Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged paid-speeches

Rss Feed Group items tagged

Paul Merrell

The Clintons' Paid-Speech Bonanza | Consortiumnews - 0 views

  • With primary voting set to start next month, one of Hillary Clinton’s remaining hurdles is convincing Democratic voters that she is not beholden to Wall Street and other wealthy interests that have fattened her family’s bank account with tens of millions of dollars for paid speeches, writes Chelsea Gilmour.
  •  
    Someone finally really dug into Hillary's income and campaign donations from big business. One might suspect that Hillary's campaign trail promises to rein in Wall Street were accompanied with private assurances that she has no true intent to do so, given that the Wall Street speeches for profit and for campaign donations continued to roll in. Hillary: the wrong woman for the first female U.S. president. 
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

In Keeping Grip on Data Pipeline, Obama Does Little to Reassure Industry - NYTimes.com - 0 views

  • Google, which briefly considered moving all of its computer servers out of the United States last year after learning how they had been penetrated by the National Security Agency, was looking for a public assurance from President Obama that the government would no longer secretly suck data from the company’s corner of the Internet cloud.Microsoft was listening to see if Mr. Obama would adopt a recommendation from his advisers that the government stop routinely stockpiling flaws in its Windows operating system, then using them to penetrate some foreign computer systems and, in rare cases, launch cyberattacks.
  • Intel and computer security companies were eager to hear Mr. Obama embrace a commitment that the United States would never knowingly move to weaken encryption systems. They got none of that.
  • Perhaps the most striking element of Mr. Obama’s speech on Friday was what it omitted: While he bolstered some protections for citizens who fear the N.S.A. is downloading their every dial, tweet and text message, he did nothing, at least yet, to loosen the agency’s grip on the world’s digital pipelines. White House officials said that Mr. Obama was committed to studying the complaints by American industry that the revelations were costing them billions of dollars in business overseas, by giving everyone from the Germans to the Brazilians to the Chinese an excuse to avoid American hardware and cloud services. “The most interesting part of this speech was not how the president weighed individual privacy against the N.S.A.,” said Fred H. Cate, the director of the Center of Applied Cybersecurity Research at Indiana University, “but that he said little about what to do about the agency’s practice of vacuuming up everything it can get its hands on.”
  • ...4 more annotations...
  • In fact, behind the speech lies a struggle Mr. Obama nodded at but never addressed head on. It pits corporations that view themselves as the core of America’s soft power around the world — the country’s economic driver and the guardians of its innovative edge — against an intelligence community 100,000 strong that regards its ability to peer into any corner of the digital world, and manipulate it if necessary, as crucial to the country’s security.In public, the coalition was polite if unenthusiastic about the president’s speech. His proposals, the companies said in a statement, “represent positive progress on key issues,” even while “crucial details remain to be addressed on these issues, and additional steps are needed on other important issues.” But in the online chat rooms that users and employees of those services inhabit each day, the president’s words were mocked. “If they really cared about the security of US infrastructure, they’d divulge the vulnerabilities they found or bought from the black market that exploit the security of these systems, so those systems can be fixed, and no one else can exploit them with these exploits,” wrote a user called “higherpurpose” on Hacker News.
  • In an interview, a senior administration official acknowledged that the administration had weighed what the president could say in public about the delicate problems of encryption, or the N.S.A.’s use of “zero day” flaws in software, the name for security holes that have never been seen before. It is a subject the intelligence agencies have refused to discuss in public, and Mr. Obama determined that it was both too secret, and too fluid, to discuss in the speech, officials said.In response to questions, the White House said the president had asked his special assistant for cybersecurity, Michael Daniel, and the president’s office of science and technology policy to study a recent advisory panel’s recommendation that the government get out of the business of corrupting the encryption systems created by American companies.
  • It will not be an easy task. One of the recent disclosures, first reported by Reuters, indicated that the N.S.A. paid millions of dollars to RSA, a major encryption firm, to incorporate a deliberately weakened algorithm into some of its products, giving the government a “back door” to read whatever it wanted. But when the advisory panel concluded that the United States should not “in any way subvert, weaken or make vulnerable generally available commercial software,” the intelligence agencies protested.“Some in the intelligence community saw that as a call for the N.S.A. to get out of cryptography, which is the reason they were created,” the senior official said. He added: “We’ve said that we are very much supportive of U.S. industry and making sure that U.S. industry remains competitive, and able to produce really good products. And N.S.A. has been out there saying they have no interest in breaking encryption that guards global commerce.”
  • But as Mr. Obama himself acknowledged, the United States has a credibility problem that will take years to address. The discovery that it had monitored the cellphone of Chancellor Angela Merkel of Germany, or that it has now found a way to tap into computers around the world that are completely disconnected from the Internet — using covert radio waves — only fuels the argument that American products cannot be trusted.That argument, heard these days from Berlin to Mexico City, may only be an excuse for protectionism. But it is an excuse that often works.
Gary Edwards

Political Editors: Dick Morris Corrects the Record on Hillary Clinton - The Patriot Post - 0 views

  • Then Bill discusses Hillary’s legal career at the Rose Law firm. He doesn’t mention that she made partner when he was elected governor and was only hired when he got elected as attorney general. "He makes as if it was a public service job — it wasn’t. Her main job was to get state business, and she got tens-of-millions of dollars of state business, then hid her participation and the fees by taking an extra share of non-state business to compensate for the fees on state business that she brought in. Her other job was to call the state banking commissioner any time one of her banks got into trouble to get them off.
  • "Bill speaks at length how Hillary was a mother, juggling career and family, taking Chelsea to soccer games and stuff — that’s non-sense. Hillary was a mother but Chelsea in the Arkansas governor’s mansion had a staff of nannies and agents to drive her around and people to be with her, and Hillary didn’t have to bother with any of that. All of that was paid for by the state. "He says she became the warrior in chief over the family finances and that was true, and the result is she learned how to steal. "She accepted a $100,000 bribe from the poultry industry in return for Bill going easy on regulating them, despite new standards. Jim Blair, the poultry lobbyist, gave her $1,000 to invest in the Futures Market and lined up seven to eight other investors and their winnings were all deposited into Hillary’s account. She made $100,000 in a year and she was out. That essentially was a bribe.
  • ”[She did] a phony real-estate deal for Jim McDougal and the Madison Bank to deceive the federal regulators by pretending someone else was buying the property. She was called before a grand jury in 1995 about that but, conveniently, the billing records were lost, couldn’t be found and there wasn’t proof that she worked on it.
  • ...5 more annotations...
  • “Bill talks about her work on the health care task force but doesn’t say the reason it didn’t pass was the task force was discredited because the meetings were all held in secret. A federal judge forced them open and fined the task force several hundred thousand dollars because of their secrecy. "He says that after the health care bill failed in 1994, Hillary went to work on adopting each piece of it piecemeal — mainly health insurance for children. "That is completely the opposite of the truth. The fact is when that bill failed, I called Hillary and I suggested that she support a proposal by Republican Bob Dole that we cover children, and she said, ‘We can’t just cover one part of this. You have to change everything or change nothing.’ Then in 1997 when I repeated that advice to Bill Clinton, we worked together to pass the Children’s Health Insurance Program. I found a lot of the money for that in the tobacco settlement that my friend Dick Scruggs was negotiating.
  • "Then Bill extols her record in the U.S. Senate. In fact, she did practically nothing. There were seven or eight bills that she introduced that passed; almost all of were symbolic — renaming a courthouse, congratulating a high school team on winning the championship. There was only one vaguely substantive bill, and that had a lot of co-sponsors of whom Hillary was just one.
  • "Then he goes to her record in the State Department and manages to tell that story without mentioning the word Benghazi, without mentioning her secret emails, without mentioning he was getting tens of millions — $220 million in speaking fees in return for favorable actions by the State Department.
  • "Also totally lacking in the speech was anything about the war on terror — terror is a word you don’t hear at the Democratic Convention. "Bill says that Hillary passed tough sanctions on Iran for their nuclear program. The opposite is true. "Every time a tough sanction bill was introduced by Senators Menendez or Kirk, Hillary would send Deputy Secretary Wendy Sherman to Capital Hill to testify against it and urge it not to pass, and it was over Hillary’s objections that those sanctions were put into place.
  • ”[Liberal columnist] Maureen Dowd called the speech by Bill Clinton “air brushed.” “It was a hell of a lot more than that — it was fiction. (Also see Morris’s comments after Clinton’s DNC acceptance speech. "It’s strategy and message will be interdicted by reality at every turn. … She basically has no message. … Her entire campaign is, ‘I’m a woman and I am running against Donald Trump. … She bean her speech by saying let’s compromise and work together. Is there any woman in the world less likely to compromise?”)
  •  
    "Dick Morris is a nationally recognized political campaign adviser, analyst and author. He was the senior political adviser to Bill Clinton before and after his occupation of the White House. He was campaign manager of Clinton's 1996 re-election, and the architect of his successful "triangulation" rhetorical ruse. Clinton's communications director George Stephanopoulos said of Morris, "No single person had more power over [Bill Clinton]." This week, in a message entitled "What Bill Left Out, Morris corrected the record regarding Clinton's glowing remarks about Hillary Clinton, her personal attributes and professional achievements. Morris's insights into the Clintons are priceless. What follows is a transcript of Morris's comments: "Bill Clinton talked at length about Hillary's idealistic work in college and law school, but he omits that she was defending the Black Panthers who killed security guards; they were on trial in New Haven. She monitored the trial while she was in law school to find evidence that could be grounds for reversal in the event they were convicted. "That summer she went to work for the True-Haft (SP) law firm in CA, headed by True Haft who is the head of the CA Communist Party and that's when she got involved with Saul Alinsky, who became something of a mentor for the rest of her life. "Then Bill says that she went off to Massachusetts and he went to Arkansas, and eventually Hillary followed her heart to join him in Arkansas. He omits that she went to work for the Watergate Committee and was fired from that job for taking home evidence and hiding documents that they needed in the impeachment inquiry. Then she took the DC Bar exam and flunked it, she went to Arkansas because that is the only bar exam she could pass. "He talked about how in the 1970's she took all kinds of pro-bono cases to defend women and children. In her memoirs, she cites one which was a custody case and that's it. In fact, in 1975 she represen
Paul Merrell

