revenues, and has failed to fashion an acceptable long-term budget in the last 800 days. If a broker told me to buy lots of stock in some private corporation that tried that crap I'd hang up the phone on that individual without any further comment. S&P put it more politely when they said the following. "We view an inability to timely agree and credibly implement medium-term fiscal consolidation policy as inconsistent with a 'AAA' sovereign rating." So the United States government has failed to pass a budget for 800 days. We have increased our national debt from $9Tr to $14Tr in the very recent near-term. Our President has recommended a budget that would have raised this indebtedness to $25Tr over the next ten. It's a genuine shame we aren't giving these people more revenues. They manage what we do give them so well.
Gary Edwards

UK Government Proposed Chemtrails/Geoengineering as Early as 1970-With U.N. Approval | ... - 0 views

  •  
    "Parliamentary records confirm that the British government considered using cirrus clouds as a means of climate modification as early as 1970. In those days, climatologists thought that the climate was cooling and sought ways to warm it. Geoffrey Johnson Smith MP said: 'to counteract the cooling effect of atmospheric dust the more jets there are in the atmosphere emitting heat-producing carbon dioxide the better, but some scientists, not all, hold the view that jet contrails-vapour trails as we usually call them-because they can lead to the extensive formation of cirrus clouds, could increase the cloud cover and thus effectively cut off the sun's rays and reduce the earth's temperature'.1 The military already had secret devices for creating contrails as early as the 1950s, as the National Archives at Kew reveal. One document is called 'Artificial Contrail Generator'. It includes information on 'Artificial vapour trails: contrail suppression equipment; vapour trails from Hunter aircraft at 50,000ft as seen from the ground, and from another aircraft flying at 8,000ft'.2 Think about it. Fake contrails could be made at altitudes as low as 8,000 ft. Disturbingly, the contrail generators were tested at the UK's biochemical warfare laboratory, Porton Down, which sprayed chemicals on the British public intermittently from 1940 to 1979 in 'trials'.3"
  •  
    Nice catch by marbux. Very detailed and referenced explanation of the where and why behind chemtrails. Chemical analysis shows heavy concentrations of ionized nano sized particles of aluminium, barium, and fluoride.
Paul Merrell

"Top secret" Shin Bet memo suggested dead Arafat would benefit Israel | The Electronic ... - 0 views

  • A “top secret” Israeli intelligence memo from 2000 concluded that the “disappearance” of Palestinian leader Yasser Arafat would be beneficial to Israel. The memo, revealed in a book to be published this week by British-Israeli political scientist Ahron Bregman, adds evidence to support the thesis that Arafat, who died in November 2004 in a French military hospital, was assassinated. The Electronic Intifada obtained an advance copy of Bregman’s book, Cursed Victory: A History of Israel and the Occupied Territories (Penguin).
  • Bregman himself is circumspect about whether Israel had a hand in Arafat’s death, but sees a number of clues, including public statements by then Prime Minister Ariel Sharon that Israel wanted him dead and was prepared to kill him. Yet Bregman finds a “clear indication that the Israelis did intend to kill Arafat” in a “Top Secret” document dated 15 October 2000 – a few months before Sharon came to power and a few weeks into the second Palestinian uprising – from the Shabak, Israel’s General Security Service (also known as Shin Bet).
  • Bregman then describes the document’s reasoning and conclusions: After going through “why Arafat is necessary,” and then “why Arafat is not necessary,” the document says that “the damage [Arafat] causes is bigger than his benefits….” And the subsequent conclusion is straightforward: “7. Arafat, the person, is a serious threat to the security of the state. His disappearance outweighs the benefits of his continuing existence.” And yet, even this Shabak “Top Secret” report does not provide us with enough evidence of assassination and we will probably have to wait for more information to ascertain what really killed Arafat.
  • ...4 more annotations...
  • Al Jazeera English investigative reporting since 2012 has revealed that Arafat’s personal effects contained high levels of the radioactive element polonium. Independent Swiss scientists later conducted tests on Arafat’s exhumed remains and concluded there was “moderate” support for the theory that Yasser Arafat was poisoned. While separate French and Russian scientific reports, also based on samples of Arafat’s remains, cast doubt on the conclusions by the Swiss radiation scientists at the Radiophysics Institute in Lausanne, the Swiss have hit back explaining why the French conclusions were flawed.
  • The French and Russian reports – unlike the Swiss findings – were never made public, but the Swiss scientists obtained copies and have explained, in an article in the Swiss magazine Le Temps last month, why the French and Russian test results actually support their conclusions. All three reports found high levels of polonium-210 in Arafat’s body. “Not only were the levels of polonium of the same order” in all three reports, Le Temps says, “but the scientists also noted similar differences” among the samples from different parts of Arafat’s remains. The key difference was not therefore in the test results, but in the interpretation.
  • The French concluded that the high level of the radioactive element was caused by radon, a naturally occurring element in the environment, but had not taken any measurements from the surrounding area to support this thesis. According to the Swiss, the French conclusion amounts to speculation. The more thorough Swiss, by contrast, did take samples from the surrounding area. Le Temps reports: “The Swiss anticipated the possible interference of radon. In their report they demolish the hypothesis. Not only was the level of radon in the sealed tomb very weak, but the soil situated under [Arafat’s] abdominal cavity, and therefore in contact with the body, was 17 times more ‘contaminated’ than soil situated far from the body.”
  • The presence of radon, which would be the same throughout the area, could not possibly explain such concentrations. While the Swiss findings look stronger than ever, the debate continues. Bregman’s revelations add a new, albeit circumstantial element, showing that Israeli intelligence, which has assassinated many Palestinian leaders, saw a rationale for eliminating Arafat as well.
  •  
    For those who support secret violence by governments, may the fleas of a thousand camels infest your armpits for the remainder of your lives.  
Paul Merrell

