Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged open-carry

Rss Feed Group items tagged

Paul Merrell

Gov't Amasses Riot Police, Military Gear, And Opens Makeshift Prisons To Prepare For RNC - 0 views

  • Authorities in Cleveland, Ohio, are adding fuel to an already “combustible” atmosphere, some activists say, as the city readies extra jail space and courtrooms and shuts down a local university to house 1,700 riot police and their weapons in preparation for demonstrations at next week’s Republican Party convention. Democracy Now! reported Thursday that city officials “say some courts will be kept open almost 24 hours per day in case protesters are arrested en masse. Authorities have also opened up extra jail space to hold protesters.” The decision to shut down classes at Case Western Reserve University to house riot police drew ire from students and faculty,
  • Adding tension to the situation in Cleveland is the fact that several Black Lives Matter protests last week saw mass arrests and violent behavior from police, leading civil rights groups in Louisiana to sue the Baton Rouge police force for violating demonstrators’ First Amendment rights—not to mention the fatal police shootings of two black men in St. Pauland Baton Rouge a week prior. In Cleveland in particular, there is widespread distrust of the police department that fatally shot 12-year-old Tamir Rice, and then lied about the circumstances of the killing to cover themselves. Police nationwide have also been on edge since a lone gunman ambushed a peaceful protest in Dallas, killing five officers. Moreover, it emerged on Thursday that officials from the FBI have been personally contacting civil rights activists associated with the Black Lives Matter movement to warn them that they shouldn’t show up at the convention, the Independent reports.
  • As Ohio has an “open carry” law allowing the open display of guns, observers expect many convention-goers to be armed. “Should violence break out during protests in Cleveland, open-carry activists bearing long-gun rifles may distract officers, frighten demonstrators, or inadvertently endanger themselves,” CityLab argued.
  • ...2 more annotations...
  • Activists are preparing for the worst. The Boston Globe reported that hundreds of demonstrators “will undergo training to help ensure their safety. Some will don neon green caps and be tasked with documenting—with video—the use of force by police or attacks by other groups.” “Activists are being trained to make sure their hands are always exposed, so it’s evident they are not holding weapons, and to clearly articulate if approached by police that they are ‘complying, not resisting,'” the newspaper added.
  • Heads of the Department of Homeland Security and the FBI both told reporters that theyfear violence from “radical activists” at next week’s convention, ABC reported. “It’s a threat we’re watching very, very carefully,” FBI director James Comey said.
  •  
    The DNC convention may be every bit as tension-filled, with Sanders supporters aiming to bring 1 million people to the convention to sway the vote on floor amendments to the Democratic platform.
Paul Merrell

Did Members of the US-Led Coalition Carry Out an Air Strike to Help ISIS? Russia Implie... - 0 views

  • The argument over the air strike on the Syrian military base in Deir az-Zor has taken a strange and worrying turn.The US has categorically denied that any of its aircraft were involved. It has admitted that its aircraft were in the area, but says that they carried out an air strike 55 km away.The Russians say that is true. However, they also say that it is not the whole truth.The Russians say that in addition to the US aircraft, two pairs of aircraft - in other words four aircraft in total - from two other countries that are also members of the US led coalition were also flying at the time of the air strike over Deir az-Zor.The Russians have not actually said it was these aircraft that carried out the air strike. However, they have pointed out that the US has failed to admit to the presence of these aircraft. They are asking why?
  • It is the broadest of hints, and it is difficult to believe that the Russians do not think that it was these aircraft that carried out the air strike.This information - if it is true - begs a host of questions.Firstly, the Syrian military base that was hit by the air strike was apparently the scene of a bitter battle between the Syrian military and the Islamic State.  It seems that shortly after the air strike - and most probably as a result of it - the Islamic State’s fighters were able to storm it.Inevitably, that begs the question of whether the aircraft that carried out the air strike were providing air support to the fighters of the Islamic State.  On the face of it, it looks like they were. After all, if what happened was simply a mistake, it might have been expected that the US and its allies would say as much.If so, it is an extremely serious and worrying development, suggesting that some members of the US-led anti-Islamic State coalition are actually in league with the Islamic State.
  • Secondly, Deir az-Zor is the area of Syria from which the Islamic State exports most of its oil. Again, this inevitably begs the question of whether the Islamic State attack on the base - and the air strike seemingly carried out in support of it - was in some way connected to the illegal oil trade, and might have been intended to protect it.Thirdly, there is the obvious question of which countries’ aircraft were involved. The Russians are not identifying these countries - at least for the moment - though they obviously know or think they know which they are.  The one thing however that the Russians are saying is that the aircraft of more than one country was involved.The Russians are also drawing attention to the US’ failure to admit to the presence of the aircraft of these countries, which strongly suggests that the US is protecting them, whichever countries they are.Lastly, it is interesting that the Russians seem to be so well informed about this incident.  If the Russians do indeed know how many aircraft from the US-led coalition were flying at any one time over Der az-Zor, and can identify the countries they belong to, then the inescapable conclusion is that their surveillance and intelligence operation in Syria is very effective indeed.
  • ...2 more annotations...
  • This raises the interesting possibility that this sort of thing has not only happened before, but that it has been going on unreported for some time, and that the reason why the Russians made so much of this particular incident was so as to warn the US that with the Russian surveillance and intelligence operation in Syria now so good the US cannot get away with doing this sort of thing any longer. If Russian reporting of this incident is intended as a warning to the US, then that might explain why the Russians have held back information about the identity of the countries whose aircraft were involved in this incident.  With the warning made, the Russians may feel that there is no reason to inflame the situation further by making public accusations against particular countries, whose governments would have no option but to dispute them.As is now happening continuously with news coming out of Syria, Western governments and the Western media have pulled down a curtain of silence over this story.This is scarcely surprising since any hint that any Western ally is in league with the Islamic State - even in the most informal sense - would after the Paris attacks be politically explosive.
  • In the case of Britain - if it was its aircraft that were involved - an attack on a Syrian military base would be in open defiance of the will of the British parliament.The attempt to suppress information about this incident however in no way diminishes its importance.  The two coalitions supposedly fighting the Islamic State - the US-led coalition and the Russian-led coalition - have in the space of just two weeks twice fought each other - once when the SU24 was shot down, and now with the attack on the Syrian base.  On both occasions it was members of the US-led coalition that acted as the aggressors.That makes it doubly important that as many people as possible are informed about this incident.In the meantime it is a certainty that all sorts of angry conversations are going on about it at various levels between Moscow and Washington.
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Paul Merrell

FBI demands new powers to hack into computers and carry out surveillance | US news | Th... - 0 views

  • The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world. Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violate first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight. The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.
  • “This is a giant step forward for the FBI’s operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move,” said Ahmed Ghappour, an expert in computer law at University of California, Hastings college of the law, who will be addressing next week’s hearing. The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district. But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.
  • Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.
  • ...2 more annotations...
  • Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week’s meeting: “This should not be the first public forum for discussion of an issue of this magnitude.” Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that “this is an investigative technique that we haven’t seen before and we haven’t thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved.” Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.
  • Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that. In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as “a search of foreign property known to contain criminal evidence, for which a warrant was not necessary”.
  •  
    This rule change has been in the works during the last year.  "The change is designed specifically to help federal investigators carry out surveillance on computers that have been "anonymized" - that is, their location has been hidden using tools such as Tor."  Are we dizzy yet? The State Department is pushing the use of TOR by dissidents in nations whose governments State and the CIA intends to overthrow. Meanwhile, Feed Bag, Inc. wants use of TOR to be sufficient grounds for installing malware on anyone using it to make their systems and all their systems can see or hear be an open book. Let's see. There's the First Amendment right to anonymous speech just to begin with. McIntyre v. Ohio Elections Comm'n, 514 US 334 (1995). ("Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation-and their ideas from suppression-at the hand of an intolerant society. The right to remain anonymous may be abused when it shields fraudulent conduct. But political speech by its nature will sometimes have unpalatable consequences, and, in general, our society accords greater weight to the value of free speech than to the dangers of its misuse.") (Internal citation omitted.) And of course there's the Natural Law liberty to whisper, to utter words in a way that none but the intended recipient can hear. So throw on the violation of the Fifth Amendment's Liberty clause. Then there's the plain language of the Fourth Amendment warrant clause, "particularly describing the *place* to be searched." Not to mention the major reason for the Fourth Amendment, to abolish the "general warrant" that had enabled the Crown to search wherever the warrant's executor's little heart desired.  And th
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

GCHQ taps fibre-optic cables for secret access to world's communications | UK news | gu... - 0 views

  • Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
  • GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called "the largest programme of suspicionless surveillance in human history"."It's not just a US problem. The UK has a huge dog in this fight," Snowden told the Guardian. "They [GCHQ] are worse than the US."
  • However, on Friday a source with knowledge of intelligence argued that the data was collected legally under a system of safeguards, and had provided material that had led to significant breakthroughs in detecting and preventing serious crime.Britain's technical capacity to tap into the cables that carry the world's communications – referred to in the documents as special source exploitation – has made GCHQ an intelligence superpower.By 2010, two years after the project was first trialled, it was able to boast it had the "biggest internet access" of any member of the Five Eyes electronic eavesdropping alliance, comprising the US, UK, Canada, Australia and New Zealand.UK officials could also claim GCHQ "produces larger amounts of metadata than NSA". (Metadata describes basic information on who has been contacting whom, without detailing the content.)By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: "We have a light oversight regime compared with the US".
  • ...8 more annotations...
  • When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was "your call".The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
  • For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.This was done under secret agreements with commercial companies, described in one document as "intercept partners".The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned "sensitive relationship teams" and staff were urged in one internal guidance paper to disguise the origin of "special source" material in their reports for fear that the role of the companies as intercept partners would cause "high-level political fallout".
  • The GCHQ documents that the Guardian has seen illustrate a constant effort to build up storage capacity at the stations at Cheltenham, Bude and at one overseas location, as well a search for ways to maintain the agency's comparative advantage as the world's leading communications companies increasingly route their cables through Asia to cut costs. Meanwhile, technical work is ongoing to expand GCHQ's capacity to ingest data from new super cables carrying data at 100 gigabits a second. As one training slide told new users: "You are in an enviable position – have fun and make the most of it."
  • The categories of material have included fraud, drug trafficking and terrorism, but the criteria at any one time are secret and are not subject to any public debate. GCHQ's compliance with the certificates is audited by the agency itself, but the results of those audits are also secret.An indication of how broad the dragnet can be was laid bare in advice from GCHQ's lawyers, who said it would be impossible to list the total number of people targeted because "this would be an infinite list which we couldn't manage".There is an investigatory powers tribunal to look into complaints that the data gathered by GCHQ has been improperly used, but the agency reassured NSA analysts in the early days of the programme, in 2009: "So far they have always found in our favour".
  • Historically, the spy agencies have intercepted international communications by focusing on microwave towers and satellites. The NSA's intercept station at Menwith Hill in North Yorkshire played a leading role in this. One internal document quotes the head of the NSA, Lieutenant General Keith Alexander, on a visit to Menwith Hill in June 2008, asking: "Why can't we collect all the signals all the time? Sounds like a good summer project for Menwith."By then, however, satellite interception accounted for only a small part of the network traffic. Most of it now travels on fibre-optic cables, and the UK's position on the western edge of Europe gave it natural access to cables emerging from the Atlantic.
  • The processing centres apply a series of sophisticated computer programmes in order to filter the material through what is known as MVR – massive volume reduction. The first filter immediately rejects high-volume, low-value traffic, such as peer-to-peer downloads, which reduces the volume by about 30%. Others pull out packets of information relating to "selectors" – search terms including subjects, phone numbers and email addresses of interest. Some 40,000 of these were chosen by GCHQ and 31,000 by the NSA. Most of the information extracted is "content", such as recordings of phone calls or the substance of email messages. The rest is metadata.
  • "The criteria are security, terror, organised crime. And economic well-being. There's an auditing process to go back through the logs and see if it was justified or not. The vast majority of the data is discarded without being looked at … we simply don't have the resources."However, the legitimacy of the operation is in doubt. According to GCHQ's legal advice, it was given the go-ahead by applying old law to new technology. The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary.However, an obscure clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad. But the nature of modern fibre-optic communications means that a proportion of internal UK traffic is relayed abroad and then returns through the cables.
  • British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
  •  
    Note particularly that the Brit criteria adds economic data to the list of categories categories the NSA trawls for and shares its data with the U.S. NSA. Both agencies claim to be targeting foreigners, so now we're into the "we surveil your citizens; you surveil our citizens, then we'll share the results" scenario that leaves both sides of the pond with a superficial excuse to say "we don't surveil our own citizens, just foreigners." But it's just ring-around-the-rosy. 850,000 NSA employees and U.S. private contractors with access to GCHQ surveillance databases.  Lots more in the article that I didn't highlight.
Paul Merrell

Saudi Press Just Accuses US Govt Of Carrying Out 9/11 Attacks - 0 views

  • In response to the U.S. Senate’s unanimous vote to allow 9/11 victims’ families to sue Saudi Arabia in federal court, a report published in the London-based Al-Hayat daily, by Saudi legal expert Katib al-Shammari, claims that the U.S. masterminded the terror attacks as a means of creating a nebulous “enemy” in order garner public support for a global war on terror. The report by al-Shammari, translated by the Middle East Media Research Institute (MEMRI), claims that long-standing American policy is “built upon the principle of advance planning and future probabilities,” which the U.S. has now turned toward the Saudi regime after being successfully employed against first the Taliban and al-Qaeda, then Saddam Hussein and his secular Baathist controlled Iraq. Al-Shammari claims the recent U.S. threats to “expose” documents implicating the Saudi government are simply the continuation of a U.S. policy, which he refers to as “victory by means of archive.” He highlights that during the initial invasion of Iraq, under George H.W. Bush, Saddam Hussein was left alive and in power to be used as “a bargaining chip,” but upon deciding that he was “no longer an ace up their sleeve” Washington moved to topple his government and install a U.S.-backed ruling party.
  • The terrorist attacks of 9/11 are now the “ace up the sleeve” of the U.S. government, according to al-Shammari. “September 11 is one of winning cards in the American archives, because all the wise people in the world who are experts on American policy and who analyze the images and the videos [of 9/11] agree unanimously that what happened in the [Twin] Towers was a purely American action, planned and carried out within the U.S. Proof of this is the sequence of continuous explosions that dramatically ripped through both buildings… Expert structural engineers demolished them with explosives, while the planes crashing [into them] only gave the green light for the detonation – they were not the reason for the collapse. But the U.S. still spreads blame in all directions. [This policy] can be dubbed ‘victory by means of archives.” The impetus behind the attacks, writes al-Shammari, was to create “an obscure enemy – terrorism – which became what American presidents blamed for all their mistakes” and that would provide justification for any “dirty operation” in any nation. According to al-Shammari’s report in Al-Hayat: “On September 11, the U.S. attained several victories at the same time, that [even] the hawks [who were at that time] in the White House could not have imagined. Some of them can be enumerated as follows:
  • 1. The U.S. created, in public opinion, an obscure enemy – terrorism – which became what American presidents blamed for all their mistakes, and also became the sole motivation for any dirty operation that American politicians and military figures desire to carry out in any country. [The] terrorism [label] was applied to Muslims, and specifically to Saudi Arabia. 2. Utilizing this incident [9/11], the U.S. launched a new age of global armament. Everyone wanted to acquire all kinds of weapons to defend themselves and at the same time battle the obscure enemy, terrorism – [even though] up to this very moment we do not know the essence of this terrorism of which the U.S. speaks, except [to say that] that it is Islamic… 3. The U.S. made the American people choose from two bad options: either live peacefully [but] remain exposed to the danger of death [by terrorism] at any moment, or starve in safety, because [the country’s budget will be spent on sending] the Marines even as far as Mars to defend you.” The Saudi press has been in a frenzy since the unanimous Senate vote to allow for the House of Saud to be held liable in U.S. federal court for the 9/11 attacks, with the U.S. being accused of being in alliance with Iran – to press warnings that passage of the “Satanic” bill would “open the gates of hell,” as reported by Breitbart.
  • ...1 more annotation...
  • Al-Shammari makes extremely clear that he views the problem as the U.S. imperial machine itself, stating, “the nature of the U.S. is that it cannot exist without an enemy.” The nature of the U.S. is that it cannot exist without an enemy… [For example,] after a period during which it did not fight anyone [i.e. following World War II], the U.S. created a new kind of war – the Cold War… Then, when the Soviet era ended, after we Muslims helped the religions and fought Communism on their [the Americans’] behalf, they began to see Muslims as their new enemy! The U.S. saw a need for creating a new enemy – and planned, organized, and carried this out [i.e. blamed Muslims for terrorism]. This will never end until it [the U.S.] accomplishes the goals it has set for itself. While it seems fighting Islamic terrorism is great for increasing fear and State propaganda meant to elicit compliant civilian populations that passively accept loss of liberty for promises of greater security, the military-industrial complex needs a bigger enemy to justify their $600 billion dollar-a-year budgets, thus beginning the transition to labeling Russia/China as “aggressive Russia/China,” in an effort to begin to pivot away from one bogeyman to other, more profitable, ones.
  •  
    Has the ring of plausability to it although it seems to ignore the Israeli role. 
Paul Merrell