Hillary Clinton tackles ISIL, previews economic message - Gabriel Debenedetti - POLITICO - 0 views

  • Hillary Clinton on Tuesday dismissed the idea of putting American or Western troops on the ground to combat the Islamic State militant group, instead favoring “air force, but also army soldiers from the region, and particularly from Iraq,” in fighting what she said would be a “long-term struggle.” The former secretary of state also said that she was “obviously” considering a run for president in 2016, but that her decision would come “all in good time.”
  • Clinton said the National Security Agency should be more transparent about its activities, insisted that she “can never condone” the actions of NSA leaker Edward Snowden, and offered support for net neutrality. She also spoke at length about the important role women can play in the technology industry, intertwining that theme with an economic one. On the effort against ISIL, Clinton suggested during the Q&A with journalist Kara Swisher that there was little use in inserting U.S. combat troops into the fight and essentially backed the president’s strategy so far. “It’s a very hard challenge, because you can’t very well put American or Western troops in to fight this organism,” she said, in her clearest statement yet on the topic. “You have to use, not only air force but also army soldiers from the region and particularly from Iraq. … A lot of the right moves are being made, but this is a really complicated and long-term problem.”
  • While lauding the technology field in general, Clinton also was careful to touch on subjects that can be sensitive in any industry, including rising CEO pay. She also called for a higher minimum wage, pay fairness, and paid leave policies.
  • ...2 more annotations...
  • And while Clinton did not explicitly mention her political future during her speech, she did nod to her 2008 concession speech that mentioned cracks in the glass ceiling by saying that now it is time to “crack every last glass ceiling.”
  • The likely Democratic 2016 front-runner, who has been criticized by Republicans for her lack of public appearances in recent weeks, is scheduled for at least half a dozen high-profile events between now and March 23, including some highly paid speeches and one speech at a New York gala for her family’s foundation. The foundation has been under scrutiny for accepting funds from foreign governments since Clinton left the State Department in 2013. Clinton’s schedule features multiple events that will draw attention to her work on women’s rights, which is expected to be a major theme for her 2016 campaign.
Paul Merrell

In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots - 0 views

  • Hillary Clinton reiterated her unreserved support for both a “no-fly zone” and “safe zones” in Syria during Sunday’s presidential debate — but in a partial transcript of private remarks she made at a Goldman Sachs event in 2013, she acknowledged some of the complications involved. Her comments were included in an 80-page report prepared by the Clinton campaign listing the most politically damaging quotes from Clinton’s paid speeches, which she has refused to make public. Among the recipients of that report was Clinton campaign chairman John Podesta, whose hacked emails were posted by WikiLeaks on Friday. In her remarks to Goldman Sachs, Clinton pointed to the Syrian government’s air defense systems, and noted that destroying them would take the lives of many Syrian civilians. “They’re getting more sophisticated thanks to Russian imports. To have a no-fly zone you have to take out all of the air defense, many of which are located in populated areas.  So our missiles, even if they are standoff missiles so we’re not putting our pilots at risk—you’re going to kill a lot of Syrians,” she said. “So all of a sudden this intervention that people talk about so glibly becomes an American and NATO involvement where you take a lot of civilians.”
  • She also addressed how much harder it would be to intervene in Syria, compared to Libya. “In Libya we didn’t have that problem. It’s a huge place.  The air defenses were not that sophisticated and there wasn’t very—in fact, there were very few civilian casualties.  That wouldn’t be the case,” she noted. “And then you add on to it a lot of the air defenses are not only in civilian population centers but near some of their chemical stockpiles.  You do not want a missile hitting a chemical stockpile.” While Clinton admitted these complications in establishing a no-fly zone, she also urged other forms of intervention. “And there is still an argument that goes on inside the administration and inside our friends at NATO and the Europeans.  How do intervene—my view was you intervene as covertly as is possible for Americans to intervene.  We used to be much better at this than we are now,” she said.
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

The United Nations' Response to ISIS Beheadings in Syria. "Resolutions" Calling for "Re... - 0 views

