Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged page

Rss Feed Group items tagged

Paul Merrell

The 28 Pages and the War on Terror: Is Congress in a State of Willful Ignorance? | 28 P... - 0 views

  • Today more than ever, Americans are struggling to unravel the Gordian knot of overt and covert alliances that comprise the Middle East’s geostrategic landscape. As they do, politicians and pundits constantly remind them that reaching the correct conclusions about the region is imperative if we are to thwart the menace of terrorism and prevent the next 9/11.
  • As if a thicket of misinformation, hit-and-miss journalism and competing propaganda didn’t make the challenge daunting enough, the American people face an even more formidable barrier in their attempts to reach informed and rational conclusions about U.S. policy in the Middle East: the classification of a 28-page finding on foreign government support of the 9/11 hijackers—classification that continues over the objections of the chairman and vice-chairman of the 9/11 Commission and the former senator who co-chaired the inquiry that produced the 28 pages. Preventing a hypothetical “next 9/11″ starts with a clear understanding of what enabled the actual one—yet, even as the U.S. military prepares for the next chapter in the seemingly perpetual War on Terror, Americans continue to be denied critical knowledge about how the September 11 attacks were planned and funded. Reflecting on that disconnect, Kentucky Congressman Thomas Massie recently told Slate, “Until we know what enabled or caused 9/11, we shouldn’t be talking about starting a third war to prevent another 9/11.”
  • For everyday Americans, ignorance about what lies within the 28 pages is imposed; for apparently far too many in Congress, that ignorance is willful. You see—unlike the citizens they represent—when it comes to reading or not reading the 28 pages, legislators enjoy the luxury of a choice: After securing permission through their respective intelligence committee, representatives and senators can venture into a guarded, soundproof room at the Capitol and read the classified findings on foreign government assistance to the 9/11 hijackers in their entirety. Astonishingly—given what’s at stake for the country and for the lives of servicemembers and civilians alike—there are indications only a slim minority have bothered to do so. Rep. Walter Jones North Carolina’s Walter Jones is one congressman who did take the initiative to learn what lies in the 28 pages. Later, he said, “I was absolutely shocked by what I read. What was so surprising was that those whom we thought we could trust really disappointed me.” He added, “The information is critical to our foreign policy moving forward and should thus be available to the American people.”
  • ...4 more annotations...
  • On January 8th of this year, by way of a “Dear Colleague” letter, Jones and Massachusetts Congressman Stephen Lynch urged every one of their fellow House representatives to read the 28 pages for themselves. Among those who heeded their call was Rep. Massie. At a March 11 press conference in which he joined Jones and Lynch in imploring peers to examine the redacted finding, Massie offered a striking description of his reaction to the revelations within the 28 pages, saying: “It was a really disturbing event for me to read those. I had to stop every two or three pages and rearrange my perception of history. And it’s that fundamental…it certainly changes your view of the Middle East.”
  • in what could well emerge as a national security scandal that engulfs much of Congress, there are indications that, when it comes to acquiring essential knowledge to shape policies that safeguard the country, a majority of legislators have thus far made a conscious decision to remain ignorant: As of this writing, 13 of the House’s 432 representatives have joined as cosponsors of a Jones-authored resolution urging the president to declassify the 28 pages. A source on the Hill who is familiar with the declassification effort is personally unaware of any representative who has read the 28 pages over the last several months who didn’t emerge from the experience as a supporter of declassification. When you overlay one of those observations on the other, the result points to a woefully low level of interest among the nation’s legislators in learning what “shocking,” “surprising” and “history-rearranging” facts are contained in the classified passage.
  • Those indications paint a bleak—albeit, tentative—portrait of Congressional diligence in overseeing national security policy. What’s needed now is a precise, name-by-name accounting of which representatives and senators have read the 28 pages and which have not. To that end, 28Pages.org urges constituents, journalists and transparency advocacy organizations to help bring accountability to this essential issue of national security job performance by contacting legislators and asking them two simple, yes-or-no questions: Have you read the 28 pages? If not, have you asked permission from your intelligence committee to do so? Shortly, 28Pages.org will announce its own contribution to this national exercise in Congressional accountability. However, a thorough accounting will only be achieved with the participation of citizens, journalists and transparency advocates. And with every House and 36 Senate seats up for election on Nov. 4, the faster the country collectively assembles a name-by-name roster of 28-pages readership on the Hill, the better position voters will be in to evaluate incumbents using this potent indicator of their attentiveness to matters of national security.
  • We provide a wealth of resources to help citizens do their part, and journalists are encouraged to contact us for insights on this issue.
Paul Merrell

MAJOR DEVELOPMENT: Rand Paul, Ron Wyden to Introduce 28 Pages Resolution in Senate | 28... - 0 views

  • The growing, nonpartisan drive to declassify a 28-page finding on foreign government support of the 9/11 hijackers is about to take an enormous step forward with the introduction of a Senate resolution urging the president to release the material to the public. Dramatically compounding the issue’s visibility, the resolution is being introduced by high-profile Republican presidential hopeful Rand Paul of Kentucky. A spokesperson for Senator Paul told 28Pages.org that Oregon Democrat Ron Wyden will cosponsor the resolution, which will serve as the upper chamber’s companion to House Resolution 14. Wyden is a member of the Senate intelligence committee.
  • ones, Lynch and Massie introduced H.Res.14 and have been championing the issue—and seeking like-minded senators to lead the cause in the upper chamber—since December 2013. Aided by Graham, who co-chaired the joint congressional 9/11 inquiry that wrote the 28 pages as one chapter in a far larger report, their success in securing the leadership of Paul and Wyden represents a critical milestone for the 28 pages movement. As Paul and Wyden seek cosponsors for the resolution, there are 11 senators whose support should—on principle, if not politics—be automatic:  Patrick Leahy (VT), Barbara Mikulski (MD), Harry Reid (NV), Barbara Boxer (CA), Patty Murray (WA), Dick Durbin (IL), Jack Reed (RI), Chuck Schumer (NY), Bill Nelson (FL), Tom Carper (DE) and Maria Cantwell (WA). 
  • What do these 11 Democrats have in common? Months after the December 2002 release of the congressional intelligence report that holds the 28 pages, each of them signed a 2003 letter to President George W. Bush protesting his decision to redact the 28 pages and urging him to release them. In part, that letter read: Unfortunately, because all but two pages of the entire section have been deemed too secret for public disclosure, the American people remain in the dark about other countries that may have facilitated the terrorist attacks. It has been widely reported in the press that the foreign sources referred to in this portion of the Joint Inquiry analysis reside primarily in Saudi Arabia. The decision to classify this information sends the wrong message to the American people about our nation’s anti-terror effort and makes it seem as if there will be no penalty for foreign abettors of the hijackers…Protecting the Saudi regime by eliminating any public penalty for the support given to terrorists from within its borders would be a mistake.
  • ...2 more annotations...
  • Among those 11 natural candidates to join the Paul-Wyden resolution, one stands out: Schumer led the 2003 letter-writing effort. At the time, he said, “The bottom line is that keeping this material classified only strengthens the theory that some in the U.S. government are hellbent on covering up for the Saudis. If we’re going to take terrorism down, that kind of behavior has got to be nipped in the bud and shedding some light on these 28 pages would start that process.”
  • Former Senator Graham and House leaders of the 28 pages movement who’ve read the 28 pages argue that their release is vital to the ongoing struggle with terrorism. According to Graham, “the 28 pages primarily relate to who financed 9/11 and they point a very strong finger at Saudi Arabia as being the principal financier.” He has also said the U.S. government’s shielding of Saudi Arabia’s role in funding extremism helped pave the way for the rise of ISIS. The House’s Lynch made a similar point in a 2014 story written by the Boston Globe’s Bryan Bender:
  •  
    I suspect that Mr. Obama won't be eager to make the Saudis the patsies  for what it really looks like Israel's far right government and some colaborators in high levels of U.S. government made happen on 9-11.  Heavens! The Saudis might start selling selling their oil in something other than U.S. dollars and bring down the Western banksters house of cards. 
Paul Merrell