U.S. rejects claim that Turkey planned Syria atrocity Anadolu Agency - 0 views

  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency.
  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency. Seymour Hersh, a freelance journalist, published an article in the London Review of Books (LRB) in which he claimed that Ankara had supplied the al Nusra Front with chemical weapons that they used to carry out the August 2013 attack. The Washington Post and the New Yorker declined the story prior to its publication in the LRB. “The Assad regime, and only the Assad regime, could have been responsible for the chemical weapons attack that took place on August 21,” said Shawn Turner and Caitlyn Hayden in a statement initially issued to fact checkers working on the report and later sent to AA. “The suggestion that there was an effort to suppress or alter intelligence is simply false.” State Department Spokesperson, Jen Psaki, in her daily press briefing said there is no doubt that the chemical attack was carried out by the Syrian regime.
  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency.
  • ...2 more annotations...
  • Psaki said, "In light of our reports and intelligence we had recieved, we believe beyond any doubt that the attack on 21 August had been carried out by the Syrian regime and we are still behind the same view shared by the international community." Hersh cited unidentified American officials and a classified intelligence analysis on the opposition's chemical weapons capabilities to back up his claim. “No such paper was ever requested or produced by Intelligence Community analysts,” said Turner and Hayden.     Hersh wrote that U.S. President Barack Obama had established September 2, 2013 as a fixed deadline for the U.S. military to undertake action in Syria following the chemical attack. Turner and Hayden rejected the claim as “completely fabricated”.  The journalist also wrote that the Obama administration had channeled weapons from Libya to the Syrian opposition through southern Turkey, a claim described by Turner and Hayden as “false”.
  • Turkey also reacted to the claim when Turkey's Deputy Prime Minister Bulent Arinc was asked a question about Hersh's claim that Turkey had provided Sarin gas to the people who had conducted chemical attack in Ghouta region. He said "A note sent by the Turkish Foreign Ministry in this regard says that it is absolutely not true. The White House official has also qualified these claims as definitely false and speculative in response to a question regarding the matter." Arinc said, "The claims based on anonymous sources have been conclusively rejected by the White House officials and it has been reconfirmed that the Assad regime is solely responsible for the chemical attack." Noting that they are well aware of previous articles written by Hersh, Arinc said, "Everyone knows very well that the individual's views and claims heard from some unnamed persons are certainly not any verified information and knowledge. In fact, the U.S. officials have quite fairly explained the matter and strictly rejected the claim."
  •  
    Seymour M. Hersh is among the most highly regarded journalists in the world. Mainstream media used to compete for the rights to publish his articles. But apparently he's been digging a little to deeply in the belly of the beast lately. See his latest article that the White House is denying. http://www.lrb.co.uk/2014/04/06/seymour-m-hersh/the-red-line-and-the-rat-line
Paul Merrell

Secret program at secret Guantánamo prison hears everything | Miami Herald - 0 views

  • A secret Defense Department program provides unfettered eavesdropping on the accused terrorists imprisoned at Guantánamo’s clandestine Camp 7 lockup, recently released war court documents show.Army Col. James L. Pohl, the judge in 9/11 trial, discovered the existence of the secret surveillance program during a recent war court hearing. Little is publicly known about the program, not even its unclassified two-word nickname.
  • The disclosure of pervasive eavesdropping at Guantánamo’s lockup for 14 former CIA prisoners comes in before-and-after documents released by the court from the recent Oct. 19-30 pretrial hearings in the death-penalty case of five men accused of orchestrating the hijackings that killed nearly 3,000 people on Sept. 11, 2001.At issue was accused 9/11 plotter Walid bin Attash’s request for guidance on how he could function as his own attorney. Bin Attash is a Yemeni in his mid-30s who is accused of training some of the hijackers. “You must assume anything you say in Camp 7 is not confidential and will be disclosed to the U.S. Government,” warns an Oct. 23 draft of the advisory, crafted after the judge was informed of the covert program. “Only when you are in Echo 2 will anything you say be covered by the attorney-client privilege.”An Oct. 20 draft of the advisory omits those lines.
  • This is not the first time in the proceedings that a surveillance program caught Pohl by surprise. In January 2013, he ordered the CIA to unplug a button that allowed an unseen observer to cut the court’s audio feed to the public. Perhaps ironically, the lone site the judge considers safe for consultative trial preparation — the Camp Echo compound of wooden huts, each containing a cell — at one time had covert recording devices that looked like smoke detectors. The judge ordered them disabled in February 2013.Attorney Dror Ladin of the American Civil Liberties Union, who was an observer at the Guantánamo hearings last month, said the apparent disclosure of “pervasive surveillance at Camp 7” is the latest issue to challenge the possibility of a fair trial.“It is shocking that for years neither defense counsel nor the judge were made aware that the government was capturing everything said aloud by the detainees there,” he said Thursday. It also adds to mounting questions of “how these military commissions can produce a fair result,” said Ladin, especially if one of the men represents himself. “These are detainees who really can’t see the evidence against them and simultaneously have been provided no rehabilitation services for the torture they suffered for years. It would be astonishing if any of them could craft a fair defense for capital charges.”
  • ...3 more annotations...
  • A defense attorney in another case said the prosecution wants to use a surreptitiously recorded conversation between two Camp 7 captives against an alleged al-Qaida commander. And in 2012 the journalist Daniel Klaidman wrote in his book “Kill or Capture” that the U.S. government had recordings made in a Guantánamo prison recreation yard of the alleged Sept. 11 mastermind Khalid Sheik Mohammed talking about evidence that could be used against him.The latest disclosure comes at a time of decreasing transparency at the war court.On Oct. 29, the judge held a 13-minute secret session without advanced notice to the public. A day later the judge wrote in a three-page ruling that he closed the court at the request of “the Government” — war-court-speak for the prosecution — to protect state secrets whose disclosure “could result in grave danger to national security.”Pohl also ordered the court to issue a censored transcript of the parts the excluded public and accused would be allowed to see. No transcript has been released.Then the next day, Oct. 30, the judge held a daylong, open hearing on a restraining order he issued forbidding female guards from touching the 9/11 accused when they are being taken to court or legal meetings. The judge’s order has outraged members of Congress and the Pentagon brass.
  • In that public court hearing, soldiers called as witnesses from the prison discussed staffing patterns at Camp 7. Normally the Pentagon releases transcripts of open hearings the same day. Unusually, the court has not yet released the Oct. 30 transcript. A Pentagon spokesman suggested Thursday — 13 days after the open court hearing — that somebody was scrubbing the transcript of information already made public. “The security review of the Oct. 30 transcript remains ongoing,” said Navy Cmdr. Gary Ross. “We will provide an update once additional information becomes available.”Much of the October session focused on bin Attash’s question about how he’d act as his own lawyer in a system that does not let the accused terrorist see classified information in the case. The judge and attorneys devoted days to designing a script Pohl would read to any accused 9/11 terrorist who tries to take charge of his defense — and spent a full afternoon huddling in a closed meeting on the secret program.
  • In it, Pohl made clear that he never intended to let bin Attash dismiss his Pentagon-paid defense attorneys — Chicago criminal defense attorney Cheryl Bormann and Air Force Maj. Michael Schwartz. Instead, the script shows Pohl planned to appoint Bormann and Schwartz as “standby counsel” the judge could activate to carry out cross-examination of certain witnesses who might have “particular sensitivities” to being questioned by the alleged terrorist.“If you are represented by lawyers, then it is the lawyers, and not you, who will conduct the defense,” the warning says. “Correspondingly, if you represent yourself, you will be able to perform the lawyer’s core functions, but you will not necessarily be allowed to direct special appearances by counsel when it is convenient to you.”The language suggests a far more limited role by the American lawyers than those carried out in an aborted attempt to hold the Sept. 11 trial during the Bush administration. In those proceedings, alleged 9/11 terrorists serving as their own lawyer regularly had standby counsel write and argue motions in court.The script also envisions a scenario in which an accused 9/11 plotter serving as his own lawyer becomes unruly, disruptive or disobedient rather than respect “the dignity of the courtroom.” In such a case, the judge said he could deal with “obstructionist misconduct” by putting “physical restraints” on bin Attash or ejecting him from the court.Bin Attash, for his part, has not been noticeably disruptive across years of pretrial proceedings. An amputee, he was brought to his May 5, 2012 arraignment in a Guantánamo prison restraint chair routinely used for forced-feeding of hunger strikers — with guards carrying his prosthetic leg separately.
  •  
    It's long past time to recognize that the military cannot provide a fair trial for GITMOI detainees, transfer them to the U.S., and try them in a civilian Article II court. If this kind of crap were going down before an Article II judge, those conducting the surveillance would be sitting in jail. 
Gary Edwards

FBI found direct ties between 9/11 hijackers and Saudis living in Florida; Co... - 0 views