Israel deploys a new weapons system in Gaza - Intellihub.com - 0 views

  • Reports, including photographic evidence reveal that Israel is using an energy weapon to attack targets in Gaza. The destructive beam, thought to be a high energy laser, is emitted from a plane identified as a Boeing KC707 “Re’em,” originally configured for Electronic Warfare. Those observing the attacks cite a beam from a 4 engine jet hitting a target which immediately turns “white hot.” After these attacks, the target area is then hit with either bombs or artillery to destroy evidence of the use of an American designed and built energy weapon illegally given to Israel. BACKGROUND The weapon used is identified as part of the YAL 1 system, a COIL laser (chemical, oxygen/iodine laser), originally intended as an aircraft mounted system to shoot down ICBMs. Boeing approached the Department of Defense in 2002 and by 2004 had mounted its first system on a 747/400 previously flown by Air India. Boeing had convinced Secretary of Defense Donald Rumsfeld that this system, mounted on as many as 7 aircraft, could fly 24 hours a day around Iran and defend “the free world” against nuclear tipped ICBMs that Rumsfeld believed Iran was planning to use. Please note that it was Rumsfeld that told television audiences that Afghanistan was “peppered” with underground cities serviced by rail links that supported division sized Al Qaeda units that, after ten years, no one was able to locate.
  • Boeing tested the system in 2007. The Department of Defense claimed the system could shoot down low earth orbit satellites and that in tests conducted in 2010, destroyed multiple test missiles. There is no reliable confirmation of this other than a press release from then Secretary of Defense Robert Gates. CANCELLATION AND MYSTERIOUS DISAPPEARANCE The Center for Strategic Studies, in an interview with then Defense Secretary Gates published the following: “I don’t know anybody at the Department of Defense who thinks that this program should, or would, ever be operationally deployed. The reality is that you would need a laser something like 20 to 30 times more powerful than the chemical laser in the plane right now to be able to get any distance from the launch site to fire.” So, right now the ABL would have to orbit inside the borders of Iran in order to be able to try and use its laser to shoot down that missile in the boost phase. And if you were to operationalize this you would be looking at 10 to 20 747s, at a billion and a half dollars apiece, and $100 million a year to operate. And there’s nobody in uniform that I know who believes that this is a workable concept.”
  • After $5 billion was spent, the functioning prototype only capable of being fired directly at nearby targets, a system very capable of acquisition and destruction of ground targets with no air defense protection only, was said to have been flown to a scrap yard. The plane itself is still there, at Davis Monthan Air Force Base, with other failed dreams and nightmares. However, the weapons system disappeared, only to reappear in Israel as a “missile defense” project, an adjunct to the “Iron Dome” system. Israel’s Rafael Defense had been trying to develop laser weapons on its own to intercept rockets being fired from Gaza. It was never able to neither deploy a laser powerful enough nor develop a radar system able to be effective.
  • ...5 more annotations...
  • “Friends of Israel,” within the US defense community were convinced by Israel that the system could be finished and deployed to protect Israel against a purported “missile onslaught” from Tehran. In truth, there was no such intention. Instead, as in the film “Real Genius,” the laser system was always intended to be deployed against ground targets, for terrorism and assassinations. The “delivery system,” a Boeing airliner configured for AWAC, electronic warfare or refueling, could easily be modified to “clone” commercial air traffic and attack targets thousands of miles away or as close as Gaza, Lebanon, Syria or Iraq with total impunity.
  • McLeod and Rogers, in The Law of War, examine the history of prohibition of incendiary weapons. Israel’s use of white phosphorous, intended as a “smoke market” as a corrosive anti-personnel weapon against civilian populations in Lebanon and Gaza skirts initial language, as cited below, in the St. Petersburg Declaration of 1868, but falls well short of evading later prohibition on the use of chemical agents. “The first treaty to deal with weapons was the St Petersburg Declaration of 1868. Here states were concerned about the development of explosive or incendiary bullets for use against the wagon trains of enemy forces. It was felt that these bullets might be used against enemy personnel15 and cause unnecessary injury. The Contracting Parties agreed ‘mutually to renounce, in case of war among themselves, the employment by their military or naval troops of any projectile of a weight below 400 grammes, which is either explosive or charged with fulminating or inflammable substances’.
  • The declaration does not seem to have affected the practice of states in using tracer for range finding, even mixed with normal ammunition, nor the use of small explosive projectiles for anti-aircraft and anti-material uses. It did not prevent states from using four pound, thermite-based incendiary bombs during the Second World War. These, obviously, were more than 400 grammes in weight. Furthermore it could be argued that they were not ‘projectiles’, a term that certainly would not include illuminating flares or smoke canisters.” The use of energy weapons for assassinations and terrorism had, prior to only a few short days ago, been subject of speculative fiction only. No one had imagined that a failed American weapons system would be pirated for deployment in acts of terrorism by a rogue state. A greater question arises, if this “failed system” costing many billions has been shipped off “in the dark of night” without public knowledge or official authorization for use in a criminal manner, what other systems may have been similarly pirated? There is conclusive evidence that W54/Davy Crocket nuclear weapons made their way to Israel after 1991 after an accident at Dimona is reputed to have made that facility useless for weapons development.
  • Similarly, when the Ukraine retired its “fleet” of SS21 tactical nuclear missiles, Israel took possession of the warheads, servicing their deuterium booster gas all these years to keep them ready for deployment. Intercepted communications between the Kiev junta and Israel now indicate that Israel is ready to “repatriate” some of these nuclear weapons to the Ukraine for use against pro-Russian separatists. Ukrainian leaders have spoken of the intent to deploy and use these nuclear weapons publicly on several recent occasions. From USA Today: “KIEV, Ukraine — Ukraine may have to arm itself with nuclear weapons if the United States and other world powers refuse to enforce a security pact that obligates them to reverse the Moscow-backed takeover of Crimea, a member of the Ukraine parliament told USA TODAY. ‘We gave up nuclear weapons because of this agreement,’ said Rizanenko, a member of the Udar Party headed by Vitali Klitschko, a candidate for president. ‘Now there’s a strong sentiment in Ukraine that we made a big mistake.’”
  • With the recent bombing of a UN refugee facility in Gaza, with the use of chemical and now energy weapons, with Israel’s planned sale of nuclear warheads to Ukraine, there is little more that could be done to establish Israel, not only as a rogue state, but as a “clear and present danger” to not only regional but global security as well. As Jim W. Dean of Veterans Today recently stated, “Their fingerprints are at every crime scene.”
Paul Merrell

F-35 Officials Prove Need for Cyber Testing by Cancelling One - 0 views

  •  
    In related news, the F-35 will be so expensive to maintain and fly that pilots will not be able to fly it enough to achieve competency. The F-35 is the most expensive Defense Dept. boondoggle in history. Yet its development and manufacture continues without a seriously threatening challenge. 
Paul Merrell

Russia's New 'Satan' Nuclear Weapons System Could Wipe Out Texas or France, But Testing... - 0 views

  • Russia has for months been testing a giant nuclear weapons delivery system that can carry 10 heavyweight warheads—enough power to wipe out Texas or France. But the RS-28 Sarmat intercontinental ballistic missile known in Russia as "Satan 2" has been delayed yet again, suggesting Moscow is having a harder time than expected updating its nuclear arsenal. Russia began testing the Sarmat last year and had been expected to enter it into service in 2018. It was slated to be Russia's first new intercontinental ballistic missile in decades and much bigger than its U.S. counterpart, the Minuteman III, which carries three warheads. The Russian weapon was designed to push through U.S. missile defenses. It is expected to replace the RS-36M, which was known as "Satan" by NATO in the 1970s, NBC News reported.
  • Russia has the world's most nuclear weapons with 7,300. The U.S. is in second place with 6,970 nuclear weapons. Only seven other nations in the world have nuclear weapons, and combined they have fewer weapons than either the U.S. or Russia. They are France, China, United Kingdom, Pakistan, India, Israel and North Korea, according to the International Campaign to Abolish Nuclear Weapons.
Paul Merrell