  • Following the gruesome beheading of James Foley, by a terrorist group called “The Islamic State of Iraq and Syria,” and the group’s threats to behead other captives in August 2014, The New York Times headline on page A19 reads, with Kafkaesque “logic”:  “U.S. Invokes Defense of Iraq in Legal Justification of Syria Strikes.”  US/NATO had failed, for three years, to get UN Security Council authorization for military action against Syria, and unilateral military action against Syria would be a violation of international law. However, the very visible emergence of ISIS, now defined as the most dangerous terrorist organization in the Middle East, or, perhaps, globally, and their widely publicized video beheadings of James Foley, Steve Sotloff and others, appeared to give some form of de facto justification for broader military action, including against Syria.  On August 22, 2014, The New York Times reported, page A6: “When the United States began airstrikes in Iraq this month, senior Obama administration officials went out of their way to underscore the limited nature of their action.  ‘This was not an authorization of a broad-based counterterrorism campaign,’ a senior Obama administration official told reporters at the time.  But the beheading of an American journalist and the possibility that more American citizens being held by the group might be slain has prompted outrage at the highest levels of the American government.”
  • In an interview with Anderson Cooper, Diane Foley stated that a military official forbade the family from going to the media and threatened to prosecute them for supporting terrorism if they attempted to raise the $1.32 million dollar ransom demanded by ISIS. “Three times he intimidated us with that message.  We were horrified he would say that.  He just told us we would be prosecuted.  We knew we had to save our son, we had to try,” Mrs. Foley told Anderson Cooper. Foley’s brother, Michael noted in an interview that he was ‘directly threatened with possible prosecution for violating anti-terrorism laws by a State Department official.”  Reporter Michael Isikoff states, in a September 12 article: “The parents of murdered journalist Steven Sotloff were told by a White House counterterrorism official at a meeting last May that they could face criminal prosecution if they paid ransom to try to free their son.”
  • Indeed, it can be asserted that these same administration officials who claimed “outrage” after the beheadings, inflicted the most extreme psychological torture upon the families of James Foley and Stephen Sotloff, who were desperately trying to save the lives of their sons and brother. On September 12, 2014, ABC news reported:  “Obama administration officials repeatedly threatened the family of murdered journalist James Foley that they might face criminal charges for supporting terrorism if they paid ransom to the ISIS killers who ultimately beheaded their son, his mother and brother said this week.  ‘We were told that several times and we took it as a threat and it was appalling,’ Foley’s mother Diane told ABC news in an interview.  She said the warnings over the summer came primarily from a highly decorated military officer serving on the White House National Security Council staff, which five outraged current and former officials with direct knowledge of the Foley case also recounted to ABC news in recent weeks.”
  • ...4 more annotations...
  • Mrs. Foley diplomatically implies that her son’s death was in the “strategic interest” and she stops just short of accusing the administration of using her son’s beheading as the fig-leaf they needed to justify the administration’s unilateral attack on Syria, which was in violation of international law. If saving Foley was not in the “strategic interest,” a very frightening possibility exists. The murders of Foley and Sotloff, both of whom were beheaded by ISIS, were called ‘acts of barbarism’ by Obama in his speech announcing a military campaign to destroy the terrorist organization. Frenzied hysteria over human rights abuses in Syria continues to be incited by mainstream media, as the middle east is fragmented and decomposed by US/NATO bombings and internecine warfare so complex that the UN’s call for the “diplomatic resolution” of multiple devastating conflicts becomes an increasingly remote possibility.  Saudi Arabia and Qatar continue arming the terrorist opposition.
  • “Sotloff’s father, Art, was ‘shaking’ after the meeting with the official, who works for the National Security Council.  Sources close to the family say that at the time of the White House meeting the Sotloffs and Foleys were exploring lining up donors who would help pay multimillion dollar ransoms to free their sons.  But after the meeting those efforts collapsed, one source said, because of concerns that ‘donors could expose themselves to prosecution.’” James Nye for Mailonline reported:  “Mrs. Foley poured scorn on the Pentagon’s claim they tried to rescue Foley on July 4, only to raid the wrong base…Throughout the 20 month ordeal, Mrs. Foley said she came to regard her and her family’s efforts to rescue James as an ‘annoyance’ to the administration and began to feel that their desperation to bring James Foley home did not ‘seem to be in the strategic interest, if you will.’”
  • The front page headline states:  “U.S. General Says Raiding Syria is Key to Halting Isis.  The Islamic State in Iraq and Syria cannot be defeated unless the United States or its partners take on the Sunni militants in Syria,’ General Martin Dempsey, Chairman of the Joint Chiefs of Staff said on August 21, 2014. ‘This is an organization that has an apocalyptic end-of-days strategic vision that will eventually have to be defeated.  Can they be defeated without addressing that part of the organization that resides in Syria?  The answer is no.” Public horror at the beheading of James Foley and Steven Sotloff transformed public reluctance to engage in yet another seemingly endless and futile distant war, paid for by the U.S. taxpayer, into public outrage and support for retaliation against the terrorists who beheaded Foley and Sotloff.  US/NATO now had a de facto form of support and legitimacy for attacking Syria.  Given little publicity, however, then and now, was the fact that ISIS offered to exchange the lives of James Foley and Stephen Sotloff for $100 million dollars in ransom.  Although top U.S. officials used their “outrage” at the beheading of Foley and Sotloff to “justify” a unilateral attack on Syria, they were not sufficiently outraged to do what was necessary to prevent these beheadings, which, once executed, provided a convenient fig-leaf for the attack on Syria for which  they had sought and failed to attain legal justification during the preceding three years.
  • At the same time that the military-industrial complex thrives on huge profits derived from these geo-politically engineered conflicts, it is worth recalling the September 10, 2014 report by Mazzetti, Schmitt and Landler in The New York Times: “Washington – “The violent ambitions of the Islamic State in Iraq and Syria have been condemned across the world:  in Europe and the Middle East, by Sunni nations and Shiite ones, and by sworn enemies like Israel and Iran.  Pope Francis joined the call for ISIS to be stopped. “As President Obama prepares to send the United States on what could be yearslong military campaign against the militant group (ISIS), American intelligence agencies have concluded that it poses no immediate threat to the United States.  Some officials and terrorism experts believe that the actual danger posed by ISIS has been distorted in hours of television punditry and alarmist statements by politicians, and that there has been little substantive public debate about the unintended consequences of expanding American military action in the Middle East. “Daniel Benjamin, who served as the State Department’s top counterterrorism adviser during Mr. Obama’s first term, said the public discussion about the ISIS threat has been a ‘farce,’ with ‘members of the cabinet and top military officers all over the place describing the threat in lurid terms that are not justified.’  “It’s hard to imagine a better indication of the ability of elected officials and TV talking heads to spin the public into a panic, with claims that the nation is honeycombed with sleeper cells, that operatives are streaming across the border into Texas or that the group will soon be spraying Ebola virus on mass transit systems – all on the basis of no corroborated information,’ said Mr. Benjamin, who is now a scholar at Dartmouth College.”
  •  
    The Feds' "no ransom" policy might better be changed to "pay the ransom then extract retribution." It would still serve as a deterrent. Nonetheless, that policy is now part of a U.N. Security Council Resolution. 
Paul Merrell

MoA - Gas From Israel And The Flynn Wiretapping - Behind The Deep-State Infighting Over... - 0 views

  • What is really behind the deep-state infighting over the U.S. elections and the "wire tapping" of the Trump campaign? Why was the CIA-Neocon axis vehemently lobbying against Trump? What foreign interests and what money is involved in this? Answers to these questions are now emerging. The former director of the CIA under Clinton, James Woolsey, went to the Wall Street Journal and offered some information (likely some true and some false) on the retired General Flynn and the lobbying businesses he was involved in. Woolsey is an arch-neoconservative. He had worked on the transition team of Trump but got fired over "growing tensions over Trump’s vision for intelligence agencies." Flynn is the former National Security Advisor of Trump who later also got fired. Woolsey was a board member of Flynn's former lobbying company FIG. Woolsey claims: In September 2016 he took part in a meeting between Flynn and high level Turkish officials, including the Turkish foreign minister and the energy minister who is the son-in-law of the Turkish president Erdogan. During the meeting, Woolsey claims, a brainstorming took place over how the Turkish cult leader Fethullah Gülen could -probably by illegal means- be removed from the U.S. and handed over to Turkey. Gülen is accused by the Erdogan mafia of initiating a coup attempt against it. The U.S. claims officially that there is no evidence for such an accusation and that Gülen can therefore not be rendered to Turkey. Gülen is an old CIA asset that helped the U.S. deep state to control Turkey.  Erdogan divorced from the Gülen organization after it became useless for his neo-Ottoman project. Here is the WSJ report on the Woolsey claims and a video clip with parts of his WSJ interview. Woolsey also went on CNN where he repeated his WSJ story. Flynn was accused by the anti-Trump campaign to have worked for Russia. He had taken several $10,000 for speeches he gave in Moscow. He also, at times, had argued for better U.S. relations with Russia. But Flynn's pro-Russia stand was probably honest. (Or the bribes involved were just smaller than the ones paid by others.) The money he got on the speaker circus was rather small for a man in his position. Flynn's real corruption was on another issue. After having been fired from the Trump administration, Flynn retroactively filed under the Foreign Agent Registration Act (FARA). His lobbying firm had a contract over $530,000 to work for a company near to the Turkish president Erdogan: In its filing, Mr. Flynn’s firm said its work from August to November “could be construed to have principally benefited the Republic of Turkey.” The filing said his firm’s fee, $530,000, wasn’t paid by the government but by Inovo BV, a Dutch firm owned by a Turkish businessman, Ekim Alptekin.
  • This lobbying, not the alleged Flynn-Putin relation, is the real scandal and part of the Trump/CIA/Clinton deep-state in-fighting. The meeting Woolsey described was under the "Turkish" Flynn contract. The Turkish business man, and owner of Inovo, Ekim Alptekin is a member of the Erdogan gang. But hidden at the very end of the WSJ story is the real key to understand the shady network: Inovo hired Mr. Flynn on behalf of an Israeli company seeking to export natural gas to Turkey, the filing said, and Mr. Alptekin wanted information on the U.S.-Turkey political climate to advise the gas company about its Turkish investments. It was the Israeli gas company, not the Alptekin outlet, that drove the issue. The Leviatan (and Tamar) gas fields in the Mediterranean along the Israeli coast are a huge energy and profit resource IF the gas from them can be exported to Europe. Several companies are involved in the exploration and all are looking for ways to connect the fields to the European gas network. There are (likely true) rumors that huge bribes have been payed in Israel, Jordan and elsewhere to win exploration contracts and to sell the gas. Negotiations between Israel and Turkey over the pipeline have been on and off. They depend on a positive climate towards Israel in the Turkish government which again depends on the often changing political position of the Erdogan gang.
  • The picture evolving here (lots of sleuthing and sources) is this: An Israeli company (or whoever is behind it) wants a gas pipeline to Turkey. It hires Flynn and Alptekin to arrange a positive climate for the Leviathan pipeline within the Turkish government. It offers Flynn more than half a million for a little (4-month long) influence work. His job is to create a "friendly atmosphere" for the deal by using his influence in the U.S. to accommodate Erdogan. A major point that is expected from Flynn is to arrange the handover of Gülen, by whatever means, from the U.S. to Erdogan. After accepting the (lobbying) bribe Flynn-the-whore suddenly changes his former anti-Turkish, pro-Russian, pro-Kurdish political position into a pro-Turkish, neutral-Russian and anti-Kurdish one. (His lobbying firm also makes some smaller payments related to the Clinton email-server scandal. This may be related to links between the Clinton family and the Gülen school empire.) He has a meeting with the Turkish government/Erdogan officials part of which is a discussion of a removal of Gülen to Turkey. He pens a pro Erdogan anti-Gülen op-ed which is published on the day of the election and he denigrates the Pentagon plan to work with the Kurds in Syria. The NSA, CIA and the FBI are listening to Flynn's conversations with Turkish and Israeli interests. (For the old and long history of such "wiretapping" of Turkish and Israeli connections and various dirty and criminal deals they revealed read and ask Sibel Edmonds.) The projects which Flynn is involved in, especially removing Gülen, are against the long term interests of the (neoconservative-driven) CIA. Selected tapes of his talks are transcribed and distributed within the anti-Trump campaign. This is the origin of the "wiretapping" of the Trump Tower the U.S. president lamented about. The stuff the CIA dug up about Flynn's dealing was and is used against Trump. Woolsey is caught up in this as he also worked for Flynn's lobbying firm. (His neocon-pro-Zionist history suggests that he is the senior Israeli watchdog over Flynn in all this.) He is now engaged in damage control and is "coming clean" and selectively leaking his anti-Flynn stuff to exculpate himself. (There is probably also some new, better deal involved that will pay off from him.) The Israeli-Turkish pipeline and the related deep-state fight are not the only issue involved in the campaign against Trump. There are also British interests and British intelligence involvement especially with the accusations against Russia of "hacking" of the DNC. If and how these fit in with above has not yet been revealed.
Paul Merrell

