Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged must--read

Rss Feed Group items tagged

Paul Merrell

Revealed: Senate report contains new details on CIA black sites | Al Jazeera America - 0 views

  • A Senate Intelligence Committee report provides the first official confirmation that the CIA secretly operated a black site prison out of Guantánamo Bay, two U.S. officials who have read portions of the report have told Al Jazeera. The officials — who spoke on condition of anonymity because the 6,600-page report on the CIA’s detention and interrogation program remains classified — said top-secret agency documents reveal that at least 10 high-value targets were secretly held and interrogated at Guantánamo’s Camp Echo at various times from late 2003 to 2004. They were then flown to Rabat, Morocco, before being officially sent to the U.S. military’s detention facility at Guantánamo in September 2006. In September 2006, President George W. Bush formally announced that 14 CIA captives had been transferred to Guantánamo and would be prosecuted before military tribunals. He then acknowledged for the first time that the CIA had been operating a secret network of prisons overseas to detain and interrogate high-value targets.
  • The Senate report, according to Al Jazeera’s sources, says that the CIA detained some high-value suspects on Diego Garcia, an Indian Ocean island controlled by the United Kingdom and leased to the United States. The classified CIA documents say the black site arrangement at Diego Garcia was made with the “full cooperation” of the British government. That would confirm long-standing claims by human rights investigators and journalists, whose allegations — based on flight logs and unnamed government sources — have routinely been denied by the CIA. The CIA and State Department declined Al Jazeera’s requests for comment. The Intelligence Committee last week voted 11 to 3 to declassify the report’s 480-page executive summary and 20 conclusions and findings, which incorporate responses from Republican members of the committee and from the CIA. The executive summary will undergo a declassification review, led by the CIA, with input from the State Department and the Office of the Director of National Intelligence, the U.S. officials said. The panel’s chairwoman, Democratic Sen. Dianne Feinstein, said in a statement last Thursday that the full 6,600-page report, with 37,000 footnotes, “will be held for declassification at a later time.”
  • Leaked details of the committee’s report have caused waves in countries like Poland, where the CIA is known to have operated a black site prison — which Polish officials continue to deny having known about. The U.S. officials who spoke to Al Jazeera said that the Senate report reveals 20 prisoners were secretly detained in Poland from 2002 to 2005. They added that Polish officials recently sought assurances from diplomats and visiting U.S. officials that the Senate report would conceal details about Poland’s role in allowing the CIA black site to be operated on Polish soil. Al Jazeera’s sources said U.S. officials reassured their Polish counterparts last year that it was almost certain that the declassified version of the report would not identify the countries that cooperated with the CIA’s detention and interrogation program.
  • ...6 more annotations...
  • According to the Senate report, Al Jazeera’s sources said, a majority of the more than 100 detainees held in CIA custody were detained in secret prisons in Afghanistan and Morocco, where they were subject to torture methods not sanctioned by the Justice Department. Those methods are recalled by the report in vivid narratives lifted from daily logs of the detention and interrogation of about 34 high-value prisoners. The report allegedly notes that about 85 detainees deemed low-value passed through the black sites and were later dumped at Guantánamo or handed off to foreign intelligence services. More than 10 of those handed over to foreign intelligence agencies “to face terrorism charges” are now “unaccounted for” and presumed dead, the U.S. officials said. The Senate report says more than two dozen of these men designated low-value had, in fact, been wrongfully detained and rendered to other countries on the basis of intelligence obtained from CIA captives under torture and from information shared with CIA officials by other governments, both of which turned out to be false. The report allegedly singles out a top CIA official for botching a handful of renditions and outlines agency efforts to cover up the mistakes. The Senate report allegedly accuses “senior CIA officials” of lying during multiple closed-session briefings to members of Congress from 2003 to 2005 about the use of certain “enhanced” interrogation techniques. The report says an agency official lied to Congress in 2005 when he insisted the U.S. was adhering to international treaties barring cruel and degrading treatment of prisoners, the U.S. officials told Al Jazeera.
  • The report not only accuses certain CIA officials of deliberately misleading Congress; Al Jazeera’s sources say it also suggests that the agency sanctioned leaks to selected journalists about phantom plots supposedly disrupted as a result of information gained through the program in order to craft a narrative of success. The Senate report, like a 2009 Senate Armed Services Committee report (PDF), says Air Force psychologists under contract to the CIA reverse-engineered a decades-old resistance-training program taught to U.S. airmen known as survival evasion resistance escape (SERE). According to a SERE training document obtained by Al Jazeera titled “Coercive Exploitation Techniques,” Air Force personnel were taught that communist regimes used “deprivations” of “food, water, sleep and medical care” as well as “the use of threats” in order to weaken a captive’s mental and physical ability to resist interrogation. “Isolation” would be used, according to the SERE program, to deprive the “recipient of all social support” so that he develops a “dependency” on his interrogator. And “physical duress, violence and torture” are used to weaken “mental and physical ability to resist exploitation.” Ironically, perhaps, the SERE document (displayed below) notes that such techniques were used by the Soviet Union, China and North Korea to obtain false confessions.
  • Senate investigators allegedly obtained from the CIA a 2003 “business plan,” written by Air Force psychologists James Mitchell and Bruce Jessen, that contained erroneous details about the positive aspects of the enhanced interrogation program and the veracity of the intelligence its extracted from detainees. The “business plan” states that Al-Qaeda captives were “resistant” to “standard” interrogation techniques, an argument the Senate report found lacked merit because torture techniques were used before they were even questioned. Neither Jessen, who lives in Spokane, Wash., nor Mitchell, who resides in Land o’ Lakes, Fla., responded to phone calls or emails for comment. Both men are featured prominently in the Senate’s report, according to U.S. officials.
  • According to Al Jazeera’s sources, Zain Abidin Mohammed Husain Abu Zubaydah was the only captive subjected to all 10 torture techniques identified in an August 2002 Justice Department memo. But the U.S. officials said the Senate report concludes that the methods applied to Abu Zubaydah went above and beyond the guidelines outlined in that memo and were used before the memo establishing their legality was written. The Senate report allegedly adopts part of a narrative from former FBI special agent Ali Soufan, who first interrogated Abu Zubaydah at the black site and wrote in his book “The Black Banners” that Mitchell was conducting an “experiment” on Abu Zubaydah. For example, the August 2002 Justice Department legal memo authorized sleep deprivation for Abu Zubaydah for 11 consecutive days, but Mitchell kept him awake far longer, the U.S. officials said, citing classified CIA cables. Abu Zubaydah was stripped naked, strapped into a chair and doused with cold water to keep him awake. He was then interrogated and asked what he knew, at which point, his attorney told Al Jazeera, Abu Zubaydah was “psychotic” and would have admitted to anything.
  • Additionally, the report allegedly says that Abu Zubaydah was stuffed into a pet crate (the type used to transport dogs on airplanes) over the course of two weeks and routinely passed out, was shackled by his wrists to the ceiling of his cell and subjected to an endless loop of loud music. One former interrogator briefed about Abu Zubaydah’s interrogations from May to July 2002 told Al Jazeera that the music used to batter the detainee’s senses was by the Red Hot Chili Peppers. Abu Zubaydah’s attorney, Brent Mickum, hopes the Senate report’s executive summary will vindicate what he has been saying for years. “My client was tortured brutally well before any legal memo was issued,” Mickum said. He expects the report to “show that my client was a nonmember of Al-Qaeda, contrary to all of the earlier reports by the Bush administration. I am also confident that the report will show that, after he was deemed to be compliant while he was held in Thailand, that he continued to be tortured on explicit orders from the Bush administration.” The Senate report, according to Al Jazeera’s sources, says that CIA interrogators were under an enormous pressure from top agency officials, themselves under pressure from the White House, to use “enhanced” interrogation techniques to obtain information from detainees connecting Iraq and Al-Qaeda.
  • One interrogator who worked for the CIA and the U.S. military during Bush’s tenure and participated in the interrogations of two high-value CIA prisoners told Al Jazeera — speaking on condition of anonymity because he is still employed by the U.S. government — that the “enhanced” interrogation program was “nothing more than the Stanford Prison Experiment writ large.” (The 1971 Stanford University study shocked the public by demonstrating how easily people placed in authority over more vulnerable others resorted to cruelty.) “Interrogators were being pressured — You have to get info from these people,’” the interrogator told Al Jazeera. “There was no consideration that the person we were interrogating may not know. That was always seen as a resistance technique. ‘They [the detainees] must be lying!’ There was pressure on us from above to produce what they wanted. Not a single person I worked with knew how to conduct an interrogation or [had] ever conducted an interrogation.”
Paul Merrell