The Missing Pages of the 9/11 Report - The Daily Beast - 0 views

  • The lead author of the Senate’s report on 9/11 says it’s time to reveal what’s in the 28 pages that were redacted from it, which he says will embarrass the Saudis.A story that might otherwise have slipped away in a morass of conspiracy theories gained new life Wednesday when former Sen. Bob Graham headlined a press conference on Capitol Hill to press for the release of 28 pages redacted from a Senate report on the 9/11 attacks. And according to Graham, the lead author of the report, the pages “point a very strong finger at Saudi Arabia as the principal financier” of the 9/11 hijackers.
  • “This may seem stale to some but it’s as current as the headlines we see today,” Graham said, referring to the terrorist attack on a satirical newspaper in Paris. The pages are being kept under wraps out of concern their disclosure would hurt U.S. national security. But as chairman of the Senate Select Committee that issued the report in 2002, Graham argues the opposite is true, and that the real “threat to national security is non-disclosure.” Graham said the redacted pages characterize the support network that allowed the 9/11 attacks to occur, and if that network goes unchallenged, it will only flourish. He said that keeping the pages classified is part of “a general pattern of coverup” that for 12 years has kept the American people in the dark. It is “highly improbable” the 19 hijackers acted alone, he said, yet the U.S. government’s position is “to protect the government most responsible for that network of support.”   The Saudis know what they did, Graham continued, and the U.S. knows what they did, and when the U.S. government takes a position of passivity, or actively shuts down inquiry, that sends a message to the Saudis. “They have continued, maybe accelerated their support for the most extreme form of Islam,” he said, arguing that both al Qaeda and ISIS are “a creation of Saudi Arabia.”
  • It all signals that the decades-long bipartisan policy of always keeping the Saudis happy, and never rocking the boat, may be coming to an end. In Sarasota, Florida, a federal judge is reviewing 80,000 pages of documents that relate to a prominent Saudi family and its extensive contacts with three of the hijackers when they attended flight school in Sarasota.
  • ...1 more annotation...
  • When the 800-page Senate report was made public in 2002, Graham recalled that he and Republican Sen. Richard Shelby were “shocked to see an important chapter in the report has been redacted.” All but three Senate Democrats, joined by one Republican and one independent, signed a letter calling on President Bush to declassify the 28-page section detailing the role of foreign governments in bankrolling the 9/11 attackers. “Finding, Discussion and Narrative Regarding Certain Sensitive National Security Matters,” the redacted portion, begins midway through the report, on page 395. Despite the title, then-CIA Director Porter Goss and the co-chairs of the 9/11 Commission all called for it to be declassified, yet it has stayed secret for a dozen years, fueling conspiracy theories that Graham says can only be put to rest by its release.   
  •  
    Graham went farther than before, now saying that the deleted section is about Saudi Arabia's involvement in the 9-11 attack. But is this all to reinforce the narrative of 19 Islamic hijackers -- none of whom had the necessary pilot skills, flying airliners into targets on 9-11? Why no investigation of Israeli and U.S. government participation in the attack?  
Paul Merrell

GOP Platform Subcommittee Approves 28 Pages Plank | 28Pages.org - 0 views

  • The national security subcommittee of the GOP platform committee today approved a plank that calls for the declassification of 28 pages that are said to link the Kingdom of Saudi Arabia to the 9/11 hijackers. The plank was introduced by Maine state senator Eric Brakey, who contacted 28Pages.org director Brian McGlinchey last week after hearing his interview on The Tom Woods Show. McGlinchey helped Brakey draft the plank’s language.
  • Planks are official expressions of the party’s opinions on various issues. To be incorporated in the final platform, the 28 pages plank must first be approved on Tuesday by a majority of the full, 112-member platform committee. Then, along with all the other proposed planks, it must be approved by the full body of next week’s GOP convention in Cleveland. If adopted, the plank would represent an important new endorsement of the release of the 28 pages. Supporters of declassification already include more than 70 Democratic and Republican members of Congress, former members of the 9/11 Commission and the editorial boards of many of the nation’s most prominent newspapers, including The New York Times and USA Today.
  • Brakey’s 28 pages plank reads: Delivering Transparency on Foreign Government Ties to 9/11 As the nation continues to confront terrorism at home and abroad, the American people are being denied access to information that can provide vital insight into the funding of Islamic extremism: 28 classified pages from a 2002 joint congressional intelligence inquiry into the September 11 attacks. A former senator who co-chaired the inquiry says the pages “point a very strong finger at Saudi Arabia as being the principal financier” of the 9/11 attacks and that, by shielding the kingdom from consequences for its actions, the redaction has encouraged its continued sponsorship of extremism and paved the way for the rise of ISIS. President Obama twice promised 9/11 family members he would release the pages, which could be invaluable in their pursuit of justice in the courtroom. However, his administration has refused to declassify them, even in the face of bipartisan support for their release that includes former 9/11 Commission members and 73 current representatives and senators. These pages must be released. As Thomas Jefferson said, “An enlightened citizenry is indispensable for the proper functioning of a republic. Self-government is not possible unless the citizens are educated sufficiently to enable them to exercise oversight.”
Paul Merrell