ECB Head Mario Draghi Admits For First Time EU May Break-Up - TruePublica - 0 views

  • Back in 2012, Mario Draghi, President of the European Central Bank, pledged to do “whatever it takes” to protect the eurozone from collapse, infamous words I’m sure he has come to regret. Draghi’s speech at an investment conference in London boosted markets at the time and forced down Spain and Italy’s borrowing costs after saying; “Within our mandate, the ECB is ready to do whatever it takes to preserve the euro. And believe me, it will be enough.” The markets responded because they were effectively being manipulated. Known as “Outright Monetary Transactions” the scheme was to have been deployed alongside a QE programme from March 2015, itself racking up ¢80billion a month. Several trillion euros later and the EU looks as precarious as ever with growth a distant memory. In Italy, yields on bonds dropped from 6.3 per cent to 1.2 per cent after that famous speech and all seemed good – on the face of it. But deep down, it was not as we had been led to believe. Italy’s government debt grew and is now equal to 133 per cent of GDP. When Ireland imploded and had to be fully bailed out by the ECB, it’s debt pile was 132.2% of GDP.
  • With all this intervention, the ECB’s balance sheet ballooned – set to overtake the U.S. Fed Reserve and has now reached over $3trillion according to Bank of America Merrill Lynch (not to be confused with national debt). Then, totally off the mainstream media radar came news that another Italian bank had disintegrated. And while attention was focused on the rescue of Banca Monte dei Paschi di Siena, which is still not fully finalised, news came that Banca Etruria, has quietly slipped into bankruptcy. “It was announced (Dec 21st) that the first part of an investigation concerning fraudulent bankruptcy charges (at Banca Etruria), in which 21 board members are implicated, had been closed. This strand of the investigation concerns €180 million of loans offered by the bank which were never paid back, leading to the regional lender’s bankruptcy and eventual bail-in/out last November that left bondholders holding virtually worthless bonds.” Next up and out of the blue comes UniCredit, the country’s largest bank. It is seeking to raise €13bn of desperately needed capital but large as though this is, the biggest problems, according to the FT is that the smaller banks, like Banca Etruria, are now in a perilous position and on the verge of falling over the cliff edge. Italy has banks on every street corner, with more branches per capita than any other OECD country. The lack of growth (occurred since it joined the Euro), has suppressed much needed profits on the one hand whilst seeing poor wage growth on the other, causing drastically increased non-performing loans that now add up to an eye-watering €360billion.
  • The FT reports that Italian banks “have long sold their own shares and debt to their retail customers as an attractive alternative to savings products, a disgraceful practice that should never have been allowed. It means that ordinary Italians, many in retirement, have already suffered as bank shares have fallen. They will suffer much more in a bail-in.” The FT is suggesting that a full bail-in is on the cards. It is. truepublica reported back in September that banks throughout the EU would simply steal depositors money if any of them failed now that new bail-in rules had been implemented. And that is exactly what is happening. The result of all this is that Mario Draghi, clearly feeling the strain, has finally admitted defeat and said that there is a strong possibility of the EU falling apart. This time the tactic to keep unity was to threaten every country in the EU by stating that leaving the Eurozone would cost dearly and would require any member country to settle its claims or debts with the bloc’s payments system before severing ties. There’s nothing to stop a desperate member country from leaving and simply defaulting.
Paul Merrell

WASHINGTON: Seeing threats, feds target instructors of polygraph-beating methods | Insi... - 0 views

  • Federal agents have launched a criminal investigation of instructors who claim they can teach job applicants how to pass lie detector tests as part of the Obama administration’s unprecedented crackdown on security violators and leakers. The criminal inquiry, which hasn’t been acknowledged publicly, is aimed at discouraging criminals and spies from infiltrating the U.S. government by using the polygraph-beating techniques, which are said to include controlled breathing, muscle tensing, tongue biting and mental arithmetic. So far, authorities have targeted at least two instructors, one of whom has pleaded guilty to federal charges, several people familiar with the investigation told McClatchy. Investigators confiscated business records from the two men, which included the names of as many as 5,000 people who’d sought polygraph-beating advice. U.S. agencies have determined that at least 20 of them applied for government and federal contracting jobs, and at least half of that group was hired, including by the National Security Agency.
  • By attempting to prosecute the instructors, federal officials are adopting a controversial legal stance that sharing such information should be treated as a crime and isn’t protected under the First Amendment in some circumstances.
  • “Nothing like this has been done before,” John Schwartz, a U.S. Customs and Border Protection official, said of the legal approach in a June speech to a professional polygraphers’ conference in Charlotte, N.C., that a McClatchy reporter attended. “Most certainly our nation’s security will be enhanced.”“There are a lot of bad people out there. . . . This will help us remove some of those pests from society,” he added.
  • ...4 more annotations...
  • The federal government polygraphs about 70,000 people a year for security clearances and jobs, but most courts won’t allow polygraph results to be submitted as evidence, citing the machines’ unreliability. Scientists question whether polygraphers can identify liars by interpreting measurements of blood pressure, sweat activity and respiration. Researchers say the polygraph-beating techniques can’t be detected with certainty, either. Citing the scientific skepticism, one attorney compared the prosecution of polygraph instructors to indicting someone for practicing voodoo.
  • But instructors may be prosecuted if they know that the people they’re teaching plan to lie about crimes during federal polygraphs, he said. In that scenario, prosecutors may pursue charges of false statements, wire fraud, obstructing an agency proceeding and “misprision of felony,” which is defined as having knowledge of serious criminal conduct and attempting to conceal it.
  • Schwartz, who was involved in the federal investigation, cited the risk of drug traffickers infiltrating his agency as justification for prosecutors going after instructors. However, he told the crowd of law enforcement officials from across the country that he wasn’t discussing a specific case but a “blueprint” of how state and local officials might pursue a prosecution. Urging them to join forces with his agency, he declared in a more than two-hour speech that “evil will always seek ways to hide the truth.” “When you identify insider threats and you eliminate insider threats, then that agency is more efficient and more effective,” Schwartz said. The Obama administration’s Insider Threat Program is intended to deter what the government condemns as betrayals by “trusted insiders” such as Edward Snowden, the former National Security Agency contractor who revealed the agency’s secret communications data-collection programs. The administration launched the Insider Threat Program in 2011 after Army Pfc. Bradley Manning downloaded hundreds of thousands of documents from a classified computer network and sent them to WikiLeaks, the anti-government secrecy group.As part of the program, employees are being urged to report their co-workers for a wide range of “risky” behaviors, personality traits and attitudes, McClatchy reported in June. Broad definitions of insider threats also give agencies latitude to pursue and penalize a range of conduct other than leaking classified information, McClatchy found.
  • Several people familiar with the investigation said Dixon and Williams had agreed to meet with undercover agents and teach them how to pass polygraph tests for a fee. The agents then posed as people connected to a drug trafficker and as a correctional officer who’d smuggled drugs into a jail and had received a sexual favor from an underage girl. Dixon wouldn’t say how much he was paid, but people familiar with countermeasures training said others generally charged $1,000 for a one-on-one session.
  •  
    There is no scientific proof that lies can be detected using a polygraph, which is why polygraph evidence is inadmissible in court, but law enforcement and national security types fervently believe otherwise. Prosecuting someone for teaching how to circumvent polygraph testing stacks one absurdity atop another.
Paul Merrell