Michael Hayden joins Washington Times - POLITICO.com - 0 views

  • Former CIA and NSA director Gen. Michael Hayden will write a bimonthly column called "Inside Intelligence" for the Washington Times, the paper announced on Wednesday.  “Gen. Hayden is known as a broad-minded and independent thinker on military and intelligence matters. His columns will be must-reads inside and outside the Beltway,” Washington Times Editor John Solomon said in a statement. “We’re thrilled to have him as part of our growing team of columnists. His topics go to the heart of our mission as a newspaper.”
Paul Merrell

Turkey Cooks the Books in Syria | The American Conservative - 0 views

  • If you had been a reader of The American Conservative magazine back in December 2011, you might have learned from an article written by me that “Unmarked NATO warplanes are arriving at Turkish military bases close to Iskenderum on the Syrian border, delivering weapons [to the Free Syrian Army] derived from Colonel Muammar Gaddafi’s arsenals…” Well, it seems that the rest of the media is beginning to catch up with the old news, supplemented with significant details by Sy Hersh in the latest issue of the London Review of Books in an article entitled “The Red Line and the Rat Line.” The reality is that numerous former intelligence officials, like myself, have long known most of the story surrounding the on-again off-again intervention by the United States and others in Syria, but what was needed was a Sy Hersh, with his unmatched range of contacts deep in both the Pentagon as well as at CIA and State Department, to stitch it all together with corroboration from multiple sources. In a sense it was a secret that wasn’t really very well hidden but which the mainstream media wouldn’t touch with a barge pole because it revealed that the Obama Administration, just like the Bushies who preceded it, has been actively though clandestinely conspiring to overthrow yet another government in the Middle East. One might well conclude that the White House is like the Bourbon Kings of France in that it never forgets anything but never learns anything either.
  • The few media outlets that are willing to pick up the Syria story even now are gingerly treating it as something new, jumping in based on their own editorial biases, sometimes emphasizing the CIA and MI6 role in cooperating with the Turks to undermine Bashar al-Assad. But Hersh’s tale is only surprising if one had not been reading between the lines over the past three years, where the clandestine role of the British and American governments was evident and frequently reported on over the internet and, most particularly, in the local media in the Middle East. Far from being either rogue or deliberately deceptive, operations by the U.S. and UK intelligence services, the so-called “ratlines” feeding weapons into Syria, were fully vetted and approved by both the White House and Number 10 Downing Street. The more recent exposure of the Benghazi CIA base’s possible involvement in obtaining Libyan arms as part of the process of equipping the Syrian insurgents almost blew the lid off of the arrangement but somehow the media attention was diverted by a partisan attack on the Obama Administration over who said what and when to explain the security breakdown and the real story sank out of sight.
  • So this is what happened, roughly speaking: the United States had been seeking the ouster of President Bashar al-Assad of Syria since at least 2003, joining with Saudi Arabia, which had been funding efforts to destabilize his regime even earlier. Why? Because from the Saudi viewpoint Syria was an ally of Iran and was also a heretical state led by a secular government dominated by Alawite Muslims, viewed as being uncomfortably close to Shi’ites in their apostasy. From the U.S. viewpoint, the ties to Iran and reports of Syrian interference in Lebanon were a sufficient casus belli coupled with a geostrategic assessment shared with the Saudis that Syria served as the essential land bridge connecting Hezbollah in Lebanon to Iran. The subsequent Congressional Syria Accountability Acts of 2004 and 2010, like similar legislation directed against Iran, have resulted in little accountability and have instead stifled diplomacy. They punished Syria with sanctions for supporting Hezbollah in Lebanon and for its links to Tehran, making any possible improvement in relations problematical. The 2010 Act even calls for steps to bring about regime change in Damascus. The United States also engaged in a program eerily reminiscent of its recent moves to destabilize the government in Ukraine, i.e., sending in ambassadors and charges who deliberately provoked the Syrian government by meeting with opposition leaders and openly making demands for greater democracy. The last U.S. Ambassador to Syria Robert Ford spoke openly in support of the protesters while serving in Damascus in 2010. On one occasion he was pelted with tomatoes and was eventually removed over safety concerns.
  • ...4 more annotations...
  • Lost in translation is the fact that Washington’s growing support for radical insurgency in Syria would also inevitably destabilize all its neighbors, most notably including Iraq, which has indeed been the case, making a shambles of U.S. claims that it was seeking to introduce stable democracies into the region. Some also saw irony in the fact that a few years before Washington decided al-Assad was an enemy it had been sending victims of the CIA’s rendition program to Syria, suggesting that at least some short-term and long-term strategies were on a collision course from the start, if indeed the advocates of the two policies were actually communicating with each other at all. Prime Minister Recep Tayyip Erdogan of Turkey, whose country shared a long border with Syria and who had legitimate security concerns relating to Kurdish separatists operating out of the border region, became the proxy in the secret war for Washington and its principal European allies, the British and French. When the U.S.-Saudi supported insurgency began to heat up and turn violent, Turkey became the key front line state in pushing for aggressive action against Damascus. Erdogan miscalculated, thinking that al-Assad was on his last legs, needing only a push to force him out, and Ankara saw itself as ultimately benefiting from a weak Syria with a Turkish-controlled buffer zone along the border to keep the Kurds in check.
  • Hersh reports how President Barack Obama had to back down from attacking Syria when the Anglo-American intelligence community informed him flatly and unambiguously that Damascus was not responsible for the poison gas attack that took place in Damascus on August 21, 2013 that was being exploited as a casus belli. The information supporting that assertion was known to many like myself who move around the fringes of the intelligence community, but the real revelation from Hersh is the depth of Turkish involvement in the incident in order to have the atrocity be exploitable as a pretext for American armed intervention, which, at that point, Erdogan strongly desired. As the use of weapons of mass destruction against civilians was one of the red lines that Obama had foolishly promoted regarding Syria Erdogan was eager to deliver just that to force the U.S.’s hand. Relying on unidentified senior U.S. intelligence sources, Hersh demonstrates how Turkey’s own preferred militant group Jabhat al-Nusra, which is generally regarded as an al-Qaeda affiliate, apparently used Turkish-provided chemicals and instructions to stage the attack.
  • Is it all true? Unless one has access to the same raw information as Sy Hersh it is difficult to say with any certainty, but I believe I know who some of the sources are and they both have good access to intelligence and are reliable. Plus, the whole narrative has an undeniable plausibility, particularly if one also considers other evidence of Erdogan’s willingness to take large risks coupled with a more general Turkish underhandedness relating to Syria. On March 23rd, one week before local elections in Turkey that Erdogan feared would go badly for him, a Turkish air force F-16 shot down a Syrian Mig-23, claiming that it had strayed half a mile into Turkish airspace. The pilot who bailed out, claimed that he was attacking insurgent targets at least four miles inside the border when he was shot down, an assertion borne out by physical evidence as the plane’s remains landed inside Syria. Was Erdogan demonstrating how tough he could be just before elections? Possibly.
  • Critics of Hersh claim that the Turks would be incapable of carrying out such a grand subterfuge, but I would argue that putting together some technicians, chemicals, and a couple of trucks to carry the load are well within the capability of MIT, an organization that I have worked with and whose abilities I respect. And one must regard with dismay the “tangled webs we weave,” with due credit to Bobby Burns, for what has subsequently evolved in Syria. Allies like Turkey that are willing to cook the books to bring about military action are exploiting the uncertainty of a White House that continues to search for foreign policy successes while simultaneously being unable to define any genuine American interests. Syria is far from an innocent in the ensuing mayhem, but it has become the fall guy for a whole series of failed policies. Turkey meanwhile has exploited the confusion to clamp down on dissent and to institutionalize Erdogan’s authoritarian inclinations. Ten years of American-licensed meddling combined with obliviousness to possible consequences has led to in excess of 100,000 dead Syrians and the introduction of large terrorist infrastructures into the Arab heartland, yet another foreign policy disaster in the making with no clear way out.
  •  
    Former CIA officer Philip Giraldi adds valuable context to revelations of Turkey's involvement in the false flag Sarin gas attack in Syria and in Turkey's follow-up plan to stage a false flag attack on a Turkish tomb in Syria as a pretext for Turkish invasion of Syria. 
Paul Merrell

