Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged permanent-bases

Rss Feed Group items tagged

Paul Merrell

Russia Plans Permanent Naval Base in Tartus as Middle East War Escalates - nsnbc intern... - 0 views

  • Russia plans to transform its auxiliary naval base in Tartus, Syria, into a permanent Russian military base. Situated at the eastern Mediterranean coast, the permanent base would not only increase Russia’s presence in the Mediterranean but help circumvent the Bosporus bottleneck in NATO member State Turkey. The decision comes against the backdrop of a widening Middle East war and tensions over Crimea.
  • Pankov’s announcement about Russia’s plans for Tartus came only days after the Russian Defense Ministry announced that it was considering to re-establish a presence at military bases it used before the discontinuation of the Soviet Union. Talks between Russia and Vietnam are reportedly ongoing, as part of the Russian Federation’s new posture. The Deputy Chairman of  the international affairs committee of Russia’s State Duma (parliament), Alexey Chapa also called for restoring Russian military bases in Latin America, Southeast Asia and Africa. The naval base in Tartus at the northwestern coast of Syria is currently used as auxiliary bas. That is, as a logistics supply base for Russian vessels and as a base to support Russian operations in Syria via the Hmeymim Air Base in Latakia province. Russia recently deployed S-400 surface to air missile batteries in Tartus. The State Duma on October 7 ratified a Russian-Syrian agreement on the open-ended deployment of the Russian air group in Syria. The agreement was signed in Damascus on August 26, 2015. Nearly a year later President Vladimir Putin submitted it to the State Duma for consideration. The Federation Council will consider the agreement on October 12.
  • The  establishment of a permanent naval presence in Tartus involves political posturing, An unequivocal sign that Russia, as already forecast by this author in 2012, draws a red line in the Syrian sand. The transformation of Tartus into a permanent Russian base has, however, geopolitical and strategic implications within a wider context than Syria. The Russian Black Sea fleet in Crimea would have to pass through the Bosporus and the narrow Dardanelles to reach the Mediterranean. This “choke point” is controlled by NATO member Turkey. Moreover, NATO member States have increased their naval presence in the Black Sea since the eruption of the crisis in Ukraine and Russia’s annexation of Crimea, or Crimea’s accession into the Russian Federation. Which of the two constructs one considers as valid largely depends on whether one interprets international law to the effect that self-determination has primacy over territorial integrity or whether territorial integrity has primacy over self-determination. The outcome is the same; The Russian Black Sea fleet and its access to the Mediterranean has been threatened by the escalation of the situation in Ukraine.
  • ...1 more annotation...
  • Russia is reportedly also negotiating the presence of Russian naval vessels in Egypt to further boost its footprint in the Mediterranean, a development that is closely correlated to the construction of a Russian industrial zone along the new Suez Canal. The decision to transform Tartus into a permanent Russian naval base also comes as the wars in Syria and Iraq have developed into what must be described as a wider Middle East war.
  •  
    Russian military expansion around the globe. So the U.S. wants Cold War 2.0? Russia will play that game.
Paul Merrell

Tomgram: Nick Turse, A Shadow War and an American Drone Unit Under Wraps | TomDispatch - 0 views