Mystery Sponsor Of Weapons And Money To Syrian Mercenary "Rebels" Revealed | Zero Hedge - 0 views

  • Previously, when looking at the real underlying national interests responsible for the deteriorating situation in Syria, which eventually may and/or will devolve into all out war with hundreds of thousands killed, we made it very clear that it was always and only about the gas, or gas pipelines to be exact, and specifically those involving the tiny but uber-wealthy state of Qatar. Needless to say, the official spin on events has no mention of this ulterior motive, and the popular, propaganda machine, especially from those powers supporting the Syrian "rebels" which include Israel, the US and the Arabian states tries to generate public and democratic support by portraying Assad as a brutal, chemical weapons-using dictator, in line with the tried and true script used once already in Iraq. On the other hand, there is Russia (and to a lesser extent China: for China's strategic interests in mid-east pipelines, read here), which has been portrayed as the main supporter of the "evil" Assad regime, and thus eager to preserve the status quo without a military intervention
  • However, one question that has so far remained unanswered, and a very sensitive one now that the US is on the verge of voting to arm the Syrian rebels, is who was arming said group of Al-Qaeda supported militants up until now. Now, finally, courtesy of the FT we have the (less than surprising) answer, which goes back to our original thesis, and proves that, as so often happens in the middle east, it is once again all about the natural resources. From the FT: The tiny gas-rich state of Qatar has spent as much as $3bn over the past two years supporting the rebellion in Syria, far exceeding any other government, but is now being nudged aside by Saudi Arabia as the prime source of arms to rebels.
  • Why would Qatar want to become involved in Syria where they have little invested?  A map reveals that the kingdom is a geographic prisoner in a small enclave on the Persian Gulf coast.   It relies upon the export of LNG, because it is restricted by Saudi Arabia from building pipelines to distant markets.  In 2009, the proposal of a pipeline to Europe through Saudi Arabia and Turkey to the Nabucco pipeline was considered, but Saudi Arabia that is angered by its smaller and much louder brother has blocked any overland expansion.   Already the largest LNG producer, Qatar will not increase the production of LNG.  The market is becoming glutted with eight new facilities in Australia coming online between 2014 and 2020.   A saturated North American gas market and a far more competitive Asian market leaves only Europe.  The discovery in 2009 of a new gas field near Israel, Lebanon, Cyprus, and Syria opened new possibilities to bypass the Saudi Barrier and to secure a new source of income.  Pipelines are in place already in Turkey to receive the gas.  Only Al-Assad is in the way.
  • ...6 more annotations...
  • Qatar has proposed a gas pipeline from the Gulf to Turkey in a sign the emirate is considering a further expansion of exports from the world's biggest gasfield after it finishes an ambitious programme to more than double its capacity to produce liquefied natural gas (LNG).   "We are eager to have a gas pipeline from Qatar to Turkey," Sheikh Hamad bin Khalifa Al Thani, the ruler of Qatar, said last week, following talks with the Turkish president Abdullah Gul and the prime minister Recep Tayyip Erdogan in the western Turkish resort town of Bodrum. "We discussed this matter in the framework of co-operation in the field of energy. In this regard, a working group will be set up that will come up with concrete results in the shortest possible time," he said, according to Turkey's Anatolia news agency.   Other reports in the Turkish press said the two states were exploring the possibility of Qatar supplying gas to the strategic Nabucco pipeline project, which would transport Central Asian and Middle Eastern gas to Europe, bypassing Russia. A Qatar-to-Turkey pipeline might hook up with Nabucco at its proposed starting point in eastern Turkey. Last month, Mr Erdogan and the prime ministers of four European countries signed a transit agreement for Nabucco, clearing the way for a final investment decision next year on the EU-backed project to reduce European dependence on Russian gas.
  • Specifically, the issue at hand is the green part of the proposed pipeline: as explained above, it simply can't happen as long as Russia is alligned with Assad.
  • So there you have it: Qatar doing everything it can to promote bloodshed, death and destruction by using not Syrian rebels, but mercenaries: professional citizens who are paid handsomely to fight and kill members of the elected regime (unpopular as it may be), for what? So that the unimaginably rich emirs of Qatar can get even richer. Although it is not as if Russia is blameless: all it wants is to preserve its own strategic leverage over Europe by being the biggest external provider of natgas to the continent through its own pipelines. Should Nabucco come into existence, Gazpromia would be very, very angry and make far less money! As for the Syrian "rebels", who else is helping them? Why the US and Israel of course. And with the Muslim Brotherhood "takeover" paradigm already tested out in Egypt, it is only a matter of time.
  • Perhaps it is Putin's turn to tell John Kerry he prefer if Qatar was not "supplying assistance to Syrian mercenaries"? What is worse, and what is already known is that implicitly the US - that ever-vigilant crusader against Al Qaeda - is effectively also supporting the terrorist organization: The relegation of Qatar to second place in providing weapons follows increasing concern in the West and among other Arab states that weapons it supplies could fall into the hands of an al-Qaeda-linked group, Jabhat al-Nusrah. Yet Qatar may have bitten off more than it can chew, even with the explicit military Israeli support, and implicit from the US. Because the closer Qatar gets to establishing its own puppet state in Syria, the closer Saudi Arabia is to getting marginalized:
  • What Saudi Arabia wants is not to leave the Syrian people alone, but to install its own puppet regime so it has full liberty to dictate LNG terms to Qatar, and subsequently to Europe.
  • Sadly, when it comes to the US (and of course Israel), it does have a very hidden agenda: one that involves lying to its people about what any future intervention is all about, and the fabrication of narrative about chemical weapons and a bloody regime hell bent on massacring every man, woman and child from the "brave resistance." What they all fail to mention is that all such "rebels" are merely paid for mercenaries of the Qatari emir, whose sole interest is to accrue even more wealth even if it means the deaths of thousands of Syrians in the process. A bigger read through of the events in Syria reveals an even more complicated web: one that has Qatar facing off against Syria, with both using Syria as a pawn in a great natural resource chess game, and with Israel and the US both on the side of the petrodollars, while Russia and to a lesser extent China, form the counterbalancing axis and refuse to permit a wholesale overthrow of the local government which would unlock even more geopolitical leverage for the gulf states. Up until today, we would have thought that when push comes to shove, Russia would relent. However, with the arrival of a whole lot of submarines in Cyprus, the games just got very serious. After all the vital interests of Gazprom - perhaps the most important "company" in the world - are suddenly at stake.
Gary Edwards