Dutch MH17 Investigation Omits US "Intel". Fabrications and Omissions Supportive of US-... - 0 views

  • The absence of America’s so-called “intelligence” regarding the downing of Malaysia Airlines MH17 over Ukraine in a 34 page Dutch Safety Board preliminary report raises serious questions about the credibility and legitimacy of both America’s political agenda, and all agencies, organizations, and political parties currently behind it. The report titled, “Preliminary Report: Crash involving Malaysia Airlines Boeing 777-200 flight MH17″ (.pdf), cites a wide variety of evidence in its attempt to determine the cause of flight MH17′s crash and to prevent similar accidents or incidents from occurring again in the future. Among this evidence includes the cockpit voice recorder (CVR), the flight data recorder (FDR), analysis of recorded air traffic control (ATC) surveillance data and radio communication, analysis of the meteorological circumstances, forensic examination of the wreckage (if recovered and possible foreign objects if found), results of the pathological investigation, and analysis of the in-flight break up sequence.
  • Satellite images are referenced in regards to analyzing the crash site after the disaster, however, no where in the report is mentioned any evidence whatsoever of satellite images of missile launchers, intelligence from the United States regarding missile launches, or any information or evidence at all in any regard suggesting a missile had destroyed MH17. In fact, the report concludes by stating: This report is preliminary. The information must necessarily be regarded as tentative and subject to alternation or correction if additional evidence becomes available. Further work will at least include the following areas of interest to substantiate the factual information regarding:
  • The report specifically mentions information collected from Russia, including air traffic control and radar data – both of which were publicly shared by Russia in the aftermath of the disaster. The report also cites data collected from Ukraine air traffic controllers. The United States however, apart from providing technical information about the aircraft itself considering it was manufactured in the US, provided absolutely no data in any regard according to the report.
  • ...3 more annotations...
  • Had the US actually possessed any credible information to substantiate its claims that MH17 was shot down by a missile, such evidence surely would have been submitted to and included in the Dutch Safety Board’s preliminary reporting. That it is predictably missing confirms what commentators, analysts, and politicians around the world had long since suspected – the West’s premature conclusions regarding MH17′s demise were driven by a political agenda, not a factually based search for the truth. The evidence that MH17 was shot down by a missile as the West insisted is missing because it never existed in the first place. That the Dutch Safety Board possesses such a vast amount of information but is still unable to draw anything but the most tentative conclusions, exposes the alleged certainty of Western pundits and politicians in the hours and days after MH17′s loss as an utterly irresponsible, politically motivated, exploitation of tragedy at best, and at worst, exposing the West – NATO in particular – as possible suspects in a crime they clearly stood the most to benefit from.
  • In the wake of the MH17 tragedy, the West would rush through a series of sanctions against Russia as well as justify further military aid for the regime in Kiev, Ukraine and the literal Neo-Nazi militant battalions serving its pro-Western agenda amid a brutal civil war raging in the country’s eastern most provinces. With sanctions in hand, and the war raging on in earnest, the MH17 disaster dropped entirely out of Western narratives as if it never occurred. Surely if the West had solid evidence implicating eastern Ukrainian rebels and/or Russia, the world would never have heard the end of the MH17 disaster until the truth was fully aired before the public. When Dutch investigators published their preliminary report, the West merely reiterated its original claims, simply imposing their contradictory nature upon the report – most likely believing the public would never actually read its 34 pages. For example, Reuters in a report titled, “Malaysia: Dutch report suggests MH-17 shot down from ground,” would brazenly claim:
  • Malaysia Airlines flight MH17 broke apart over Ukraine due to impact from a large number of fragments, the Dutch Safety Board said on Tuesday, in a report that Malaysia’s prime minister and several experts said suggested it was shot down from the ground. The title of Reuters’ propaganda piece directly contradicts its first paragraph which reveals “experts,” not the actual Dutch Safety Board report, claimed it was “shot down from the ground,” while the report itself says nothing of the sort. The experts cited by Reuters in fact had no association whatsoever with the preliminary report and instead are the same mainstay of cherry picked commentators the West constantly defers to while building up and perpetuating utterly fabricated narratives to advance its agenda globally.
Paul Merrell

NSA spies on more US citizens than Russians - Snowden - RT News - 0 views

  • The NSA gathers more data on American citizens than it does about foreigners, Edward Snowden has said. During an acceptance speech for a “truth-telling” prize, the whistleblower attacked NSA head, James Clapper, for lying about US surveillance. “We watch our own people more closely than anyone else in the world,” said Edward Snowden, appearing in a live video link at the 11th annual Ridenhour Prizes ceremony in Washington. He was greeted by a standing ovation from the audience when he received the Ridenhour Award for “Truth-Telling."
  • He also criticized the Senate and the House Intelligence committees for their lack of oversight on the NSA and the intelligence community. Leveling criticism at the NSA’s director, James Clapper, Snowden blasted him for his “famous lie” during a speech last year.
  • “When Clapper raised his hand and lied to the American public, was anyone tried? Were any charges brought?” Snowden asked. “Within 24 hours of going public, I had three charges against me.”
Paul Merrell