  • Am I the only person who still remembers how Pentagon officials spoke of the major military bases already on the drawing boards as the invasion of Iraq ended in April 2003? It was taboo back then to refer to those future installations as “permanent bases.” No one wanted to mouth anything that had such an ugly (yet truthful) ring to it when it came to the desires of the Bush administration to occupy and dominate the Greater Middle East for generations to come. Charmingly enough, however, those Pentagon types sometimes spoke instead of “enduring camps,” as if a summer frolic in the countryside was at hand. Later, those enormous installations -- Balad Air Base, the size of a small American town, had its own Pizza Hut, Subway, and Popeye's franchises, "an ersatz Starbucks," a 24-hour Burger King, two post exchanges, and four mess halls -- would be relabeled "contingency operating bases." They were meant to be Washington’s ziggurats, its permanent memorials to its own power in the region. With rare exceptions, American reporters would nonetheless pay almost no attention to them or to the obvious desire embedded in their very construction to control Iraq and the rest of the Greater Middle East.
  • In all, from the massive Camp Victory outside Baghdad to tiny outposts in the hinterlands, not to speak of the three-quarters-of-a-billion dollar citadel Washington built in Baghdad’s green zone to house an embassy meant to be the central command post for a future Pax Americana in the region, the Pentagon built 505 bases in Iraq. In other words, Washington went on a base-building bender there. And lest you imagine this as some kind of anomaly, consider the 800 or more bases and outposts (depending on how you counted them) that the U.S. built in Afghanistan. Eight years later, all 505 of the Iraqi bases had been abandoned, as most of the Afghan ones would be.  (A few of the Iraqi bases have since been reoccupied by American advisers sent in to fight the Islamic State.)
  • Nonetheless, as Chalmers Johnson pointed out long ago (and TomDispatch regular David Vine has made so clear recently), this was the U.S. version of empire building. And in this century, despite the loss of those Iraqi bases and most of the Afghan ones, Washington has continued its global base-building extravaganza in a big way. It has constructed, expanded, or reconfigured a staggering set of bases in the Greater Middle East and on the island of Diego Garcia in the Indian Ocean and has been building drone bases around the world. Then there's the remaining European bases that came out of World War II, were expanded in the Cold War years, and have, in this century, been driven deep into the former Eastern European imperial possessions of the old Soviet Union.  Add in another structure of bases in Asia that also came out of World War II and that are once again added to, reconfigured, and pivoted toward. Toss in as well the 60 or so small bases, baselets, sites, storage areas, and the like that, in recent years, the U.S. military has been constructing across Africa. Throw in some bases still in Latin America and the Caribbean, including most infamously Guantánamo in Cuba, and you have a structure for the imperial ages.
  • ...1 more annotation...
  • But like some madcap Dr. Seuss character, the Pentagon can’t seem to stop and so, the New York Times recently reported, it has now presented the White House with a plan for a new (or refurbished) “network” of bases in the most “volatile” regions of the planet. These shadowy “hubs” are meant mainly for America’s secret warriors -- “Special Operations troops and intelligence operatives who would conduct counterterrorism missions for the foreseeable future” against the Islamic State and its various franchisees.  This will undoubtedly be news for Times readers, but not for TomDispatch ones.  For several years, Nick Turse has been reporting at this site on the building, or building up of, both the “hubs” and “spokes” of this system in southern Europe and across Africa (as well as on the way the U.S. military's pivot to Africa has acted as a kind of blowback machine for terror outfits). Today, he’s at it again, revealing wars secretly being fought in our name from this country’s ever-changing, ever-evolving empire of bases.
Gary Edwards

The Civil War is Here | Frontpage Mag - 0 views

  •  
    "Daniel Greenfield, a Shillman Journalism Fellow at the Freedom Center, is a New York writer focusing on radical Islam. A civil war has begun. This civil war is very different than the last one. There are no cannons or cavalry charges. The left doesn't want to secede. It wants to rule. Political conflicts become civil wars when one side refuses to accept the existing authority. The left has rejected all forms of authority that it doesn't control. The left has rejected the outcome of the last two presidential elections won by Republicans. It has rejected the judicial authority of the Supreme Court when it decisions don't accord with its agenda. It rejects the legislative authority of Congress when it is not dominated by the left. It rejected the Constitution so long ago that it hardly bears mentioning.   It was for total unilateral executive authority under Obama. And now it's for states unilaterally deciding what laws they will follow. (As long as that involves defying immigration laws under Trump, not following them under Obama.) It was for the sacrosanct authority of the Senate when it held the majority. Then it decried the Senate as an outmoded institution when the Republicans took it over. It was for Obama defying the orders of Federal judges, no matter how well grounded in existing law, and it is for Federal judges overriding any order by Trump on any grounds whatsoever. It was for Obama penalizing whistleblowers, but now undermining the government from within has become "patriotic". There is no form of legal authority that the left accepts as a permanent institution. It only utilizes forms of authority selectively when it controls them. But when government officials refuse the orders of the duly elected government because their allegiance is to an ideology whose agenda is in conflict with the President and Congress, that's not activism, protest, politics or civil disobedience; it's treason. After losing Congress, the left consolidated
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