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com - 0 views

  • It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords, briefly locking out the FBI until it gained back control. The new details emerged in local press reports from a Thursday bail hearing in Dublin, Ireland, where Marques, 28, is fighting extradition to America on charges that Freedom Hosting facilitated child pornography on a massive scale. He was denied bail today for the second time since his arrest in July. Freedom Hosting was a provider of turnkey “Tor hidden service” sites — special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network. Tor hidden services are used by sites that need to evade surveillance or protect users’ privacy to an extraordinary degree – including human rights groups and journalists. But they also appeal to serious criminal elements, child-pornography traders among them.
  • On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the Tor Browser Bundle, reporting back to a mysterious server in Northern Virginia. The FBI was the obvious suspect, but declined to comment on the incident. The FBI also didn’t respond to inquiries from WIRED today. But FBI Supervisory Special Agent J. Brooke Donahue was more forthcoming when he appeared in the Irish court yesterday to bolster the case for keeping Marques behind bars, according to local press reports. Among the many arguments Donahue and an Irish police inspector offered was that Marques might reestablish contact with co-conspirators, and further complicate the FBI probe. In addition to the wrestling match over Freedom Hosting’s servers, Marques allegedly dove for his laptop when the police raided him, in an effort to shut it down.
  • The apparent FBI-malware attack was first noticed on August 4, when all of the hidden service sites hosted by Freedom Hosting began displaying a “Down for Maintenance” message. That included at least some lawful websites, such as the secure email provider TorMail. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address. By midday, the code was being circulated and dissected all over the net. Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. Though many older revisions of Firefox were vulnerable to that bug, the malware only targeted Firefox 17 ESR, the version of Firefox that forms the basis of the Tor Browser Bundle – the easiest, most user-friendly package for using the Tor anonymity network. That made it clear early on that the attack was focused specifically on de-anonymizing Tor users. Tor Browser Bundle users who installed or manually updated after June 26 were safe from the exploit, according to the Tor Project’s security advisory on the hack.
  • ...2 more annotations...
  • Perhaps the strongest evidence that the attack was a law enforcement or intelligence operation was the limited functionality of the malware. The heart of the malicious Javascript was a tiny Windows executable hidden in a variable named “Magneto.” A traditional virus would use that executable to download and install a full-featured backdoor, so the hacker could come in later and steal passwords, enlist the computer in a DDoS botnet, and generally do all the other nasty things that happen to a hacked Windows box. But the Magneto code didn’t download anything. It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
  • The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway. The code’s behavior, and the command-and-control server’s Virginia placement, is also consistent with what’s known about the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007. Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor. Prior to the Freedom Hosting attack, the code had been used sparingly, which kept it from leaking out and being analyzed.
  •  
    Taking down the entire Freedom Hosting service because some content was kiddie porn is reminiscent of the U.S. government's proxy take-down of Mega-Upload in New Zealand. Such actions that disable legitimate users or deny access to their data are in my opinion violative of the 1st and 4th Amendments.  It suppresses the Freedom of Speech and seizes more than the 4th Amendment allows.  That our own government would use malware for surveillance purposes under any circumstance is just plain chilling.
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

M of A - The "Salafist Principality" - ISIS Paid Off To Leave Mosul, Take Deir Ezzor? - 0 views

  • On September 20 I wrote about the likely reason for the willful U.S. bombing attack on a critical Syrian army position in Deir Ezzor: Two recent attacks against the Syrian Arab Army in east-Syria point to a U.S. plan to eliminate all Syrian government presence east of Palmyra. This would enable the U.S. and its allies to create a "Sunni entity" in east-Syria and west-Iraq which would be a permanent thorn in side of Syria and its allies. ... The U.S. plan is to eventually take Raqqa by using Turkish or Kurdish proxies. It also plans to let the Iraqi army retake Mosul in Iraq. The only major city in Islamic State territory left between those two is Deir Ezzor. Should IS be able to take it away from the isolated Syrian army garrison it has at least a decent base to survive. (Conveniently there are also rich oil wells nearby.) No one, but the hampered Syrian state, would have an immediate interest to remove it from there. There are new signs that this analysis was correct.
  • Yesterday the Turkish President Erdogan made a remark that points into that direction. As the British journalist Elijah Magnier summarized it: Elijah J. Magnier @EjmAlrai Erdogan: #Turkey will participate in #Mosul just like it did in #Jarablus.Army doesn't take orders from #Iraq PM who should know his limits. 4:06 AM - 11 Oct 2016 "Like Jarablus" was an interesting comparison. The Turks and their proxies took Jarablus in center-north Syria from the Islamic State without any fight and without any casualties from fighting. ISIS had moved away from the city before the Turks walked in. There obviously had been a deal made. That's why I replied this to Magnier's tweet above: Moon of Alabama @MoonofA The Turks will pay off ISIS in Mosul to leave early just like they did in Jarablus? 5:58 AM - 12 Oct 2016
  • Three hours later this rumor from a well connected Syrian historian and journalist in London answered that question: Nizar Nayouf @nizarnayouf Breaking news:Sources in #London say:“#US& #Saudi_Arabia concluded an agreement to let #ISIS leave #Mosul secretly& safely to #Syria"! 9:28 AM - 12 Oct 2016 Erdogan predicts that his troops and proxy forces will march into Mosul just like they marched into Jarablus: In a peaceful walk, without any fight, into a city free of Jihadis. The Saudis and the U.S. arranged for that. The U.S. bombed the most important SAA position in Deir Ezzor so that ISIS, now with the help of its cadres from Mosul, can take over the city. A nice place to keep it holed up in east-Syria until it can further be used in this or that imperial enterprise.
  • ...4 more annotations...
  • A good plan when your overall aim is to create an obedient mercenary statelet in the center of the Middle East. As the U.S. Defense Intelligence Agency wrote in 2012: THERE IS THE POSSIBILITY OF ESTABLISHING A DECLARED OR UNDECLARED SALAFIST PRINCIPALITY IN EASTERN SYRIA (HASAKA AND DER ZOR), AND THIS IS EXACTLY WHAT THE SUPPORTING POWERS TO THE OPPOSITION WANT, IN ORDER TO ISOLATE THE SYRIAN REGIME. But this plan requires to fight the Syrian and Russian air-forces which will do their utmost to defend the SAA group and the 100-200,000 ISIS besieged Syrian civilians in Deir Ezzor. The the U.S. and its allies may be willing to do that. A well known British Tory member of parliament already made noise that British fighter jets should be free to shoot down Russian planes in Syria. The U.S. had claimed that British planes took part in the Deir Ezzor ambush. The defenders of Deir Ezzor lack their own air defenses. The Russian systems at the Syrian west-coast can not reach that far east. The Syrian system are mostly positioned to defend Damascus and other cities from attacks by Israel. Russia recently talked about delivering 10 new Pantsyr-S1 short-to-medium range air defense systems to Syria. At least two of those should be airlifted to Deir Ezzor as soon as possible.
  • UPDATE: I was just made aware of a recent speech by Hizbullah leader Nasrallah who smells the same stinking plot: Sayyed Nasrallah said that the Americans intend to repeat Fallujah plot when they opened a way for ISIL to escape towards eastern Syria before the Iraqi warplanes targeted the terrorists’ convoy, warning that the same deceptive scheme is possible to be carried out in Mosul.
  • All the .mil conspiracy theory folks (me) knew why those ships were sent into the straits. The only thing we couldn't figure out was what kind of false flag the U.S. would use to Tomahawk Yemen because nobody would believe the Houthis would be dumb enough to fire on a U.S. missile cruiser. They hate the U.S., but have no reason to rattle our cage THAT much. They fired on the UAE-contracted Swift because it was bringing armor and weapons to Saudi puppet Hadi's forces in Yemen. Attacking a U.S. missile destroyer accomplishes absolutely nothing for them. When the Houthis heard the USS Mason and Nitze were attacked, they thought it was a joke. They denied any such attack as preposterous, asking the obvious question: "Why the hell would we ever do that? But it gets a little better for us in tinfoil hat land. This post by someone looking for images of deleted Tweets sums it up nicely: https://twitter.com/teddy_cat1/status/786333929309556736 Few hours before Reuter's announcement of a U.S. Navy destroyer came under missile attack off Yemen on Sunday, Saudi official accounts on tweeter like Journalist Fahd Kamely and Saudi-24 News had tweeted that the Royal Saudi Naval Forces targeted what they thought to be an Iranian ship for suspicion of supplying Houthis with weapons! They immediately deleted their tweets following this announcement, but many people have saved a picture for those tweets before being deleted and since then are circulating them on tweeter...
  • So we know the U.S. Navy lied when they said the missiles came from Yemen. The RSNF most likely did launch the missiles and used the 'Iranian arms smuggling' as a cover story in case anyone noticed. The U.S. destroyers were never targeted or in danger, but probably did use the occasion to test their anti-missile defenses. All this set up the false flag, providing Obama and excuse to order the U.S. Navy to Tomahawk the Yemeni coastal radars at the behest of some pissed-off UAE emir (likely a Clinton Foundation donor).
  •  
    There are other signs that the U.S. made this slimy deal with the Saudis and that it is being implemented. I'll post other links. And I've seen other confirmation that the UK has authorized its pilots to down Russian aiircraft. Meanwhile, Turkey's Erdogan has commanded that Mosul is to become a Sunni Arab city and has forbidden Shi'ite Militia form participating in the "battle" for Mosul. Today, MSM is full of news about the launch of the Iraqi attack on Mosul. But no mention of the deal to allow ISIL to escape into Syria, of course. Make no mistake: this is the U.S. launching ISIL against Russia, Syria, Iran, and Hezbollah in Syria. With the added bonus of being able to claim that this time, they trained the Iraqi Army correctly, as it walks into Mosul against only token resistance. Smoke and mirrors. This is U.S. war against Russia.
Paul Merrell