Asia Times Online :: It was Putin's missile! - 0 views

  • And here's the spin war verdict: the current Malaysia Airlines tragedy - the second in four months - is "terrorism" perpetrated by "pro-Russian separatists", armed by Russia, and Vladimir Putin is the main culprit. End of story. Anyone who believes otherwise, shut up. Why? Because the CIA said so. Because Hillary "We came, we saw, he died" Clinton said so. Because batshit crazy Samantha "R2P" Power said so - thundering at the UN, everything duly printed by the neo-con infested Washington Post. [1] Because Anglo-American corporate media - from CNN to Fox (who tried to buy Time Warner, which owns CNN) - said so. Because the President of the United States (POTUS) said so. And mostly because Kiev had vociferously said so in the first place.
  • Right off the bat they were all lined up - the invariably hysterical reams of "experts" of the "US intelligence community" literally foaming at their palatial mouths at "evil" Russia and "evil" Putin; intel "experts" who could not identify a convoy of gleaming white Toyotas crossing the Iraqi desert to take Mosul. And yet they have already sentenced they don't need to look any further, instantly solving the MH17 riddle.
  • It doesn't matter that President Putin has stressed the MH17 tragedy must be investigated objectively. And "objectively" certainly does not mean that fictional "international community" notion construed by Washington - the usual congregation of pliable vassals/patsies. And what about Carlos?
  • ...7 more annotations...
  • A simple search at reveals that MH17 was in fact diverted 200 kilometers north from the usual flight path taken by Malaysia Airlines in the previous days - and plunged right in the middle of a war zone. Why? What sort of communication MH17 received from Kiev air control tower? Kiev has been mute about it. Yet the answer would be simple, had Kiev released the Air Traffic Control recording of the tower talking to flight MH17; Malaysia did it after flight MH370 disappeared forever. It won't happen; SBU security confiscated it. So much for getting an undoctored explanation on why MH17 was off its path, and what the pilots saw and said before the explosion. The Russian Defense Ministry, for its part, has confirmed that a Kiev-controlled Buk anti-aircraft missile battery was operational near the MH17's crash. Kiev has deployed several batteries of Buk surface-to-air missile systems with at least 27 launchers; these are all perfectly capable of bringing down jets flying at 33,000 ft.
  • Radiation from a battery's Kupol radar, deployed as part of a Buk-M1 battery near Styla (a village some 30km south of Donetsk) was detected by the Russian military. According to the ministry, the radar could be providing tracking information to another battery which was at a firing distance from MH17's flight path. The tracking radar range on the Buk system is a maximum of 50 miles. MH17 was flying at 500 mph. So assuming the "rebels" had an operational Buk and did it, they would have had not more than five minutes to scan all the skies above, all possible altitudes, and then lock on. By then they would have known that a cargo plane could not possibly be flying that high. For evidence supporting the possibility of a false flag, check here.
  • And then there's the curiouser and curiouser story of Carlos, the Spanish air traffic controller working at Kiev's tower, who was following MH17 in real time. For some Carlos is legit - not a cipher; for others, he's never even worked in Ukraine. Anyway he tweeted like mad. His account - not accidentally - has been shut down, and he has disappeared; his friends are now desperately looking for him. I managed to read all his tweets in Spanish when the account was still online - and now copies and an English translation are available. These are some of his crucial tweets: "The B777 was escorted by 2 Ukrainian fighter jets minutes before disappearing from radar (5.48 pm)" "If the Kiev authorities want to admit the truth 2 fighter jets were flying very close a few minutes before the incident but did not shoot down the airliner (5.54)" "As soon as the Malaysia Airlines B777 disappeared the Kiev military authority informed us of the shooting down. How did they know? (6.00)"
  • "Everything has been recorded on radar. For those that don't believe it, it was taken down by Kiev; we know that here (in traffic control) and the military air traffic control know it too (7.14)" "The Ministry of the Interior did know that there were fighter aircraft in the area, but the Ministry of Defense didn't. (7.15)" "The military confirm that it was Ukraine, but it is not known where the order came from. (7.31)" Carlos's assessment (a partial compilation of his tweets is collected here http://slavyangrad.wordpress.com/2014/07/18/spanish-air-controller-kiev-borispol-airport-ukraine-military-shot-down-boeing-mh17/ ): the missile was fired by the Ukraine military under orders of the Ministry of Interior - NOT the Ministry of Defense. Security matters at the Ministry of the Interior happen to be under Andriy Parubiy, who was closely working alongside US neo-cons and Banderastan neo-nazis on Maidan.
  • Assuming Carlos is legit, the assessment makes sense. The Ukrainian military are divided between Chocolate king President Petro Poroshenko - who would like a d?tente with Russia essentially to advance his shady business interests - and Saint Yulia Timoshenko, who's on the record advocating genocide of ethnic Russians in Eastern Ukraine. US neo-cons and US "military advisers" on the ground are proverbially hedging their bets, supporting both the Poroshenko and Timoshenko factions. So who profits? The key question remains, of course, cui bono? Only the terminally brain dead believe shooting a passenger jet benefits the federalists in Eastern Ukraine, not to mention the Kremlin. As for Kiev, they'd have the means, the motive and the window of opportunity to pull it off - especially after Kiev's militias have been effectively routed, and were in retreat, in the Donbass; and this after Kiev remained dead set on attacking and bombing the population of Eastern Ukraine even from above. No wonder the federalists had to defend themselves.
  • And then there's the suspicious timing. The MH17 tragedy happened two days after the BRICS announced an antidote to the IMF and the World Bank, bypassing the US dollar. And just as Israel "cautiously" advances its new invasion/slow motion ethnic cleansing of Gaza. Malaysia, by the way, is the seat of the Kuala Lumpur War Crimes Commission, which has found Israel guilty of crimes against humanity. Washington, of course, does profit. What the Empire of Chaos gets in this case is a ceasefire (so the disorganized, battered Kiev militias may be resupplied); the branding of Eastern Ukrainians as de facto "terrorists" (as Kiev, Dick Cheney-style, always wanted); and unlimited mud thrown over Russia and Putin in particular until Kingdom Come. Not bad for a few minutes' work. As for NATO, that's Christmas in July. From now on, it all depends on Russian intelligence. They have been surveying/tracking everything that happens in Ukraine 24/7. In the next 72 hours, after poring over a lot of tracking data, using telemetry, radar and satellite tracking, they will know which type of missile was launched, where from, and even produce communications from the battery that launched it. And they will have access to forensic evidence.
  • Unlike Washington - who already knows everything, with no evidence whatsoever (remember 9/11?) - Moscow will take its time to know the basic journalistic facts of what, where, and who, and engage on proving the truth and/or disproving Washington's spin. The historical record shows Washington simply won't release data if it points to a missile coming from its Kiev vassals. The data may even point to a bomb planted on MH17, or mechanical failure - although that's unlikely. If this was a terrible mistake by the Novorossiya rebels, Moscow will have to reluctantly admit it. If Kiev did it, the revelation will be instantaneous. Anyway we already know the hysterical Western response, no matter what; Russia is to blame. Putin is more than correct when he stressed this tragedy would not have happened if Poroshenko had agreed to extend a cease-fire, as Merkel, Hollande and Putin tried to convince him in late June. At a minimum, Kiev is already guilty because they are responsible for safe passage of flights in the airspace they - theoretically - control. But all that is already forgotten in the fog of war, tragedy and hype. As for Washington's hysterical claims of credibility, I leave you with just one number: Iran Air 655.
  •  
    Pepe Escobar again.  Cui bono, indeed. It's the first question that should be asked when investigating any mystery.  
Paul Merrell

Obama's Novel Lawyering to Bomb Syria | Consortiumnews - 0 views

  • The Obama administration has devised an extraordinary legal justification for carrying out bombing attacks inside Syria: that the United States and its Persian Gulf allies have the right to defend Iraq against the Islamic State because the Syrian government is unable to stop the cross-border terror group. “The Syrian regime has shown that it cannot and will not confront these safe havens effectively itself,” said the U.S. letter delivered by Ambassador Samantha Power to United Nations officials. “Accordingly, the United States has initiated necessary and proportionate military actions in Syria in order to eliminate the ongoing ISIL [Islamic State] threat to Iraq, including by protecting Iraqi citizens from further attacks and by enabling Iraqi forces to regain control of Iraq’s borders.”
  • Yet, beyond the danger to world order if such an expansive theory is embraced by the international community (does anyone remember how World War One got started?), there is the hypocrisy of the U.S. government and many of those same Gulf allies arming, training and funding Syrian rebels for the purpose of preventing the Syrian military from controlling its territory and then citing that lack of control as the rationale to ignore Syria’s sovereignty. In other words, the United States, Saudi Arabia, Qatar, Jordan and other enemies of Syria covertly backed the rebels inside Syria and watched as many of them – including thousands of the U.S.-preferred “moderates” – took their newly acquired military skills to al-Qaeda affiliates and other terrorist organizations. Then, the U.S. and its allies have the audacity to point to the existence of those terror groups inside Syria as a rationale for flying bombing raids into Syria.
  • Another alarming part of the U.S. legal theory is that among this new “coalition of the willing” – the U.S., Saudi Arabia, the United Arab Emirates, Qatar, Bahrain and Jordan – only Jordan shares a border with Syria. So, this novel principle would mean that distant countries have the right to destabilize a country from afar and then claim the destabilization justifies mounting military attacks inside that country. Such a theory – if accepted as a new standard of behavior – could wreak havoc on international order which is based on the principle of national sovereignty. The U.S. theory also stands in marked contrast to Washington’s pious embrace of strict readings of international law when denouncing Russia just this summer for trying to protect ethnic Russians in eastern Ukraine from brutal assaults by the U.S.-backed coup regime in Kiev.
  • ...6 more annotations...
  • An entirely different set of rules were applied to Syria, where President Barack Obama decided that Syrian President Bashar al-Assad “must go” and where Obama authorized the CIA to provide arms, training and money for supposedly “moderate” rebels. Other U.S. “allies,” such as Saudi Arabia and Qatar, supported some of the more extreme anti-Assad groups. Israel’s right-wing Likud government also was eager for “regime change” in Syria as were America’s influential neoconservatives who saw Assad’s overthrow as a continuation of their strategy of removing Middle East leaders regarded as hostile to Israel. Saddam Hussein’s Iraq was the first on the list with Syria and Iran to follow. In those cases, the application of international law was entirely optional.
  • In 2011, the Obama administration’s “liberal interventionists” threw their weight behind a Sunni-led uprising to oust Assad, who runs a harsh but largely secular government with key support from Alawites, Shiites, Christians and other minorities who feared Sunni extremism. As with Iraq, Syria’s sectarian violence drew in many Sunni extremists, including jihadists associated with al-Qaeda, particularly the Nusra Front but also “al-Qaeda in Iraq” which rebranded itself the Islamic State of Iraq and Syria or simply the Islamic State. Eventually, al-Qaeda leaders rejected the Islamic State because it had become a rival of the Nusra Front and because its brutality was  too graphic even for al-Qaeda. Despite the growing radicalism of Syrian rebels, Official Washington’s influential neocons and the “liberal interventionists” continued the drumbeat for ousting Assad, a position also shared by Israeli leaders who went so far as to indicate they would prefer Damascus to fall to al-Qaeda extremists rather than have Iranian ally Assad retain control. [See Consortiumnews.com’s “Israel Sides with Syrian Jihadists.”]
  • Yet, with al-Qaeda-connected terrorists controlling part of the Israeli border along the Golan Heights, the Israeli government began to reverse its position on demanding Assad’s removal. As the Israeli investigative Web site, Debka Files, reported on Sept. 9, citing military and intelligence sources: “The Israeli government has radically changed tack on Syria, reversing a policy and military strategy that were long geared to opposing Syrian President Bashar Assad … This reversal has come about in the light of the growing preponderance of radical Islamists in the Syrian rebel force fighting Assad’s army in the Quneitra area since June. Al Qaeda’s Syrian Nusra front … is estimated to account by now for 40-50 percent – or roughly, 4,000-5,000 Islamists – of the rebel force deployed just across Israel’s Golan border. … “Nusra Front jihadis fighting alongside insurgents on the various Syrian battlefronts made a practice of surreptitiously infiltrating their non-Islamist brothers-at-arms, a process which the latter’s foreign allies, the US, Israel, Saudi Arabia, Qatar and Jordan, either ignored or were unaware of. These tactics began to pay off in the past month, when large numbers of moderate rebels suddenly knocked on the Nusra Front’s door and asked to join.”
  • I have confirmed this Israeli shift with my own sourcing. But it’s unclear whether Israel’s change of heart will cause any second thoughts among U.S. neocons who typically conform their policy recommendations to Israeli interests. However, on the Syrian case, the neocons and their “liberal interventionists” friends might be too dug in on ousting Assad to adjust. Indeed, all of Official Washington seems incapable of admitting that its wishful thinking about Syrian “moderates” may have caused another major strategic error in the Mideast. The unrealistic “group think” about “moderates” contributed to a power vacuum in Syria that has pulled in some of the most vicious Islamic extremists on earth and turned parts of Syria into a new base of operation for international terrorism.
  • For his part, President Obama recognized the folly of training Syrian “moderates” – just last month he dismissed the notion as a “fantasy” that was “never in the cards” as a workable strategy – but he nevertheless resurrected it last week as a key part of his new Syrian initiative. He won solid congressional majorities in support of spending some $500 million on the training scheme. The most charitable view of Obama’s strange flip-flop is that he feared being accused of aiding Assad if the U.S. bombing campaign against the Islamic State indirectly strengthened Assad’s hold on Damascus. So, Obama tacked on what he knew to be a useless appendage, a tough-sounding plan to “ramp up” the “moderate” rebel forces.
  • Yet, Obama may find it politically impossible to state the truth – that a “realist” approach to foreign affairs sometimes requires working with disreputable governments. So, instead of simply saying that Syria has no objection to these bombing raids, Obama has invented a dangerous new legal theory to justify the violation of a country’s sovereignty.
Paul Merrell

