Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged month

Rss Feed Group items tagged

Paul Merrell

The Effort to Destroy the Iran Agreement: Chapter Two « LobeLog - 0 views

  • The voting and possible vetoing that will take place later this month thus will mark only the end of one chapter in a continuing political contest. Opponents of the agreement will continue to try to subvert it even after it enters into force. The partisan divide in sentiment on the issue, which, as Jim Lobe points out, has become increasingly sharp as reflected in opinion polls over the past year, will be one of the drivers of continued opposition. The issue has exhibited a familiar pattern in which members of the public who have little substantive knowledge of the matter of question take their cues from leaders of the party with which they most identify. A self-reinforcing cycle of adamant opposition by Republican politicians and consequent opposition by a cue-taking Republican base has put the Iranian nuclear issue on a similar trajectory as the Affordable Care Act—i.e., endless preoccupation by the Congressional portion of half the political spectrum with killing it rather than implementing it, no matter what experience may show is working or not working.
  • Efforts to kill the agreement, after the votes this month that will determine whether the agreement will go into effect, will center on getting the United States not to live up to its end of the agreement. Given that the United States has no obligations under the agreement other than to end some of the punishment it has been inflicting in the form of economic sanctions, the agreement-killing strategy will entail slapping new sanctions on Iran until Tehran is pressed passed the limits of its tolerance for such accord-circumventing behavior. The specific tactics may involve in effect restoring some of the nuclear-related sanctions that are due to be relaxed under the agreement, but under some new label such as terrorism or something having to do with other Iranian behavior. Ideas have already been advanced along these lines. Other creative ideas of opponents include having states rather than the federal government sanction Iran. All such maneuvers will make it difficult for Iranian leaders committed to observance of the agreement to deflect charges from their domestic opponents that the United States snookered Iran and that it is not in Iran’s interests to continue to live up to the agreement.
  • The U.S. presidential election calendar has given diehard opponents of the nuclear agreement added incentive to inflict lethal sabotage on the agreement within the next 16 months. The prospect of a Republican entering the White House in January 2017 may in this respect present more of a vulnerability than an opportunity for opponents. Republican presidential candidates have been competing with each other in telling the primary-voter party base how quickly and peremptorily they would renounce the agreement with Iran—with the only differences being whether it would be on the very first day in office, whether renunciation would take place before or after consulting with advisers, etc. It would be tough for any of these candidates, if elected, to back down from such an oft-repeated pledge. But such a presidential renunciation would be a more direct and blatant unilateral U.S. reneging on a multilateral accord than even some of the more aggressive sanctions-restoring tactics mentioned earlier. And such a renunciation would come after three years (counting from when the JPOA came into effect) of Iran living up to its commitments under the agreement and notmoving to make a nuclear weapon. The discomfort that the future president would be feeling in this situation would reflect what has been the underlying concern of confirmed opponents of the nuclear agreement all along: not that the accord will fail, but that it will succeed.
Paul Merrell

NSA Will Destroy Archived Metadata When Program Stops - 0 views

  • Four months from now, at the same time that the National Security Agency finally abandons the massive domestic telephone dragnet exposed by whistleblower Edward Snowden, it will also stop perusing the vast archive of data collected by the program. The NSA announced on Monday that it will expunge all the telephone metadata it previously swept up, citing Section 215 of the U.S.A Patriot Act. The program was ruled illegal by a federal appeals court in May. In June, Congress voted to end the program, but gave the NSA until the end of November to phase it out. The historical metadata —  records of American phone calls showing who called who, when, and for how long — will be put out of the reach of analysts on November 29, although technical personnel will have access for three more months. The program started 14 years ago, and operated under rules requiring data be retained for five years, and then destroyed.
  • The only possible hold-up, ironically, would be if any of the civil lawsuits prompted by the program prohibit the destruction of the data. “The telephony metadata” will be “preserved solely because of preservation obligations in pending civil litigation,” the Office of the Director of National Intelligence announced. “As soon as possible, NSA will destroy the Section 215 bulk telephony metadata upon expiration of its litigation preservation obligations.” ACLU staff attorney Alex Abdo told The Intercept his organization is “pleased that the NSA intends to purge the call records it has collected illegally.” But, he added: “Even with today’s pledge, the devil may be in the details.”
Paul Merrell

The Numbers Are In: China Dumps A Record $94 Billion In US Treasurys In One Month | Zer... - 0 views

  • Shortly after the PBoC’s move to devalue the yuan, we noted with some alarm that it looked as though China may have drawn down its reserves by more than $100 billion in the space of just two weeks. That, we went on the point out, would represent a stunning increase over the previous pace of the country’s reserve draw down, which we began documenting months ahead of the devaluation (see here, for instance). We went on to estimate, based on the projected size of the RMB carry trade unwind, how large the FX reserve liquidation might need to be to offset capital outflows and finally, late last week, we suggested that China’s official FX reserve data was set to become the new risk-on/off trigger for nervous, erratic markets. In short, the pace at which Beijing is burning through its USD assets in defense of the yuan has serious implications not only for investors’ collective perception of market stability, but for yields on core paper, for global liquidity, and for US monetary policy. 
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Is someone pinching pennies at Guantánamo prison? | Miami Herald - 0 views