Why the Ruling Class is So Upset About Edward Snowden » CounterPunch: Tells t... - 0 views

  • the networks now compete with one another to generate outrage—not at the spying, mind you, but at Snowden for violating the law.
  • O’Reilly’s current position is that while a hero, Snowden should be placed on trial and judged by a jury. Which is to say, he should be apprehended abroad, brought back in handcuffs and treated to the same benefits of the U.S. judicial system enjoyed by a Bradley Manning or a Guantanamo detainee.
  • He broke the law! He told us: “Any analyst at any time can target anyone.”
  • ...24 more annotations...
  • “He took an oath,” thunders Dianne Feinstein
  • chair of the Senate Intelligence Committee (and thus someone complicit in the spying programs).
  • What she means by this is that he broke his pledge, made when he became an employee of the CIA contractor Booz Allen Hamilton—which helps handle the massive effort to monitor all of us daily—to conceal any secrets he obtained as an employee.
  • She is of course not referring to the oath he made at the same time, to uphold the Constitution of the United States, which says very clearly that “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated…”
  • Snowden has not merely revealed that the U.S. government has forced service providers Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple to share all their records with itself, in the form of mega-data that can only be accessed for content following the issuance of warrants from (secret) courts, in order to thwart real or imagined terrorist plots. He hasn’t merely shown that the NSA intercepts 1.7 billion electronic records every day (in order, of course, to thwart the terrorists). He has charged the following:
  • The FBI’s “Counterintelligence Program” (COINTELPRO), active from 1956 to 1971, collected information through wiretaps and other means with the specific objective of destroying civil rights and left-wing organizations.
  • Snowden indicates that those with that power can indeed gain access to what Bill Clinton recently called the “meat” of your communications.
  • That is, every word you’ve spoken on the phone recently, or maybe for several years; or test-messaged or instant-messaged online; can be accessed by government “analysts” at their whim.
  • in 2008, ABC News revealed that National Security Agency staffers enjoyed monitoring satellite phone sex involving U.S. officers in Iraq. It’s worth quoting at length.
  • “‘These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones,’ said Adrienne Kinne, a 31-year old US Army Reserves Arab linguist assigned to a special military program at the NSA’s Back Hall at Fort Gordon from November 2001 to 2003. Kinne described the contents of the calls as ‘personal, private things with Americans who are not in any way, shape or form associated with anything to do with terrorism.’ [...] Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up using phones in Baghdad’s Green Zone from late 2003 to November 2007. ‘Calling home to the United States, talking to their spouses, sometimes their girlfriends, sometimes one phone call following another,’ said Faulk. [...] ‘Hey, check this out,’ Faulk says he would be told, ‘there’s good phone sex or there’s some pillow talk, pull up this call, it’s really funny, go check it out. It would be some colonel making pillow talk and we would say, ‘Wow, this was crazy,’ Faulk told ABC News.”
  • “Any analyst at any time can target anyone. Any selector, anywhere… I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the President…”
  • But the main issue is not your protection from phone-sex interlopers, but protection from those who want to do you harm.
  • If that’s the way NSA analysts could deal with U.S. military officers in Iraq—fellow cogs in the system, fighting on behalf of U.S. imperialism—how much respect do you suppose they have for you and your privacy? For your security from their searches, their violations?
  • One of its stated missions was to use surveillance on activists to release negative personal information to the public to discredit them. In many instances the agents succeeded, and they ruined lives. And their abilities to do so pale in comparison with the abilities of Obama’s NSA.
  • the Bush administration would be willing to learn a thing or two about domestic spying from the experts of the former Stasi. What ruling elite has ever gained more total information awareness about its citizens than the old German Democratic Republic?  And done it with such elegant legal scaffolding?
  • As historians such as Katherine Pence and Paul Betts have shown, the GDR authorities operated within scrupulously observed legal constraints. One sees this in the film Das Leben der Anderen (The Lives of Others) produced in the reunited Germany in 2006. It depicts the surveillance culture of the former East Germany, leaving the viewer nauseated.
  • Everything according to law.
  • I thought of that film while reading the lead Boston Globe editorial on June 13. It concludes that the “policies that [Snowden revealed], however objectionable, are properly authorized” while Snowden himself “broke the law.”
  • Thus, you see, he’s not a whistle-blower but a criminal.
  • U.S. to World: “You Must View Snowden as a Criminal, and Give Him Back”
  • Suddenly, the Cold War has reappeared. Snowden is charged with espionage, some of his critics alleging that he’s in the service of the PRC and/or Russia or other “enemies.” It in fact appears that Beijing and Moscow both were taken by surprise by this episode, and that both have attempted to handle Snowden’s unexpected presence carefully to avoid annoying the U.S.
  • The entirety of the ruling elite and the journalistic establishment are keen on defending the programs Snowden has exposed; keen on punishing him for his whistle-blowing; determined to vilify him as a punk, narcissist, egoist, attention-hungry ne’er-do-well (anything but a thoughtful man who made a moral choice that has enlightened people about the character of the U.S. government); feverishly working on damage control while anticipating more damning revelations; and determined to get those four laptops with their incriminating content back into the bosom of the national security state.
  • It all, in my humble opinion, boils down to thi
  • No, there are us, and there are them. The tiny power elite that controls the mainstream press and cable channels, the corporations that dutifully hand over mega-data to the state (and then deny doing so to allay consumer outrage), the twin political parties, are sick to their stomachs that they’ve been so exposed. We in our turn should feel, if not terrorized, nauseated.
  •  
    This is a fun and enlightening read.  Extremely well written!  Maybe the most complete statement of both the facts of the Snowden - NSA disclosure event, and the mix of heartache and anger I feel about it.  Gut wrenching, nauseating and sick to my soul over what these clowns are doing to this great Republic, the Constitution, and the brief history of individual liberty this country represents.  Nicely written summary.
Paul Merrell