What's in the Missing 28 Pages From the 9/11 Inquiry? - NBC News - 0 views

  • If members of Congress force the government to release 28 secret pages of a 14-year-old inquiry into 9/11, the missing pages may yield new tidbits about a possible role by some Saudis in aiding the hijackers — but there are thousands of other still-classified documents that would reveal far more about the terror attacks, officials tell NBC News. A renewed push is on to declassify a secret chapter of the 838-page joint inquiry report issued in December 2002 by the House and Senate intelligence committees, in part because of a lawsuit seeking to hold Saudi Arabia accountable for the attacks. That lawsuit, and explosive allegations contained in those pages, may come up during President Obama's visit to Saudi Arabia, where he arrived Wednesday morning. But many current and former officials with knowledge of the pages tell NBC News that their release would only flesh out the details of events already well known to authorities — and to members of the general public who read the exhaustive 9/11 Commission and follow-up reports.
  • The 9/11 Commission spent 17 months completing the investigation begun by the congressional inquiry. It confirmed some of the inquiry's findings about generalized assistance that various Saudis provided the 9/11 hijackers when they came to the U.S. But it also knocked down numerous other allegations, including assertions about assistance by some Saudi government officials. "The pages provide no further answers about the 9/11 attacks that are not already included in the 9/11 Commission report," says Philip Zelikow, the executive director of the 9/11 Commission, who describes the 28 pages as "unvetted investigative material." "I'm afraid they will only make the red herring glow redder," he said of the push for release of the pages, which has garnered some bipartisan support in Congress. Lost in the hubbub, according to Zelikow and others, is that there are some far more fundamental questions about the attacks that remain unanswered — or at least unknown to the public. One of the most significant: What information has 9/11 mastermind Khalid Sheikh Mohamed (KSM) been hiding all these years about the global al-Qaeda network that he oversaw around the world, including in the U.S., before and after the 2001 attacks?
  • And despite the furor over several Saudi operatives who assisted some of the hijackers, the most suspicious people were two Yemenis — radical cleric Anwar al-Awlaki and student Mohdar Abdullah, Zelikow said.
  • ...1 more annotation...
  • Another is why the Iranian government "facilitated the transit of al Qaeda members through Iran on their journey to the United States," Zelikow said. Similar questions have been raised about Pakistan. Zelikow and others said the 28 pages won't answer these broader questions about 9/11. There are mountains of other investigative documents that could, but they're locked away. "There are missing puzzle pieces to the overall issue of 9/11 as to the culpability and who was behind it," one U.S. intelligence official confirmed to NBC News. "It's fair to say there are additional insights that can be gleaned from these other sources."
  •  
    Zelikow was a main figure in the 9-11 cover-up. As chief of staff for the 9-11 Commission, his suppression of evidence and fencing Commission members out of any direct involvement in the development and drafting of the report are thoroughly documented, along with the conflict of interest that should have barred him from ever receiving the job. http://goo.gl/Vgqz5O Zelikow is also a rabid Zionist, which explains why the Commission Report never addressed the mountain of evidence that Israel played a key role in the commission of the 9/11 attacks. See e.g., Wikispooks, https://wikispooks.com/wiki/9-11/Israel_did_it
Paul Merrell

Paul Offers NDAA Amendment to Drive Release of 28 Pages | 28Pages.org - 0 views

  • Following through on intentions he announced earlier this week, Senator Rand Paul today offered an amendment to the pending National Defense Authorization Act (NDAA) that would require the president to declassify 28 pages on foreign government links to the 9/11 hijackers. The language is identical to S.1471, the bill Paul introduced on Monday with Senators Ron Wyden and Kirsten Gillibrand. In a story on Paul’s new move, The Hill’s Julian Hattem said the proposed amendment “heightens the profile of the fight and may increase the stakes for the opponents.”
  • While there are a growing number of vocal champions of the declassification of the 28 pages, those who want the 28 pages kept under wraps have worked quietly and effectively out of public view. As we wrote earlier this year, “It’s likely that among the most powerful of those unseen opponents of 9/11 transparency are two strange bedfellows: The Kingdom of Saudi Arabia—which has fueled the growth of terror, and the U.S. intelligence community—which is charged with thwarting terror.” Paul’s amendment to the must-pass NDAA could force some of those opponents—and, more specifically, their Senate allies—out of the shadows.
  • However, the language may also offer President Obama an opportunity to continue his administration’s refusal to release the 28 pages, as it says he is not required to declassify sources and methods if that release would “result in imminent lawless action or comprise presently on-going national security operations.”
  • ...1 more annotation...
  • In 2003, Bush invoked “sources and methods” when defending his decision to classify the pages, saying “Declassification of that part of a 900-page document would reveal sources and methods that would make it harder for us to win the war on terror. … It would help the enemy if they knew our sources and methods.” Among many who have read the 28 pages, Congressman Walter Jones denies that declassification would harm national security in any way, pointing to other motives for the secrecy. “There’s nothing in it about national security. It’s about the Bush administration and its relationship with the Saudis,” Jones told The New Yorker.
Paul Merrell

Core Secrets: NSA Saboteurs in China and Germany - The Intercept - 0 views

  • The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA.
  • with vast amounts of customer data, including phone records and email traffic. But documents published today by The Intercept suggest that even as the agency uses secret operatives to penetrate them, companies have also cooperated more broadly to undermine the physical infrastructure of the internet than has been previously confirmed. In addition to so-called “close access” operations, the NSA’s “core secrets” include the fact that the agency works with U.S. and foreign companies to weaken their encryption systems; the fact that the NSA spends “hundreds of millions of dollars” on technology to defeat commercial encryption; and the fact that the agency works with U.S. and foreign companies to penetrate computer networks, possibly without the knowledge of the host countries. Many of the NSA’s core secrets concern its relationships to domestic and foreign corporations.
  • Sentry Eagle includes six programs: Sentry Hawk (for activities involving computer network exploitation, or spying), Sentry Falcon (computer network defense), Sentry Osprey (cooperation with the CIA and other intelligence agencies), Sentry Raven (breaking encryption systems), Sentry Condor (computer network operations and attacks), and Sentry Owl (collaborations with private companies). Though marked as a draft from 2004, it refers to the various programs in language indicating that they were ongoing at the time, and later documents in the Snowden archive confirm that some of the activities were going on as recently as 2012.
  • ...3 more annotations...
  • The agency’s core secrets are outlined in a 13-page “brief sheet” about Sentry Eagle, an umbrella term that the NSA used to encompass its most sensitive programs “to protect America’s cyberspace.” “You are being indoctrinated on Sentry Eagle,” the 2004 document begins, before going on to list the most highly classified aspects of its various programs. It warns that the details of the Sentry Eagle programs are to be shared with only a “limited number” of people, and even then only with the approval of one of a handful of senior intelligence officials, including the NSA director. “The facts contained in this program constitute a combination of the greatest number of highly sensitive facts related to NSA/CSS’s overall cryptologic mission,” the briefing document states. “Unauthorized disclosure…will cause exceptionally grave damage to U.S. national security. The loss of this information could critically compromise highly sensitive cryptologic U.S. and foreign relationships, multi-year past and future NSA investments, and the ability to exploit foreign adversary cyberspace while protecting U.S. cyberspace.”
  • The most controversial revelation in Sentry Eagle might be a fleeting reference to the NSA infiltrating clandestine agents into “commercial entities.” The briefing document states that among Sentry Eagle’s most closely guarded components are “facts related to NSA personnel (under cover), operational meetings, specific operations, specific technology, specific locations and covert communications related to SIGINT enabling with specific commercial entities (A/B/C).” It is not clear whether these “commercial entities” are American or foreign or both. Generally the placeholder “(A/B/C)” is used in the briefing document to refer to American companies, though on one occasion it refers to both American and foreign companies. Foreign companies are referred to with the placeholder “(M/N/O).” The NSA refused to provide any clarification to The Intercept.
  • Documents: Sentry Eagle Brief Sheet (13 pages) TAREX Classification Guide (7 pages) Exceptionally Controlled Information Listing (6 pages) ECI WHIPGENIE Classification Guide (7 pages) ECI Pawleys Classification Guide (4 pages) ECI Compartments (4 pages) CNO Core Secrets Slide Slices (10 pages) CNO Core Secrets Security Structure (3 pages) Computer Network Exploitation Classification Guide (8 pages) CNO Core Secrets (7 pages)
Paul Merrell