U.S. Army Announces Troops Will Stay In Syria After ISIS Defeat - 0 views

  • Though Assad has refrained from attacking foreign forces hostile to his regime that are operating within Syria’s borders, this recent escalation has prompted him to step up his rhetoric. In a recent interview with Phoenix TV, Assad stated that “any foreign troops coming to Syria without our invitation or consultation or permission, they are invaders, whether they are American, Turkish or any other one.” Though Assad didn’t specifically single out U.S. troops, he did state the following: “What are they [foreign troops] going to do? To fight ISIS [Islamic State, formerly ISIL]? The Americans lost nearly every war. They lost in Iraq, they had to withdraw at the end. Even in Somalia, let alone Vietnam in the past and Afghanistan.” Assad then added that the U.S. “didn’t succeed anywhere they sent troops, they only create a mess; they are very good in creating problems and destroying, but they are very bad in finding solutions.” “The complexity of this war is the foreign intervention. This is the problem,” he continued.
  • However, foreign intervention is increasingly seeming more likely than not. According to the head of U.S. Central Command Army General Joseph Votel, once Raqqa is liberated from Islamic State elements, U.S. forces will be “required” to stabilize the region as U.S. officials anticipate that “America’s allies,” i.e. anti-Assad rebels, will need assistance from the U.S. military to establish “Syrian-led peacekeeping efforts” in the area. This is a frank admission that U.S. troops will not be going anywhere even after the Islamic State is removed, despite the fact that the presence of the Islamic State is the only justification the U.S. military has offered for its technically illegal presence within Syria. If this comes to pass, the U.S. will once again be an occupying force in yet another Middle Eastern nation. It seems likely that the U.S. will return to its former mantra “Assad must go” and refocus its efforts on removing Assad from power once and for all.
  •  
    The U.S. military intervention in Syria is absolutely illegal under international law. Now to compound it, the U.S. will apparently occupy permanent bases in Syria.
Paul Merrell

Al Qaeda: The Database | Global Research - 0 views

  • This article originally published by Global Research in 2005 sheds light on the nature of Al Qaeda, an intelligence construct used by Washington to destabilize and destroy sovereign countries, while sustaining the illusion of  an outside enemy, which threatens the security of the Western World.
  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . .
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.” “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat.
  • ...5 more annotations...
  • “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world. “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
  • This article originally published by Global Research in 2005 sheds light on the nature of Al Qaeda, an intelligence construct used by Washington to destabilize and destroy sovereign countries, while sustaining the illusion of  an outside enemy, which threatens the security of the Western World. *       *       * Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . .
  • “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
Paul Merrell

Al Qaeda: The Database | Global Research - Centre for Research on Globalization - 0 views

  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . . “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.”
  • “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat. “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world.
  • ...3 more annotations...
  • “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
Paul Merrell

M of A - Erdogan Moves To Annexes Mosul - 0 views

  • The wannabe Sultan Erdogan did not get his will in Syria where he had planned to capture and annex Aleppo. The Russians prevented that. He now goes for his secondary target, Mosul in Iraq, which many Turks see as historic part of their country