Financial frauds had a friend in Holder | Al Jazeera America - 0 views

  • Eric Holder was U.S. attorney general at a time when the world desperately needed the nation’s chief law enforcement officer to hold accountable the elite bankers who oversaw the epidemic of fraud that drove the 2008 global financial crisis and triggered the Great Recession. After nearly six years in office, Holder announced on Sept. 25 that he plans to step down, without having brought to justice even one of the executives responsible for the crisis. His tenure represents the worst strategic failure against elite white-collar crime in the history of the Department of Justice (DOJ).  In both the U.S. savings and loan debacle of the late 1980s and the Enron-era accounting frauds of the early 2000s, there were more than 1,000 successful felony convictions in cases designated as major by the DOJ. In both those fraud epidemics, federal prosecutors prioritized the top executives of the corporations responsible. This context makes Holder’s failure to prosecute — much less convict — the elite bank frauds that caused this far larger crisis all the more damning.
  • In addition to the failure to prosecute the leaders of those massive frauds, Holder’s dismal record includes 1) failing to prosecute the elite bankers who led the largest (by several orders of magnitude) price-rigging cartel in history — the LIBOR scandal, in which the world’s largest banks conspired to rig the reported interest rates at which the banks were willing to lend to one another, which affected prices on over $300 trillion in transactions; 2) failing to prosecute the massive foreclosure frauds (robo-signing), in which bank employees perjured themselves by signing more than 100,000 false affidavits in order to deceive the authorities that they had a right to foreclose on homes; 3) failing to prosecute the bid-rigging cartels of bond issuances in order to raise the costs to U.S. cities, counties and states of borrowing money in order to increase banks’ illegal profits; 4) failing to prosecute money laundering by HSBC for the murderous Sinaloa and Norte del Valle drug cartels; 5)  failing to prosecute the senior bank officers of Standard Chartered who helped fund of terrorists and nations that support terrorism; and 6) failing to prosecute the controlling officers of Credit Suisse who for decades helped wealthy Americans unlawfully evade U.S. taxes and then obstructed investigations by the DOJ and Internal Revenue Service for many years.  
  • the CEOs knew that they could trade off a slightly larger fine in return for complete immunity for themselves and other officers who might otherwise be flipped by federal prosecutors to testify against more senior officers. The fines, of course, would be paid not by the CEOs but by the banks they ran. Indeed, one of the lesser-known aspects of the crisis is that the DOJ almost never sued a banker (as opposed to a bank) and virtually never sought to claw back bankers’ fraud proceeds. It is telling that, as even Holder admitted last week, “A corporation may enter a guilty plea and still see its stock price rise the next day.”
Paul Merrell

NSA Spying Inspires ProtonMail 'End-to-End' Encrypted Email Service | NDTV Gadgets - 0 views

  • ne new email service promising "end-to-end" encryption launched on Friday, and others are being developed while major services such as Google Gmail and Yahoo Mail have stepped up security measures.A major catalyst for email encryption were revelations about widespread online surveillance in documents leaked by Edward Snowden, the former National Security Agency contractor."A lot of people were upset with those revelations, and that coalesced into this effort," said Jason Stockman, a co-developer of ProtonMail, a new encrypted email service which launched Friday with collaboration of scientists from Harvard, the Massachusetts Institute of Technology and the European research lab CERN.Stockman said ProtonMail aims to be as user-friendly as the major commercial services, but with extra security, and with its servers located in Switzerland to make it more difficult for US law enforcement to access.
  • "Our vision is to make encryption and privacy mainstream by making it easy to use," Stockman told AFP. "There's no installation. Everything happens behind the scenes automatically."Even though email encryption using special codes or keys, a system known as PGP, has been around for two decades, "it was so complicated," and did not gain widespread adoption, Stockman said.After testing over the past few months, ProtonMail went public Friday using a "freemium" model a basic account will be free with some added features for a paid account.
  • By locating in Switzerland, ProtonMail hopes to avoid the legal woes of services like Lavabit widely believed to be used by Snowden which shut down rather than hand over data to the US government, and which now faces a contempt of court order.Even if a Swiss court ordered data to be turned over, Stockman said, "we would hand over piles of encrypted data. We don't have a key. We never see the password."
  • ...3 more annotations...
  • As our users from China, Iran, Russia, and other countries around the world have shown us in the past months, ProtonMail is an important tool for freedom of speech and we are happy to finally be able to provide this to the whole world," the company said in a blog post.Google and Yahoo recently announced efforts to encrypt their email communications, but some specialists say the effort falls short."These big companies don't want to encrypt your stuff because they spy on you, too," said Bruce Schneier, a well-known cryptographer and author who is chief technology officer for CO3 Systems."Hopefully, the NSA debate is creating incentives for people to build more encryption."Stockman said that with services like Gmail, even if data is encrypted, "they have the key right next to it if you have the key and lock next to each other, so it's pretty much useless."
  • Lavabit founder Ladar Levison meanwhile hopes to launch a new service with other developers in a coalition known as the "Dark Mail Alliance."Levison told AFP he hopes to have a new encrypted email system in testing within a few months and widely available later this year."The goal is to make it ubiquitous, so people don't have to turn it on," he said.But he added that the technical hurdles are formidable, because the more user-friendly the system becomes, "the more susceptible it is to a sophisticated attacker with fake or spoofed key information."Levison said he hopes Dark Mail will become a new open standard that can be adopted by other email services.
  • on Callas, a cryptographer who developed the PGP standard and later co-founded the secure communications firm Silent Circle, cited challenges in making a system that is both secure and ubiquitous."If you are a bank you have to have an email system that complies with banking regulations," Callas told AFP, which could allow, for example, certain emails to be subject to regulatory or court review."Many of the services on the Internet started with zero security. We want to start with a system that is totally secure and let people dial it down."The new email system would complement Silent Circle's existing secure messaging system and encrypted mobile phone, which was launched earlier this year."If we start competing for customers on the basis of maximum privacy, that's good for everybody," Callas said.
  •  
    They're already so swamped that you have to reserve your user name and wait for an invite. They say they have to add servers. Web site is at https://protonmail.ch/ "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones. It's as simple as visiting our site and logging in. There are no plugins or apps to install - simply use your favorite web browser." "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones.
Paul Merrell