Did Certain Foreign Governments Facilitate the 9/11 Attacks? by Justin Raimondo -- Anti... - 0 views

  • Some thirteen years after the event, the shadow of the 9/11 terrorist attacks on the World Trade Center in Manhattan and the Pentagon still darkens our world. The legacy of that terrible day has impacted not only our foreign policy, bequeathing to a new generation an apparently endless "war on terrorism," it also has led directly to what is arguably the most massive assault on our civil liberties since the Alien and Sedition Acts. Getting all the information about what happened that day – and why it happened – is key to understanding the course we have taken since. This was supposed to have been the purpose of the 9/11 Commission, whose massive report is now looked to as the primary source on the subject. Yet there is another, far more specific investigative report, the one issued by the intelligence committees of both houses of Congress, entitled "Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001." If you actually take the time to read the report, all goes along swimmingly (except for occasional redactions) until you get to p. 369, whereupon the text is blacked out for the next twenty-eight pages.
  • Some thirteen years after the event, the shadow of the 9/11 terrorist attacks on the World Trade Center in Manhattan and the Pentagon still darkens our world. The legacy of that terrible day has impacted not only our foreign policy, bequeathing to a new generation an apparently endless "war on terrorism," it also has led directly to what is arguably the most massive assault on our civil liberties since the Alien and Sedition Acts. Getting all the information about what happened that day – and why it happened – is key to understanding the course we have taken since. This was supposed to have been the purpose of the 9/11 Commission, whose massive report is now looked to as the primary source on the subject. Yet there is another, far more specific investigative report, the one issued by the intelligence committees of both houses of Congress, entitled "Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001." If you actually take the time to read the report, all goes along swimmingly (except for occasional redactions) until you get to p. 369, whereupon the text is blacked out for the next twenty-eight pages.
  • Do you get the impression someone has something to hide? The censored section is entitled "Finding, Discussion and Narrative Regarding Certain Sensitive National Security Matters," and the introduction – left largely intact – is instructive: "Through its investigation, the Joint Inquiry developed information suggesting specific sources of foreign support for some of the September 11 hijackers while they were in the United States. The Joint Inquiry’s review confirmed that the Intelligence Community also has information, much of which has yet to be independently verified, concerning these potential sources of support. In their testimony, neither CIA nor FBI officials were able to address definitively the extent of such support for the hijackers globally or within the United States or the extent to which such support, if it exists, is knowing or inadvertent in nature."
  • ...1 more annotation...
  • What’s in the 28 censored pages of the Joint Inquiry into 9/11? We don’t know for sure – but if Israel is involved, then we do know why they won’t let us read those pages. Representatives Jones, Lynch, and Massie have sparked a movement to declassify the 28 pages: go here for more information. This is a fight we need to win – but we can only do it by raising a huge stink. Call or write your congressional representatives and urge them to join the three congressmen who are fighting for your right to know. And spread the word.
  •  
    Eloquent essay on the 60 Israeli "students" swept up by the FBI right after 9/11 then as swiftly shuttled onto airliners bound for Israel. It's a plea for the declassification of the 28 pages censored from the public version of the Congressional Intelligence Committees joint report on "Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001." The essay's theme is wrapped around the preface to the censored pages mention of plural "sources of foreign support for some of the September 11 hijackers[.]" And it uses reported information about the  60 "students" and some statements by members of Congress who have read the 28 pages to argue there is a strong whiff that Israel was one of those plural sources of support. But the essay otherwise does not address the large mound of circumstantial evidence of Israel's involvement. I've got a lot of notes and links on that issue, so may blog about that later.
Paul Merrell

Letters from 9/11 Family Group to Obama Go Unanswered | 28 Pages.org - 0 views

  • On three separate occasions, 9/11 Families United for Justice Against Terrorism has sent letters to President Obama, asking him to declassify the 28-page finding on foreign government support of the 9/11 hijackers. Each letter takes a slightly different approach to pleading for the release of the redacted section of a joint House/Senate intelligence study, but one thing they share in common is the response from the president and the White House: complete silence. One would think an organized group of 9/11 family members would at least merit the courtesy of a presidential reply—if only to say he had received their letter and would give due consideration to their request. Instead, Obama has opted to ignore them, despite the fact that he has reportedly twice promised 9/11 families he would declassify the 28 pages. The group sent its first letter on June 20, 2013, and never heard back. The group tried again on May 9, 2014—just ahead of the dedication of the 9/11 Museum in New York. Again, silence. Still determined, the organization sent a third letter on June 24 of this year that has likewise gone unanswered.
  • The letters remind the president of his promises to 9/11 families, and point to the large and growing number of credible experts—including former Senator Bob Graham, who co-chaired the inquiry that created the 28 pages, and both the chairman and vice-chairman of the 9/11 Commission—who say there’s no valid national security reason for the continued secrecy. Indeed, even past and present Secretaries of State in the Obama White House Hillary Clinton and John Kerry are on record urging the declassification of the 28 pages; they did so as senators in a letter to George W. Bush. You can read the group’s most recent letter here. It was delivered to the White House by North Carolina Congressman Walter Jones, who introduced and continues to champion H.Res.428, which urges the president to declassify the 28 pages.
Paul Merrell