  • Could the people at the Most Expensive Prison on Earth be pinching pennies?
  • Attorneys for the last 114 captives at the U.S. Navy base at Guantánamo Bay, Cuba, say they have been increasingly providing their clients with everything from T-shirts and socks and shoes to shampoo and vitamins to fill a long-term, unexplained need at the war on terror prison.Lawyers who have visited the prison as recently as this month say the captives’ U.S. military issue uniforms are faded, torn or tattered and their shoes have holes. In other instances, detainees tell their lawyers, personal hygiene supplies are cheap and simply don’t do the job. A case-in-point: When attorney Ramzi Kassem met detainee Shaker Aamer to share the news that the long-held Saudi prisoner was approved for transfer to Britain after Oct. 24, the captive was brought to their meeting in prison-issue canvas shoes held together by duct tape.
  • “Stuff’s just not getting replaced,” said attorney George Clarke who in late September spent about $300 on slip-on canvas shoes, plastic sandals, T-shirts and towels for his two detainee clients — both approved for repatriation, if the political situation improves in Yemen. “They say the stuff they get is crap. Or they’re not getting it.”Recently, he said, the detention center staff has been more accepting of contributions from the attorneys, suggesting prison commanders are confronted with a cash crunch or have realized they can pass along costs of basics to the private sector.
  • ...7 more annotations...
  • At the prison, a spokesman declined to say whether the raggedy clothing reflected a new policy or budget cutbacks but dismissed a question on whether there was a supply issue. Detainee provisions “have not changed,” Navy Capt. Christopher Scholl said tersely by email. The prison would not provide a list of what constitutes basic issue prisoner provisions these days. Nor would Scholl address a question about whether the quality of prison-issue items had degraded.
  • The International Committee of the Red Cross would not say whether delegates have raised the issue in confidential talks with the prison commander. The Miami Herald spoke, separately, with 12 attorneys who have met captives in recent months and describe detainees showing up at legal meetings looking disheveled and needing replacement footwear or clothes. The attorneys say the appearance is noteworthy because through the years all but mentally ill captives have tried to tidy up for their legal meetings.“They’re looking pretty threadbare,” attorney Cori Crider of the nonprofit Reprieve legal defense group said from the U.S. Navy base Tuesday after she bought shampoo and socks for one prisoner. “It’s an escalating complaint that people are being left in rags.”The lawyers quote their clients as saying some supplies have disappeared entirely at the prison, which boasts Muslim sensitivity and humane treatment. Some just aren’t replaced frequently enough, they claim.
  • Into this vacuum attorneys who represent the detainees at no charge have for about nine months routinely spent hundreds of dollars on each trip to buy their clients basic provisions at the base commissary, the Navy Exchange, or NEX.In March, Chicago attorney Patricia Bronte, a solo practitioner, spent $136.25 on shoes and Gold Toe socks for her two Yemeni clients. She left them with a prison lawyer, who got them to the clients after she left the base — something she knows because she got thank-you notes via the prison’s legal mail system.
  • “I have noticed that sometimes the client appears at the meetings with shoes that look pretty beaten up. So I went to the NEX and I bought shoes and socks.” Also $6.12 in toothbrushes and toothpaste, according to her commissary receipt.“Understand, I’m not complaining. I don’t mind buying my clients shoes to improve their conditions,” she said. “It’s the gall of this country. To detain these guys for little or no reason for 14 years and not provide them with shoes is offensive.”
  • Prison officials had already stopped spending taxpayers’ money on books, videos and electronic games for the detainee diversion program, according to media visits in the past year, leaving it to the Red Cross and lawyers to donate to the Detainee Library. Kassem, the attorney, said his clients quoted guards and other prison staff as blaming budget cuts at the prison where the Pentagon maintains a 2,000-plus staff for 114 captives and has spent more than $5 billion. “Sometimes it’s a problem of poor toiletries — soap that doesn’t lather, toothpaste that doesn’t froth, deodorant that doesn’t prevent body odor,” said Kassem, a professor at the City University of New York School of Law whose legal clinic represents five Guantánamo detainees. Captives he sees in the prison’s iconic orange prison uniform are wearing old, torn and much less orange jumpsuits, he said.The prisoners are perplexed, Kassem said. “They’ve heard how much it costs per prisoner. They wonder, where’s all the money?”“Somebody’s pinching pennies, it seems,” he said, describing the prison-issue footwear on Aamer, the next detainee to be released, as “Oliver Twist tattered” despite repeated pleas for a replacement pair.
  • Over at the secret prison for former long-held CIA captives, Camp 7, the detainees are taking vitamin D furnished by defense attorneys Cheryl Bormann and Air Force Capt. Michael Schwartz.Walid bin Attash spent years without exposure to sunlight in a so-called CIA black site before he got to Camp 7 in 2006. Now, he’s told his lawyers, his medical record shows a severe vitamin D deficiency. He asked his defense team for a halal version of the supplement, which the prison doesn’t provide. One attorney, who asked not to be identified, quoted a prison medical officer as telling detainees “there’s no money for that.”So bin Attash’s lawyers ordered kosher vitamin D — no forbidden products in those gel caps — and gave it to the military staff attorney assigned to Camp 7. The prison’s medical officer has apparently doled them out to other former CIA black site captives because bin Attash needs a resupply sooner than a one-a-day distribution would require, Bormann said.“We’ve been having to purchase vitamin D for our client,” said Bormann, a criminal defense attorney with death-penalty experience. “It’s crazy.” At a civilian prison, she said, the lawyers wouldn’t have to buy and furnish it. They’d go to a federal or state judge, who would order the prison to provide it.
  • Lists of purchases provided by more than a dozen attorneys include toothbrushes, toothpaste, bar soap, shampoo, deodorant, slip-on sandals that double as slippers, white socks, white T-shirts, towels, no-lace sneakers, canvas slip-on shoes, pillows, books, individual DVD players, video games and audio tapes. Those reached the clients after a guard inspection — as did tahini, ginger, allspice, mint oil, mint tea, ginger tea, Nesquik, olive oil, ground cloves, henna and almonds, around Ramadan. Lawyers also said they have submitted other items that were rejected — notably black socks, hairbrushes, combs and aftershave (probably for its taboo alcohol content).
Paul Merrell

Activists send the Senate 6 million faxes to oppose cyber bill - CBS News - 0 views

  • Activists worried about online privacy are sending Congress a message with some old-school technology: They're sending faxes -- more than 6.2 million, they claim -- to express opposition to the Cybersecurity Information Sharing Act (CISA).Why faxes? "Congress is stuck in 1984 and doesn't understand modern technology," according to the campaign Fax Big Brother. The week-long campaign was organized by the nonpartisan Electronic Frontier Foundation, the group Access and Fight for the Future, the activist group behind the major Internet protests that helped derail a pair of anti-piracy bills in 2012. It also has the backing of a dozen groups like the ACLU, the American Library Association, National Association of Criminal Defense Lawyers and others.
  • CISA aims to facilitate information sharing regarding cyberthreats between the government and the private sector. The bill gained more attention following the massive hack in which the records of nearly 22 million people were stolen from government computers."The ability to easily and quickly share cyber attack information, along with ways to counter attacks, is a key method to stop them from happening in the first place," Sen. Dianne Feinstein, D-California, who helped introduce CISA, said in a statement after the hack. Senate leadership had planned to vote on CISA this week before leaving for its August recess. However, the bill may be sidelined for the time being as the Republican-led Senate puts precedent on a legislative effort to defund Planned Parenthood.Even as the bill was put on the backburner, the grassroots campaign to stop it gained steam. Fight for the Future started sending faxes to all 100 Senate offices on Monday, but the campaign really took off after it garnered attention on the website Reddit and on social media. The faxed messages are generated by Internet users who visit faxbigbrother.com or stopcyberspying.com -- or who simply send a message via Twitter with the hashtag #faxbigbrother. To send all those faxes, Fight for the Future set up a dedicated server and a dozen phone lines and modems they say are capable of sending tens of thousands of faxes a day.
  • Fight for the Future told CBS News that it has so many faxes queued up at this point, that it may take months for Senate offices to receive them all, though the group is working on scaling up its capability to send them faster. They're also limited by the speed at which Senate offices can receive them.
  •  
    From an Fight For the Future mailing: "Here's the deal: yesterday the Senate delayed its expected vote on CISA, the Cybersecurity Information Sharing Act that would let companies share your private information--like emails and medical records--with the government. "The delay is good news; but it's a delay, not a victory. "We just bought some precious extra time to fight CISA, but we need to use it to go big like we did with SOPA or this bill will still pass. Even if we stop it in September, they'll try again after that. "The truth is that right now, things are looking pretty grim. Democrats and Republicans have been holding closed-door meetings to work out a deal to pass CISA quickly when they return from recess. "Right before the expected Senate vote on CISA, the Obama Administration endorsed the bill, which means if Congress passes it, the White House will definitely sign it.  "We've stalled and delayed CISA and bills like it nearly half a dozen times, but this month could be our last chance to stop it for good." See also http://tumblr.fightforthefuture.org/post/125953876003/senate-fails-to-advance-cisa-before-recess-amid (;) http://www.cbsnews.com/news/activists-send-the-senate-6-million-faxes-to-oppose-cyber-bill/ (;) http://www.npr.org/2015/08/04/429386027/privacy-advocates-to-senate-cyber-security-bill (.)
Joseph Skues