Canadian Government Says Free Speech is for Offending Muslims - Not Opposing Israel - T... - 0 views

  • Canadian Prime Minister Stephen Harper, January 8, 2015, on Charlie Hebdo shootings: “When a trio of hooded men struck at some of our most cherished democratic principles, freedom of expression, freedom of the press, they assaulted democracy everywhere . . . They have declared war on anybody who does not think and act exactly as they wish they would think and act . . . . they have declared war on any country, like ourselves, that values freedom, openness and tolerance.”
  • CBC, today: “Ottawa threatening hate charges against those who boycott Israel” The Harper government is signaling its intention to use hate crime laws against Canadian advocacy groups that encourage boycotts of Israel. Such a move could target a range of civil society organizations, from the United Church of Canada and the Canadian Quakers to campus protest groups and labour unions. If carried out, it would be a remarkably aggressive tactic, and another measure of the Conservative government’s lockstep support for Israeli Prime Minister Benjamin Netanyahu. . . . The government’s intention was made clear in a response to inquiries from CBC News about statements by federal ministers of a “zero tolerance” approach to groups participating in a loose coalition called Boycott, Divest and Sanction (BDS), which was begun in 2006 at the request of Palestinian non-governmental organizations.
  • Has a #JeSuisBDS hashtag started trending yet on Twitter? Under the new Charlie Hebdo standard — it’s not enough to defend free speech; one must praise and even express the speech targeted with suppression — have all of the newfound free speech crusaders begun organizing pro-Israel-boycott rallies in order to defy these suppression efforts? In a zillion years, could anyone imagine the popularity-craving officials who run PEN America bestowing one of their glamorous awards on advocates of the Israel-targeted Boycott/Divestment/Sanctions movement? The answer to all of those questions is and will remain “no,” because (as I discussed last week here with Bob Wright) the Charlie Hebdo ritual (for most, not all) was about many agendas having nothing to do with the free expression banner under which it paraded. In that regard, Stephen Harper is the perfect Poster Boy for how free expression is tribalistically manipulated and exploited in the West. When the views being suppressed are ones amenable to those in power (e.g., cartoons mocking Islam), free speech is venerated; attempts to suppress those kinds of ideas show that “they have declared war on any country, like ourselves, that values freedom, openness and tolerance.” We get to celebrate ourselves as superior and progressive and victimized, and how good that feels. But when ideas are advocated that upset those in power (e.g. speech by Muslims critical of Western nations and their allies), the very same people acquiesce to, or expressly endorse, full-scale suppression. Thus can the Canadian Prime Minister pompously parade around as some sort of Guardian of Enlightenment Ideals only, three months later, to act like the classic tyrant.
  • ...3 more annotations...
  • Asked to explain what zero tolerance means, and what is being done to enforce it, a spokesperson for Public Safety Minister Steven Blaney replied, four days later, with a detailed list of Canada’s updated hate laws, noting that Canada has one of the most comprehensive sets of such laws “anywhere in the world.”
  • As I’ve argued many times — most comprehensively here — all applications of hate speech laws are inherently tyrannical, dangerous and wrong, and it’s truly mystifying (and scary) that people convince themselves that their judgment is so unerring and their beliefs so sacrosanct that it should be illegal to question or dissent from them. But independent of that, what we see here again is the utter foolishness of endorsing such laws on pragmatic grounds: they will inevitably be used against not just the ideas you hate but the ones you like, and when that happens, if you cheered when such laws were used to suppress the ideas you hate, then you will have no valid ground to object.
  • UPDATE: Various Israel devotees such as David Frum spent the morning insisting the CBC story is false, and now the Canadian government has followed suit, issuing a statement denouncing it. Unfortunately for them, the full email exchange between the CBC reporter, Neil Macdonald, and a spokesman for the Public Safety Department can be read here, and it proves that the CBC story is 100% accurate.
Paul Merrell

OPERATION CONDOR: National Security Archive Presents Trove of Declassified Documentatio... - 0 views