  •  
    By Anthony Summers and Dan Christensen, BrowardBulldog.org United Airlines Flight 175 hits the World Trade Center's south tower Just two weeks before the 9/11 hijackers slammed into the Pentagon and World Trade Center, members of a Saudi family abruptly left their luxury home near Sarasota, leaving a brand new car in the driveway, a refrigerator full of food, fruit on the counter - and an open safe in the master bedroom. In the weeks to follow, law enforcement agents not only discovered the home was visited by vehicles used by the hijackers, but phone calls were linked between the home and those who carried out the death flights - including leader Mohamed Atta - in discoveries never before revealed to the public. Ten years after the deadliest attack of terrorism on U.S. soil, new information has emerged that shows the FBI found troubling ties between the hijackers and residents in the upscale community in southwest Florida, but the investigation wasn't reported to Congress or mentioned in the 9/11 Commission Report. Former U.S. Sen. Bob Graham, the Florida Democrat who cochaired the bipartisan congressional Joint Inquiry into the attacks, said he should have been told about the findings, saying it "opens the door to a new chapter of investigation as to the depth of the Saudi role in 9/11. … No information relative to the named people in Sarasota was disclosed."
Paul Merrell

The Mystery of ISIS' Toyota Army Solved | New Eastern Outlook - 0 views

  • The US Treasury has recently opened an inquiry about the so-called “Islamic State’s” (ISIS/ISIL) use of large numbers of brand-new Toyota trucks. The issue has arisen in the wake of Russia’s air operations over Syria and growing global suspicion that the US itself has played a key role in arming, funding, and intentionally perpetuating the terrorist army across Syria and Iraq. ABC News in their article, “US Officials Ask How ISIS Got So Many Toyota Trucks,” reports: U.S. counter-terror officials have asked Toyota, the world’s second largest auto maker, to help them determine how ISIS has managed to acquire the large number of Toyota pick-up trucks and SUVs seen prominently in the terror group’s propaganda videos in Iraq, Syria and Libya, ABC News has learned. 
  • Toyota says it does not know how ISIS obtained the vehicles and is “supporting” the inquiry led by the Terror Financing unit of the Treasury Department — part of a broad U.S. effort to prevent Western-made goods from ending up in the hands of the terror group. The report went on to cite Iraqi Ambassador to the US, Lukman Faily: “This is a question we’ve been asking our neighbors,” Faily said. “How could these brand new trucks… these four wheel drives, hundreds of them — where are they coming from?” Not surprisingly, it appears the US Treasury is asking the wrong party. Instead of Toyota, the US Treasury’s inquiry should have started next door at the US State Department.
  • Just last year it was reported that the US State Department had been sending in fleets of specifically Toyota-brand trucks into Syria to whom they claimed was the “Free Syrian Army.” US foundation-funded Public Radio International (PRI) reported in a 2014 article titled, “This one Toyota pickup truck is at the top of the shopping list for the Free Syrian Army — and the Taliban,” that: Recently, when the US State Department resumed sending non-lethal aid to Syrian rebels, the delivery list included 43 Toyota trucks. Hiluxes were on the Free Syrian Army’s wish list. Oubai Shahbander, a Washington-based advisor to the Syrian National Coalition, is a fan of the truck. “Specific equipment like the Toyota Hiluxes are what we refer to as force enablers for the moderate opposition forces on the ground,” he adds. Shahbander says the US-supplied pickups will be delivering troops and supplies into battle. Some of the fleet will even become battlefield weapons..
  • ...3 more annotations...
  • The British government has also admittedly supplied a number of vehicles to terrorists fighting inside of Syria.
  • It’s fair to say that whatever pipeline the US State Department and the British government used to supply terrorists in Syria with these trucks was likely used to send additional vehicles before and after these reports were made public. The mystery of how hundreds of identical, brand-new ISIS-owned Toyota trucks have made it into Syria is solved. Not only has the US and British government admitted in the past to supplying them, their military forces and intelligence agencies ply the borders of Turkey, Jordan, and even Iraq where these fleets of trucks must have surely passed on their way to Syria – even if other regional actors supplied them. While previous admissions to supplying the vehicles implicates the West directly, that nothing resembling interdiction operations have been set up along any of these borders implicates the West as complicit with other parties also supplying vehicles to terrorists inside of Syria.
  • Of course, much of this is not new information. So the question remains – why is the US Treasury just now carrying on with this transparent charade? Perhaps those in Washington believe that if the US government is the one asking this obvious question of how ISIS has managed to field such an impressive mechanized army in the middle of the Syrian desert, no one will suspect they had a role in it.
  •  
    Of course those who follow this stuff already knew the answer when Treasury popped the question. The question Treasury hasn't asked yet is why the U.S. didn't bomb all those Toyotas when they convoyed out of Syria into Iraq for the opening of the ISIL war in Iraq? Out in the open desert, the U.S. surely was aware of that mass movement of vehicles.
Paul Merrell

Turkish PM replaces 10 ministers amid graft inquiry | Reuters - 0 views

  • (Reuters) - Turkey's Prime Minister Tayyip Erdogan said he replaced ten cabinet ministers, half of his total roster, after three ministers resigned over a high-level graft inquiry on Wednesday. The replaced ministers included EU Minister Egemen Bagis, who was allegedly named in the corruption probe but had not resigned yet, and key positions such as the Economy and justice ministers.
  •  
    It appears that a large-scale purge is under way in NATO member and E.U. candidate nation Turkey, ostensibly based on corruption and graft charges. Score card so far: ten cabinet ministers fired, three more resigned. More than 500 police officers in the Istanbul area have been fired. http://www.todayszaman.com/news-334870-400-more-police-officers-in-istanbul-removed-from-duty.html The purge of police appears to be largely aimed at upper ranks. More than 110 police chiefs have lost their posts and journalists are in an uproar because of a new directive " banning journalists from entering police department buildings." It appears that a large-scale purge is under way in NATO member and E.U. candidate nation Turkey, ostensibly based on corruption and graft charges. Score card so far: ten cabinet ministers fired, three more resigned. More than 500 police officers in the Istanbul area have been fired. http://www.todayszaman.com/news-334870-400-more-police-officers-in-istanbul-removed-from-duty.html The purge of police appears to be largely aimed at upper ranks. More than 110 police chiefs have lost their posts and journalists are in an uproar because of a new directive " banning journalists from entering police department buildings." It appears that a large-scale purge is under way in NATO member and E.U. candidate nation Turkey, ostensibly based on corruption and graft charges. Score card so far: ten cabinet ministers fired, three more resigned. More than 500 police officers in the Istanbul area have been fired. http://www.todayszaman.com/news-334870-400-more-police-officers-in-istanbul-removed-from-duty.html The purge of police appears to be largely aimed at upper ranks. More than 110 police chiefs have lost their posts and journalists are in an uproar because of a new directive " banning journalists from
  •  
    "The United States has demanded the Turkish government condemn false news reports about US Ambassador Francis J. Ricciardone and urged Ankara to protect the strong partnership between the two countries, a Turkish daily reported on Tuesday. Jen Psaki, US State Department Spokesperson, said in a press conference that the ongoing false allegations against US ambassador is disturbing. "On Saturday, several pro-government newspapers accused the US ambassador of being behind a recent wave of arrests as part of the corruption investigation. Pro-government Yeni Şafak wrote on its front page: "Get out of this country," a headline that was apparently directed at the US ambassador. "The US Embassy denied the accusations as "lies and slander." It said through Twitter in Turkish: "No one should jeopardize Turkish-US relations through baseless claims." http://www.todayszaman.com/newsDetail_getNewsById.action;jsessionid=1F7B777659D734167420623A648E1335?newsId=334788&columnistId=0
  •  
    Another reaction came from the Contemporary Journalists Association (ÇGD) on Tuesday. The president of the ÇGD's western Central Anatolia branch, Can Hacıoğlu, said the decisions to ban journalists from entering police departments and the closure of press rooms at those departments are unacceptable. He added that the fact that police departments prefer censorship in a period when Turkey has been discussing opening press agencies at police departments and prosecutor's offices as part of the EU harmonization process is very challenging. "We journalists find this situation very odd," Hacıoğlu said. Hacıoğlu also harshly criticized Turkish Airlines (THY) for stopping the distribution of the Zaman, Today's Zaman, Bugün and Ortadoğu dailies to business class passengers on its planes on Monday without providing any explanation, though other dailies are still being handed out onboard. "Hacıoğlu accused THY of discriminating against the dailies for their coverage of the major corruption scandal involving numerous bureaucrats and the sons of three ministers." "Access to Taraf journalist Mehmet Baransu's website was blocked to users in Turkey by the Telecommunications Directorate (TİB) as of Wednesday evening for publishing photos and tapes about the recent graft investigation. The website, yenidönem.com, is still blocked." http://www.todayszaman.com/newsDetail_getNewsById.action;jsessionid=1F7B777659D734167420623A648E1335?newsId=334831&columnistId=0
Paul Merrell