  • Mosul, Iraq's second biggest city with about a million inhabitants, is currently occupied by the Islamic State. On Friday a column of some 1,200 Turkish soldiers with some 20 tanks and heavy artillery moved into a camp near Mosul. The camp was one of four small training areas where Turkey was training Kurds and some Sunni-Arab Iraqis to fight the Islamic State. The small camps in the northern Kurdish area have been there since the 1990s. They were first established to fight the PKK. Later their Turkish presence was justified as ceasefire monitors after an agreement ended the inner Kurdish war between the KDP forces loyal to the Barzani clan and the PUK forces of the Talabani clan. The bases were actually used to monitor movement of the PKK forces which fight for Kurdish independence in Turkey. The base near Mosul is new and it was claimed to be just a small weapons training base. But tanks and artillery have a very different quality than some basic AK-47 training. Turkey says it will increase the numbers in these camps to over 2000 soldiers.
  • Should Mosul be cleared of the Islamic State the Turkish heavy weapons will make it possible for Turkey to claim the city unless the Iraqi government will use all its power to fight that claim. Should the city stay in the hands of the Islamic State Turkey will make a deal with it and act as its protector. It will benefit from the oil around Mosul which will be transferred through north Iraq to Turkey and from there sold on the world markets. In short: This is an effort to seize Iraq's northern oil fields. That is the plan but it is a risky one. Turkey did not ask for permission to invade Iraq and did not inform the Iraqi government. The Turks claim that they were invited by the Kurds: Turkey will have a permanent military base in the Bashiqa region of Mosul as the Turkish forces in the region training the Peshmerga forces have been reinforced, Hürriyet reported. The deal regarding the base was signed between Kurdistan Regional Government (KRG) President Massoud Barzani and Turkish Foreign Minister Feridun Sinirlioğlu, during the latter’s visit to northern Iraq on Nov. 4.
  • ...2 more annotations...
  • There are two problems with this. First: Massoud Barzani is no longer president of the KRG. His mandate ran out and the parliament refused to prolong it. Second: Mosul and its Bashiqa area are not part of the KRG. Barzani making a deal about it is like him making a deal about Paris. The Iraqi government and all major Iraqi parties see the Turkish invasion as a hostile act against their country. Abadi demanded the immediate withdrawal of the Turkish forces but it is unlikely that Turkey will act on that. Some Iraqi politicians have called for the immediate dispatch of the Iraqi air force to bomb the Turks near Mosul. That would probably the best solution right now but the U.S. installed Premier Abadi is too timid to go for such strikes. The thinking in Baghdad is that Turkey can be kicked out after the Islamic State is defeated. But this thinking gives Turkey only more reason to keep the Islamic State alive and use it for its own purpose. The cancer should be routed now as it is still small. Barzani's Kurdistan is so broke that is has even confiscated foreign bank accounts to pay some bills. That may be the reason why Barzani agreed to the deal now. But the roots run deeper. Barzani is illegally selling oil that belongs to the Iraqi government to Turkey. The Barzani family occupies  not only the presidential office in the KRG but also the prime minister position and the local secret services. It is running the oil business and gets a big share of everything else. On the Turkish side the oil deal is handled within the family of President Erdogan. His son in law, now energy minister, had the exclusive right to transport the Kurdish oil through Turkey. Erdogan's son controls the shipping company that transports the oil over sea to the customer, most often Israel. The oil under the control of the Islamic State in Iraq passes the exactly same route. These are businesses that generate hundreds of millions per year.
  • It is unlikely that U.S., if it is not behinds Turkey new escapade, will do anything about it. The best Iraq could do now is to ask the Russians for their active military support. The Turks insisted on their sovereignty when they ambushed a Russian jet that brushed its border but had no intend of harming Turkey. Iraq should likewise insist on its sovereignty, ask Russia for help and immediately kick the Turks out. The longer it waits the bigger the risk that Turkey will eventually own Mosul.
Paul Merrell