  • Argentine Newspaper, Pagina 12, Highlights Evidence Presented by Archive Southern Cone Project Director Carlos Osorio Documents given to Court Reveal Condor Precedents; Secret Summary of Inaugural Condor Meeting Introduced into Court for First Time National Security Archive Electronic Briefing Book No. 514
  • The National Security Archive today posted key documents on Operation Condor, presented by its Southern Cone analyst, Carlos Osorio, at a historic trial in Buenos Aires of former military officers. During 10 hours on the witness stand recently, Osorio introduced one hundred documents into evidence for the court proceedings. His testimony was profiled on May 3 in a major feature article published in the Buenos Aires daily, Pagina 12. Operation Condor was an infamous secret alliance between South American dictatorships in the mid and late 1970s - a Southern Cone rendition and repression program - formed to track down and eliminate enemies of their military regimes. The Condor trial charges 25 high-ranking officers, originally including former Argentine presidents Jorge Videla (deceased) and Reynaldo Bignone (aged 87), with conspiracy to "kidnap, disappear, torture and kill" 171 opponents of the regimes that dominated the Southern Cone in the 1970s and 1980s. Among the victims were approximately 80 Uruguayans, 50 Argentines, 20 Chileans and a dozen others from Paraguay, Bolivia, Peru and Ecuador who were targeted by Condor operatives.
  • The tribunal requested Osorio’s testimony, which took place over two days on March 6 and 7, 2015, and included presentation of an Excel data base of 900 documents drawn mostly from U.S. government sources and from the Archive of Terror in Paraguay. Of these, Osorio focused on 100 declassified records selected for the tribunal, which was presided over by Judge Oscar Amirante, president of Federal Tribunal N° 1. The National Security Archive obtained the U.S. documents through the Freedom of Information Act (FOIA), primarily from the Central Intelligence Agency, Defense Intelligence Agency and the State Department. Other notable records originated from the Chilean former secret police, DINA. "We have been working on Operation Condor for years," Osorio said, "sifting through archives in many continents and building a body of knowledge and a trove of documents." The Pagina 12 feature entitled "The Evolution of Condor," described Osorio’s presentation of "dozens" of documents to the tribunal, and the contribution the documents made in educating the judges on the genesis and evolution of coordinated repression in the Southern Cone. Osorio’s testimony covered a range of topics including the breadth of Condor operations, U.S. knowledge of those operations and the authenticity of the records being introduced into evidence.
  • ...3 more annotations...
  • The article highlighted one document Osorio presented that revealed the bilateral precedent for what would become a multilateral system of regional repression: a secret accord between the Argentine and Paraguayan military intelligence services to "Collaborate in the struggle against subversion…" and the "… internment [of dissenters]…" " The agreement was dated September 12,1972, and signed by Paraguayan intelligence officer Col. Benito Guanes Serrano. Three years later, Guanes would also be one of the five original signatories of the secret Condor accords. Osorio discovered the document in the Archive of Terror in Paraguay. In September 1975, an assessment by a State Department intelligence analyst concluded that "The national security forces of the southern cone surpass the terrorists in cooperation at the international level…" Six weeks later, in Santiago, Chile, intelligence chiefs from Argentina, Bolivia, Chile, Paraguay and Uruguay signed an "Acta" officially establishing Operation Condor. Osorio introduced that pivotal document - provided to the Archive by a source in Chile - into evidence as well.
  • Two declassified U.S. documents presented to the tribunal underscored the contradictory response of high U.S. officials as they became aware of Condor operations in the summer of 1976. One well-known 13-page memorandum of conversation between Secretary of State Henry Kissinger and Argentine Foreign Minister Admiral Cesar Guzzetti dated June 10, 1976, revealed Kissinger’s endorsement of the regional collaboration to repress the left. After Guzzetti informed Kissinger that the Southern Cone regimes were engaged in "joint efforts" to fight "the terrorist problem," Kissinger essentially supported this approach: "If there are things that have to be done, you should do them quickly. But you should get back quickly to normal procedures," according to the declassified transcript Osorio provided to the court. "We want you to succeed. We do not want to harrass [sic] you," Kissinger concluded. "I will do what I can … "
  • After a CIA briefing to Kissinger’s top aides in late July 1976 on the Condor countries’ plans to send assassination teams around the world to eliminate opponents, the Secretary of State authorized a démarche to General Augusto Pinochet in Chile, General Jorge Videla in Argentina, and other military leaders in the region calling on them to cease and desist. "Government planned and directed assassinations within and outside the territory of Condor members has most serious implication which we must face squarely and rapidly," stated the secret August 13, 1976, cable to U.S. ambassadors in those nations. But the démarche was never delivered to any of the Condor regimes. After the U.S. ambassadors raised objections about presenting the démarche to the generals, on September 16, 1976, Kissinger rescinded it, and ordered "that no further action be taken on this matter." In addition to Osorio, the National Security Archive’s Chile Documentation Project director, Peter Kornbluh, testified in the Operation Condor trial for five hours in December 2014. Archive Advisory Board member, professor of journalism and author John Dinges presented evidence in April 2015. Read the Documents
Paul Merrell

Canadians have united to reject fear and stop Bill C-51. Will the government listen? | ... - 0 views

  • It's rare in Canadian politics to see intense public interest in government legislative proposals -- let alone to see Canadians take to the streets in the tens of thousands to protest a piece of legislation by name. Yet that's exactly what has happened in the case of Bill C-51, which critics, including The Globe and Mail's editorial team, say will undermine basic democratic values and lead to the creation of a "secret police force" in Canada. In the space of a few short months since Bill C-51 was announced, hundreds of thousands of people have taken action to stop it: signing petitions, writing letters to local newspapers, phoning and writing to their member of Parliament, and hitting the streets in nationwide demonstrations in over 70 communities across Canada. It's not hard to see why so many people are concerned. Canada's top privacy and security experts warn that this legislation will undermine democratic rights Canadians have enjoyed for generations. For example, according to professors Craig Forcese and Kent Roach, who have conducted a detailed legal analysis of the legislation, Bill C-51 will:
  • Undermine Canadians' privacy by allowing widespread information disclosures among government agencies, and by giving the Canadian Security and Intelligence Service (CSIS) access to personal information held by up to 17 government departments. Even Stephen Harper has admitted that these kinds of dragnet surveillance measures are ineffective. Chill free speech online by criminalizing what is loosely defined as the promotion of "terrorism offences in general" and even showing "reckless disregard" for whether a particular post may encourage a violent act. As Forcese and Roach point out in their testimony to the Senate Standing Committee on National Security and Defence, "The new speech crime in our view violates freedom of expression because it reaches well beyond the sort of speech that threatens actual violence." Dramatically expand the powers of CSIS, without any commensurate increase in oversight or review measures. The legislation even allows CSIS to obtain a warrant permitting them to break the law and contravene the Charter rights of Canadians. Under C-51, such warrants would be granted in a secret hearing, with no representation from the target of such measures, and with no right of appeal.
  • So it's no surprise that Canadians are worried. What is unprecedented however, is the sheer number of Canadians taking part in the campaign to stop the bill. My organization, OpenMedia, has been campaigning on privacy issues for years -- but in all our time, we've never seen a public outpouring quite like this. Our joint efforts are clearly having an impact: public opinion has swung dramatically against Bill C-51 since it was announced. Support has plummeted, with a recent Forum Research poll finding that 56 per cent of Canadians now oppose Bill C-51, with just 33 per cent in favour. The business community, civic society groups, and principled conservatives have all spoken out. Sadly, there's no sign that the government is listening. At the time of writing, the government seems determined to use its majority to ram the legislation through the Commons in the coming weeks. What's even more worrying is that this reckless, dangerous, and ineffective legislation will further undermine Canadians' privacy rights -- rights that have already been seriously damaged by the government's Bill C-13, passed late last year, and by the government's failure to address the mass surveillance activities of its Canadian Security Establishment (CSE) intelligence agency.
Paul Merrell