Being sick in France ; French social security ; retirement in France - 0 views

  • the system is very efficient : the administrative cost of the health system is around 4,5% (for US private insurance companies : 10 to 13%) and 1,2% for the retirement system (vs. around 10% for most pension funds). The health system reimburses very quickly (after four days).
  • 22 Euros
  • "three best symbols of the French nation" are the flag, the health and the Marseillaise
  • ...20 more annotations...
  • each regional organization (Caisse) is managed by a board composed 50/50 of representatives of labor unions on one side, employers associations on the other side, with the State playing the role of a referee
  • it is not accurate to call it a "socialized
  • when a family is expecting a child, it gets approximately 2,000 Euros in three installments (the first two of them corresponding to a mandatory medical visit, the third to the birth) ; then the family receives a monthly allowance till the child is 20 (for two children or more, around 100 Euros/month/child) ;
  • minimal pension (in the range of 750 Euros/month) to any person who has worked 40 years
  • For the French, it is just unthinkable that, if you lose your job, you also lose your health plan
  • This is a typical example of what the French call their "social model" and one of the few where, in my opinion, the USA could learn something from the French experience. Read my opinion about it "Socialized medicine : give me a break".
  • all companies, whatever their size, must provide their staff with an annual visit to a doctor ; in big companies it is a in-house doctor, in small companies an external doctor who comes for the annual controls
  • (otherwise, you'll be reimbursed a little less)
  • SOS Medecin tel. 01 47 07 77 77 : very reasonably priced (around 70 Euros) and efficient, a doctor in your house in less than an hour
  • Basic tips for tourists you can see any doctor (they also make house calls for a small supplement) for a cost of around 22 Euros ($ 30) but you will not be reimbursed by Social Security if you are not part of the French Social Security system you can be treated by any French hospital in case of emergency (they will talk about money AFTER treating you...) you can buy certain drugs over the counter in a pharmacy but a lot of them require a doctor's prescription ; don't be surprised if you do not find US drug brand names, you are in another country ! If your French isn't good, there are two hospitals with English-speaking staff : the American Hospital, 63 blvd Victor Hugo 92202 Neuilly, Tel. 33-(0)1 46 41 25 25 ; Email : patient@ahp-paris.com the British Hospital, 3 rue Barbès 92300 Levallois Tel. 33-(0)1 46 39 22 22 Public or private ? For a serious case, it is often wiser to go to a public hospital, especially a CHU (Centre Hospitalo-Universitaire). In case of a (real) emergency call SAMU (this is a day and night emergency service tel. 15) or les pompiers (fire-brigade) who provide 24 hour-emergency service (tel. 18). Useful numbers for emergencies (other than 15) :
  • The World Health Organization (WHO) has ranked the health system of its 191 member countries and France tops the list for providing the best overall health care (UK ranks 18 and USA ranks 37) (source : International Herald Tribune June 21,2000).
  • Health coverage by Social Security ("Sécurité Sociale") is mandatory and paid both by the employee (1/4) and the employer (3/4).
  • In the USA the Emergency staff is a driver whose job is to take you as fast as possible to the hospital, whatever your condition, in a fast ambulance. In France, the SAMU team includes a MD whose job is to do as much as he can before taking you to the hospital in a more heavily-equipped ambulance. Both ways have their pros and cons, but dont be horrified if you see an ambulance NOT moving....
  • DID YOU KNOW THAT....? In France, the maternity leave is 16 weeks minimum (of course paid 100% of the salary!), plus one month minimum if the baby is breast-fed ; "paternity" leave is two weeks ; new mothers spend 3 to 6 days in the hospital.
  • To related pages : a column of the Health system (#2), an American article on the French health system (#3), etc....
  • French doctors are not very different from American doctors, except they make much less money (three or four times?) and are probably much more accessible, less protected by a dragon-secretary.
  • All expenses are paid by the company and of course the employee does not pay a cent. The 20-minute visit includes whatever check-up seems appropriate (heart, eyes, stress, depression...). The doctor cannot prescribe medecine but can prescribe a visit to the doctor is something new that is wrong or needs a more thorough check is detected.
  • You have to pay ONE Euro more (not reimbursable) for every visit to the doctor
  • The system is threefold : Health, Family and Retirement, each of them has different structures and financing ; each of them is financially autonomous (no taxpayer's money -
  • The system is threefold : Health, Family and Retirement, each of them has different structures and financing ; each of them is financially autonomous ( no taxpayer's money
Gary Edwards

911: Lloyds of London Insurance brokers have sued Citigroup-AMEC et al. in respect of t... - 1 views

  • We allege the Citigroup-AMEC partners sabotaged the diesel generators to feed fires lit by arsonists on the 11th, 12th or 13th floors of WTC7 where the Securities & Exchange Commission lost between 3,000 to 4,000 files. The SEC files contained evidence of insider trading by Citigroup-AMEC investment bank partners in the shares of initial public offerings during the high-tech boom. The House Financial Services Committee was seeking information about the treatment Citigroup's Salmon Smith Barney investing banking division may have given WorldCom executives. Salomon had offices in 7 World Trade Center and Citigroup says back-up tapes of corporate emails from September 1998 through December 2000 were stored at the building and destroyed in 9/11. Citigroup subsequently paid $2.65 billion to the settlement class which purchased WorldCom securities during the period from April 1999 through June 2002. www.thestreet.com/markets...36925.html www.citigroup.com/citigro...40510a.htm
  • At 5:20 p.m. on 9/11, 7 World Trade Center collapsed in its own footprint at a speed slightly slower than free fall under gravity in a manner consistent with a controlled demolition. Molten steel and partially evaporated steel members were found in the debris pile of WTC #1, 2 and 7. The thermal signature of 32 hot spots, 5 days and 10 days after the collapse, is consistent with all the buildings being rigged for demolition with an incendiary such as thermite.
  • We allege that the Citigroup-AMEC partnership now conspired to remove and destroy evidence of arson before filing bogus property insurance claims in an arrangement with Larry Silverstein and Silverstein Properties, including a claim for a double payment for the destruction of the Twin Towers. "Griffin quotes court documents to the effect that Silverstein had only $14 million invested in the insurance deal for the Twin Towers (compared to 50 times as much by his [off-book] lenders) through limited liability investment vehicles."
  •  
    Incredible.  In 2006 Lloyd's of London sued a group comprised of Citigroup, AMEC and GMAC for a "concealed demolition" conspiracy resulting in insurance fraud.  This is complicated, but the key assertion is that World Trade Center building #1, #2, and #7 were rigged for demolition prior to the 9/11/01 attack.  The claim also alleges the involvement of Larry Silverstein, who had purchased these buildings a few months prior to the 9/11 attack, and made the subsequent and fraudulent insurance claim. Based on the Lloyd's of London report: "9/11 - A Citigroup-AMEC insurance fraud on Lloyd's of London?" .. by David Hawkins, Foundation Scholar, Cambridge University, Founder of the Citizen's Association of Forensic Economists at Hawks' CAFE .
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
Paul Merrell

Six months of revelations on NSA - The Washington Post - 0 views

  • The National Security Agency has been forced to respond to unprecedented disclosures about its surveillance programs. Those programs have been assailed as a violation of privacy rights by critics and defended as critical to U.S. national security by intelligence officials. Explore the revelations and the fallout.
  •  
    The Washington Post releases a timeline of NSA disclosures in the last six months, in order of publication, with links to the newspaper's coverage.
Paul Merrell

NSA Spying Inspires ProtonMail 'End-to-End' Encrypted Email Service | NDTV Gadgets - 0 views