John McCain, Conductor of the "Arab Spring" and the Caliph , by Thierry Meyssan - 0 views

  • Everyone has noticed the contradiction of those who recently characterized the Islamic Emirate as "freedom fighters" in Syria and who are indignant today faced with its abuses in Iraq. But if that speech is incoherent in itself, it makes perfect sense in the strategic plan: the same individuals were to be presented as allies yesterday and must be as enemies today, even if they are still on orders from Washington. Thierry Meyssan reveals below US policy through the particular case of Senator John McCain, conductor of the "Arab Spring" and longtime partner of Caliph Ibrahim.
  • ohn McCain is known as the leader of the Republicans and unhappy 2008 US presidential candidate. This is, we will see, only the real part of his biography, which serves as a cover to conduct covert actions on behalf of his government. When I was in Libya during the "Western"attack, I was able to view a report of the foreign intelligence services. It stated that, on February 4, 2011 in Cairo, NATO organized a meeting to launch the "Arab Spring" in Libya and Syria. According to this document, the meeting was chaired by John McCain. The report detailed the list of Libyan participants, whose delegation was led by the No. 2 man of the government of the day, Mahmoud Jibril, who abruptly switched sides at the entrance of the meeting to become the opposition leader in exile. I remember that, among the French delegates present, the report quoted Bernard-Henry Lévy, although officially he had never exercised functions within the French government. Many other personalities attended the symposium, including a large delegation of Syrians living abroad.
  • Emerging from the meeting, the mysterious Syrian Revolution 2011 Facebook account called for demonstrations outside the People’s Council (National Assembly) in Damascus on February 11. Although this Facebook account at the time claimed to have more than 40,000 followers, only a dozen people responded to its call before the flashes of photographers and hundreds of police. The demonstration dispersed peacefully and clashes only began more than a month later in Deraa. [1] On February 16, 2011, a demonstration underway in Benghazi, in memory of members of the Islamic Fighting Group in Libya [2] massacred in 1996 in the Abu Selim prison, degenerated into shooting. The next day, a second event, this time in memory of those who died by attacking the Danish consulate during the Muhammad cartoons affair, also degenerated into shooting. At the same time, members of the Islamic Fighting Group in Libya ,coming from Egypt and coordinated by unidentified, hooded individuals, simultaneously attacked four military bases in four different cities. After three days of fighting and atrocities, the rebels launched the uprising of Cyrenaica against Tripolitania [3]; a terrorist attack that the western press falsely presented as a "democratic revolution" against "the regime" of Muammar el-Qaddafi.
  • ...16 more annotations...
  • On February 22nd, John McCain was in Lebanon. He met members of the Future Movement (the party of Saad Hariri) whom he charged to oversee the transfer of arms to Syria around the MP Okab Sakr [4]. Then, leaving Beirut, he inspected the Syrian border and the selected villages including Ersal, which were used as a basis to back mercenaries in the war to come. The meetings chaired by John McCain were clearly the trigger point for a long-prepared Washington plan; the plan that would have the UK and France attack Libya and Syria simultaneously, following the doctrine of "leadership from behind" and the annex of the Treaty of Lancaster House of November 2010. [5]
  • In May 2013, Senator John McCain made his way illegally to near Idleb in Syria via Turkey to meet with leaders of the "armed opposition". His trip was not made public until his return to Washington. [6] This movement was organized by the Syrian Emergency Task Force, which, contrary to its title, is a Zionist Organization led by a Palestinian employee of AIPAC [7]
  • John McCain in Syria. In the foreground at right is the director of the Syrian Emergency Task Force. In the doorway, center, Mohammad Nour.
  • In photographs released at that time, one noticed the presence of Mohammad Nour, a spokesman for the Northern Storm Brigade (of the Al-Nosra Front, that is to say, al-Qaeda in Syria), who kidnapped and held 11 Lebanese Shiite pilgrims in Azaz. [8] Asked about his proximity to al-Qaeda kidnappers, the Senator claimed not to know Mohammad Nour who would have invited himself into this photo. The affair made a great noise and the families of the abducted pilgrims lodged a complaint before the Lebanese judiciary against Senator McCain for complicity in kidnapping. Ultimately, an agreement was reached and the pilgrims were released. Let’s suppose that Senator McCain had told the truth and that he was abused by Mohammad Nour. The object of his illegal trip to Syria was to meet the chiefs of staff of the Free Syrian Army. According to him, the organization was composed "exclusively of Syrians" fighting for "their freedom" against the "Alouite dictatorship” (sic). The tour organizers published this photograph to attest to the meeting.
  • John McCain and the heads of the Free Syrian Army. In the left foreground, Ibrahim al-Badri, with which the Senator is talking. Next, Brigadier General Salim Idris (with glasses).
  • If we can see Brigadier General Idriss Salem, head of the Free Syrian Army, one can also see Ibrahim al-Badri (foreground on the left) with whom the senator is talking. Back from the surprise trip, John McCain claimed that all those responsible for the Free Syrian Army were "moderates who can be trusted" (sic).
  • However, since October 4, 2011, Ibrahim al-Badri (also known as Abu Du’a) was on the list of the five terrorists most wanted by the United States (Rewards for Justice). A premium of up to $ 10 million was offered to anyone who would assist in his capture. [9] The next day, October 5, 2011, Ibrahim al-Badri was included in the list of the Sanctions Committee of the UN as a member of Al Qaeda. [10] In addition, a month before receiving Senator McCain, Ibrahim al-Badri, known under his nom de guerre as Abu Bakr al-Baghdadi, created the Islamic State in Iraq and the Levant (ÉIIL) – all the while still belonging to the staff of the very "moderate" Free Syrian Army. He claimed as his own the attack on the Taj and Abu Ghraib prisons in Iraq, from which he helped between 500 and 1,000 jihadists escape who then joined his organization. This attack was coordinated with other almost simultaneous operations in eight other countries. Each time, the escapees joined the jihadist organizations fighting in Syria. This case is so strange that Interpol issued a note and requested the assistance of the 190 member countries. [11]
  • For my part, I have always said that there was no difference on the ground between the Free Syrian Army, Al-Nosra Front, the Islamic Emirate etc ... All these organizations are composed of the same individuals who continuously change flag. When they pose as the Free Syrian Army, they fly the flag of French colonization and speak only of overthrowing the "dog Bashar." When they say they belong to Al-Nosra Front, they carry the flag of al Qaeda and declare their intention to spread Islam in the world. Finally when they say they are the Islamic Emirate, they brandish the flag of the Caliphate and announce that they will clean the area of all infidels. But whatever the label, they proceed to the same abuses: rape, torture, beheadings, crucifixions. Yet neither Senator McCain nor his companions of the Syrian Emergency Task Force provided the information in their possession on Ibrahim al-Badri to the State Department, nor have they asked for the reward. Nor have they informed the anti-terrorism Committee of the UN.
  • But John McCain is not just the leader of the political opposition to President Obama, he is also one of his senior officials! He is in fact President of the International Republican Institute (IRI), the republican branch of NED / CIA [12], since January 1993. This so-called "NGO" was officially established by President Ronald Reagan to extend certain activities of the CIA, in connection with the British, Canadian and Australian secret services. Contrary to its claims, it is indeed an inter-governmental agency. Its budget is approved by Congress in a budget line dependent of the Secretary of State. It is also because it is a joint agency of the Anglo-Saxon secret services that several states in the world prohibit it from any activity on their territory.
  • he list of interventions by John McCain on behalf of the State Department is impressive. He participated in all the color revolutions of the last twenty years.
  • And an agent that has the best coverage imaginable: he is the official opponent of Barack Obama. As such, he can travel anywhere in the world (he is the most traveled US senator) and meet whoever he wants without fear. If his interlocutors approve Washington policy, he promised them to continue it, if they fight it, he hands over the responsibility to President Obama.
  • In 2003, France’s opposition was not enough to offset the influence of the Committee for the Liberation of Iraq. The United States attacked the country again and this time overthrew President Hussein. Of course, John McCain was a major contributor to the Committee. After handing to a private company the care of plundering the country for a year [17], they tried to partition Iraq into three separate states, but had to give it up due to the resistance of the population. They tried again in 2007, around the Biden-Brownback resolution, but again failed. [18] Hence the current strategy that attempts to achieve this by means of a non-state actor: the Islamic Emirate.
  • The operation was planned well in advance, even before the meeting between John McCain and Ibrahim al-Badri. For example, internal correspondence from the Qatari Ministry of Foreign Affairs, published by my friends James and Joanne Moriarty [19], shows that 5,000 jihadis were trained at the expense of Qatar in NATO’s Libya in 2012, and 2,5 million dollars was paid at the same time to the future Caliph. In January of 2014, the Congress of the United States held a secret meeting at which it voted, in violation of international law, to approve funding for the Al-Nosra Front (Al-Qaeda) and the Islamic emirate in Iraq and the Levant until September 2014. [20] Although it is unclear precisely what was really agreed to during this meeting revealed by the British Reuters news agency [21], and no media US media dared bypass censorship, it is highly probable that the law includes a section on arming and training jihadists.
  • Proud of this US funding, Saudi Arabia has claimed on its public television channel, Al-Arabiya, that the Islamic Emirate was headed by Prince Abdul Rahman al-Faisal, brother of Prince Saud al Faisal (Foreign Minister) and Prince Turki al-Faisal (Saudi ambassador to the United States and the United Kingdom) [22]. The Islamic Emirate represents a new step in the world of mercenaries. Unlike jihadi groups who fought in Afghanistan, Bosnia-Herzegovina and Chechnya around Osama bin Laden, it does not constitute a residual force but actually an army in itself. Unlike previous groups in Iraq, Libya and Syria, around Prince Bandar bin Sultan, they have sophisticated communication services at their disposal for recruitment and civilian officials trained in large western schools capable of instantly taking over the administration of a territory.
  • Brand new Ukrainian weapons were purchased by Saudi Arabia and conveyed by the Turkish secret services who gave them to the Islamic Emirate. Final details were coordinated with the Barzani family at a meeting of jihadist groups in Amman on 1 June 2014. [23] The joint attack on Iraq by the Islamic Emirate and the Kurdistan Regional Government began four days later. The Islamic Emirate seized the Sunni part of the country, while the Kurdistan Regional Government increased its territory by over 40%. Fleeing the atrocities of jihadists, religious minorities left the Sunni area, paving the way for the three-way partition of the country. Violating the Iraqi-US Defense agreement, the Pentagon did not intervene and allowed the Islamic Emirate to continue its conquest and massacres. A month later, while the Kurdish Peshmerga Regional Government had retreated without a fight, and when the emotions of world public opinion became too strong, President Obama gave the order to bomb some positions of the Islamic Emirate. However, according to General William Mayville, director of operations at the headquarters, "These bombings are unlikely to affect the overall capacity of the Islamic Emirate and its activities in other areas of Iraq or Syria ". [24] Obviously, they are not meant to destroy the jihadist army, but only to ensure that each player does not overlap the territory that has been assigned. Moreover, for the moment, they are symbolic and have destroyed only a handful of vehicles. It was ultimately the intervention of the Kurds of the Turkish and Syrian Kurdish PKK which halted the progress of the Islamic Emirate and opened a corridor to allow civilians to escape the massacre.
  • In the latest issue of its magazine, the Islamic Emirate devoted two pages to denounce Senator John McCain as "the enemy" and "double-crosser", recalling his support for the US invasion of Iraq. Lest this accusation remain unknown in the United States, Senator immediately issued a statement calling the Emirate the "most dangerous Islamist terrorist group in the world" [26]. This controversy is there only to distract the gallery. One would like to believe it ... if it were’t for this photograph from May 2013.
  •  
    Thierry Meysann makes the case that Sen. John McCain, working with  was the guiding force behind the Arab Spring, the overthrow of Qadaffi in Libya, and the invasion of Syria by mercenary Islamists, working with a Zionist but deliberately misnomered front group. Thierry goes on to show that McCain played a key role in the creation and deployment of ISIL.  
Paul Merrell