ExposeFacts - For Whistleblowers, Journalism and Democracy - 0 views

  • Launched by the Institute for Public Accuracy in June 2014, ExposeFacts.org represents a new approach for encouraging whistleblowers to disclose information that citizens need to make truly informed decisions in a democracy. From the outset, our message is clear: “Whistleblowers Welcome at ExposeFacts.org.” ExposeFacts aims to shed light on concealed activities that are relevant to human rights, corporate malfeasance, the environment, civil liberties and war. At a time when key provisions of the First, Fourth and Fifth Amendments are under assault, we are standing up for a free press, privacy, transparency and due process as we seek to reveal official information—whether governmental or corporate—that the public has a right to know. While no software can provide an ironclad guarantee of confidentiality, ExposeFacts—assisted by the Freedom of the Press Foundation and its “SecureDrop” whistleblower submission system—is utilizing the latest technology on behalf of anonymity for anyone submitting materials via the ExposeFacts.org website. As journalists we are committed to the goal of protecting the identity of every source who wishes to remain anonymous.
  • The seasoned editorial board of ExposeFacts will be assessing all the submitted material and, when deemed appropriate, will arrange for journalistic release of information. In exercising its judgment, the editorial board is able to call on the expertise of the ExposeFacts advisory board, which includes more than 40 journalists, whistleblowers, former U.S. government officials and others with wide-ranging expertise. We are proud that Pentagon Papers whistleblower Daniel Ellsberg was the first person to become a member of the ExposeFacts advisory board. The icon below links to a SecureDrop implementation for ExposeFacts overseen by the Freedom of the Press Foundation and is only accessible using the Tor browser. As the Freedom of the Press Foundation notes, no one can guarantee 100 percent security, but this provides a “significantly more secure environment for sources to get information than exists through normal digital channels, but there are always risks.” ExposeFacts follows all guidelines as recommended by Freedom of the Press Foundation, and whistleblowers should too; the SecureDrop onion URL should only be accessed with the Tor browser — and, for added security, be running the Tails operating system. Whistleblowers should not log-in to SecureDrop from a home or office Internet connection, but rather from public wifi, preferably one you do not frequent. Whistleblowers should keep to a minimum interacting with whistleblowing-related websites unless they are using such secure software.
    • Gary Edwards
       
      Thanks Paul! Great article and I agree with you about switching. Rather than a USB, I would rather look into a SSD and try to isolate performance to an ISP bandwidth issue. FYI, I read your Diigo posts daily at this Web site: https://groups.diigo.com/group/socialism-and-the-end-of-the-american-dream/content/user/marbux Seems to be the best visual presentation of your research. I do however think Diigo could improve their hosting of this research by enabling more extensive comments. Notice that your comments are often clipped :( Still, I really do appreciate your sharing both your research and your commentary. Priceless stuff! Many thanks! ~ge~
  •  
    A new resource site for whistle-blowers. somewhat in the tradition of Wikileaks, but designed for encrypted communications between whistleblowers and journalists.  This one has an impressive board of advisors that includes several names I know and tend to trust, among them former whistle-blowers Daniel Ellsberg, Ray McGovern, Thomas Drake, William Binney, and Ann Wright. Leaked records can only be dropped from a web browser running the Tor anonymizer software and uses the SecureDrop system originally developed by Aaron Schwartz. They strongly recommend using the Tails secure operating system that can be installed to a thumb drive and leaves no tracks on the host machine. https://tails.boum.org/index.en.html Curious, I downloaded Tails and installed it to a virtual machine. It's a heavily customized version of Debian. It has a very nice Gnome desktop and blocks any attempt to connect to an external network by means other than installed software that demands encrypted communications. For example, web sites can only be viewed via the Tor anonymizing proxy network. It does take longer for web pages to load because they are moving over a chain of proxies, but even so it's faster than pages loaded in the dial-up modem days, even for web pages that are loaded with graphics, javascript, and other cruft. E.g., about 2 seconds for New York Times pages. All cookies are treated by default as session cookies so disappear when you close the page or the browser. I love my Linux Mint desktop, but I am thinking hard about switching that box to Tails. I've been looking for methods to send a lot more encrypted stuff down the pipe for NSA to store. Tails looks to make that not only easy, but unavoidable. From what I've gathered so far, if you want to install more software on Tails, it takes about an hour to create a customized version and then update your Tails installation from a new ISO file. Tails has a wonderful odor of having been designed for secure computing. Current
Paul Merrell

Polish Outrage to Paying Victims of CIA Black Sites-and What the Eur Court Said | Just ... - 0 views

  • Poland will be paying a quarter of a million dollars to two Guantánamo detainees, Abu Zubaydah and Abd al-Rahim al-Nashiri. The payment arises in the context of the torture of the terror suspects at a CIA “black site” operating on Polish territory. Last July, the European Court of Human Rights handed down its much-awaited judgments in the cases of Abd al-Rahim al-Nashiri v. Poland and Husayn (Abu Zubaydah) v. Poland in relation to Poland’s involvement in the CIA rendition, detention and interrogation program. The Court ruled that Poland violated the substantive and procedural aspects of the detainees’ right to be free from torture or inhuman or degrading treatment or punishment (Article 3, European Convention on Human Rights). The Court also found violations of, among other rights, Articles 5 (liberty and security), 8 (private and family life), and 13 (effective remedy) of the ECHR. The Court ordered the Polish government to pay €130,000 to Zubaydah and €100,000 to al-Nashiri, within three months from when the judgments become final. Poland appealed the ruling, but the request was rejected by a Grand Chamber panel on February 16, making last weekend the deadline for the payments. The Polish Foreign Ministry said on Friday that it was processing the payments, AP’s Vanessa Gera reported.
  • Poland will be paying a quarter of a million dollars to two Guantánamo detainees, Abu Zubaydah and Abd al-Rahim al-Nashiri. The payment arises in the context of the torture of the terror suspects at a CIA “black site” operating on Polish territory. Last July, the European Court of Human Rights handed down its much-awaited judgments in the cases of Abd al-Rahim al-Nashiri v. Poland and Husayn (Abu Zubaydah) v. Poland in relation to Poland’s involvement in the CIA rendition, detention and interrogation program. The Court ruled that Poland violated the substantive and procedural aspects of the detainees’ right to be free from torture or inhuman or degrading treatment or punishment (Article 3, European Convention on Human Rights). The Court also found violations of, among other rights, Articles 5 (liberty and security), 8 (private and family life), and 13 (effective remedy) of the ECHR. The Court ordered the Polish government to pay €130,000 to Zubaydah and €100,000 to al-Nashiri, within three months from when the judgments become final. Poland appealed the ruling, but the request was rejected by a Grand Chamber panel on February 16, making last weekend the deadline for the payments. The Polish Foreign Ministry said on Friday that it was processing the payments, AP’s Vanessa Gera reported.
  • But the Court took a different, more robust view and found significant responsibility on part of the Polish government. The Court held (my emphasis added): “517. … Notwithstanding the [Article 3] Convention obligation, Poland, for all practical purposes, facilitated the whole process, created the conditions for it to happen and made no attempt to prevent it from occurring. As the Court has already held above, on the basis of their own knowledge of the CIA activities deriving from Poland’s complicity in the [High-Value Detainees Program] Programme and from publicly accessible information on treatment applied in the context of the “war on terror” to terrorist suspects in US custody the authorities – even if they did not witness or participate in the specific acts of ill-treatment and abuse endured by the applicant – must have been aware of the serious risk of treatment contrary to Article 3 occurring on Polish territory.”
  • ...3 more annotations...
  • The ruling, which predated the publication of the redacted version of the Senate Intelligence Committee report on the CIA program, brought important judicial scrutiny to the agency’s post-9/11 practices, including the controversial role played by U.S. allies. The Senate report has since provided some further details about Poland’s involvement, although the country is not identified by name. The AP report notes the frustration of those in Poland who view the ruling as unjustifiably punishing the country for CIA actions. An opposition Polish lawmaker has recorded his discontent, stating that the terror suspects remained in the sole custody of U.S. officials throughout their detention. Former Foreign Minister Radoslaw Sikorski has similarly been quoted by the LA Times’ Carol Williams as saying:  “We might have to pay compensation even though our personnel did nothing wrong. You can imagine how Polish people feel about it … We just wish that intelligence matters were kept confidential.”
  • While some in Poland are expressing their exasperation with the Court’s ruling, the issue of compensation has sparked equal outrage among some in the United States who do not believe that suspects of terrorist attacks should receive payments, as noted by the AP. The controversy over compensation comes just as the U.S. faces renewed calls from some European and other countries to compensate victims of CIA torture. At the UN Human Rights Council last week, the Universal Periodic Review report on the United States documented other UN member states’ objections to U.S. practices.
  • Meanwhile, in Europe, more judgments are pending on this subject, including two involving the same detainees (see: Abu Zubaydah v. Lithuania and Al Nashiri v. Romania). While accountability within the U.S. still seems like a pipe dream, the European Court of Human Right’s more robust approach perhaps offers the only means of securing reparation for human rights abuses committed as part of the “war on terror.” The Court’s approach may also help to educate European citizens on the nature of complicity in grave human rights abuses. By calling for compensation, the Court has also served to weaken the forms of international cooperation that foster such violations in the first place.
Paul Merrell