Logistics 101: Where Does ISIS Get Its Guns? | nsnbc international - 0 views

  • Since ancient times an army required significant logistical support to carry out any kind of sustained military campaign. In ancient Rome, an extensive network of roads was constructed to facilitate not only trade, but to allow Roman legions to move quickly to where they were needed, and for the supplies needed to sustain military operations to follow them in turn.
  • ISIS’ Supply Lines The current conflict consuming the Middle East, particularly in Iraq and Syria where the so-called “Islamic State” (ISIS) is operating and simultaneously fighting and defeating the forces of Syria, Lebanon, Iraq, and Iran, we are told, is built upon a logistical network based on black market oil and ransom payments. The fighting capacity of ISIS is that of a nation-state. It controls vast swaths of territory straddling both Syria and Iraq and not only is able to militarily defend and expand from this territory, but possesses the resources to occupy it, including the resources to administer the populations subjugated within it. For military analysts, especially former members of Western armed forces, as well as members of the Western media who remember the convoys of trucks required for the invasions of Iraq in the 1990s and again in 2003, they surely must wonder where ISIS’ trucks are today. After all, if the resources to maintain the fighting capacity exhibited by ISIS were available within Syrian and Iraqi territory alone, then certainly Syrian and Iraqi forces would also posses an equal or greater fighting capacity but they simply do not.
  • And were ISIS’ supply lines solely confined within Syrian and Iraqi territory, then surely both Syrian and Iraqi forces would utilize their one advantage – air power – to cut front line ISIS fighters from the source of their supplies. But this is not happening and there is a good reason why. Terrorists and weapons left over from NATO’s intervention in Libya in 2011 were promptly sent to Turkey and then onto Syria – coordinated by US State Department officials and intelligence agencies in Benghazi – a terrorist hotbed for decades.ISIS’ supply lines run precisely where Syrian and Iraqi air power cannot go. To the north and into NATO-member Turkey, and to the southwest into US allies Jordan and Saudi Arabia. Beyond these borders exists a logistical network that spans a region including both Eastern Europe and North Africa. The London Telegraph would report in their 2013 article, “CIA ‘running arms smuggling team in Benghazi when consulate was attacked’,” that:
  • ...4 more annotations...
  • [CNN] said that a CIA team was working in an annex near the consulate on a project to supply missiles from Libyan armouries to Syrian rebels. Weapons have also come from Eastern Europe, with the New York Times reporting in 2013 in their article, “Arms Airlift to Syria Rebels Expands, With Aid From C.I.A.,” that: From offices at secret locations, American intelligence officers have helped the Arab governments shop for weapons, including a large procurement from Croatia, and have vetted rebel commanders and groups to determine who should receive the weapons as they arrive, according to American officials speaking on the condition of anonymity. And while Western media sources continuously refer to ISIS and other factions operating under the banner of Al Qaeda as “rebels” or “moderates,” it is clear that if billions of dollars in weapons were truly going to “moderates,” they, not ISIS would be dominating the battlefield.
  • Recent revelations have revealed that as early as 2012 the United States Department of Defense not only anticipated the creation of a “Salafist Principality” straddling Syria and Iraq precisely where ISIS now exists, it welcomed it eagerly and contributed to the circumstances required to bring it about. Just How Extensive Are ISIS’ Supply Lines? While many across the West play willfully ignorant as to where ISIS truly gets their supplies from in order to maintain its impressive fighting capacity, some journalists have traveled to the region and have video taped and reported on the endless convoys of trucks supplying the terrorist army. Were these trucks traveling to and from factories in seized ISIS territory deep within Syrian and Iraqi territory? No. They were traveling from deep within Turkey, crossing the Syrian border with absolute impunity, and headed on their way with the implicit protection of nearby Turkish military forces. Attempts by Syria to attack these convoys and the terrorists flowing in with them have been met by Turkish air defenses. Germany’s international broadcaster Deutsche Welle (DW) published the first video report from a major Western media outlet illustrating that ISIS is supplied not by “black market oil” or “hostage ransoms” but billions of dollars worth of supplies carried into Syria across NATO member Turkey’s borders via hundreds of trucks a day.
  • The report titled, “‘IS’ supply channels through Turkey,” confirms what has been reported by geopolitical analysts since at least as early as 2011 – that ISIS subsides on immense, multi-national state sponsorship, including, obviously, Turkey itself. Looking at maps of ISIS-held territory and reading action reports of its offensive maneuvers throughout the region and even beyond, one might imagine hundreds of trucks a day would be required to maintain this level of fighting capacity. One could imagine similar convoys crossing into Iraq from Jordan and Saudi Arabia. Similar convoys are likely passing into Syria from Jordan. In all, considering the realities of logistics and their timeless importance to military campaigns throughout human history, there is no other plausible explanation to ISIS’s ability to wage war within Syria and Iraq besides immense resources being channeled to it from abroad. If an army marches on its stomach, and ISIS’ stomachs are full of NATO and Persian Gulf State supplies, ISIS will continue to march long and hard. The key to breaking the back of ISIS, is breaking the back of its supply lines. To do that however, and precisely why the conflict has dragged on for so long, Syria, Iraq, Iran, and others would have to eventually secure the borders and force ISIS to fight within Turkish, Jordanian, and Saudi territory – a difficult scenario to implement as nations like Turkey have created defacto buffer zones within Syrian territory which would require a direct military confrontation with Turkey itself to eliminate.
  • With Iran joining the fray with an alleged deployment of thousands of troops to bolster Syrian military operations, overwhelming principles of deterrence may prevent Turkey enforcing its buffer zones. What we are currently left with is NATO literally holding the region hostage with the prospect of a catastrophic regional war in a bid to defend and perpetuate the carnage perpetrated by ISIS within Syria, fully underwritten by an immense logistical network streaming out of NATO territory itself.
Gary Edwards

Poems - The Old Issue : Rudyard Kipling - 1 views

  • Ancient Right unnoticed as the breath we draw— Leave to live by no man’s leave, underneath the Law. Lance and torch and tumult, steel and grey-goose wing Wrenched it, inch and ell and all, slowly from the King. Till our fathers ’stablished, after bloody years, How our King is one with us, first among his peers. So they bought us freedom—not at little cost Wherefore must we watch the King, lest our gain be lost,
  • (Time himself is witness, till the battle joins, Deeper strikes the rottenness in the people’s loins.)
  • Give no heed to bondsmen masking war with peace. Suffer not the old King here or overseas.
  • ...5 more annotations...
  • They that beg us barter—wait his yielding mood— Pledge the years we hold in trust—pawn our brother’s blood—
  • He shall mark our goings, question whence we came, Set his guards about us, as in Freedom’s name.
  • He shall peep and mutter; and the night shall bring Watchers ’neath our window, lest we mock the King—
  • Hate and all division; hosts of hurrying spies; Money poured in secret, carrion breeding flies.
  • Step by step, and word by word: who is ruled may read. Suffer not the old Kings: for we know the breed— All the right they promise—all the wrong they bring. Stewards of the Judgment, suffer not this King!
  •  
    Ode to the NSA!  Hat tip to Marbux for this awesome digg.  Kipling wrote this at the outbreak of the Boer War.  Like the War on Terror, the circumstance and patriotic fervor of citizens demanding safety and security becomes occasion for the government to seize and stomp liberty. There are some really beautiful lines here.
Paul Merrell

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
Paul Merrell

Senators: Limit NSA snooping into US phone records - 0 views

  • One of those senators, Mark Udall, D-Colo., challenged the head of the NSA, Gen. Keith Alexander, on just how far his agency could go when gathering those records. "Is it the goal of the NSA to collect the phone records of all Americans?" Udall asked at Thursday's hearing. "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it. Yes," Alexander replied. Udall's counterpart on the committee in proposing more stringent limits, Sen. Ron Wyden, D-Ore., asked Alexander whether the NSA had ever collected or made plans to collect Americans' cellphone signals to track the movements of individual callers. Alexander answered both times that the NSA was not collecting such data and would have to ask for court approval if it wanted to. Questioned further, he cited a classified version of the letter that was sent to senators and said, "What I don't want to do ... is put out in an unclassified forum anything that's classified." Wyden promised to keep asking.
  •  
    This is from 27 September 2013. Note the quote from Gen. Alexander saying the NSA wants *all* telephone records in a lockbox for later searches. That's important information about the size of the haystack the NSA wants to build.  
Paul Merrell

Paul Offers NDAA Amendment to Drive Release of 28 Pages | 28Pages.org - 0 views

  • Following through on intentions he announced earlier this week, Senator Rand Paul today offered an amendment to the pending National Defense Authorization Act (NDAA) that would require the president to declassify 28 pages on foreign government links to the 9/11 hijackers. The language is identical to S.1471, the bill Paul introduced on Monday with Senators Ron Wyden and Kirsten Gillibrand. In a story on Paul’s new move, The Hill’s Julian Hattem said the proposed amendment “heightens the profile of the fight and may increase the stakes for the opponents.”
  • While there are a growing number of vocal champions of the declassification of the 28 pages, those who want the 28 pages kept under wraps have worked quietly and effectively out of public view. As we wrote earlier this year, “It’s likely that among the most powerful of those unseen opponents of 9/11 transparency are two strange bedfellows: The Kingdom of Saudi Arabia—which has fueled the growth of terror, and the U.S. intelligence community—which is charged with thwarting terror.” Paul’s amendment to the must-pass NDAA could force some of those opponents—and, more specifically, their Senate allies—out of the shadows.
  • However, the language may also offer President Obama an opportunity to continue his administration’s refusal to release the 28 pages, as it says he is not required to declassify sources and methods if that release would “result in imminent lawless action or comprise presently on-going national security operations.”
  • ...1 more annotation...
  • In 2003, Bush invoked “sources and methods” when defending his decision to classify the pages, saying “Declassification of that part of a 900-page document would reveal sources and methods that would make it harder for us to win the war on terror. … It would help the enemy if they knew our sources and methods.” Among many who have read the 28 pages, Congressman Walter Jones denies that declassification would harm national security in any way, pointing to other motives for the secrecy. “There’s nothing in it about national security. It’s about the Bush administration and its relationship with the Saudis,” Jones told The New Yorker.
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Joseph Skues