  • ne new email service promising "end-to-end" encryption launched on Friday, and others are being developed while major services such as Google Gmail and Yahoo Mail have stepped up security measures.A major catalyst for email encryption were revelations about widespread online surveillance in documents leaked by Edward Snowden, the former National Security Agency contractor."A lot of people were upset with those revelations, and that coalesced into this effort," said Jason Stockman, a co-developer of ProtonMail, a new encrypted email service which launched Friday with collaboration of scientists from Harvard, the Massachusetts Institute of Technology and the European research lab CERN.Stockman said ProtonMail aims to be as user-friendly as the major commercial services, but with extra security, and with its servers located in Switzerland to make it more difficult for US law enforcement to access.
  • "Our vision is to make encryption and privacy mainstream by making it easy to use," Stockman told AFP. "There's no installation. Everything happens behind the scenes automatically."Even though email encryption using special codes or keys, a system known as PGP, has been around for two decades, "it was so complicated," and did not gain widespread adoption, Stockman said.After testing over the past few months, ProtonMail went public Friday using a "freemium" model a basic account will be free with some added features for a paid account.
  • By locating in Switzerland, ProtonMail hopes to avoid the legal woes of services like Lavabit widely believed to be used by Snowden which shut down rather than hand over data to the US government, and which now faces a contempt of court order.Even if a Swiss court ordered data to be turned over, Stockman said, "we would hand over piles of encrypted data. We don't have a key. We never see the password."
  • ...3 more annotations...
  • As our users from China, Iran, Russia, and other countries around the world have shown us in the past months, ProtonMail is an important tool for freedom of speech and we are happy to finally be able to provide this to the whole world," the company said in a blog post.Google and Yahoo recently announced efforts to encrypt their email communications, but some specialists say the effort falls short."These big companies don't want to encrypt your stuff because they spy on you, too," said Bruce Schneier, a well-known cryptographer and author who is chief technology officer for CO3 Systems."Hopefully, the NSA debate is creating incentives for people to build more encryption."Stockman said that with services like Gmail, even if data is encrypted, "they have the key right next to it if you have the key and lock next to each other, so it's pretty much useless."
  • Lavabit founder Ladar Levison meanwhile hopes to launch a new service with other developers in a coalition known as the "Dark Mail Alliance."Levison told AFP he hopes to have a new encrypted email system in testing within a few months and widely available later this year."The goal is to make it ubiquitous, so people don't have to turn it on," he said.But he added that the technical hurdles are formidable, because the more user-friendly the system becomes, "the more susceptible it is to a sophisticated attacker with fake or spoofed key information."Levison said he hopes Dark Mail will become a new open standard that can be adopted by other email services.
  • on Callas, a cryptographer who developed the PGP standard and later co-founded the secure communications firm Silent Circle, cited challenges in making a system that is both secure and ubiquitous."If you are a bank you have to have an email system that complies with banking regulations," Callas told AFP, which could allow, for example, certain emails to be subject to regulatory or court review."Many of the services on the Internet started with zero security. We want to start with a system that is totally secure and let people dial it down."The new email system would complement Silent Circle's existing secure messaging system and encrypted mobile phone, which was launched earlier this year."If we start competing for customers on the basis of maximum privacy, that's good for everybody," Callas said.
  •  
    They're already so swamped that you have to reserve your user name and wait for an invite. They say they have to add servers. Web site is at https://protonmail.ch/ "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones. It's as simple as visiting our site and logging in. There are no plugins or apps to install - simply use your favorite web browser." "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones.
Paul Merrell

NSA contracted French cyber-firm for hacking help - RT USA - 0 views

  • The latest revelation regarding the National Security Agency doesn't come courtesy of Edward Snowden. A Freedom of Information Act request has confirmed the NSA contracted a French company that makes its money by hacking into computers. It's no secret that the United States government relies on an arsenal of tactics to gather intelligence and wage operations against its adversaries, but a FOIA request filed by Muckrock's Heather Akers-Healy has confirmed that the list of Uncle Sam's business partners include Vupen, a French-based security company that specializes in selling secret codes used to crack into computers. Documents responsive to my request to #NSA for contracts with VUPEN, include 12/month exploit subscription https://t.co/x3qJbqSUpa — Heather Akers-Healy (@abbynormative) September 16, 2013 Muckrock published on Monday a copy of a contract between the NSA and Vupen in which the US government is shown to have ordered a one-year subscription to the firm's “binary analysis and exploits service” last September.
  • That service, according to the Vupen website, is sold only to government entities, law enforcement agencies and computer response teams in select countries, and provides clients with access to so-called zero-day exploits: newly-discovered security vulnerabilities that the products' manufacturers have yet to discover and, therefore, have had zero days to patch-up. “Major software vendors such as Microsoft and Adobe usually take 6 to 9 months to release a security patch for a critical vulnerability affecting their products, and this long delay between the discovery of a vulnerability and the release of a patch creates a window of exposure during which criminals can rediscover a previously reported but unpatched vulnerability, and target any organization running the vulnerable software,” Vupen says elsewhere on their website. Last year, Vupen researchers successfully cracked Google's Chrome browser, but declined to show developers how they did so — even for an impressive cash bounty. “We wouldn’t share this with Google for even $1 million,” Vupen CEO Chaouki Bekrar told Forbes' Andy Greenberg of the Chrome hack in 2012. “We don’t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.”
  • And why the NSA and other clients may benefit from being privy to these vulnerabilities, knowing how to exploit security holes in adversarial systems is a crucial component to any government's offensive cyber-operations. Last month, the Washington Post published excerpts from the previously secretive “black budget,” a closely guarded ledger listing the funding requests made by America's intelligence community provided by NSA leaker Edward Snowden. According to that document, a substantial goal of the US in fiscal year 2013 was to use a portion of $52.6 billion in secretive funding towards improving offensive cyber-operations.
  • ...1 more annotation...
  • The portion of the contract obtained by Muckrock where the cost of the subscription is listed has been redacted, but a Vupen hacker who spoke to Greenberg last year said deals in the five-figures wasn't uncommon. "People seem surprised to discover that major government agencies are acquiring Vupen's vulnerability intelligence," Bekrar wrote in an email to Information Week's Matthew Schwartz after the NSA contract with his signature was published. "There is no news here, governments need to leverage the most detailed and advanced vulnerability research to protect their infrastructures and citizens against adversaries." Critics of Vupen and its competitors see government-waged cyber-operations in a different light, however. Christopher Soghoian of the American Civil Liberties Union's Speech, Privacy and Technology Project has spoken outright against companies that sell exploits and have equated the computer codes being sold for big money as a new sort of underground arms trade fueling an international, online battle. To Greenberg last year, Soghoian described Vupen as  a “modern-day merchant of death” selling “the bullets for cyberwar," and upon publishing of the NSA contract called the company a “cyber weapon merchant.” The NSA is a customer of French 0-day cyber weapon merchant VUPEN, FOIA docs reveal: (via @ramdac & @MuckRockNews) https://t.co/OPJ82miK3c — Christopher Soghoian (@csoghoian) September 16, 2013
Paul Merrell

James Clapper Confirms VADM Mike Rogers Needlessly Obfuscated in Confirmation Hearing |... - 0 views