Moon of Alabama - 0 views

  • Over the last year the U.S. bombed Jabhat al-Nusra personal and facilities in Syria some five or six times. The al-Qaeda subgroup also has a history of attacking U.S. paid "relative moderate" proxy forces in Syria. The Pentagon recently inserted another U.S. mercenary group into north Syria. This was accompanied by a media campaign in which the administration lauded itself for the operation. The newly inserted group is especially trained and equipped to direct U.S. air attacks like those that earlier hit al-Nusra fighters. Now that freshly inserted group was attacked by Jabhat al-Nusra. Some of its members were killed and others were abducted. The Obama administration is shocked, SHOCKED, ABSOLUTELY SHOCKED that Jabhat al-Nusra would do such a ghastly deed. "Why would they do that?" "Who could have known that they would attack U.S. proxy forces???"
  • There is no longer an Jihadist ISIS or ISIL in Syria and Iraq. The people leading that entity declared (pdf) today, at the highly symbolic beginning of Ramadan, themselves to be a new caliphate:
  • Could someone explain to the fucking dimwits in the Pentagon and the Obama administrations that people everywhere, and especially terrorists group, hate it when you bomb them and kill their leaders? That those people you bomb might want to take revenge against you and your proxies? That people you bombed will not like your targeting team moving in next door to them? That alQaeda is not an "ally"? These people are too pathetically clueless to even be embarrassed about it. The accumulated intelligence quotient of the administration and Pentagon officials running the anti-Syria operation must be below three digits. But aside from their lack of basic intelligence the utter lack of simple "street smarts" is the real problem here. These people have no idea how life works outside of their beltway cages.
  • ...12 more annotations...
  • On more thought from me on why the dimwits did not foresee that Nusra would attack. The White House insisted on calling a part of Nusra the "Khorasan group" and explained that it was only bombing this groups of alQaeda veterans now part of Nusra because the "Khorasan group" planning to hit in "western" countries. No expert nor anyone on the ground in Syria thought that this differentiation was meaningful. Nusra is alQaeda and so are all of its members. But the White House and Pentagon probably thought that Nusra would accept the artificial separation they themselves had made up. That Nusra would understand that it is seen as an "ally" and only the "Khorasan group" is seen as an enemy. If that was the line of thinking, and the situation seems to point to that, then these people have fallen for their own propaganda stunt. They probably believed that the "Khorasan group" was an accepted narrative because they were telling that tale to themselves. Poor idiots.
  • UPDATE: The one sane guy at the Council of Foreign relations, Micah Zenko, foresaw this debacle and wrote on March 2: [The U.S. trained mercenaries] will immediately be an attractive target for attacks by the Islamic State, Assad’s ground and air forces, and perhaps Nusra and other forces. Killing or taking prisoner fighters (or the families of those fighters) who were trained by the U.S. military will offer propaganda value, as well as leverage, to bargain for those prisoners’ release. He compared the whole operation to the 1961 CIA invasion of Cuba: Last September, the White House and Congress agreed to authorize and fund a train-and-equip project similar to the Bay of Pigs, but this time in the Middle East, without any discussion about phase two. The Syrian project resembles 1961 in two ways: What happens when the fighting starts is undecided, and the intended strategic objective is wholly implausible.
  • The attack on Friday was mounted by the Nusra Front, which is affiliated with Al Qaeda. It came a day after the Nusra Front captured two leaders and at least six fighters of Division 30, which supplied the first trainees to graduate from the Pentagon’s anti-Islamic State training program. In Washington, several current and former senior administration officials acknowledged that the attack and the abductions by the Nusra Front took American officials by surprise and amounted to a significant intelligence failure. While American military trainers had gone to great lengths to protect the initial group of trainees from attacks by Islamic State or Syrian Army forces, they did not anticipate an assault from the Nusra Front. In fact, officials said on Friday, they expected the Nusra Front to welcome Division 30 as an ally in its fight against the Islamic State....A senior Defense Department official acknowledged that the threat to the trainees and their Syrian recruiters had been misjudged, and said that officials were trying to understand why the Nusra Front had turned on the trainees. Like other Obama administration operations this one did not fail because of "intelligence failure" but because an utter lack of common sense.
  • U.S. media can no agree with itself if Russia is giving ISIS an airforce or if Russia pounds ISIS with the biggest bomber raid in decades. Such confusion occurs when propaganda fantasies collide with the observable reality. To bridge such divide requires some fudging. So when the U.S. claims to act against the finances of the Islamic State while not doing much, the U.S Public Broadcasting Service has to use footage of Russian airstrikes against the Islamic State while reporting claimed U.S. airstrike successes. The U.S. military recently claimed to have hit Islamic State oil tankers in Syria. This only after Putin embarrassed Obama at the G-20 meeting in Turkey. Putin showed satellite pictures of ridiculous long tanker lines waiting for days and weeks to load oil from the Islamic State without any U.S. interference.
  • The U.S. then claimed to have hit 116 oil tankers while the Russian air force claims to have hit 500. But there is an important difference between these claims. The Russians provided videos showing how their airstrikes hit at least two different very large oil tanker assemblies with hundreds of tankers in each. They also provided video of several hits on oil storage sites and refinery infrastructure. I have found no video of U.S. hits on Islamic State oil tanker assemblies. The U.S. PBS NewsHour did not find any either. In their TV report yesterday about Islamic State financing and the claimed U.S. hits on oil trucks they used the videos Russia provided without revealing the source. You can see the Russian videos played within an interview with a U.S. military spokesperson at 2:22 min.