Being sick in France ; French social security ; retirement in France - 0 views

  • the system is very efficient : the administrative cost of the health system is around 4,5% (for US private insurance companies : 10 to 13%) and 1,2% for the retirement system (vs. around 10% for most pension funds). The health system reimburses very quickly (after four days).
  • 22 Euros
  • "three best symbols of the French nation" are the flag, the health and the Marseillaise
  • ...20 more annotations...
  • each regional organization (Caisse) is managed by a board composed 50/50 of representatives of labor unions on one side, employers associations on the other side, with the State playing the role of a referee
  • it is not accurate to call it a "socialized
  • when a family is expecting a child, it gets approximately 2,000 Euros in three installments (the first two of them corresponding to a mandatory medical visit, the third to the birth) ; then the family receives a monthly allowance till the child is 20 (for two children or more, around 100 Euros/month/child) ;
  • minimal pension (in the range of 750 Euros/month) to any person who has worked 40 years
  • For the French, it is just unthinkable that, if you lose your job, you also lose your health plan
  • This is a typical example of what the French call their "social model" and one of the few where, in my opinion, the USA could learn something from the French experience. Read my opinion about it "Socialized medicine : give me a break".
  • all companies, whatever their size, must provide their staff with an annual visit to a doctor ; in big companies it is a in-house doctor, in small companies an external doctor who comes for the annual controls
  • (otherwise, you'll be reimbursed a little less)
  • SOS Medecin tel. 01 47 07 77 77 : very reasonably priced (around 70 Euros) and efficient, a doctor in your house in less than an hour
  • Basic tips for tourists you can see any doctor (they also make house calls for a small supplement) for a cost of around 22 Euros ($ 30) but you will not be reimbursed by Social Security if you are not part of the French Social Security system you can be treated by any French hospital in case of emergency (they will talk about money AFTER treating you...) you can buy certain drugs over the counter in a pharmacy but a lot of them require a doctor's prescription ; don't be surprised if you do not find US drug brand names, you are in another country ! If your French isn't good, there are two hospitals with English-speaking staff : the American Hospital, 63 blvd Victor Hugo 92202 Neuilly, Tel. 33-(0)1 46 41 25 25 ; Email : patient@ahp-paris.com the British Hospital, 3 rue Barbès 92300 Levallois Tel. 33-(0)1 46 39 22 22 Public or private ? For a serious case, it is often wiser to go to a public hospital, especially a CHU (Centre Hospitalo-Universitaire). In case of a (real) emergency call SAMU (this is a day and night emergency service tel. 15) or les pompiers (fire-brigade) who provide 24 hour-emergency service (tel. 18). Useful numbers for emergencies (other than 15) :
  • The World Health Organization (WHO) has ranked the health system of its 191 member countries and France tops the list for providing the best overall health care (UK ranks 18 and USA ranks 37) (source : International Herald Tribune June 21,2000).
  • Health coverage by Social Security ("Sécurité Sociale") is mandatory and paid both by the employee (1/4) and the employer (3/4).
  • In the USA the Emergency staff is a driver whose job is to take you as fast as possible to the hospital, whatever your condition, in a fast ambulance. In France, the SAMU team includes a MD whose job is to do as much as he can before taking you to the hospital in a more heavily-equipped ambulance. Both ways have their pros and cons, but dont be horrified if you see an ambulance NOT moving....
  • DID YOU KNOW THAT....? In France, the maternity leave is 16 weeks minimum (of course paid 100% of the salary!), plus one month minimum if the baby is breast-fed ; "paternity" leave is two weeks ; new mothers spend 3 to 6 days in the hospital.
  • To related pages : a column of the Health system (#2), an American article on the French health system (#3), etc....
  • French doctors are not very different from American doctors, except they make much less money (three or four times?) and are probably much more accessible, less protected by a dragon-secretary.
  • All expenses are paid by the company and of course the employee does not pay a cent. The 20-minute visit includes whatever check-up seems appropriate (heart, eyes, stress, depression...). The doctor cannot prescribe medecine but can prescribe a visit to the doctor is something new that is wrong or needs a more thorough check is detected.
  • You have to pay ONE Euro more (not reimbursable) for every visit to the doctor
  • The system is threefold : Health, Family and Retirement, each of them has different structures and financing ; each of them is financially autonomous (no taxpayer's money -
  • The system is threefold : Health, Family and Retirement, each of them has different structures and financing ; each of them is financially autonomous ( no taxpayer's money
Gary Edwards

Gold - MUST READ Op-Ed: The world's monetary system is melting down... - 0 views

  •  
    The printing presses have been smoking, working night and day, printing money like there is not tomorrow.  Meanwhile, the USA government is spending money and creating debt like there really will not be a tomorrow.  This article is reprinted from Bloomberg Financial News.  It's a shocker.  Turns out that as the dollar falls, there is no where to hide.  Other nations are too heavily invested in non yeilding treasury notes to save themselves.  We're looking at hyperinflation.  The kind that will bring down the world and probably usher in a Wrold War III.  
Gary Edwards

Obama's Socialism: A history of Marxist - Leftist Radicalism : Commentary Online - 0 views

  • Even after declaring his candidacy, and despite a certain inevitable sidling rightward, Obama still reflected the presuppositions of a radical worldview. In one notable remark, he said of voters in economic distress that in their desperation they “cling to guns or religion or antipathy to people who aren’t like them.” Chastised for his condescension, he responded: “I said something that everybody knows is true.” This was elitism of a very specific kind—the mentality of the community organizer, according to which people in the grip of “false consciousness” need to be enlightened as to the true nature of their class interests, and to the nature of their true class enemies.
  • Even the events of 9/11 could not shake Obama from the mindset that the enemy is always ourselves. The bombings, he wrote, reflected the underlying struggle—between worlds of plenty and worlds of want; between the modern and the ancient; between those who embrace our teeming, colliding, irksome diversity, while still insisting on a set of values that binds us together; and those who would seek, under whatever flag or slogan or sacred text, a certainty and simplification that justifies cruelty toward those not like us. In this reading, the lessons to be learned from the actions of Osama bin Laden and Mohammed Atta are that we must accept multiculturalism at home and share our wealth abroad.
  •  
    Comprehensive history of Obama's socialism, and the associations that influenced him.
Gary Edwards

ACTA Open Must Read Analysis: Why Markets Are Still Falling . . . The Shadow Financial ... - 0 views

  • evidence suggests more credit default swaps are traded in London than in the United States according to the US Federal Reserve, so US action alone cannot address perceived problems.
  • As corporations, home owners and credit card holders go into default -- stop making payments -- many financial institutions are being hit twice on their balance sheet -- once by the bad loan and then by the associated CDS default or obligation.
  • CDS trading has expanded 100-fold since 2001 as financial institutions including insurance companies and hedge funds as well as investors have used the contracts to protect against bond losses and speculate on companies' ability to repay debt.
  • ...4 more annotations...
  • Chicago Mercantile Exchange
  • Lawmakers are also considering the introduction of new regulations to curb CDS abuse as engines of speculation, but many financial experts are also encouraging the creation of public exchanges for these shadow markets. An exchange would establish an arms length price. As that price was transparent and moved, the market would see that a credit was deteriorating. A centralised clearing market would help shine a clear light on these transactions and since every trade would be backed up by the members of the clearing house, chances of default would greatly be reduced.
  • Unlike most financial markets, credit default swaps are unregulated and at USD 54.6 trillion, they are one of the largest unregulated markets in the world.
  • In response to the coming derivatives and deleveraging Tsunami, which has already begun, the world GDP may have to shrink drastically -- some estimates suggest between 30% and 50% -- over the coming years of The Great Unwind. This is the severe recession the markets fear as they go into free fall.
  •  
    Why are Markets still Falling? The Tsunami caused by Derivatives and Deleveraging The invisible elephant in the room causing continuous falls in global financial markets is the link to the privately traded Credit Default Swaps (CDS) and the financial uncertainty they have created whilst synchronised deleveraging takes place across the world. ... Credit default swaps are unregulated financial derivatives which act as debt insurance on risky assets like mortgages, corporate and government bonds. But unlike a normal insurance policy, financial institutions that sell credit default swaps are not required to have enough funds in reserve should those risky loans turn bad. Since the US Congress in 2000 declined to regulate these contracts as it does insurance, the companies that guarantee the assets are not required by law to keep enough capital on hand to pay them off in the event of a default.
« First ‹ Previous 201 - 220 of 250 Next › Last »
Showing 20 items per page