  • On Friday, James Clapper finally provided Ron Wyden an unclassified response to a question he posed on January 29, admitting that the NSA conducts back door searches. (via Charlie Savage) As reflected in the August 2013 Semiannual Assessment of Compliance with Procedures and Guidelines Issued Pursuant to Section 702, which we declassified and released on August 21, 2013, there have been queries, using U.S. person identifiers, of communications lawfully acquired to obtain foreign intelligence by targeting non U.S. persons reasonably believed to be located outside the U.S. pursuant to Section 702 of FISA. It has taken just 9 months for Clapper to admit that, contrary to months of denials, the NSA (and FBI, which he doesn’t confirm but which the Report makes clear, as well as the CIA) can get the content of Americans’ communications without a warrant. But Clapper’s admission that this fact was declassified in August should disqualify Vice Admiral Mike Rogers from confirmation as CyberComm head (I believe he started serving as DIRNSA head, which doesn’t require confirmation, yesterday). Because it means Rogers refused to answer a question the response to which was already declassified.
  • Udall: If I might, in looking ahead, I want to turn to the 702 program and ask a policy question about the authorities under Section 702 that’s written into the FISA Amendments Act. The Committee asked your understanding of the legal rationale for NASA [sic] to search through data acquired under Section 702 using US person identifiers without probable cause. You replied the NASA–the NSA’s court approved procedures only permit searches of this lawfully acquired data using US person identifiers for valid foreign intelligence purposes and under the oversight of the Justice Department and the DNI. The statute’s written to anticipate the incidental collection of Americans’ communications in the course of collecting the communications of foreigners reasonably believed to be located overseas. But the focus of that collection is clearly intended to be foreigners’ communications, not Americans. But declassified court documents show that in 2011 the NSA sought and obtained the authority to go through communications collected under Section 702 and conduct warrantless searches for the communications of specific Americans. Now, my question is simple. Have any of those searches been conducted?
  • Rogers: I apologize Sir, I’m not in a position to answer that as the nominee. Udall: You–yes. Rogers: But if you would like me to come back to you in the future if confirmed to be able to specifically address that question I will be glad to do so, Sir. Udall: Let me follow up on that. You may recall that Director Clapper was asked this question in a hearing earlier this year and he didn’t believe that an open forum was the appropriate setting in which to discuss these issues. The problem that I have, Senator Wyden’s had, and others is that we’ve tried in various ways to get an unclassified answer — simple answer, yes or no — to the question. We want to have an answer because it relates — the answer does — to Americans’ privacy. Can you commit to answering the question before the Committee votes on your nomination?
  • ...3 more annotations...
  • Rogers: Sir, I believe that one of my challenges as the Director, if confirmed, is how do we engage the American people — and by extension their representatives — in a dialogue in which they have a level of comfort as to what we are doing and why. That is no insignificant challenge for those of us with an intelligence background, to be honest. But I believe that one of the takeaways from the situation over the last few months has been as an intelligence professional, as a senior intelligence leader, I have to be capable of communicating in a way that we are doing and why to the greatest extent possible. That perhaps the compromise is, if it comes to the how we do things, and the specifics, those are perhaps best addressed in classified sessions, but that one of my challenges is I have to be able to speak in broad terms in a way that most people can understand. And I look forward to that challenge. Udall: I’m going to continue asking that question and I look forward to working with you to rebuild the confidence. [my emphasis]
  • I assume that now that Clapper has given him the okay to discuss unclassified topics with Congress, Rogers will now provide a forthright answer, all the while claiming he was ignorant about the answer at the time (fine! then make me DIRNSA because I know more about it!). But Rogers’ response went far beyond such an answer. He refused — not just in the hearing but even after it — to commit to answering a question with a completely unclassified answer. And as I pointed out in this post, his written answers were even more obfuscatory. I don’t get a vote. But I think this should disqualify him as a nominee.
  • Update: Here’s the exchange in Rogers’ questions for the record on back door searches. What is your understanding of the legal rationale for NSA to search through data acquired under section 702 using U.S. Persons identifiers without probable cause? Information acquired by NSA under Section 702 of FI SA must be handled in strict accordance with minimization procedures adopted by the Attorney General and approved by the Foreign Intelligence Surveillance Court. As required by the statute and certifications approving Section 702 acquisitions, such activities must be limite d to targeting non-U.S. persons reasonably believed to be located outside the United States . NSA’s Court-approved procedures only permit searches of this lawfully acquired data using U.S. person identifiers for valid foreign intelligence purposes and under the oversight of the Department of Justice and Office of Director of National Intelligence.
Paul Merrell

Abbas: Palestinians to seek further UN recognition | News , Middle East | THE DAILY STAR - 0 views

  • RAMALLAH, West Bank: In a surprise move that could jeopardize U.S. peace efforts, Palestinian President Mahmoud Abbas on Tuesday resumed a bid for further Palestinian recognition by the United Nations, despite a promise to suspend such efforts during nine months of negotiations with Israel. Abbas signed "State of Palestine" applications for 15 U.N. agencies in a hastily convened ceremony televised live from his West Bank headquarters.  Abbas said he was compelled to take action because Israel had failed to carry out a promised released of veteran Palestinian prisoners. "We will apply to 15 agencies and conventions immediately," Abbas said after leading members of his Fatah movement and the Palestine Liberation Organization supported the decision unanimously by a show of hands. Abbas insisted that he is still interested in negotiating a deal with Israel on the terms of Palestinian statehood, saying he and his aides "will continue our efforts to reach a peaceful solution through negotiations."
  • Such talks resumed in late July, after a push by U.S. Secretary of State John Kerry, and were to last for nine months, until the end of April.  During this period, Abbas promised to suspend his U.N. bid, while Israel was to release 104 veteran Palestinian prisoners in four stages. The Palestinians say the fourth group of prisoners was due to be released by the end of March, and that Israel failed to live up to its promise. There was no immediate reaction from Israel and from Kerry, who has been mediating between Abbas and Israeli Prime Minister Benjamin Netanyahu for the past year. It was not immediately clear if Abbas' decision was a negotiating tactic or signaled a fundamental shift in strategy. In his brief comments Tuesday, the Palestinian leader said he is "not seeking a conflict with anyone, particularly the U.S."
  • It was also uncertain if a meeting between Abbas and Kerry, tentatively arranged for Wednesday, would still take place. Abbas' decision, meanwhile, also threw into doubt claims that a deal was emerging that would have extended Israel-Palestinian talks beyond an April 29 deadline and included the release of imprisoned American Jewish spy Jonathan Pollard.
  • ...1 more annotation...
  • In a surprise move that could jeopardize U.S. peace efforts, Palestinian President Mahmoud Abbas on Tuesday resumed a bid for further Palestinian recognition by the United Nations, despite a promise to suspend such efforts during nine months of negotiations with Israel. Abbas signed "State of Palestine" applications for 15 U.N. agencies in a hastily convened ceremony televised live from his West Bank headquarters.  Abbas said he was compelled to take action because Israel had failed to carry out a promised released of veteran Palestinian prisoners. "We will apply to 15 agencies and conventions immediately," Abbas said after leading members of his Fatah movement and the Palestine Liberation Organization supported the decision unanimously by a show of hands.
Paul Merrell

Months of Bombing Makes Small Impact on ISIS' Military Capabilities - NBC News.com - 0 views

  • fter more than three months of air attacks against ISIS forces in Iraq and Syria, U.S. intelligence and defense officials say minimal progress has been made toward President Barack Obama’s stated goal to “degrade and destroy” the Islamic terror group.
  •  
    Ye gads. As thiough the U.S. military should actually target its own mercenary "boots on the ground." 
Paul Merrell

The Woman at the Center of the C.I.A.'s Torture Report - 0 views

  • or the past eight months, there has been a furious battle raging behind closed doors at the White House, the C.I.A., and in Congress. The question has been whether the Senate Select Committee on Intelligence would be allowed to use pseudonyms as a means of identifying characters in the devastating report it released last week on the C.I.A.’s abusive interrogation and detention program. Ultimately, the committee was not allowed to, and now we know one reason why. The NBC News investigative reporter Matthew Cole has pieced together a remarkable story revealing that a single senior officer, who is still in a position of high authority over counterterrorism at the C.I.A.—a woman who he does not name—appears to have been a source of years’ worth of terrible judgment, with tragic consequences for the United States. Her story runs through the entire report. She dropped the ball when the C.I.A. was given information that might very well have prevented the 9/11 attacks; she gleefully participated in torture sessions afterward; she misinterpreted intelligence in such a way that it sent the C.I.A. on an absurd chase for Al Qaeda sleeper cells in Montana. And then she falsely told congressional overseers that the torture worked.
  • Had the Senate Intelligence Committee been permitted to use pseudonyms for the central characters in its report, as all previous congressional studies of intelligence failures, including the widely heralded Church Committee report in 1975, have done, it might not have taken a painstaking, and still somewhat cryptic, investigation after the fact in order for the American public to hold this senior official accountable. Many people who have worked with her over the years expressed shock to NBC that she has been entrusted with so much power. A former intelligence officer who worked directly with her is quoted by NBC, on background, as saying that she bears so much responsibility for so many intelligence failures that “she should be put on trial and put in jail for what she has done.” Instead, however, she has been promoted to the rank of a general in the military, most recently working as the head of the C.I.A.’s global-jihad unit. In that perch, she oversees the targeting of terror suspects around the world. (She was also, in part, the model for the lead character in “Zero Dark Thirty.”)
  • Amazingly, perhaps, more than thirteen years after the 9/11 attacks, no one at the C.I.A. has ever been publicly held responsible for this failure. Evidently, the C.I.A. was adamant in its negotiations with the White House and the Senate Intelligence Committee that the American public never learn the names of anyone directly involved in this failure.
  • ...3 more annotations...
  • According to sources in the law-enforcement community who I have interviewed over the years, and who I spoke to again this week, this woman—whose name the C.I.A. has asked the news media to withhold—had supervision over an underling at the agency who failed to share with the F.B.I. the news that two of the future 9/11 hijackers had entered the United States prior to the terrorist attacks.
  • As NBC recounts, this egregious chapter was apparently only the first in a long tale, in which the same C.I.A. official became a driving force in the use of waterboarding and other sadistic interrogation techniques that were later described by President Obama as “torture.” She personally partook in the waterboarding of Khalid Sheikh Mohammed, the architect of the 9/11 attacks, at a black site in Poland. According to the Senate report, she sent a bubbly cable back to C.I.A. headquarters in 2003, anticipating the pain they planned to inflict on K.S.M. in an attempt to get him to confirm a report from another detainee, about a plot to use African-American Muslims training in Afghanistan for future terrorist attacks. “i love the Black American Muslim at AQ camps in Afghanuistan (sic). … Mukie (K.S.M.) is going to be hatin’ life on this one,” she wrote, according to the report. But, as NBC notes, she misconstrued the intelligence gathered from the other detainee. Somehow, the C.I.A. mistakenly believed that African-American Muslim terrorists were already in the United States. The intelligence officials evidently pressed K.S.M. so hard to confirm this, under such physical duress, that he eventually did, even though it was false—leading U.S. officials on a wild-goose chase for black Muslim Al Qaeda operatives in Montana. According to the report, the same woman oversaw the extraction of this false lead, as well as the months-long rendition and gruesome interrogation of another detainee whose detention was a case of mistaken identity. Later, in 2007, she accompanied then C.I.A. director Michael Hayden to brief Congress, where she insisted forcefully that the torture program had been a tremendous and indispensable success.
  • Readers can speculate on how the pieces fit together, and who the personalities behind this program are. But without even pseudonyms, it is exceedingly hard to connect the dots. It seems entirely possible—though, again, one can only speculate—that the C.I.A. overcompensated for its pre-9/11 intelligence failures by employing overly harsh measures later. Once they’d made a choice that America had never officially made before—of sanctioning torture—it seems possible that they felt they had to defend its efficacy, despite mounting evidence to the contrary. If so, this would be worth learning. But without names, or even pseudonyms, it is almost impossible to piece together the puzzle, or hold anyone in the American government accountable. Evidently, that is exactly what the C.I.A. was fighting for during its eight-month-long redaction process, behind all those closed doors.
Paul Merrell