  • The U.S. military spokesperson speaks on camera about U.S. airforce hits against the Islamic State. The video cuts to footage taken by Russian airplanes hitting oil tanks and then trucks. The voice-over while showing the Russian video with the Russians blowing up trucks says: "For the first time the U.S. is attacking oil delivery trucks." The video then cuts back to the U.S. military spokesperson. At no point is the Russian campaign mentioned or the source of the footage revealed. Any average viewer of the PBS report will assume that the black and white explosions of oil trucks and tanks are from of U.S. airstrikes filmed by U.S. air force planes. The U.S. military itself admitted that its strikes on IS oil infrastructure over the last year were "minimally effective". One wonders then how effective the claimed strike against 116 trucks really was. But unless we have U.S. video of such strikes and not copies of Russian strike video fraudulently passed off as U.S. strikes we will not know if those strikes happened at all.
  • The wannabe Sultan Erdogan did not get his will in Syria where he had planned to capture and annex Aleppo. The Russians prevented that. He now goes for his secondary target, Mosul in Iraq, which many Turks see as historic part of their country
  • Mosul, Iraq's second biggest city with about a million inhabitants, is currently occupied by the Islamic State. On Friday a column of some 1,200 Turkish soldiers with some 20 tanks and heavy artillery moved into a camp near Mosul. The camp was one of four small training areas where Turkey was training Kurds and some Sunni-Arab Iraqis to fight the Islamic State. The small camps in the northern Kurdish area have been there since the 1990s. They were first established to fight the PKK. Later their Turkish presence was justified as ceasefire monitors after an agreement ended the inner Kurdish war between the KDP forces loyal to the Barzani clan and the PUK forces of the Talabani clan. The bases were actually used to monitor movement of the PKK forces which fight for Kurdish independence in Turkey. The base near Mosul is new and it was claimed to be just a small weapons training base. But tanks and artillery have a very different quality than some basic AK-47 training. Turkey says it will increase the numbers in these camps to over 2000 soldiers.
  • Should Mosul be cleared of the Islamic State the Turkish heavy weapons will make it possible for Turkey to claim the city unless the Iraqi government will use all its power to fight that claim. Should the city stay in the hands of the Islamic State Turkey will make a deal with it and act as its protector. It will benefit from the oil around Mosul which will be transferred through north Iraq to Turkey and from there sold on the world markets. In short: This is an effort to seize Iraq's northern oil fields. That is the plan but it is a risky one. Turkey did not ask for permission to invade Iraq and did not inform the Iraqi government. The Turks claim that they were invited by the Kurds: Turkey will have a permanent military base in the Bashiqa region of Mosul as the Turkish forces in the region training the Peshmerga forces have been reinforced, Hürriyet reported. The deal regarding the base was signed between Kurdistan Regional Government (KRG) President Massoud Barzani and Turkish Foreign Minister Feridun Sinirlioğlu, during the latter’s visit to northern Iraq on Nov. 4. There are two problems with this. First: Massoud Barzani is no longer president of the KRG. His mandate ran out and the parliament refused to prolong it. Second: Mosul and its Bashiqa area are not part of the KRG. Barzani making a deal about it is like him making a deal about Paris.
  • The Iraqi government and all major Iraqi parties see the Turkish invasion as a hostile act against their country. Abadi demanded the immediate withdrawal of the Turkish forces but it is unlikely that Turkey will act on that. Some Iraqi politicians have called for the immediate dispatch of the Iraqi air force to bomb the Turks near Mosul. That would probably the best solution right now but the U.S. installed Premier Abadi is too timid to go for such strikes. The thinking in Baghdad is that Turkey can be kicked out after the Islamic State is defeated. But this thinking gives Turkey only more reason to keep the Islamic State alive and use it for its own purpose. The cancer should be routed now as it is still small. Barzani's Kurdistan is so broke that is has even confiscated foreign bank accounts to pay some bills. That may be the reason why Barzani agreed to the deal now. But the roots run deeper. Barzani is illegally selling oil that belongs to the Iraqi government to Turkey. The Barzani family occupies  not only the presidential office in the KRG but also the prime minister position and the local secret services. It is running the oil business and gets a big share of everything else. On the Turkish side the oil deal is handled within the family of President Erdogan. His son in law, now energy minister, had the exclusive right to transport the Kurdish oil through Turkey. Erdogan's son controls the shipping company that transports the oil over sea to the customer, most often Israel. The oil under the control of the Islamic State in Iraq passes the exactly same route. These are businesses that generate hundreds of millions per year.
  • It is unlikely that U.S., if it is not behinds Turkey new escapade, will do anything about it. The best Iraq could do now is to ask the Russians for their active military support. The Turks insisted on their sovereignty when they ambushed a Russian jet that brushed its border but had no intend of harming Turkey. Iraq should likewise insist on its sovereignty, ask Russia for help and immediately kick the Turks out. The longer it waits the bigger the risk that Turkey will eventually own Mosul.
  • Another fake news item currently circling is that Trump has given order to the military to create safe zones for Syria. The reality is still far from it: [H]is administration crafted a draft order that would direct the Pentagon and the State Department to submit plans for the safe zones within 90 days. The order hasn't yet been issued. The draft of the order, which will be endlessly revised, says that safe zones could be in Syria or in neighboring countries. The Pentagon has always argued against such zones in Syria and the plans it will submit, should such an order be issued at all, will reflect that. The safe zones in Syria ain't gonna happen
  •  
    So the first group of U.S. trained "moderate" Syrian opposition fighters are an epic fail. Who'd of thunk? 
Paul Merrell