Backstage at the Trump vs. Deep State Cage Match - 0 views

  • Pepe Escobar118211755The real story behind The Fall of Michael Flynn has been confirmed by a highly informed US insider, who has previously detailed how the Trump presidency's foreign policy will unfold.
  • According to the insider, which I named "X", "Flynn was removed because he was agitating for a strike against Iran which would have had disastrous consequences. That would have led to Iranian strikes against Western oil supplies in the Middle East, raising Russia's economic power as the oil price would have soared to over $200 a barrel, and the EU would have had to join the Russian-Chinese block, or not be able to obtain sufficient energy to survive. The United States would have been completely isolated." When still on the job as National Security Adviser, Flynn, on the record, had already put Iran "on notice". That was, for all practical purposes, a virtual declaration of war. "X" expands on the ramifications: "Turkey is the key here, and Turkey wants a deal with Iran. The key danger to NATO is Turkey, as it does not control Serbia, and Turkey-Serbia undermines Romania and Bulgaria in an outflanking maneuver to the southern-southeastern part of NATO. Serbia linked to Russia in WWI and Turkey linked with Germany. Tito linked with Russia in WWII and Turkey was neutral. If Turkey, Serbia, Russia link together, NATO is outflanked. Russia is linked to Iran. Turkey is linking to Russia and Iran after what Erdogan perceives was a failed CIA coup attempt against him. All this was way beyond the capacity of Flynn to handle." "X" maintains that the Obama administration opening towards Iran, which led to the nuclear deal, was essentially a tactic to undermine Russia's Gazprom – assuming an Iran-Iraq gas pipeline would be built all the way to Turkey and then connected to EU markets.
  • "X", against a virtual Beltway consensus, insists, "the rapprochement to Russia was not dependent on Flynn. It is dependent on those who supervise Trump, and they put him in there for the purpose of shifting towards Russia. The deep state conflict is irrelevant. These are pros who know how and when to change policy. They have the goods on anyone who is in a high position and can destroy them at will. Flynn was in their way and now he is out."
  • ...1 more annotation...
  • "X" reveals once again what makes the Pentagon squirm as far as Russia is concerned: "Russia is not an economic threat to the US. Its manufacturing base is centered on military production. It has developed since the [late 1990s] Belgrade bombing into the greatest military power in the world in terms of self-defense. Its defensive missiles seal its air space and its offensive ICBMs are the most advanced in the world. The recently tested US defensive missile placed in Romania is nearly worthless despite a fake, staged success for European consumption and to hold NATO together. Russia is a natural ally to the US. The US will shift to Russia and Flynn's departure is relatively meaningless except for its entertainment value."
Paul Merrell

Intelligence Archives - Secrecy News - 0 views

  • The U.S. military has been investigating the use of sophisticated data mining tools to probe social media and other open sources in order to support military operations against money laundering, drug trafficking, terrorism and other threats.  But the window for doing so may be closing as the social media landscape changes, according to an internal assessment. U.S. Special Operations Command (SOCOM) National Capital Region (NCR) conducted a series of experiments over the past year under the rubric “QUANTUM LEAP” that was intended to test “non-traditional” tools and techniques to advance the SOCOM mission. An after-action report on the first experiment said it “was successful in identifying strategies and techniques for exploiting open sources of information, particularly social media, in support of a counter threat finance mission.”  Counter threat finance refers to efforts to disrupt an adversary’s finances.  A copy of the SOCOM NCR report was obtained by Secrecy News.  See “Project QUANTUM LEAP: After Action Report,” 12 September 2012. “Major lessons learned were the pronounced utility of social media in exploiting human networks, including networks in which individual members actively seek to limit their exposure to the internet and social media…,” the report said.
  • The report said that as valuable as the opportunity created by new techniques for data mining of open sources appears to be, it may prove to be transient. “We are currently in a ‘window’ of opportunity for exploitation of social media sources for application to CTF [counter threat finance] or other SOCOM NCR missions. This window could be as narrow as 18-24 months before the social media phenomenon transforms. This future transformation is unknown and could offer additional opportunities, or existing opportunities could be closed, but the only thing that is certain is that there will continue to be rapid change.”
Gary Edwards

Jim Douglass: A Letter to the American People (and Myself in Particular) On the Unspeak... - 0 views

  • “But if they’re not [authentic], then you have something of a magnitude beyond common experience that would reflect so devastatingly on our society as a whole and its corruptibility that you don’t know how to deal with it.”[4]
  • Since I began researching the assassinations of Martin Luther King, Malcolm X, and John and Robert Kennedy, I have been shocked by the obvious signature that is written across all four of them. It is the signature of what President Eisenhower identified as the military-industrial complex of our government.[6] We can read that signature at once in Dallas in the identity of the scapegoat Lee Harvey Oswald.
  • When Lee Harvey Oswald was arrested in Dallas after the assassination, he was carrying a Department of Defense ID card that is routinely issued to U.S. intelligence agents abroad. The FBI later obliterated the card by “testing” it but writer Mary La Fontaine discovered a copy of it in l992 in a Dallas Police Department photo. Oswald had been a radar operator for the CIA’s U-2 spy plane while he was a Marine stationed at Atsugi Naval Air Station in Japan. The Atsugi base served as the CIA’s center for its Far East operations. His fellow Marines David Bucknell and James Botelho said that when Oswald “defected” to the Soviet Union, he did so under the direction of U.S. intelligence.[8] The professed traitor Oswald was given a U.S.-government loan to assist his return from the USSR. When he settled in Dallas, his closest friend and mentor was longtime U.S. intelligence operative George DeMohrenschildt.
  • ...10 more annotations...
  • Fidel Castro recognized “CIA” written all over Lee Harvey Oswald and the press releases on him that were being sent around the world within minutes of the assassination. The whole Dallas set-up was obvious to someone as familiar with CIA assassination plots as Fidel Castro was.
  • The more one investigates the assassination of John Kennedy, the more one becomes immersed in the depths of U.S. intelligence. The American intelligence community was the sea around Lee Harvey Oswald, Jack Ruby, and the host of anti-Castro Cuban exiles and gun runners with whom Oswald and Ruby worked closely.
  • By the Fall of l963 John Kennedy had also decided to withdraw from Vietnam.[14] Robert McNamara in his memoir In Retrospect[15] has described the contentious October 2, l963, National Security Council meeting at which Kennedy decided, against the arguments of most of his advisors: to withdraw all U.S. forces from Vietnam by the end of l965; to withdraw l,000 U.S. troops by the end of l963; to announce this policy publicly “to set it in concrete,” which Press Secretary Pierre Salinger did at a press conference when the meeting was over.[16]
  • After JFK’s assassination, his withdrawal policy was quietly voided.[18] In light of the future consequences of Dallas, it was not only John Kennedy who was crucified on November 22, l963, but 58,000 other Americans and over three million Vietnamese, Laotians, and Cambodians.
  • Clifton Baird was a Louisville, Kentucky, police officer in l965 when he was asked to help kill Martin Luther King. On September l8, l965, Baird gave a ride home in his car to fellow Louisville officer Arlie Blair after their 3-ll pm shift. Baird parked his car in Blair’s driveway, and the two men talked. Alarmed at what Blair was saying, Clifton Baird secretly turned on a microphone hidden under his seat that was connected to a recorder in a rear speaker. What Baird taped was an offer to engage in a conspiracy to kill Dr. King. He later shared the information with author William F. Pepper who included it in his book on the King assassination Orders to Kill.[32] Blair told Baird that an organization he belonged to was willing to pay $500,000 for the death of King. Would Baird be willing to participate? Baird said he definitely would not. He urged Blair to stay away from it, too.
  • The next day at a Louisville police station, Clifton Baird saw Arlie Blair conferring with a group of police officers and FBI agents. The FBI agents had, over a period of sixteen years or more, developed a close relationship with members of the Louisville police force.
  • On September 20, l965, Baird taped a second car conversation with Blair. Blair again brought up the $500,000 bounty for King, which Baird had now connected with the FBI.
  • Myron Billett was another witness to the truth. By undergoing a conversion in his own life, Myron Billett was able to reveal that in January l968 FBI and CIA agents offered a New York Mafia leader a $l million contract to kill Martin Luther King.
  • After Dr. King was assassinated on April 4, Sam Giancana gave Myron Billett $30,000 and told him to start running: They both knew too much and were going to be killed. Giancana was in fact murdered in his Chicago home in June l975, just before he was scheduled to testify before the Church Committee concerning assassination plots. His killing took the form of a symbolic warning to other possible assassination witnesses. Giancana was shot seven times in a circle around his mouth.
  • In his Canadian Broadcasting Corporation lectures at the end of l967 (later published as The Trumpet of Conscience[39]), King’s vision went beyond even these overwhelming concerns. He saw the next step as a global nonviolent movement using escalating acts of massive civil disobedience to disrupt the entire international order and block economic and political exploitation across borders.
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