1,000 soldiers from the 82nd Airborne headed to Iraq - U.S. - Stripes - 0 views

  • Approximately 1,000 paratroopers from the Army’s famed 82nd Airborne Division will deploy to Iraq early next year to help the Iraqi security forces take on the Islamic State, the Pentagon announced Friday. The soldiers from the 82nd’s 3rd Brigade Combat Team, based at Fort Bragg, N.C., will begin to deploy in late January to train, advise and assist the ISF, Pentagon press secretary Rear Adm. John Kirby told reporters. Their mission is part of the coalition effort to build up the Iraqi army and Kurdish peshmerga so that they can recapture territory from Islamic State militants.
  • The paratroopers are preparing for a nine-month deployment, according to a spokeswoman for the 82nd Airborne. Approximately 300 troops from other Army, Air Force and Marine Corps units will also deploy to provide “enabler” support in areas such as counterintelligence, logistics, and signals, Kirby said. Last month, President Barack Obama authorized an additional 1,500 troops to deploy to Iraq to participate in the train, advise and assist mission. The deployment of elements of the 82nd Airborne is part of that initiative. On Thursday, Lt. Gen. James Terry, the commander of Combined Joint Task Force-Operation Inherent Resolve, told reporters that other countries in the coalition are expected to contribute to another 1,500-strong force for the capacity-building effort.
  • Terry said the training effort “takes some patience,” and it will take “a minimum of three years” to fully build the capabilities of Iraqi forces. U.S. troops already in Iraq are laying the groundwork for the training program. But on Tuesday, Kirby said it will be “several months” before the formal training effort gets under way. The plan is to train nine Iraqi army brigades and three peshmerga brigades at four training sites throughout Iraq. On Friday, Kirby declined to identify the location of the sites, saying that force protection measures are still being put in place. The additional advisers will be in Anbar province and areas north of Baghdad, according to Kirby. He said the training and advising will take place at bases and higher headquarters, not near the front lines of the fighting.
Paul Merrell

Fallout from Obama's Russia Strategy Is Spreading through Europe - Yahoo Finance - 0 views

  • The Obama administration’s sanctions against Russia, reluctantly supported by the Europeans, bite more deeply every day. But it is also clearer with each daily news report that Russians are not going to suffer alone.
  • The Obama administration’s sanctions against Russia, reluctantly supported by the Europeans, bite more deeply every day. But it is also clearer with each daily news report that Russians are not going to suffer alone.
  • Russia’s immediate neighbors and the Europeans will, too. And—not to be missed—so will the trans-Atlantic alliance that has served as the backbone of Western policy since the postwar order was established 70 years ago next spring.This president is intent on making history. But does he distinguish between good history and the other kind?
  • ...5 more annotations...
  • It’ll be the other kind if the European Union swoons into another recession as a consequence of America’s geopolitical ambitions to Europe’s east. Emphatically it’ll be the other kind if Obama hastens a drift in Washington’s ties to the European capitals that have been faintly discernible, if papered over, for decades.     Let’s look at this from all angles.
  • On Friday the Polish zloty hit a 15-month low against the euro—straight-ahead fallout from Russia’s crisis. Among the CIS nations, Belarus just doubled interest rates, to 50 percent, and imposed a 30 percent tax on forex transactions.Kyrgyzstan is closing private currency exchanges, and Armenia is letting the dram, its currency, collapse—17 percent in the past month—in a policy it calls “hyper-devaluation.” Further afield, the Indian rupee, the South African rand, and the Turkish lira are among the emerging-market currencies taking hits from the ruble crisis.Flipping these eggs over, Switzerland just imposed negative interest rates to discourage a stampede of weak-currency holders from piling into the franc in search of a safe haven.
  • What happened as E.U. ministers and heads of state convened in Brussels last week can come as no surprise.On one hand, German Chancellor Angela Merkel and British Prime Minister David Cameron insisted that Europeans must “stay the course” on Russia. Just before the Brussels summit, the E.U. barred investments in Crimea—a gesture more than anything else, but one with clear intent. On the other hand, deep divisions are now on the surface. Italian Prime Minister Matteo Renzi declared “absolutely no” to more sanctions, and François Hollande seemed to say no to the sanctions already in place. Noting signs of progress on Ukraine, the French president said, “If gestures are sent by Russia, as we expect, there would be no reason to impose new sanctions, but on the contrary to look at how we could bring about a de-escalation from our side.”Danish Foreign Minister Martin Lidegaard asserted that the sanctions already in place may be hitting too hard. We want to modulate Russia’s behavior, he said in an especially astute distinction, not destroy Russia’s economy.
  • In short, two serious fissures are emerging as the hard line against Russia advances. One, the E.U. is plainly getting fractious. Reflecting the rainbow of political tendencies among their leaders, Europeans may have reached their limit in acquiescing in the Obama administration’s tough-and-getting-tougher policies. Note, in this context: Europe has nothing like the fiscal and monetary wherewithal it had six years ago to withstand another bout of financial and economic contagion. Two, Obama appears ever closer to overplaying America’s hand with the Europeans. Tensions between Washington and Europe have simmered just out of sight since the Cold War decades. There are significant signs now that Obama has let the Ukraine crisis worsen them to the point the tenor of trans-Atlantic ties is permanently modulated. If this goes any further it will be very big indeed. 
  • Question: Do President Obama’s big-think people at State and the Treasury know the magnitude of the game they’re playing? This is the issue the economic fallout of sanctions and the new shifts in Europe raise. Follow-on query, not pleasant to ask but it must be put: Does Obama have any big thinkers in either department? As the consequences of this administration’s Russia policy unfurl, they appear to travel on a wing and a prayer—“making it up as they go along,” as a friend and Foreign Service refugee said over lunch the other day.
Paul Merrell