How the FBI Created a Terrorist - The Intercept - 0 views

  • Informant-led sting operations are central to the FBI’s counterterrorism program. Of 508 defendants prosecuted in federal terrorism-related cases in the decade after 9/11, 243 were involved with an FBI informant, while 158 were the targets of sting operations. Of those cases, an informant or FBI undercover operative led 49 defendants in their terrorism plots, similar to the way Osmakac was led in his. In these cases, the FBI says paid informants and undercover agents are foiling attacks before they occur. But the evidence suggests — and a recent Human Rights Watch report on the subject illustrates — that the FBI isn’t always nabbing would-be terrorists so much as setting up mentally ill or economically desperate people to commit crimes they could never have accomplished on their own.
  • At least in Osmakac’s case, FBI agents seem to agree with that criticism, though they never intended for that admission to become public. In the Osmakac sting, the undercover FBI agent went by the pseudonym “Amir Jones.” He’s the guy behind the camera in Osmakac’s martyrdom video. Amir, posing as a dealer who could provide weapons, wore a hidden recording device throughout the sting. The device picked up conversations, including, apparently, back at the FBI’s Tampa Field Office, a gated compound beneath the flight path of Tampa International Airport, among agents and employees who assumed their words were private and protected. These unintentional recordings offer an exclusive look inside an FBI counterterrorism sting, and suggest that, even in the eyes of the FBI agents involved, these sting targets aren’t always the threatening figures they are made out to be.
  • OW OSMAKAC CAME to the attention of law enforcement in the first place is still unclear. In a December 2012 Senate floor speech, Dianne Feinstein, chairwoman of the Senate Intelligence Committee, cited Osmakac’s case as one of nine that demonstrated the effectiveness of surveillance under the FISA Amendments Act. Senate legal counsel later walked back those comments, saying they were misconstrued. Osmakac is among terrorism defendants who were subjected to some sort of FISA surveillance, according to court records, but whether he was under individual surveillance or identified through bulk collection is unknown. Discovery material referenced in a defense motion included a surveillance log coversheet with the description, “CT-GLOBAL EXTREMIST INSPIRED.” If he first came onto the FBI’s radar as a result of eavesdropping, then it’s plausible that as part of the sting, the FBI manufactured another explanation for his targeting. This is a long-running, if controversial process known as “parallel construction,” which has also been used by the U.S. Drug Enforcement Administration when drug offenders are identified through bulk collection and then prosecuted for drug crimes. In court records, the FBI maintained that Osmakac came to agents’ attention through Dabus. The informant reached out to the FBI after meeting Osmakac, and soon offered him a job at Java Village.
  •  
    A judge denied the defense access to FBI transcripts of conversations among agents on grounds that they would provide no assistance to the defense beyond what was available to the defense by discovery. He also entered a protective order barring their disclosure. The defendant was found guilty and sentenced to 40 years in prison.  But the FBI transcripts were leaked to The Intercept, apparently by someone inside the Dept. of Justice or the judicial system, since the defense never was provided with them. The transcripts along with evidence from the case and gathered through interviews provide a chilling look into the methods the FBI uses to manufacture "terrorists" for prosecution and conviction (in this case victimizing a young Muslim American with a severe mental illness), obviously only for propaganda and to justify its counter-terrorism budget. This is an area that needs Congressional attention. The courts' protections from entrapment are far too lax, particularly when members of a particular religion are being targeted for political reasons and anti-Muslim hysteria is sweeping the land. The government should not be permitted to manufacture criminals.
Paul Merrell

Trump Urged Not to Pull Out of Iran Nuclear Deal - Consortiumnews - 0 views

  • MEMORANDUM FOR: The President FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Being “Played” By Bogus Evidence on Iran NOTE: The evidence presented by Israeli Prime Minister Benjamin Netanyahu on April 30 alleging a covert Iranian nuclear weapons program shows blatant signs of fabrication. That evidence is linked to documents presented by the Bush Administration more a decade earlier as proof of a covert Iran nuclear weapons program. Those documents were clearly fabricated as well. We sent President Bush a similar warning about bogus intelligence — much of it fabricated by Israel —six weeks before the U.S./UK attack on Iraq, but Bush paid us no heed. This time, we hope you will take note before things spin even further out of control in the Middle East. In short, Israel’s “new” damaging documents on Iran were fabricated by the Israelis themselves.
1 - 19 of 19
Showing 20 items per page