Inside TAO: The NSA's Shadow Network - SPIEGEL ONLINE - 0 views

  • The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of "covert" routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with "implants" that then allow the government hackers to control the computers remotely. (Click here to read a related article on the NSA's "implants".) In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person's computer. Of course, a cookie doesn't automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint.
  • Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID. This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer. The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: "Wait for client to initiate new connection," "Shoot!" and "Hope to beat server-to-client response." Like any competition, at times the covert network's surveillance tools are "too slow to win the race." Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document.
  • At the same time, it is in no way true to say that the NSA has its sights set exclusively on select individuals. Of even greater interest are entire networks and network providers, such as the fiber optic cables that direct a large share of global Internet traffic along the world's ocean floors. One document labeled "top secret" and "not for foreigners" describes the NSA's success in spying on the "SEA-ME-WE-4" cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle. The document proudly announces that, on Feb. 13, 2013, TAO "successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4)." With the help of a "website masquerade operation," the agency was able to "gain access to the consortium's management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network."
  • ...3 more annotations...
  • It appears the government hackers succeeded here once again using the QUANTUMINSERT method. The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure. But that was only the first step. "More operations are planned in the future to collect more information about this and other cable systems," it continues. But numerous internal announcements of successful attacks like the one against the undersea cable operator aren't the exclusive factors that make TAO stand out at the NSA. In contrast to most NSA operations, TAO's ventures often require physical access to their targets. After all, you might have to directly access a mobile network transmission station before you can begin tapping the digital information it provides.
  • To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour's work.
  • Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors. Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer. These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world."
  •  
    From page 3 of a 3-page article. The entire article is well worth reading. I chose this page to bookmark because of its disclosure that NSA is intercepting new computers before they are delivered and installing hardware and software backdoors, then reshipping them to their intended recipients. Although not mentioned, this implies the complicity of package shipment companies and conceivably government mail systems and original equipment manufacturers ("OEMs").  
Paul Merrell

Florida Event Spotlights Signs of Foreign Support of 9/11 Plot | 28Pages.org - 0 views

  • Last month, 9/11 parents Loreen and Matt Sellitto hosted an informative event focused on one of the most important yet least-understood aspects of September 11: the extent to which the terrorists received support from foreign governments—and the extent of the government’s knowledge of that support, both before and after the attacks.
  • Held in Naples, Florida, the November 11 event was called “The Untold Story of 9/11: A Conversation with Bob Graham.” Following opening remarks from host Loreen Sellitto and from Terry Strada of 9/11 Families United for Justice Against Terrorism, the event featured three speakers: Former Senator Bob Graham, the most prominent voice outside government fighting for declassification of the 28 pages. Broward Bulldog editor Dan Christensen, who broke the story of the FBI’s discovery of a 9/11 cell in Sarasota, and who continues working to bring FBI investigation documents into the daylight. Attorney Tom Julin, who is helping the Broward Bulldog in its effort to overcome the government’s stonewalling. Here, we cover many of the highlights; a full video of the event can be found at the bottom of the page.
  • Broward Bulldog Battles Feds Over Sarasota Investigation Christensen’s quest for answers about foreign sources of support of the 9/11 hijackers began in 2011 with a tip passed to him by Anthony Summers, who, with his wife Robbyn Swan, had just completed their book, “The Eleventh Day.” Summers and Swan had learned about an FBI investigation of a Saudi family with close ties to the Saudi government that suddenly abandoned its upscale home just outside Sarasota about two weeks before 9/11. Pursuing the lead, Christensen contacted Senator Graham for his insights into the Sarasota cell. Braced for the possibility that Graham would decline comment because of classification restraints, Christensen was stunned to learn that Graham—who had been chairman of the Senate Intelligence Committee and co-chaired the joint Congressional inquiry into 9/11—was unable to comment for an altogether different reason: Graham said the FBI had never told him about its Sarasota investigation.
  • ...4 more annotations...
  • Christensen then inquired with the FBI, which confirmed there had been an investigation, but said it found no connection to 9/11. Next, seeking to learn how they reached that conclusion, he requested the FBI’s investigation documents using the Freedom of Information Act (FOIA), but the FBI said there were no documents matching the request. Finding that completely implausible, in September 2012, Christensen and the Broward Bulldog filed a FOIA lawsuit. About six months later, the FBI sent Christensen 35 partially redacted pages that contained a bombshell conclusion directly contradicting the government’s earlier denials: The investigation had in fact “revealed many connections” between the Saudi family that fled their home and “individuals associated with the terrorist attacks on 9/11/2001.” (Indeed, investigations showed the home had been called and even visited by future 9/11 hijackers.)
  • In April 2014, as the Bulldog’s lawsuit progressed, Fort Lauderdale U.S. District Judge William Zloch ordered the FBI to conduct a more thorough search of its files, chiding the government for advancing “nonsensical” legal arguments in its effort to maintain secrecy. Later, he ordered the FBI to turn over more than 80,000 pages from its Tampa office so he could personally review them and reach his own conclusions about the need for secrecy. The judge’s review of that enormous cache is still underway.
  • Julin, in addition to providing an interesting elaboration on the legal battle to liberate the FBI’s Sarasota files, explained the Broward Bulldog’s attempts to secure the release of the 28-page finding on foreign government support of the 9/11 hijackers found in the 2002 report of the joint Congressional inquiry. Julin is helping Christensen, Summers and Swan push for the declassification of the 28 pages through a little-known process called Mandatory Declassification Review. Under that process, an agency’s refusal to declassify material can ultimately be appealed to a multi-agency panel that reviews the material and presents a recommendation to the president. The panel is now reviewing the 28 pages. While there’s no deadline, Julin has been told to expect the panel’s recommendation to President Obama sometime this winter.
  • Graham also explored the questions of: Why would the Saudis support Islamic terrorists operating in the United States? Why did the Bush administration shield Saudi Arabia by preventing the release of damning material? Why would the Obama administration continue the Bush administration’s “soft treatment” of Saudi Arabia? In the course of his remarks, Graham briefly discussed two of his books. The first, “Intelligence Matters: The CIA, the FBI, Saudi Arabia and the Failure of America’s War on Terror,” is a non-fiction work, which required advance clearance from the federal government that resulted in many passages being censored. That disappointing experience prompted Graham to do an end-run around government censors by publishing “Keys to the Kingdom,” a work labelled as fiction but which Graham used to write on the topic with greater freedom.
Paul Merrell