Dangerous Crossroads: US-NATO To Deploy Ground Troops, Conduct Large Scale Naval Exerci... - 0 views

  • The World is at a dangerous Crossroads. The Western military alliance is in an advanced state of readiness. And so is Russia. Russia is heralded as the “Aggressor”. US-NATO military confrontation with Russia is contemplated. Enabling legislation in the US Senate under “The Russian Aggression Prevention Act” (RAPA) has “set the US on a path towards direct military conflict with Russia in Ukraine.”  Any US-Russian war is likely to quickly escalate into a nuclear war, since neither the US nor Russia would be willing to admit defeat, both have many thousands of nuclear weapons ready for instant use, and both rely upon Counterforce military doctrine that tasks their military, in the event of war, to preemptively destroy the nuclear forces of the enemy. (See Steven Starr, Global Research, August 22, 2014) The Russian Aggression Prevention Act (RAPA) is the culmination of more than twenty years of US-NATO war preparations, which consist in the military encirclement of both Russia and China:
  • On July 24, in consultation with the Pentagon, NATO’s Europe commander General Philip Breedlove called for “stockpiling a base in Poland with enough weapons, ammunition and other supplies to support a rapid deployment of thousands of troops against Russia”.(RT, July 24, 2014). According to General Breedlove, NATO needs “pre-positioned supplies, pre-positioned capabilities and a basing area ready to rapidly accept follow-on forces”: “He plans to recommend placing supplies — weapons, ammunition and ration packs — at the headquarters to enable a sudden influx of thousands of Nato troops” (Times, August 22, 2014, emphasis added) Breedlove’s “Blitzkrieg scenario” is to be presented at NATO’s summit in Wales in early September, according to The London Times.  It is a “copy and paste” text broadly consistent with the  Russian Aggression Prevention Act (RAPA) which directs President Obama to:
  • “(1) implement a plan for increasing U.S. and NATO support for the armed forces of Poland, Estonia, Lithuania, and Latvia, and other NATO member-states; and (2) direct the U.S. Permanent Representative to NATO to seek consideration for permanently basing NATO forces in such countries.” (S.2277 — 113th Congress (2013-2014)) More generally, a scenario of military escalation prevails with both sides involved in extensive war games. In turn, the structure of US sponsored military alliances plays a crucial role in war planning. We are dealing with a formidable military force involving a global alliance of 28 NATO member states. In turn, the US as well as NATO have established beyond the “Atlantic Region” a network of bilateral military alliances with “partner” countries directed against Russia, China, Iran and North Korea.
  • ...11 more annotations...
  • t is worth noting that FLEETEX is one among several US-NATO naval war games directed against an unnamed enemy. In July, NATO conducted naval exercises in the Black sea, in an area contiguous to Russia’s maritime borders.
  • NATO’s “Breeze” formally hosted by Bulgaria took place from July 4 to July 13, with the participation of naval vessels from Greece, Italy, Romania, Turkey, the U.K. and the U.S. The underlying scenario was the “”destruction of enemy ships in the sea and organization of air defense of naval groups and coastal infrastructure.” The exercises were “aimed at improving the tactical compatibility and collaboration among naval forces of the alliance’s member states…” (See Atlantic Council , see also Russia, U.S. ships sail in competing Black Sea exercises, July 7, Navy Times 2014) Ironically, NATO’s July Black Sea games started on exactly the same day as those of the “unnamed enemy”[Russia], involving its Crimea Black sea fleet of some 20 war ships and aircraft:
  • Russia has made it clear they don’t welcome NATO’s presence in the Black Sea. Russia’s navy let it be known that it is following the exercises with reconnaissance aircraft and surveillance ships. “The aviation of the Black Sea Fleet is paying special attention to the missile cruiser USS Vella Gulf which, though not formally the flagship of the ‘Breeze’ exercises, effectively is leading them,” a Russian naval source told NTV. (Ibid)
  • Since 2006, the US has been building up its weapons arsenal in Poland on Russia’s Western border (Kalingrad). The deployment of US forces in Poland was initiated  in July 2010 (within 40 miles from the border), with a view to training Polish forces in the use of US made Patriot missiles. (Stars and Stripes, 23 July 2010). In recent developments, the Pentagon announced in early August the deployment of US troops and National Guard forces to Ukraine as part of a military training operation. US-NATO is also planning further deployments of ground forces (as described by NATO General Breedlove) in Poland, Latvia, Estonia and Lithuania as well as in Georgia and Azerbaijan on Russia’s southern border. These deployments which are envisaged in the draft text of the “Russian Aggression Prevention Act” (RAPA) (S.2277 — 113th Congress (2013-2014)) are also part of a NATO “defensive” strategy in the case of a “Russian invasion”: Russia’s annexation of Crimea and the conflict in eastern Ukraine have alarmed Latvia, Estonia and Lithuania – like Ukraine, former Soviet republics with Russian-speaking minorities. NATO’s 28 leaders are expected to discuss plans to reassure Poland and the Baltics at a summit in Wales on Sept. 4-5.
  • Deployment on Russia’s Southern border is to be coordinated under a three country agreement signed on August 22, 2014 by Turkey, Georgia and Azerbaijan: Following the trilateral meeting of Azerbaijani, Turkish and Georgian defense ministers, Tbilisi announced that the three countries are interested in working out a plan to strengthen the defense capability. “The representatives of the governments of these three countries start to think about working out a plan to strengthen the defense capability,” Alasania said, adding that this is in the interests of Europe and NATO.“Because, this transit route [Baku-Tbilisi-Kars] is used to transport the alliance’s cargo to Afghanistan,” he said. Alasania also noted that these actions are not directed against anyone. (See Azeri News, August 22, 2014, emphasis added)