The ISIS Fiasco: It's Really an Attack on Iran » CounterPunch: Tells the Fact... - 0 views

  • There’s something that doesn’t ring-true about the coverage of crisis in Iraq. Maybe it’s the way the media reiterates the same, tedious storyline over and over again with only the slightest changes in the narrative. For example, I was reading an article in the Financial Times by Council on Foreign Relations president, Richard Haass, where he says that Maliki’s military forces in Mosul “melted away”. Interestingly, the Haass op-ed was followed by a piece by David Gardener who used almost the very same language. He said the “army melts away.” So, I decided to thumb through the news a bit and see how many other journalists were stung by the “melted away” bug. And, as it happens, there were quite a few, including Politico, NBC News, News Sentinel, Global Post, the National Interest, ABC News etc. Now, the only way an unusual expression like that would pop up with such frequency would be if the authors were getting their talking points from a central authority. (which they probably do.) But the effect, of course, is the exact opposite than what the authors intend, that is, these cookie cutter stories leave readers scratching their heads and feeling like something fishy is going on.
  • And something fishy IS going on. The whole fable about 1,500 jihadis scaring the pants off 30,000 Iraqi security guards to the point where they threw away their rifles, changed their clothes and headed for the hills, is just not believable. I don’t know what happened in Mosul, but, I’ll tell you one thing, it wasn’t that. That story just doesn’t pass the smell test.
  • In any event, there is a rational explanation for what happened in Mosul although I cannot verify its authenticity. Check out this post at Syria Perspectives blog: “…the Iraqi Ba’ath Party’s primary theoretician and Saddam’s right-hand man, ‘Izzaat Ibraaheem Al-Douri, himself a native of Mosul…was searching out allies in a very hostile post-Saddam Iraq … Still on the run and wanted for execution by the Al-Maliki government, Al-Douri still controlled a vast network of Iraqi Sunni Ba’athists who operated in a manner similar to the old Odessa organization that helped escaped Nazis after WWII … he did not have the support structure needed to oust Al-Maliki, so, he found an odd alliance in ISIS through the offices of Erdoghan and Bandar. Our readers should note that the taking of Mosul was accomplished by former Iraqi Ba’athist officers suspiciously abandoning their posts and leaving a 52,000 man military force without any leadership thereby forcing a complete collapse of the city’s defenses. The planning and collaboration cannot be coincidental.” (THE INNER CORE OF ISIS – THE INVASIVE SPECIES, Ziad Fadel, Syrian Perspectives)
  • ...1 more annotation...
  • I’ve read variations of this same explanation on other blogs, but I have no way of knowing whether they’re true or not. But what I do know, is that it’s a heckuva a lot more believable than the other explanation mainly because it provides enough background and detail to make the scenario seem plausible. The official version–the “melts away” version– doesn’t do that at all. It just lays out this big bogus story expecting people to believe it on faith alone. Why? Because it appeared in all the papers? That seems like a particularly bad reason for believing anything. And the “army melting away” story is just one of many inconsistencies in the official media version of events.
Paul Merrell

Why Won't the FBI Tell the Public About its Drone Program? | Electronic Frontier Founda... - 0 views

  • Today we’re publishing—for the first time—the FBI’s drone licenses and supporting records for the last several years. Unfortunately, to say that the FBI has been less than forthcoming with these records would be a gross understatement. Just yesterday, Wired broke the story that the FBI has been using drones to surveil Americans. Wired noted that, during an FBI oversight hearing before the Senate Judiciary Committee, FBI Director Robert Mueller let slip that the FBI flies surveillance drones on American soil. Mueller tried to reassure the senators that FBI’s drone program “is very narrowly focused on particularized cases and particularized leads.” However, there’s no way to check the Director on these statements, given the Bureau’s extreme lack of transparency about its program.
  • EFF received these records as a result of our Freedom of Information lawsuit against the Federal Aviation Administration (FAA) for the licenses the FAA issues to all public entities wishing to fly drones in the national airspace. As detailed in prior posts and on our drone map, we have already received tens of thousands of pages of valuable information about local, state and federal agencies’ drone flights. However, unlike other federal agencies, including the US Air Force, the Bureau has withheld almost all information within its documents—even including the dates the FAA’s Certificates of Authorization (COAs) were issued. As you can see from the two examples linked below—the first from the Air Force and the second from the FBI—the FBI is withholding information, including something as basic as the city and state of the Bureau’s point of contact, that could in no way be expected to risk circumvention of the law (the applicable test under FOIA, 5 U.S.C. § 552 (b)(7)(E)).
  • The FBI has even withheld information from standard documents that all agencies file with the FAA to support their COA applications, many of which come directly from the drone manufacturer. (Compare, for example, the Air Force’s “LOST_LINK_MISSION” or “AIRCRAFT_SYSTEM” documents with the FBI’s versions of the same documents.) One interesting fact is that the Bureau has withheld most of the records under several statutes and regulations related to the arms exports and the International Traffic in Arms Regulations (ITAR) (see statutes and regulations here, here, and here.) This is surprising because, although ITAR does apply explicitly to drones, not even the US Military has claimed these statutes in withholding information from its drone records. Given the FBI’s past abuses and the information recently revealed about how the Bureau exploits specious interpretations of federal law to help out the NSA’s spying program, we have good reason to be concerned about the FBI’s lack of transparency here. We hope Senator Feinstein will follow up on her concerns about the FBI’s apparent lack of “strictures” in place to protect Americans’ privacy in connection to FBI drone use and demand a full accounting of how, when, where and why the Bureau has been using drones to monitor the public. Download the zip files of the documents here, here, and here.
Paul Merrell