Syria: US Success Would Only Be the End of the Beginning | nsnbc international - 0 views

  • An October 7, 2015 hearing before the US Senate Committee on Armed Forces (SASC) titled, “Iranian Influence in Iraq and the Case of Camp Liberty,” served as a reaffirmation of America’s commitment to back the terrorist organization Mujahedeen e-Khalq (MEK) and specifically 2,400 members of the organization being harbored on a former US military base in Iraq.
  • Providing testimony was former US Senator Joseph I. Lieberman, former US Marine Corps Commandant and former Supreme Allied Commander Europe General James Jones, USMC (Ret.), and Colonel Wesley Martin, US Army (Ret.). All three witnesses made passionate pleas before a room full of nodding senators for America to continue backing not only MEK terrorists currently harbored on a former US military base in Iraq, but to back groups like MEK inside of Iran itself to threaten the very survival of the government in Tehran. In the opening remarks by Lieberman, he stated: It was not only right and just that we took them off the foreign terrorist organization list, but the truth is now that we ought to be supportive of them and others in opposition to the government in Iran more than we have been.
  • Lieberman would also state (emphasis added): Here’s my point Mr. Chairman, we ought to compartmentalize that agreement also, that nuclear agreement. We ought to put it over there, and not let it stop us from confronting what they’re doing in Syria. Continuing the sanctions for human rights violations in Iran in support of terrorism. And here’s the point I want to make about the National Council of Resistance of Iran and other democratic opposition groups that are Iranian – we ought to be supporting them.  This regime in Tehran is hopeless. It’s not going to change. There’s no evidence … every piece of evidence says the contrary. So I hope we can find a way, we used to do this not so long ago, supporting opposition groups in Iran. They deserve our support, and actually they would constitute a form of pressure on the government in Tehran that would unsettle them as much as anything else we could do because it would threaten the survival of the regime which from every objective indicator I can see is a very unpopular regime in Iran.  The United States, unrepentant regarding the arc of chaos, mass murder, terrorism, civilizational destruction it has created stretching from Libya to Syria, now seeks openly to extend it further into Iran using precisely the same tactics – the use of terrorist proxies – to dismantle and destroy Iranian society.
  • ...6 more annotations...
  • MEK has carried out decades of brutal terrorist attacks, assassinations, and espionage against the Iranian government and its people, as well as targeting Americans including the attempted kidnapping of US Ambassador Douglas MacArthur II, the attempted assassination of USAF Brigadier General Harold Price, the successful assassination of Lieutenant Colonel Louis Lee Hawkins, the double assassinations of Colonel Paul Shaffer and Lieutenant Colonel Jack Turner, and the successful ambush and killing of American Rockwell International employees William Cottrell, Donald Smith, and Robert Krongard. Admissions to the deaths of the Rockwell International employees can be found within a report written by former US State Department and Department of Defense official Lincoln Bloomfield Jr. on behalf of the lobbying firm Akin Gump in an attempt to dismiss concerns over MEK’s violent past and how it connects to its current campaign of armed terror – a testament to the depths of depravity from which Washington and London lobbyists operate. To this day MEK terrorists have been carrying out attacks inside of Iran killing political opponents, attacking civilian targets, as well as carrying out the US-Israeli program of targeting and assassinating Iranian scientists. MEK terrorists are also suspected of handling patsies in recent false flag operations carried out in India, Georgia, and Thailand, which have been ham-handedly blamed on the Iranian government.
  • MEK is described by Council on Foreign Relations Senior Fellow Ray Takeyh as a “cult-like organization” with “totalitarian tendencies.” While Takeyh fails to expand on what he meant by “cult-like” and “totalitarian,” an interview with US State Department-run Radio Free Europe-Radio Liberty reported that a MEK Camp Ashraf escapee claimed the terrorist organization bans marriage, using radios, the Internet, and holds many members against their will with the threat of death if ever they are caught attempting to escape. Not once is any of this backstory mentioned in the testimony of any of the witnesses before the senate hearing, defiling the memories of those who have been murdered and otherwise victimized by this terrorist organization. The de-listing of MEK in 2012 as a foreign terrorist organization by the US State Department is another indictment of the utter lack of principles the US clearly hides behind rather than in any way upholds as a matter of executing foreign policy.
  • MEK has already afforded the US the ability to wage a low-intensity conflict with Iran. MEK’s role in doing so was eagerly discussed in 2009, several years before it was even de-listed as a terrorist organization by the US State Department in the Brooking Institution’s policy paper “Which Path to Persia? Options for a New American Strategy Toward Iran” (PDF). The report stated (emphasis added): Perhaps the most prominent (and certainly the most controversial) opposition group that has attracted attention as a potential U.S. proxy is the NCRI (National Council of Resistance of Iran), the political movement established by the MEK (Mujahedin-e Khalq). Critics believe the group to be undemocratic and unpopular, and indeed anti-American.
  • In contrast, the group’s champions contend that the movement’s long-standing opposition to the Iranian regime and record of successful attacks on and intelligence-gathering operations against the regime make it worthy of U.S. support. They also argue that the group is no longer anti-American and question the merit of earlier accusations. Raymond Tanter, one of the group’s supporters in the United States, contends that the MEK and the NCRI are allies for regime change in Tehran and also act as a useful proxy for gathering intelligence. The MEK’s greatest intelligence coup was the provision of intelligence in 2002 that led to the discovery of a secret site in Iran for enriching uranium.   Despite its defenders’ claims, the MEK remains on the U.S. government list of foreign terrorist organizations. In the 1970s, the group killed three U.S. officers and three civilian contractors in Iran. During the 1979-1980 hostage crisis, the group praised the decision to take America hostages and Elaine Sciolino reported that while group leaders publicly condemned the 9/11 attacks, within the group celebrations were widespread. Undeniably, the group has conducted terrorist attacks—often excused by the MEK’s advocates because they are directed against the Iranian government. For example, in 1981, the group bombed the headquarters of the Islamic Republic Party, which was then the clerical leadership’s main political organization, killing an estimated 70 senior officials. More recently, the group has claimed credit for over a dozen mortar attacks, assassinations, and other assaults on Iranian civilian and military targets between 1998 and 2001. At the very least, to work more closely with the group (at least in an overt manner), Washington would need to remove it from the list of foreign terrorist organizations.
  • Proof that Brookings’ policy paper was more than a mere theoretical exercise, in 2012 MEK would indeed be de-listed by the US State Department with support for the terrorist organization expanded. The fact that former senators and retired generals representing well-funded corporate think tanks even just this week are plotting to use MEK to overthrow the Iranian government should raise alarms that other criminality conspired within the pages of this policy paper may still well be in play. Lieberman himself suggests that proxy war and regime-change should proceed regardless of the so-called “nuclear deal” – with the 2009 Brookings report itself having stated that (emphasis added): …any military operation against Iran will likely be very unpopular around the world and require the proper international context—both to ensure the logistical support the operation would require and to minimize the blowback from it. The best way to minimize international opprobrium and maximize support (however, grudging or covert) is to strike only when there is a widespread conviction that the Iranians were given but then rejected a superb offer—one so good that only a regime determined to acquire nuclear weapons and acquire them for the wrong reasons would turn it down. Under those circumstances, the United States (or Israel) could portray its operations as taken in sorrow, not anger, and at least some in the international community would conclude that the Iranians “brought it on themselves” by refusing a very good deal.  Clearly, both Brookings in 2009, and Lieberman this week have conspired to use the so-called “Iranian Nuclear Deal” as cover for betrayal and regime change.
  • For those wondering why Russia has intervened in Syria in the matter that it has, it should be plainly obvious. The US has no intention to stop in Syria. With Iraq, Afghanistan, and Libya behind it, and Syria within its clutches, it is clear that Iran is next, and inevitably this global blitzkrieg will not stop until it reaches Moscow and Beijing. Even as the US adamantly denies the obvious – that is has intentionally created and is currently perpetuating Al Qaeda, the so-called “Islamic State,” and other terrorist groups in Syria, it is openly conspiring to use another army of terrorists against neighboring Iran, live before a US Senate hearing. Should the US succeed in Syria, it would not be the end of the conflict, but only the end of the beginning of a much wider world war.
Paul Merrell