Video: CIA Veteran Ray McGovern on the 28 Pages and HRes 428 | 28Pages.org - 0 views

  • At a November 22 speaking engagement hosted by the Schiller Institute in New York City, former CIA analyst Ray McGovern endorsed House Resolution 428 and discussed the secret, 28-page finding on foreign government involvement in the 9/11 attacks. In remarks spanning more than 20 minutes, McGovern—who helped launch Veteran Intelligence Professionals for Sanity (VIPS)—puts the 28 pages in the context of the intelligence community’s advance awareness of the presence of 9/11 hijackers and its withholding of that knowledge from the FBI. He also shares interesting insights into the constraints placed on both the joint House/Senate intelligence inquiry that produced the 28 pages and the 9/11 Commission as well.
  •  
    Ray McGovern riffs on the still-classifed 28 pages missing from the House/Senate 9-11 Report. He sees their declassification and publication as key to learning what really happened on 9-11 and preventing another such occurrence by holding those in government who failed to account.
Paul Merrell

ODNI Erects Cost Barrier to Mandatory Declassification - 1 views

  • Anyone who submits a mandatory declassification review request to the Office of the Director of National Intelligence seeking release of classified records “shall be responsible for paying all fees” resulting from the request, according to a new ODNI regulation. And those fees are considerable. A search for a requested document costs from $20-$72 per hour. Document review runs $40-$72 per hour. And photocopying costs fifty cents per page, the new ODNI regulation said. It was published in the Federal Register on Friday, with a request for public comments. The mandatory declassification review (MDR) process was established by executive order 13526 to permit requests for declassification of information that no longer meets the standards for national security classification. The executive order’s implementing directive states that fees may be charged for responding to MDR requests for classified records. But the proposed ODNI fees seem extravagant on their face. No commercial enterprise charges anything close to fifty cents to photocopy a single page. Neither do most of ODNI’s peer agencies.
  • The Department of Defense permits (though it does not require) DoD agencies to charge fees for search, review and reproduction (pursuant to DoD Manual 5230.30-M). But the DoD schedule of fees is well below the proposed ODNI rate. Instead of fifty cents per page, DoD charges thirteen cents. Instead of up to $72 per hour for search and review, DoD charges no more than $52.60 per hour. ODNI wants $10 for a CD, but DoD asks only $1.25. (See DoD 7000.14-R, Volume 11A, Chapter 4, Appendix 2, Schedule of Fees and Rates, at page 4-13). And while ODNI would make requesters liable for “all fees,” DoD says that “Fees will not be charged if the total amount to process your request is $30.00 or less.” Similarly, at the Department of State, “Records shall be duplicated at a rate of $.15 per page.” In a 2011 rule, the Central Intelligence Agency did mandate a fifty cent per page photocopy fee for MDR requests, as well as a $15 minimum charge. But the CIA policy was suspended in response to public criticism and a legal challenge from the non-profit National Security Counselors. That challenge is still pending.
  • “There is nothing unusual about these [search and review] fees,” CIA told a court in 2014 in response to the legal challenge. “And the reproduction costs are similar to those employed by other agencies.” CIA noted that a National Archives regulation sets reproduction costs as high as 75 cents per page. (Last year it reached 80 cents, although a self-service copier is sometimes available for 25 cents per page.) Furthermore, CIA said in 2014, “neither set of costs reimburses the CIA for the full cost of providing the declassification review service to the requester.”
  •  
    Mandatory Declassification Review is now only for the wealthy. Note that the Freedom of Information Act requires that all search and copying fees be waived if the request is in the public interest and the request is for scholarly or news purposes. It looks like Congress should step in here and establish similar requirements for Mandatory Declassification Review. Query, whether the records if sought under both the FOIA and MDR by a scholar or news organization would have to be provided without charge if declassified. 
Paul Merrell

28 pages of misdirection | Truth and Shadows - 0 views

  • For years the 9/11 Truth movement has been vainly pleading with mainstream media – and the “alternative” 9/11-Truth-rejecting media (which we’ll include for our purposes as mainstream) to cover any of the endless, obvious problems with any of the Official 9/11 Conspiracy Theory (OCT) tales we’ve been told. Now, all of a sudden, these same mainstream media, echoing prestigious players like former US Senator Bob Graham, are on the rampage about a “9/11 cover-up,” and are pushing for the release of 28 redacted pages from the 2002 Joint Congressional Intelligence Committee 9/11 Inquiry’s report! So…let’s all of us 9/11 Truthers jump aboard this fast moving train with both feet, right? The Truth movement has gradually been gaining a foothold with the public; a growing number of people countenance some kind of government role in 9/11 and/or its cover-up. Suspicion has likewise grown about the role played by Bush-administration neocons and their Zionist bedfellows. After 15 years of staunch media refusal to report the flagrantly obvious holes in the various OCT stories we’ve been fed, why is this particular issue suddenly headline news? Why at this particular juncture? And how does it just happen to be spearheaded by one of the major contributors to the initial coverup? Let’s examine the question of why the Deep State might want this story heated up to a fever pitch:
  •  
    I'm not the only one who questions why the 28--pages controversy erupts in mainstream media when all other questions about 9-11, for example the evidence of neocons and Israelis still has the MSM blackout. And why can I find no hard information on the Web about who is behind 28pages.org?
Paul Merrell

9/11 Bill Prompts Saudi Threat to Sell Off U.S. Treasury Debt | 28Pages.org - 0 views