U.S. to defend Syrian rebels with airpower, including from Assad | Reuters - 0 views

  • The United States has decided to allow airstrikes to defend Syrian rebels trained by the U.S. military from any attackers, even if the enemies hail from forces loyal to Syrian President Bashar al-Assad, U.S. officials said on Sunday.The decision by President Barack Obama, which could deepen the U.S. role in Syria's conflict, aims to shield a still-fledging group of Syrian fighters armed and trained by the United States to battle Islamic State militants -- not forces loyal to Assad.But in Syria's messy civil war, Islamic State is only one of the threats to the U.S. recruits. The first batch of U.S.-trained forces deployed to northern Syria came under fire on Friday from other militants, triggering the first known U.S. airstrikes to support them.U.S. officials, speaking on condition of anonymity to confirm details of the decision, first reported by the Wall Street Journal, said the United States would provide offensive strikes to support advances against Islamic State targets. The United States would also provide defensive support to repel any attackers.
  • The Pentagon and the White House declined to discuss the decision on rules of engagement or confirm comments by the unnamed U.S. officials.
  • The U.S. military launched its program in May to train up to 5,400 fighters a year in what was seen as a test of Obama's strategy of getting local partners to combat extremists and keep U.S. troops off the front lines.The training program has been challenged from the start, with many candidates being declared ineligible and some even dropping out.
  •  
    Typical. Authorized leakers announce that Obama has declared war against the democratically-elected government of Syria, then White House officials refuse to confirm it on grounds that a declaration of war is somehow a mere "rule of engagement."  Yet the Constitution holds that only Congress can declare war. 
Paul Merrell

US hegemonic quest in Mideast creates chaos - Global Times - 0 views

  • Editor's Note:With the rise of the Islamic State (IS), the conflicts in Syria and Iraq, and the struggle between Iran and the West over nuclear issues, the Middle East remained chaotic in 2014. What about 2015? What kind of role will the US play in the regional political landscape? At a seminar held by the Chongyang Institute for Financial Studies, Renmin University of China, Global Times (GT) reporter Liu Zhun talked to Flynt Leverett (Flynt), former senior director of Middle East Affairs at the National Security Council (NSC), and Hillary Mann Leverett (Hillary), former director of Iran, Afghanistan and Persian Gulf Affairs at the NSC, about these issues. GT: What is your forecast of the situation of the Middle East this year?
  • Flynt: More and more negative consequences of the failed US drive for the hegemony in the Middle East will become increasingly evident. The US is struggling to come to terms with that. Washington should reconsider its basic strategy for this region, but President Barack Obama has a great belief in US' hegemonic agenda. Many analysts in the US argue that Washington should "double-down" on its strategy. But this is the wrong direction.Hillary: There will be more violence throughout the region - violence encouraged by the US. A potential difference rests on the possibility that an alternative mindset will be brought in by China as it rises. Whether Russia, with the support of China and Iran, can put Syria's conflicts on a different trajectory toward resolution is important - whether they can bring in a different paradigm for conflict resolution. I am not sure they can yet, but I am encouraged by China's rise and its focus on sovereignty and conflict resolution. GT: If the US changes its course, will the region be a better place?Flynt: Yes, it will be a better place. The historical record has proven that. For 20 years after China's revolution, the US was doing everything it could to isolate and hurt the People's Republic of China. After it gave up its hostile policies toward China, China, as well as other East Asian countries, embarked on a long and productive period of economic expansion with rising prosperity for hundreds of millions of people. The Middle East will not be perfect after the US changes its policy, but it will be better.
  • GT: But the chaos in the Middle East, much of which is driven by religious issues, is more complicated than the conflicts China encountered with the US, which were basically ideological. What do you think of the role of Islam in the chaos of the Middle East?Hillary: There has been a perception that there is something wrong with Islam and that it is the major contributor to the complications of the problems in the Middle East. But if you look historically, that is not really true. There is no evidence that Muslims are historically terrorists. The head of the IS was in an American prison, where he became more extreme in his own views and forged a network with other extremists.The perennial chaos of the Middle East, to a large extent, is caused by a long history of military penetration by Western countries such as France, the UK and now the US. GT: You suggest the US should shift its Middle East policy and pull back from trying to be a hegemon - for example, by restoring ties with Iran. What do you think of Obama's current strategy to the Middle East?Flynt: People are talking about the Obama doctrine and his being less interventionist. I don't really think that is right. I think the Obama administration is no less committed to so-called global leadership, which is actually hegemony, over strategically important areas like the Middle East. The Obama administration thinks it has a smarter way of promoting that leadership than its immediate predecessor. But that is more a tactical than strategic difference.
  • ...1 more annotation...
  • GT: China's "One Belt and One Road" project is believed to have a major influence on the Middle East. Will it be a counterbalance of the US' influence in the region?Flynt: US power in the Persian Gulf is in relative decline. But because it is desperate to cling to its hegemonic ambitions in the region, Washington is trying to put China's interests at risk. China will decide what its interests are in the Middle East. As an analytic point, though, if China really wants to have an independent and balanced foreign policy, China will need to decide how accommodating it wants to be of US preferences and to what extent it wants to pursue its own interests, even when the US is not necessarily happy about that. I think the Middle East's engagement in the Silk Road, especially Iran, is going to be a testing ground for China. Hillary: I think the US will definitely disagree with the project. After the collapse of the Soviet Union, the US has really focused on trying to expand its influence, military or otherwise, on Central Asian states in a bid to put pressure on Russia. This has been a consistent theme through both Democratic and Republican administrations. China's project will unavoidably reach Central Asia, which could lessen interest in those states in aligning with various American projects and make it harder for the US to pressure Russia. Besides, as Iran is central for both Silk Roads, China's good relationship with Iran will be very problematic for the US interests, and also for its hegemonic ambitions across the entire Middle East.
Paul Merrell

British army creates team of Facebook warriors | UK news | The Guardian - 0 views