Breakthrough hopes dented as Ukraine accuses Russia of new incursion | Reuters - 0 views

  • Late-night talks in the Belarussian capital Minsk had appeared to yield some progress towards ending a war in which more than 2,200 people have been killed, according to the U.N. -- a toll that excludes the 298 who died when a Malaysian airliner was shot down over rebel-held territory in July.Ukrainian President Petro Poroshenko said he would work on an urgent 'road map' towards a ceasefire with the rebels. Russia's Vladimir Putin said it would be for Ukrainians to work out ceasefire terms, but Moscow would "contribute to create a situation of trust".
  • The next step would be for a 'Contact Group', comprising representatives of Russia, Ukraine, the rebels and the Organisation for Security and Cooperation in Europe, to meet in Minsk, he said without giving a time frame.But Ukrainian foreign policy adviser Valery Chaly told reporters in Kiev that Poroshenko's declaration on a ceasefire road map did not mean an immediate end to the government’s military offensive against the rebels."If there are attacks from the terrorists and mercenaries, then our army has the duty to defend the people," he said.A crowd of several hundred gathered outside the presidential administration building in Kiev to demand reinforcement for Ukrainian forces in Ilovaysk, a town in Donetsk region, where government troops have been encircled by rebel units.
  • A rebel leader, Oleg Tsaryov, wrote on Facebook that he welcomed the outcome of the Minsk talks, but the separatists would not stop short of full independence for the regions of eastern Ukraine they call Novorossiya (New Russia).He said he saw "a real breakthrough" in Putin's offer to contribute to the peace process.But he added: "It must be understood that a genuine settlement of the situation is only possible with the participation of representatives of Novorossiya. We will not allow our fate to be decided behind our back..."Now we are demanding independence. We don't trust the Ukrainian leadership and don't consider ourselves part of Ukraine. The guarantee of our security is our own armed forces. We will decide our own fate."Further underlining Kiev's distrust of Moscow, Ukrainian Prime Minister Arseny Yatseniuk said his country needed "practical help" and "momentous decisions" from NATO at an alliance summit next month.
  •  
    Highlighted statements are scattered and buried deep in an article mostly about new accusations against Russia. Coup government President Poroshenko's statement that he is working toward a peace roadmap represents an abrupt departure from that government's stance since it began its invasion of separatist-held territory in eastern Ukraine, that only the unconditional surrender of the separatists could halt the coup government's attack. Lying behind that statement (from other reports) is the fact that the tide of battle has turned sharply; the coup government's mostly-conscript army forces are variously surrounded or retreating as the separatists gain the upper hand. Moreover, nearly all of the coup government attack airplanes and helicopters have been destroyed by separatist MANPAD shoulder-fired ground-to-air missiles.  On coup government Prime Minister Yatseniuk's expressed need for "'practical help' and 'momentous decisions' from NATO at an alliance summit next month," I'd love to be a fly on wall during that meeting if the coup government's military situation continues to deteriorate. The U.S. is the only NATO member that wants further confrontation in Ukraine. Notwithstanding U.S. rhetoric threatening military action against Russia, it's doubtful that any military officers holding the rank needed to attend that NATO meeting would support NATO action against Russia so close to its own backyard. Russia has nukes aplenty, so it comes down to the ability to win a conventional war against Russia in Russia and the Ukraine. Far easier said than done, as both Napoleon Bonaparte and Adolph Hitler learned the hard way. Russia remains the nation with the second post powerful military in the world and would be playing on the home court with the ferocity of the Russian Bear. The U.S. would bring the most powerful force, both augmented and semi-crippled by taking the lead among reluctant NATO nation military forces. All to protect the U.S. dollar's dwindling purchasing powe
Paul Merrell

John McCain, Conductor of the "Arab Spring" and the Caliph , by Thierry Meyssan - 0 views