Asia Times Online :: Middle East News, Iraq, Iran current affairs - 2 views

  • There is nothing tragic about the Obama presidency, capable of drawing the analytical talents of a neo-Plutarch or a neo-Gibbon. This is more like a Pirandello farce, a sort of Character in Search of An Author. Candidates to Author are well documented - from the Israel lobby to the House of Saud, from a select elite of the industrial-military-security complex to, most of all, the rarified banking/financial elite, the real Masters of the Universe. Poor Barack is just a cipher, a <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> functionary of empire, whose ''deciding'' repertoire barely extends to what trademark smile to flash at the requisite photo-ops. There's nothing ''tragic'' about the fact that during this week - marking the 12th anniversary of 9/11 - this presidency will be fighting for its bombing ''credibility'' trying to seduce Republican hawks in the US Congress while most of the warmongers du jour happen to be Democrats.
  • Republicans are torn between supporting the president they love to hate and delivering him a stinging rebuke - as much as they are aching to follow the orders of their masters, ranging from the American Israel Public Affairs Committee to military contractors. Once again, this is farce - caused by the fact that a man elected to finish off wars is eager to start yet another one. And once again without a United Nations vote. The White House ''strategy'' in this crucial negotiating week boils down to this; to convince the US Congress that the United States must start a war on Syria to punish an ''evil dictator'' - once again, as bad as Hitler - for gassing children. The evidence? It's ''indisputable''. Well, it's not ''irrefutable''. It's not even ''beyond-a-reasonable-doubt''. As Obama's Chief of Staff Denis McDonough admitted, with a straight face, it boils down to ''a quite strong common sense test, irrespective of the intelligence, that suggests that the regime carried this out''. So if this is really about ''common sense'', the president is obviously not being shown by his close coterie of sycophants this compendium of common sense, compiled by a group of top, extremely credible former US intelligence officials, which debunks all the ''evidence'' as flawed beyond belief. To evoke a farce from 12 years ago, this clearly seems to be a case of ''facts being fixed around the policy''.
  • The Arab street doesn't buy it because they clearly see through the hypocrisy; the desperate rush to ''punish'' the Bashar al-Assad government in Syria while justifying everything the apartheid state of Israel perpetrates in occupied Palestine. The Muslim world doesn't buy it because it clearly sees the demonization only applies to Muslims - from Arafat to bin Laden to Saddam to Gaddafi and now Assad. It would never apply to the military junta in Myanmar, which was clever enough to engineer an ''opening''; the next day Westerners were lining up to kiss the hem of Burmese longyis. It would never apply to the Islam Karimov dictatorship in Uzbekistan because ''we'' always need to seduce him as one of our bastards away from Russia and China. It eventually applies, on and off, to the Kim dynasty in North Korea, but with no consequences - because these are badass Asians who can actually respond to an US attack. Informed public opinion across the developing world does not buy it because they clearly see, examining the historical record, that Washington would never really be bothered with the sorry spectacle of Arabs killing Arabs, or Muslims killing Muslims, non-stop. The 1980-1988 Iran-Iraq war is a prime piece of evidence.
  • ...4 more annotations...
  • Then there's the ''credibility'' farce. The Obama administration has convoluted the whole world in its own self-spun net, insisting that the responsibility for the ''red line'' recklessly drawn by the president is in fact global. Yet the pesky ''world'' is not buying it.
  • At the Group of 20 summit last week, the BRICS group of emerging powers - Brazil, Russia, India, China and South Africa - as well as Indonesia and Argentina, clearly stressed that a war on Syria without UN Security Council approval would qualify Obama as a war criminal. Even among the European poodles ''support'' for the White House is extremely qualified. Germany's Angela Merkel and even France's attack dog Francois Hollande said the primacy is with the UN. The European Union as a whole wants a political solution. It's enlightening to remember that the EU in Brussels can issue arrest warrants for heads of EU governments guilty of war crimes. Someone in Paris must have warned attack dog Hollande that he would not welcome the prospect of slammer time. ''Evil'' as a political category is something worthy of the brain dead. The key question now revolves around the axis of warmongers - Washington, Israel and the House of Saud. Will the Israel lobby, the more discreet but no less powerful Saudi lobby, and the Return of the Living Dead neo-cons convince the US Congress to fight their war?
  • And then there's the curioser and curioser case of al-Qaeda - essentially the Arabic denomination for a CIA database of US-Pakistani-Saudi trained mujahideen during the 1980s: the oh so convenient transnational bogeyman that ''legitimized'' the Global War On Terror (GWOT) of the George W Bush years; the ''opening'' for al-Qaeda to move to Iraq; and now, no middle men; the CIA and the Obama administration fighting side-by-side with al-Qaeda in Syria. No wonder the denomination ''al-CIAeda'' has gone viral. With farce after farce after farce piling up in their own Tower of Babel, the much-vaunted ''US credibility'' is in itself the biggest farce of all. Politically, no one knows how the vacuum will be filled. It won't be via the UN. It won't be via the BRICS. It won't be via the G-20 - which is seriously divided; at least new multipolar players are carrying way more weight than US poodles. Much would be made to restore ''US credibility'' if the Obama administration had the balls to force both the House of Saud and Qatar (''300 people and a TV station'', in the epic definition of Saudi Arabia's Prince Bandar Sultan - aka Bandar Bush) to end once and for all their weaponizing of hardcore ''rebels'' and ultimately hardcore jihadis, and accept Iran in the negotiating table for a real Geneva II peace process in Syria. It won't happen because this bypasses farce. Once again; helpless Barack is just a paperboy. The plutocrats in charge are getting extremely nervous. The system is melting - and they need to act fast.
  • They need a Syria as docile as the Arab petro-monarchies. They want to hit Russia bad - and then discuss missile defense and Russian influence in Eastern Europe from a position of force. They want to hit Iran bad - and then continue to issue ultimatums from a position of force. They want to facilitate yet another Israeli attempt to capture southern Lebanon (it's the water, stupid). They want a monster gas pipeline from Qatar for European customers bypassing Iran and Syria as well as Gazprom. Most of all, this is all about control of natural resources and channels of distribution. These are real motives - and they have nothing to do with farce. Farce is only deployed to kill any possibility of real diplomacy and real political discussion. Farce is a theatrical mask - as in ''humanitarian'' imperialism - the ''acceptable'' version of the Dick Cheney-run years. It's as if Dick Cheney had never left the building; paperboy Barack is Dick Cheney with a ''human'' face. The only good outcome in this multi-sorrowful tale is that the real ''international community'', all around the world, has seen the naked Emperor in all its (farcical) glory.
  •  
    What can I say? The iconoclastic Pepe Escobar strikes again. 
  •  
    Outstanding article Paul. Wow! Watching the 911 link now. But here's one for you: Massimo Mazzucco's new 5-hour documentary "September 11- The New Pearl Harbor" summarizes 12 years of public debate on 9-11, looking at the events from all sides. Watch a trailer for the film here: http://goo.gl/M5c0dj Full five hours available here: http://www.luogocomune.net/site/modules/sections/index.php?op=viewarticle&artid=167 I listened to a two hour interview with Massimo last night. Awesome stuff.
  •  
    A 5-hour documentary will have to wait for tomorrow. I'm about 7 hours away from a deadline for the current development cycle's Help file. :-) I do think Pepe is a off on a couple of details in this article. The Neocons were mostly silent on this one and Rumsfeld came out against the intervention, saying that Obama hadn't made a valid case for war. That's most likely because the Neocons are joined at the hip with Israeli government and that government is a house divided this time around, with only factions supporting the military strike. The current thinking in Tel Aviv/Jerusalem is, in line with the Israeli right's long term strategy, that it's just fine with them to have Muslims running around killing each other in Syria. That long-term strategy is to destabilize Israel's Arab neighbor states while Israel builds its economic empire and military hegemony in the region. Israeli government isn't exactly thrilled by the prospect of Obama delivering fulfillment of the Saudi goal of transforming Syria from a secular state into a non-secular Islamic state run by Wahabi extremists. Such a state, armed to the teeth by the U.S. and/or the Saudi-Qatari zillionaires could be very bad news for Israel. Notably, the very strongest case thus far that the August 21 chemical attack was conducted by the opposition forces with the U.S. and Syria in on it to create a false flag attack, has been delivered in installments by Yossef Bodansky, an Israeli-American uber-scholar of Islamic "terrorism" and Soviet/Russian weaponry who is incapable of criticising Israel's decades-long terrorism inflicted on the Palestinian people and Israel's continuing unlawful occupation of Palestine plus parts of Jordan, Syria, and Lebanon. Bodanysky sits at the center of an intelligence web of intelligence professionals from nations worried about Islamic "terrorism." In other words, he's extremely pro-Israeli and to boot, very close to Mossad and Israel's IDF intelligence forces. Israel's AIPAC lobby d
Gary Edwards