  • he British army is creating a special force of Facebook warriors, skilled in psychological operations and use of social media to engage in unconventional warfare in the information age. The 77th Brigade, to be based in Hermitage, near Newbury, in Berkshire, will be about 1,500-strong and formed of units drawn from across the army. It will formally come into being in April. The brigade will be responsible for what is described as non-lethal warfare. Both the Israeli and US army already engage heavily in psychological operations.
  • Against a background of 24-hour news, smartphones and social media, such as Facebook and Twitter, the force will attempt to control the narrative. The 77th will include regulars and reservists and recruitment will begin in the spring. Soldiers with journalism skills and familiarity with social media are among those being sought. An army spokesman said: “77th Brigade is being created to draw together a host of existing and developing capabilities essential to meet the challenges of modern conflict and warfare. It recognises that the actions of others in a modern battlefield can be affected in ways that are not necessarily violent.” The move is partly a result of experience in counter-insurgency operations in Afghanistan. It can also be seen as a response to events of the last year that include Russia’s actions in Ukraine, in particular Crimea, and Islamic State’s (Isis) takeover of large swaths of Syria and Iraq.
  • The Israel Defence Forces have pioneered state military engagement with social media, with dedicated teams operating since Operation Cast Lead, its war in Gaza in 2008-9. The IDF is active on 30 platforms – including Twitter, Facebook, Youtube and Instagram – in six languages. “It enables us to engage with an audience we otherwise wouldn’t reach,” said an Israeli army spokesman. It has been approached by several western countries, keen to learn from its expertise.
  • ...1 more annotation...
  • During last summer’s war in Gaza, Operation Protective Edge, the IDF and Hamas’s military wing, the Qassam Brigades, tweeted prolifically, sometimes engaging directly with one another.
  •  
    No mention of foreign langauge skills as a criteria for selecting troops., That raises a strong suspicion that those who speak English are the psywar targets. So long until the UK Army  is beaming propaganda at the U.S.?  Do we have to put up with this?
Paul Merrell

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis... - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. Court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower courts, nor the justices on the Supreme Court, were allowed to read the report.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the court with an example, and offered to provide additional examples if so requested.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the court.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme Court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
Paul Merrell

Protocols of the Hackers of Zion? « LobeLog - 0 views

  • When Israeli Prime Minister Benjamin Netanyahu met with Google chairman Eric Schmidt on Tuesday afternoon, he boasted about Israel’s “robust hi-tech and cyber industries.” According to The Jerusalem Post, “Netanyahu also noted that ‘Israel was making great efforts to diversify the markets with which it is trading in the technological field.'” Just how diversified and developed Israeli hi-tech innovation has become was revealed the very next morning, when the Russian cyber-security firm Kaspersky Labs, which claims more than 400 million users internationally, announced that sophisticated spyware with the hallmarks of Israeli origin (although no country was explicitly identified) had targeted three European hotels that had been venues for negotiations over Iran’s nuclear program.
  • Wednesday’s Wall Street Journal, one of the first news sources to break the story, reported that Kaspersky itself had been hacked by malware whose code was remarkably similar to that of a virus attributed to Israel. Code-named “Duqu” because it used the letters DQ in the names of the files it created, the malware had first been detected in 2011. On Thursday, Symantec, another cyber-security firm, announced it too had discovered Duqu 2 on its global network, striking undisclosed telecommunication sites in Europe, North Africa, Hong Kong, and  Southeast Asia. It said that Duqu 2 is much more difficult to detect that its predecessor because it lives exclusively in the memory of the computers it infects, rather than writing files to a drive or disk. The original Duqu shared coding with — and was written on the same platform as — Stuxnet, the computer worm  that partially disabled enrichment centrifuges in Iranian nuclear power plants, according to a 2012 report in The New York Times. Intelligence and military experts said that Stuxnet was first tested at Dimona, a nuclear-reactor complex in the Negev desert that houses Israel’s own clandestine nuclear weapons program. While Stuxnet is widely believed to have been a joint Israeli-U.S. operation, Israel seems to have developed and implemented Duqu on its own.
  • Coding of the spyware that targeted two Swiss hotels and one in Vienna—both sites where talks were held between the P5+1 and Iran—so closely resembled that of Duqu that Kaspersky has dubbed it “Duqu 2.” A Kaspersky report contends that the new and improved Duqu would have been almost impossible to create without access to the original Duqu code. Duqu 2’s one hundred “modules” enabled the cyber attackers to commandeer infected computers, compress video feeds  (including those from hotel surveillance cameras), monitor and disrupt telephone service and Wi-Fi, and steal electronic files. The hackers’ penetration of computers used by the front desk would have allowed them to determine the room numbers of negotiators and delegation members. Duqu 2 also gave the hackers the ability to operate two-way microphones in the hotels’ elevators and control their alarm systems.
Paul Merrell

Blackwater Guards Found Guilty in 2007 Iraq Killings - NYTimes.com - 0 views

  • Four former Blackwater Worldwide security guards were convicted and immediately jailed Wednesday for their roles in a deadly 2007 shooting in Baghdad’s Nisour Square that marked a bloody nadir in America’s war in Iraq.A jury in Federal District Court found that the deaths of 17 Iraqis in the shooting, which began when a convoy of the guards suddenly began firing in a crowded intersection, was not a battlefield tragedy, but the result of a criminal act.The convictions on murder, manslaughter and weapons charges represented a legal and diplomatic victory for the United States government, which had urged Iraqis to put their faith in the American court system. That faith was tested repeatedly over seven years as the investigation had repeated setbacks, leaving Iraqis deeply suspicious that anyone would be held responsible for the deaths.
  • One defendant, Nicholas A. Slatten, a sniper who the government said fired the first shots, was convicted of murder. The others — Dustin L. Heard, Evan S. Liberty and Paul A. Slough — were convicted of voluntary manslaughter and using a machine gun to carry out a violent crime. A fifth contractor, Jeremy Ridgeway, previously pleaded guilty to manslaughter and cooperated with prosecutors.Jurors could not reach verdicts on several of the counts against Mr. Heard, but that will have little bearing on the sentencing. The machine-gun charges carry mandatory 30-year minimum prison sentences, more than the manslaughter charges. Mr. Slatten faces possible life in prison. No sentencing date has been set.
  • The trial was an epilogue to the story of Blackwater, which began as a police- and military-training facility in North Carolina and came to symbolize the country’s outsourcing of its wartime responsibilities.About 1,000 of Blackwater’s contractors guarded diplomats in Iraq. Others loaded bombs onto Predator drones. The company’s founder, Erik Prince, tapped retired Central Intelligence Agency officials for executive positions, and at one point, the C.I.A. hired Blackwater contractors to covertly track and kill Qaeda operatives worldwide, a program that was shelved before any killings were conducted. While the company’s security guards were involved in scores of shootings in Iraq, it was the 2007 incident in Nisour Square that helped cement Blackwater’s image as a company that operated with impunity because of its lucrative contracts with the American government. The company became the subject of several Justice Department investigations, all of which the company and its executives survived. But ultimately, public outrage over the shooting contributed to Blackwater’s demise. It lost its contracts and was renamed, sold and renamed again.
  • ...1 more annotation...
  • The criminal trial raised novel legal issues, and the case is expected to wind through the appellate courts for a year or more. One issue — whether the Justice Department had jurisdiction to bring the case at all — could undo the entire case.Under federal law, the government has jurisdiction for overseas crimes committed by defense contractors or those supporting the Pentagon’s mission. Blackwater was working for the State Department, a distinction that jurors concluded did not matter but which has not been tested.
« First ‹ Previous 61 - 80 of 98 Next ›
Showing 20 items per page