  • Everyone has noticed the contradiction of those who recently characterized the Islamic Emirate as "freedom fighters" in Syria and who are indignant today faced with its abuses in Iraq. But if that speech is incoherent in itself, it makes perfect sense in the strategic plan: the same individuals were to be presented as allies yesterday and must be as enemies today, even if they are still on orders from Washington. Thierry Meyssan reveals below US policy through the particular case of Senator John McCain, conductor of the "Arab Spring" and longtime partner of Caliph Ibrahim.
  • ohn McCain is known as the leader of the Republicans and unhappy 2008 US presidential candidate. This is, we will see, only the real part of his biography, which serves as a cover to conduct covert actions on behalf of his government. When I was in Libya during the "Western"attack, I was able to view a report of the foreign intelligence services. It stated that, on February 4, 2011 in Cairo, NATO organized a meeting to launch the "Arab Spring" in Libya and Syria. According to this document, the meeting was chaired by John McCain. The report detailed the list of Libyan participants, whose delegation was led by the No. 2 man of the government of the day, Mahmoud Jibril, who abruptly switched sides at the entrance of the meeting to become the opposition leader in exile. I remember that, among the French delegates present, the report quoted Bernard-Henry Lévy, although officially he had never exercised functions within the French government. Many other personalities attended the symposium, including a large delegation of Syrians living abroad.
  • Emerging from the meeting, the mysterious Syrian Revolution 2011 Facebook account called for demonstrations outside the People’s Council (National Assembly) in Damascus on February 11. Although this Facebook account at the time claimed to have more than 40,000 followers, only a dozen people responded to its call before the flashes of photographers and hundreds of police. The demonstration dispersed peacefully and clashes only began more than a month later in Deraa. [1] On February 16, 2011, a demonstration underway in Benghazi, in memory of members of the Islamic Fighting Group in Libya [2] massacred in 1996 in the Abu Selim prison, degenerated into shooting. The next day, a second event, this time in memory of those who died by attacking the Danish consulate during the Muhammad cartoons affair, also degenerated into shooting. At the same time, members of the Islamic Fighting Group in Libya ,coming from Egypt and coordinated by unidentified, hooded individuals, simultaneously attacked four military bases in four different cities. After three days of fighting and atrocities, the rebels launched the uprising of Cyrenaica against Tripolitania [3]; a terrorist attack that the western press falsely presented as a "democratic revolution" against "the regime" of Muammar el-Qaddafi.
  • ...16 more annotations...
  • On February 22nd, John McCain was in Lebanon. He met members of the Future Movement (the party of Saad Hariri) whom he charged to oversee the transfer of arms to Syria around the MP Okab Sakr [4]. Then, leaving Beirut, he inspected the Syrian border and the selected villages including Ersal, which were used as a basis to back mercenaries in the war to come. The meetings chaired by John McCain were clearly the trigger point for a long-prepared Washington plan; the plan that would have the UK and France attack Libya and Syria simultaneously, following the doctrine of "leadership from behind" and the annex of the Treaty of Lancaster House of November 2010. [5]
  • In May 2013, Senator John McCain made his way illegally to near Idleb in Syria via Turkey to meet with leaders of the "armed opposition". His trip was not made public until his return to Washington. [6] This movement was organized by the Syrian Emergency Task Force, which, contrary to its title, is a Zionist Organization led by a Palestinian employee of AIPAC [7]
  • John McCain in Syria. In the foreground at right is the director of the Syrian Emergency Task Force. In the doorway, center, Mohammad Nour.
  • In photographs released at that time, one noticed the presence of Mohammad Nour, a spokesman for the Northern Storm Brigade (of the Al-Nosra Front, that is to say, al-Qaeda in Syria), who kidnapped and held 11 Lebanese Shiite pilgrims in Azaz. [8] Asked about his proximity to al-Qaeda kidnappers, the Senator claimed not to know Mohammad Nour who would have invited himself into this photo. The affair made a great noise and the families of the abducted pilgrims lodged a complaint before the Lebanese judiciary against Senator McCain for complicity in kidnapping. Ultimately, an agreement was reached and the pilgrims were released. Let’s suppose that Senator McCain had told the truth and that he was abused by Mohammad Nour. The object of his illegal trip to Syria was to meet the chiefs of staff of the Free Syrian Army. According to him, the organization was composed "exclusively of Syrians" fighting for "their freedom" against the "Alouite dictatorship” (sic). The tour organizers published this photograph to attest to the meeting.
  • John McCain and the heads of the Free Syrian Army. In the left foreground, Ibrahim al-Badri, with which the Senator is talking. Next, Brigadier General Salim Idris (with glasses).
  • If we can see Brigadier General Idriss Salem, head of the Free Syrian Army, one can also see Ibrahim al-Badri (foreground on the left) with whom the senator is talking. Back from the surprise trip, John McCain claimed that all those responsible for the Free Syrian Army were "moderates who can be trusted" (sic).
  • However, since October 4, 2011, Ibrahim al-Badri (also known as Abu Du’a) was on the list of the five terrorists most wanted by the United States (Rewards for Justice). A premium of up to $ 10 million was offered to anyone who would assist in his capture. [9] The next day, October 5, 2011, Ibrahim al-Badri was included in the list of the Sanctions Committee of the UN as a member of Al Qaeda. [10] In addition, a month before receiving Senator McCain, Ibrahim al-Badri, known under his nom de guerre as Abu Bakr al-Baghdadi, created the Islamic State in Iraq and the Levant (ÉIIL) – all the while still belonging to the staff of the very "moderate" Free Syrian Army. He claimed as his own the attack on the Taj and Abu Ghraib prisons in Iraq, from which he helped between 500 and 1,000 jihadists escape who then joined his organization. This attack was coordinated with other almost simultaneous operations in eight other countries. Each time, the escapees joined the jihadist organizations fighting in Syria. This case is so strange that Interpol issued a note and requested the assistance of the 190 member countries. [11]
  • For my part, I have always said that there was no difference on the ground between the Free Syrian Army, Al-Nosra Front, the Islamic Emirate etc ... All these organizations are composed of the same individuals who continuously change flag. When they pose as the Free Syrian Army, they fly the flag of French colonization and speak only of overthrowing the "dog Bashar." When they say they belong to Al-Nosra Front, they carry the flag of al Qaeda and declare their intention to spread Islam in the world. Finally when they say they are the Islamic Emirate, they brandish the flag of the Caliphate and announce that they will clean the area of all infidels. But whatever the label, they proceed to the same abuses: rape, torture, beheadings, crucifixions. Yet neither Senator McCain nor his companions of the Syrian Emergency Task Force provided the information in their possession on Ibrahim al-Badri to the State Department, nor have they asked for the reward. Nor have they informed the anti-terrorism Committee of the UN.
  • But John McCain is not just the leader of the political opposition to President Obama, he is also one of his senior officials! He is in fact President of the International Republican Institute (IRI), the republican branch of NED / CIA [12], since January 1993. This so-called "NGO" was officially established by President Ronald Reagan to extend certain activities of the CIA, in connection with the British, Canadian and Australian secret services. Contrary to its claims, it is indeed an inter-governmental agency. Its budget is approved by Congress in a budget line dependent of the Secretary of State. It is also because it is a joint agency of the Anglo-Saxon secret services that several states in the world prohibit it from any activity on their territory.
  • he list of interventions by John McCain on behalf of the State Department is impressive. He participated in all the color revolutions of the last twenty years.
  • And an agent that has the best coverage imaginable: he is the official opponent of Barack Obama. As such, he can travel anywhere in the world (he is the most traveled US senator) and meet whoever he wants without fear. If his interlocutors approve Washington policy, he promised them to continue it, if they fight it, he hands over the responsibility to President Obama.
  • In 2003, France’s opposition was not enough to offset the influence of the Committee for the Liberation of Iraq. The United States attacked the country again and this time overthrew President Hussein. Of course, John McCain was a major contributor to the Committee. After handing to a private company the care of plundering the country for a year [17], they tried to partition Iraq into three separate states, but had to give it up due to the resistance of the population. They tried again in 2007, around the Biden-Brownback resolution, but again failed. [18] Hence the current strategy that attempts to achieve this by means of a non-state actor: the Islamic Emirate.
  • The operation was planned well in advance, even before the meeting between John McCain and Ibrahim al-Badri. For example, internal correspondence from the Qatari Ministry of Foreign Affairs, published by my friends James and Joanne Moriarty [19], shows that 5,000 jihadis were trained at the expense of Qatar in NATO’s Libya in 2012, and 2,5 million dollars was paid at the same time to the future Caliph. In January of 2014, the Congress of the United States held a secret meeting at which it voted, in violation of international law, to approve funding for the Al-Nosra Front (Al-Qaeda) and the Islamic emirate in Iraq and the Levant until September 2014. [20] Although it is unclear precisely what was really agreed to during this meeting revealed by the British Reuters news agency [21], and no media US media dared bypass censorship, it is highly probable that the law includes a section on arming and training jihadists.
  • Proud of this US funding, Saudi Arabia has claimed on its public television channel, Al-Arabiya, that the Islamic Emirate was headed by Prince Abdul Rahman al-Faisal, brother of Prince Saud al Faisal (Foreign Minister) and Prince Turki al-Faisal (Saudi ambassador to the United States and the United Kingdom) [22]. The Islamic Emirate represents a new step in the world of mercenaries. Unlike jihadi groups who fought in Afghanistan, Bosnia-Herzegovina and Chechnya around Osama bin Laden, it does not constitute a residual force but actually an army in itself. Unlike previous groups in Iraq, Libya and Syria, around Prince Bandar bin Sultan, they have sophisticated communication services at their disposal for recruitment and civilian officials trained in large western schools capable of instantly taking over the administration of a territory.
  • Brand new Ukrainian weapons were purchased by Saudi Arabia and conveyed by the Turkish secret services who gave them to the Islamic Emirate. Final details were coordinated with the Barzani family at a meeting of jihadist groups in Amman on 1 June 2014. [23] The joint attack on Iraq by the Islamic Emirate and the Kurdistan Regional Government began four days later. The Islamic Emirate seized the Sunni part of the country, while the Kurdistan Regional Government increased its territory by over 40%. Fleeing the atrocities of jihadists, religious minorities left the Sunni area, paving the way for the three-way partition of the country. Violating the Iraqi-US Defense agreement, the Pentagon did not intervene and allowed the Islamic Emirate to continue its conquest and massacres. A month later, while the Kurdish Peshmerga Regional Government had retreated without a fight, and when the emotions of world public opinion became too strong, President Obama gave the order to bomb some positions of the Islamic Emirate. However, according to General William Mayville, director of operations at the headquarters, "These bombings are unlikely to affect the overall capacity of the Islamic Emirate and its activities in other areas of Iraq or Syria ". [24] Obviously, they are not meant to destroy the jihadist army, but only to ensure that each player does not overlap the territory that has been assigned. Moreover, for the moment, they are symbolic and have destroyed only a handful of vehicles. It was ultimately the intervention of the Kurds of the Turkish and Syrian Kurdish PKK which halted the progress of the Islamic Emirate and opened a corridor to allow civilians to escape the massacre.
  • In the latest issue of its magazine, the Islamic Emirate devoted two pages to denounce Senator John McCain as "the enemy" and "double-crosser", recalling his support for the US invasion of Iraq. Lest this accusation remain unknown in the United States, Senator immediately issued a statement calling the Emirate the "most dangerous Islamist terrorist group in the world" [26]. This controversy is there only to distract the gallery. One would like to believe it ... if it were’t for this photograph from May 2013.
  •  
    Thierry Meysann makes the case that Sen. John McCain, working with  was the guiding force behind the Arab Spring, the overthrow of Qadaffi in Libya, and the invasion of Syria by mercenary Islamists, working with a Zionist but deliberately misnomered front group. Thierry goes on to show that McCain played a key role in the creation and deployment of ISIL.  
« First ‹ Previous 81 - 100 of 1261 Next › Last »
Showing 20 items per page