  • Saudi Arabia has warned the Obama administration and federal legislators that it will sell off U.S. Treasury debt worth $750 billion if Congress passes a law clearing the way for 9/11 victims to sue the kingdom for its alleged role in aiding the hijackers. according to a story in today’s New York Times.
  • Appearing on Michael Smerconish’s CNN program Saturday morning, former Senator Bob Graham, a leading advocate of declassifying 28 pages that allegedly implicate Saudi Arabia in the attacks, said, “I’m outraged but not surprised.” According to the Times report, the kingdom’s caution was personally delivered last month by Saudi foreign minister Adel al-Jubeir, who reportedly told legislators that, if the bill passes, Saudi Arabia would sell up to $750 billion in Treasury debt before it could be potentially frozen by U.S. courts.
  • Though presented as a necessity for Saudi Arabia’s own financial protection, Saudi Arabia’s cautionary statement is de facto economic threat against the United States. A sell-off would prompt an increase in U.S. Treasury interest rates, raising borrowing costs for the American government, businesses and consumers and potentially triggering an economic downturn that extends beyond our own shores. The Saudi warning was triggered by the legislative progress of the Justice Against Sponsors of Terrorism Act (JASTA), which would amend the Foreign Sovereign Immunities Act (FSIA). Last fall, Saudi Arabia was dropped from a lawsuit filed by 9/11 families, victims and insurers after a federal judge said the plaintiffs had failed to meet the high jurisdictional hurdles that FSIA imposes for claims against foreign governments.
  • ...2 more annotations...
  • According to the New York Times report, the Obama administration has aggressively lobbied lawmakers against passing JASTA, telling them it could trigger moves by other countries to undermine immunity enjoyed by the U.S. government and American businesses and individuals abroad. September 11 widow Terry Strada, who has spent years lobbying for JASTA, told Smerconish, “I’m shocked with what’s going on here. Do the Saudis really have that much influence on our government? Are they really calling the shots in Washington, D.C.?”
  • Graham said that failing to hold Saudi Arabia to account for its “complicity in the murder of 3,000 Americans” gave the kingdom “a sense of impunity that they can do anything they wanted to with no sanction, and now that impunity has expanded to their trying to lobby the highest levels of the White House and the Congress” to prevent a courtroom determination of Saudi Arabia’s guilt. “I believe that there is material in the 28 pages and the volume of other documents that would indicate that there was a connection at the highest levels between the Kingdom of Saudi Arabia and the 19 hijackers. I believe that the plot would not have occurred but for the support and protection that the hijackers were receiving primarily from Saudi Arabia,” said Graham. Graham’s reference to the “highest levels” of the Saudi government is reminiscent of a statement former Navy secretary and 9/11 Commission member John Lehman made to 60 Minutes on Sunday. Asked if the 28 classified pages names names, he replied, “Yes. The average intelligent watcher of 60 Minutes would recognize them instantly.” Smerconish asked Graham about the kingdom’s 2003 request to the Bush administration to release the 28 pages. “I think what the Saudis had was an understanding with the United States that whatever the Saudis indicated they wanted was a sham,” said Graham, adding that Saudi Arabia likely relied on a quiet commitment by the U.S. government to keep the pages classified, freeing the kingdom to make the request solely for public consumption.
Paul Merrell

DARPA seeks the Holy Grail of search engines - 0 views

  • The scientists at DARPA say the current methods of searching the Internet for all manner of information just won't cut it in the future. Today the agency announced a program that would aim to totally revamp Internet search and "revolutionize the discovery, organization and presentation of search results." Specifically, the goal of DARPA's Memex program is to develop software that will enable domain-specific indexing of public web content and domain-specific search capabilities. According to the agency the technologies developed in the program will also provide the mechanisms for content discovery, information extraction, information retrieval, user collaboration, and other areas needed to address distributed aggregation, analysis, and presentation of web content.
  • Memex also aims to produce search results that are more immediately useful to specific domains and tasks, and to improve the ability of military, government and commercial enterprises to find and organize mission-critical publically available information on the Internet. "The current one-size-fits-all approach to indexing and search of web content limits use to the business case of web-scale commercial providers," the agency stated. 
  • The Memex program will address the need to move beyond a largely manual process of searching for exact text in a centralized index, including overcoming shortcomings such as: Limited scope and richness of indexed content, which may not include relevant components of the deep web such as temporary pages, pages behind forms, etc.; an impoverished index, which may not include shared content across pages, normalized content, automatic annotations, content aggregation, analysis, etc. Basic search interfaces, where every session is independent, there is no collaboration or history beyond the search term, and nearly exact text input is required; standard practice for interacting with the majority of web content, which remains one-at-a-time manual queries that return federated lists of results. Memex would ultimately apply to any public domain content; initially, DARPA  said it intends to develop Memex to address a key Defense Department mission: fighting human trafficking. Human trafficking is a factor in many types of military, law enforcement and intelligence investigations and has a significant web presence to attract customers. The use of forums, chats, advertisements, job postings, hidden services, etc., continues to enable a growing industry of modern slavery. An index curated for the counter-trafficking domain, along with configurable interfaces for search and analysis, would enable new opportunities to uncover and defeat trafficking enterprises.
  • ...1 more annotation...
  • DARPA said the Memex program gets its name and inspiration from a hypothetical device described in "As We May Think," a 1945 article for The Atlantic Monthly written by Vannevar Bush, director of the U.S. Office of Scientific Research and Development (OSRD) during World War II. Envisioned as an analog computer to supplement human memory, the memex (a combination of "memory" and "index") would store and automatically cross-reference all of the user's books, records and other information. This cross-referencing, which Bush called associative indexing, would enable users to quickly and flexibly search huge amounts of information and more efficiently gain insights from it. The memex presaged and encouraged scientists and engineers to create hypertext, the Internet, personal computers, online encyclopedias and other major IT advances of the last seven decades, DARPA stated.
  •  
    DoD announces that they want to go beyond Google. Lots more detail in the proposal description linked from the article. Interesting tidbits: [i] the dark web is a specific target; [ii] they want the ability to crawl web pages blocked by robots.txt; [iii] they want to be able to search page source code and comments. 
Paul Merrell

NSA broke privacy rules thousands of times per year, audit finds - The Washington Post - 0 views

  • The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents. Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls.
  • The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence.
  • Read the documents NSA report on privacy violations Read the full report with key sections highlighted and annotated by the reporter.
  • ...2 more annotations...
  • The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents. Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls.
  • The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents.
  •  
    4 Part Article; this is page 1. Based on a Congressional Audit of the NSA, and, the NSA documents provided by uber patriot Edward Snowden.
Paul Merrell

NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say - ... - 0 views

  • The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials. By tapping those links, the agency has positioned itself to collect at will from hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.
  • According to a top-secret accounting dated Jan. 9, 2013, the NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records — including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video.The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, the Government Communications Headquarters . From undisclosed interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that carry information among the data centers of the Silicon Valley giants.
  • The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process. The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship American companies. The agency is built for high-tech spying, with a wide range of digital tools, but it has not been known to use them routinely against U.S. companies.
  • ...1 more annotation...
  • In a statement, Google’s chief legal officer, David Drummond, said the company has “long been concerned about the possibility of this kind of snooping” and has not provided the government with access to its systems.“We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform,” he said.
  •  
    It says later in this 3-page article that Google's data centers back up their content to each other in case one goes down. So no question that U.S. citizens' data is collected, I think. See also closely related article, Why the NSA Wanted More Access, http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/30/prism-already-gave-the-nsa-access-to-tech-giants-heres-why-it-wanted-more/ ("Scooping up data is deep in the NSA's DNA, and it may simply have been unable to help itself."). See also http://apps.washingtonpost.com/g/page/world/how-the-nsas-muscular-program-collects-too-much-data-from-yahoo-and-google/543/ (excerpts from documents discussed in the main article). 
1 - 20 of 603 Next › Last »
Showing 20 items per page