Freedom to Fascism - the movie - 0 views

  •  
    "Are you aware the money in your pocket is printed by a private bank? Are you aware the REAL ID law will require you to carry a national identification card? Are you aware that there are plans being developed to have all Americans embedded with a Radio Frequency Identification (RFID) computer chip under their skin so they can be tracked wherever they go? Are you aware the Supreme Court has ruled that the government has no authority to impose a direct unapportioned tax on the labor of the American people, and the 16th Amendment does not give the government that power? Are you aware that computer voting machines can be rigged and there is no way to ensure that vote is counted Our Friend and Hero, Aaron Russo Has Passed Esteemed filmmaker, ardent activist and loyal patriot Aaron Russo lost his battle to cancer on August 24, 2007 at the age of 64. Aaron will be profoundly missed but always remembered. He was a husband, father, friend, mentor, and inspiration to many. Aaron's long list of achievements includes his work in the areas of filmmaking and political activism. His documentary film, "America: From Freedom to Fascism", debunked the justification of both the IRS and the Federal Reserve as well as exposed their crooked basis. This movie received widespread acclaim, including opening to standing ovations at the Cannes Film Festival. Congressman Ron Paul was also featured in the documentary, in which he presents his views on the economy and the Federal Reserve. Aaron's work in the realm of activism proved to be invaluable and selfless. He will be perpetually revered as a true patriot and tireless fighter for our freedom. We must continue to venerate Aaron's legacy as we move forward by honoring his great words: "There are no boundaries one must adhere to when preserving one's liberty"."
Gary Edwards

Who Benefits From A War Between The United States And Syria? - BlackListedNews.com - 0 views

  • Someone wants to get the United States into a war with Syria very, very badly.  Cui bono is an old Latin phrase that is still commonly used, and it roughly means "to whose benefit?"  The key to figuring out who is really behind the push for war is to look at who will benefit from that war. 
  • If a full-blown war erupts between the United States and Syria, it will not be good for the United States, it will not be good for Israel, it will not be good for Syria, it will not be good for Iran and it will not be good for Hezbollah. 
  • The party that stands to benefit the most is Saudi Arabia, and they won't even be doing any of the fighting.  They have been pouring billions of dollars into the conflict in Syria, but so far they have not been successful in their attempts to overthrow the Assad regime.  Now the Saudis are trying to play their trump card - the U.S. military. 
  • ...12 more annotations...
  • If the Saudis are successful, they will get to pit the two greatest long-term strategic enemies of Sunni Islam against each other - the U.S. and Israel on one side and Shia Islam on the other.  In such a scenario, the more damage that both sides do to each other the happier the Sunnis will be.
  • it is well-known that Qatar wants to run a natural gas pipeline out of the Persian Gulf, through Syria and into Europe.  That is why Qatar has also been pouring billions of dollars into the civil war in Syria.
  • This war would not be good for Israel either.  I have seen a number of supposedly pro-Israel websites out there getting very excited about the prospect of war with Syria, but that is a huge mistake. Syria has already threatened to attack Israeli cities if the U.S. attacks Syria.  If Syrian missiles start landing in the heart of Tel Aviv, Israel will respond. And if any of those missiles have unconventional warheads, Israel will respond by absolutely destroying Damascus. And of course a missile exchange between Syria and Israel will almost certainly draw Hezbollah into the conflict.  And right now Hezbollah has 70,000 rockets aimed at Israel. If Hezbollah starts launching those rockets, thousands upon thousands of innocent Jewish citizens will be killed.
  • For the United States, there really is no good outcome in Syria. If we attack and Assad stays in power, that is a bad outcome for the United States. If we help overthrow the Assad regime, the rebels take control.  But they would be even worse than Assad.  They have pledged loyalty to al-Qaeda, and they are rabidly anti-American, rabidly anti-Israel and rabidly anti-western.
  • Someone should ask Barack Obama why it is necessary for the U.S. military to do the dirty work of his Sunni Muslim friends.
  • Even if Assad is overthrown, the rebel government that would replace him would be even more anti-Israel than Assad was.
  • If the Saudis want this war so badly, they should go and fight it.  Everyone knows that the Saudis have been bankrolling the rebels.  At this point, even CNN is openly admitting this... It is an open secret that Saudi Arabia is using Jordan to smuggle weapons into Syria for the rebels. Jordan says it is doing all it can to prevent that and does not want to inflame the situation in Syria.
  • Syrian rebels in the Damascus suburb of Ghouta have admitted to Associated Press correspondent Dale Gavlak that they were responsible for last week’s chemical weapons incident which western powers have blamed on Bashar Al-Assad’s forces, revealing that the casualties were the result of an accident caused by rebels mishandling chemical weapons provided to them by Saudi Arabia.
  • “From numerous interviews with doctors, Ghouta residents, rebel fighters and their families….many believe that certain rebels received chemical weapons via the Saudi intelligence chief, Prince Bandar bin Sultan, and were responsible for carrying out the (deadly) gas attack,” writes Gavlak.
  • The Voice of Russia has also been reporting on Gavlak's bombshell findings... The rebels noted it was a result of an accident caused by rebels mishandling chemical weapons provided to them. “My son came to me two weeks ago asking what I thought the weapons were that he had been asked to carry,” said Abu Abdel-Moneim, the father of a rebel fighting to unseat Assad, who lives in Ghouta. As Gavlak reports, Abdel-Moneim said his son and 12 other rebels died in a weapons storage tunnel. The father stated the weapons were provided to rebel forces by a Saudi militant, known as Abu Ayesha, describing them as having a “tube-like structure” while others were like a “huge gas bottle.” “They didn’t tell us what these arms were or how to use them,” complained a female fighter named ‘K’. “We didn’t know they were chemical weapons. We never imagined they were chemical weapons.” “When Saudi Prince Bandar gives such weapons to people, he must give them to those who know how to handle and use them,” she warned. She, like other Syrians, do not want to use their full names for fear of retribution.
  • Gavlak also refers to an article in the UK’s Daily Telegraph about secret Russian-Saudi talks stating that Prince Bandar threatened Russian President Vladimir Putin with terror attacks at next year’s Winter Olympics in Sochi if Russia doesn’t agree to change its stance on Syria. “Prince Bandar pledged to safeguard Russia’s naval base in Syria if the Assad regime is toppled, but he also hinted at Chechen terrorist attacks on Russia’s Winter Olympics in Sochi if there is no accord,” the article stated. “I can give you a guarantee to protect the Winter Olympics next year. The Chechen groups that threaten the security of the games are controlled by us,” Saudi Prince allegedly told Vladimir Putin.
  • The Saudis are absolutely determined to make this war happen, and they expect us to do the fighting. And Barack Obama plans to go ahead and attack Syria without the support of the American people or the approval of Congress.
  •  
    This article wins my award as the best analysis to date.  Hits like a macchine gun, and laying the blame on the Saudis makes sense to me.  Chalk up 911 and the Boston Marathon Massacre also.  And don't miss the coverage of the recent talks between Russia and the Saudis.  Very eye opening stuff.
Paul Merrell

Conflict Erupts in Public Rebuke on C.I.A. Inquiry - NYTimes.com - 0 views

  • A festering conflict between the Central Intelligence Agency and its congressional overseers broke into the open Tuesday when Senator Dianne Feinstein, chairwoman of the Intelligence Committee and one of the C.I.A.’s staunchest defenders, delivered an extraordinary denunciation of the agency, accusing it of withholding information about its treatment of prisoners and trying to intimidate committee staff members investigating the detention program.Describing what she called a “defining moment” for the oversight of American spy agencies, Ms. Feinstein said the C.I.A. had removed documents from computers used by Senate Intelligence Committee staff members working on a report about the agency’s detention program, searched the computers after the committee completed its report and referred a criminal case to the Justice Department in an attempt to thwart their investigation.
  • Ms. Feinstein’s disclosures came a week after it was first reported that the C.I.A. last year had monitored computers used by her staff in an effort to learn how the committee may have gained access to the agency’s own internal review of the detention and interrogation program that became perhaps the most criticized part of the American government’s response to the Sept. 11, 2001, attacks. Ms. Feinstein said the internal review bolstered the conclusions of the committee’s still-classified report on the program, which President Obama officially ended in January 2009 after sharply criticizing it during the 2008 presidential campaign. For an intelligence community already buffeted by controversies over electronic surveillance and armed drone strikes, the rupture with Ms. Feinstein, one of its closest congressional allies, could have broad ramifications.
  • “Feinstein has always pushed the agency in private and defended it in public,” said Amy B. Zegart, who studies intelligence issues at Stanford University. “Now she is skewering the C.I.A. in public. This is a whole new world for the C.I.A.”Ms. Feinstein, who had refused to comment on the dispute between the C.I.A. and her committee, took the Senate floor on Tuesday morning to say the agency’s actions had breached constitutional provisions for the separation of powers and “were a potential effort to intimidate.” “How this will be resolved will show whether the Intelligence Committee can be effective in monitoring and investigating our nation’s intelligence activities, or whether our work can be thwarted by those we oversee,” she said.
  • ...4 more annotations...
  • The dispute came to a head in mid-January when Mr. Brennan told members of the committee that the agency had carried out a search of computers used by committee investigators at a C.I.A. facility in Northern Virginia, where the committee was examining documents the agency had made available for its report. Ms. Feinstein said on Tuesday that during the meeting, Mr. Brennan told her that the C.I.A. had searched a “walled-off committee network drive containing the committee’s own internal work product and communications” and that he was going to “order further forensic evidence of the committee network to learn more about activities of the committee’s oversight staff.”
  • The C.I.A. had carried out the search to determine whether committee investigators may have gained unauthorized access to the internal review of the detention program that the agency had carried out without informing the committee. Ms. Feinstein on Tuesday vigorously disputed this allegation, saying the document had been included — intentionally or not — as part of a dump of millions of pages the C.I.A. had provided for the Intelligence Committee.
  • Mr. Brennan, in a January letter to Ms. Feinstein that a government official who did not want to be identified released on Tuesday, said the committee had not been entitled to the internal review because it contained “sensitive, deliberative, pre-decisional C.I.A. material”— and therefore was protected under executive privilege considerations. The letter, attached to a statement that Mr. Brennan issued to the agency’s employees on Tuesday, raised questions about Ms. Feinstein’s statements earlier in the day concerning at what point the committee came into possession of the internal review. The C.I.A.’s acting general counsel has referred the matter to the Justice Department as a possible criminal offense, a move Ms. Feinstein called a strong-arm tactic by someone with a conflict of interest in the case. She said that that official had previously been a lawyer in the C.I.A.’s Counterterrorism Center — the section of the spy agency that was running the detention and interrogation program — and that his name is mentioned more than 1,600 times in the committee’s report. Ms. Feinstein did not name the lawyer, but she appeared to be referring to Robert Eatinger, the C.I.A.’s senior deputy general counsel. In 2007, The New York Times reported that when a top C.I.A. official in 2005 destroyed videotapes of brutal interrogations of Al Qaeda detainees, Mr. Eatinger had been one of two lawyers to approve their destruction.
  • Ms. Feinstein said that on two occasions in 2010, the C.I.A. had removed documents totaling hundreds of pages from the computer server used by her staff at the Northern Virginia facility. She did not provide any details about the documents, but said that when committee investigators confronted the C.I.A. they received a number of answers — first a denial that the documents had been removed, then an explanation that they had been removed by contractors working at the facility, then an explanation that the removal of documents was ordered by the White House. When the committee approached the White House, she said, it denied giving such an order.Ms. Feinstein’s broadside rallied Senate Democrats, but divided Republicans.
  •  
    The separation of powers Constitutional issue here is plain. The Senate has oversight of the CIA; the CIA has no lawful oversight of the Senate and furthermore is forbidden by law from conducting surveillance within the U.S. But the CIA spied on the Senate, then used evidence it found to file a criminal complaint with the DoJ against Senate staffers. Tit for tat, a criminal complaint has been filed against the CIA staffers.   
Gary Edwards

Larry Summers and the Secret "Bankster End Game" Memo : http://goo.gl/wDhDhL - 1 views

  •  
    Diigo is screwing up the URL AGAIN!!!!! WTF!!! The correct title is "Larry Summers and the Secret "End-Game" Memo :: http://goo.gl/wDhDhL From the marbux treasure trove of truth we have financial expert Greg Palast describing how the Banksters engineered the 2008 World Financial Collapse. Greg names names, sighting an important 1997 memo signed by then Deputy Treasury Secretary, Larry Summers. The memo describes the Banksters "end game", and authorizes pulling the trigger on a process of forcing the world's financial institutions to accept the game of derivative roulette where high risk financial schemes and casino bets had to be accepted as "financial assets". Good story and as from everything I know, the absolute truth. Read it carefully because these same Banksters control the Obama Administration and seek to continue the great shakedown. One item of note is the recent resignation of Larry Summers as Obama nominee to head the Federal Reserve Bankster Cartel. Summers is one of the architects of the 2008 financial collapse, but is seen be Wall Street as hesitant to continue with the current Bernake flooding of the money markets with $85 Billion per month in freshly minted paper. Even the hint of rolling back the Bankster bailout a bit is enough to do in Summers. alternative Fed Banster Czar Janette Yellin promises to up the $85 Billion monthly bailout, and Wall Street celebrated with a near doubling of trades. We're so screwed! We started the "Socialism and the End of the American Dream" Diigo group in September of 2008 as an effort to understand the financial collapse. In this short article, Greg Palast summarizes the story and places the important facts on the table for all to see. Pray with me for his health and safety. excerpt: "The year was 1997.  US Treasury Secretary Robert Rubin was pushing hard to de-regulate banks.  That required, first, repeal of the Glass-Steagall Act to dismantle the barrier between commercial ba
  •  
    Related link: Summers Withdraws From Consideration for Fed Chairmanship, http://www.bloomberg.com/news/2013-09-15/obama-said-he-accepted-summers-decision-to-withdraw-his-name.html
  •  
    From the marbux treasure trove of truth we have financial expert Greg Palast describing how the Banksters engineered the 2008 World Financial Collapse. Greg names names, sighting an important 1997 memo signed by then Deputy Treasury Secretary, Larry Summers. The memo describes the Banksters "end game", and authorizes pulling the trigger on a process of forcing the world's financial institutions to accept the game of derivative roulette where high risk financial schemes and casino bets had to be accepted as "financial assets". Good story and as from everything I know, the absolute truth. Read it carefully because these same Banksters control the Obama Administration and seek to continue the great shakedown. One item of note is the recent resignation of Larry Summers as Obama nominee to head the Federal Reserve Bankster Cartel. Summers is one of the architects of the 2008 financial collapse, but is seen be Wall Street as hesitant to continue with the current Bernake flooding of the money markets with $85 Billion per month in freshly minted paper. Even the hint of rolling back the Bankster bailout a bit is enough to do in Summers. alternative Fed Banster Czar Janette Yellin promises to up the $85 Billion monthly bailout, and Wall Street celebrated with a near doubling of trades. We're so screwed! We started the "Socialism and the End of the American Dream" Diigo group in September of 2008 as an effort to understand the financial collapse. In this short article, Greg Palast summarizes the story and places the important facts on the table for all to see. Pray with me for his health and safety. excerpt: "The year was 1997.  US Treasury Secretary Robert Rubin was pushing hard to de-regulate banks.  That required, first, repeal of the Glass-Steagall Act to dismantle the barrier between commercial banks and investment banks.  It was like replacing bank vaults with roulette wheels. Second, the banks wanted the right to play a new high-risk game:  "d
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Gary Edwards

Larry Summers and the Secret End Game Memo - by Greg Palast | Investigative Reporter - 1 views

  •  
    excerpt: "The year was 1997.  US Treasury Secretary Robert Rubin was pushing hard to de-regulate banks.  That required, first, repeal of the Glass-Steagall Act to dismantle the barrier between commercial banks and investment banks.  It was like replacing bank vaults with roulette wheels. Second, the banks wanted the right to play a new high-risk game:  "derivatives trading."  JP Morgan alone would soon carry $88 trillion of these pseudo-securities on its books as "assets." Deputy Treasury Secretary Summers (soon to replace Rubin as Secretary) body-blocked any attempt to control derivatives. But what was the use of turning US banks into derivatives casinos if money would flee to nations with safer banking laws? The answer conceived by the Big Bank Five:  eliminate controls on banks in every nation on the planet - in one single move.    It was as brilliant as it was insanely dangerous. How could they pull off this mad caper?  The bankers' and Summers' game was to use the Financial Services Agreement, an abstruse and benign addendum to the international trade agreements policed by the World Trade Organization. Until the bankers began their play, the WTO agreements dealt simply with trade in goods-that is, my cars for your bananas.  The new rules ginned-up by Summers and the banks would force all nations to accept trade in "bads" - toxic assets like financial derivatives. Until the bankers' re-draft of the FSA, each nation controlled and chartered the banks within their own borders.  The new rules of the game would force every nation to open their markets to Citibank, JP Morgan and their derivatives "products." And all 156 nations in the WTO would have to smash down their own Glass-Steagall divisions between commercial savings banks and the investment banks that gamble with derivatives. The job of turning the FSA into the bankers' battering ram was given to Geithner, who was named Ambassador to the World Trade Organization. "
  •  
    Greg Palast does good work. I'm reminded of a passage from Carl Oglesby's The Yankee and Cowboy War where he argued rather convincingly that conspiracy is the norm rather than the exception at the boundary line between government and big business.
1 - 20 of 106 Next › Last »
Showing 20 items per page