  • In the Far-east, Russia’s borders are also threatened by Obama’s “Pivot to Asia”. The “Pivot to Asia” from a military standpoint consists in extending US military deployments in the Asia-Pacific as well as harnessing the participation of Washington’s allies in the region, including Japan, South Korea and Australia. These countries have signed bilateral military cooperation agreements with Washington. As US allies, they are slated to be involved in Pentagon war plans directed against Russia, China and North Korea: Japan and South Korea are also both part of a grand U.S. military project involving the global stationing of missile systems and rapid military forces, as envisioned during the Reagan Administration. (Mahdi Darius Nazemroaya, Global Military Alliance: Encircling Russia and China, Global Research, October 5, 2007) This Pentagon strategy of military encirclement requires both centralized military decision making (Pentagon, USSTRATCOM) as well coordination with NATO and the various US regional commands.
  • On August 12, the US and Australia signed a military agreement allowing for the deployment of US troops in Australia. This agreement is part of Obama’s Pivot to Asia: The U.S. and Australia signed an agreement Tuesday [August 12] that will allow the two countries’ militaries to train and work better together as U.S. Marines and airmen deploy in and out of the country. “This long-term agreement will broaden and deepen our alliance’s contributions to regional security,” U.S. Defense Secretary Chuck Hagel said Tuesday. He described the U.S.-Australia alliance as the “bedrock” for stability in the Asia-Pacific region.
  • Ironically, coinciding with the announcement of the US-Australia agreement (August 12), Moscow announced that it would be conducting naval exercises in the Kuril Islands of the Pacific Ocean (which are claimed by Japan): “Exercises began involving military units in the region, which have been deployed to the Kuril Islands,” Colonel Alexander Gordeyev, a spokesman for Russia’s Eastern Military District, told news agency Interfax. (Moscow Times, August 12, 2014)
  • While this renewed East-West confrontation has mistakenly been labelled a “New Cold War”, none of the safeguards of The Cold War era prevail. International diplomacy has collapsed. Russia has been excluded from the Group of Eight (G-8), which has reverted to the G-7 (Group of Seven Nations). There is no “Cold War East-West dialogue” between competing superpowers geared towards avoiding military confrontation. In turn, the United Nations Security Council has become a de facto mouthpiece of the U.S. State Department. US-NATO will not, however, be able to win a conventional war against Russia, with the danger that military confrontation will lead to a nuclear war. In the post-Cold war era, however, nuclear weapons are no longer considered as a  “weapon of last resort” under the Cold War doctrine of “Mutual Assured Destruction” (MAD).  Quite the opposite. nuclear weapons are heralded by the Pentagon as “harmless to the surrounding civilian population because the explosion is underground”. In 2002, the U.S. Senate gave the green light for the use of nuclear weapons in the conventional war theater.  Nukes are part of the “military toolbox” to be used alongside conventional weapons.
  • When war becomes peace, the world is turned upside down.  In a bitter irony, nukes are now upheld by Washington as “instruments of peace”. In addition to nuclear weapons, the use of chemical weapons is also envisaged. Methods of non-conventional warfare are also contemplated by US-NATO including financial warfare, trade sanctions, covert ops, cyberwarfare, geoengineering and environmental modification technologies (ENMOD). But Russia also has  extensive capabilities in these areas.
  • The timeline towards war with Russia has been set. The Wales NATO venue on September 4-5, 2014 is of crucial importance. What we are dealing with is a World War III Scenario, which is the object of the Wales NATO Summit, hosted by Britain’s Prime Minister David Cameron. The agenda of this meeting has already been set by Washington, NATO and the British government. It requires, according to PM David Cameron in a letter addressed to heads of State and heads of government of NATO member states ahead of the Summit that: “Leaders [of NATO countries] must review NATO’s long term relationship with Russia at the summit in response to Russia’s illegal actions in Ukraine. And the PM wants to use the summit to agree how NATO will sustain a robust presence in Eastern Europe in the coming months to provide reassurance to allies there, building on work already underway in NATO.” (See PM writes to NATO leaders ahead of NATO Summit Wales 2014)
Gary Edwards

Is The US Finally Ready For Revolution? - Democratic Underground - 1 views

  •  
    Written in June of 2012, before the national elections, this commentary remains the ringing truth.  Maybe more Americans are ready to listen this fourth of July? ........................... "Is America Ready For Revolution? I have always strongly believed that it's not possible to be a good Christian without standing up against social injustice and government corruption in all its forms. As I take a look around me today I find a lot of things wrong with our country. In fact, I have been a proponent for radical change for several years now, and I have written and published 2 books on this very topic. Where shall I begin? In God-blessed America, the land of the free where everyone is an economic slave, our founding fathers' sacred idea of a government "of the people, by the people, for the people" has become but a cruel joke. Former president George W. Bush has notoriously called our Constitution - our supreme law of the land - "that (expletive) piece of paper". The federal government is currently spending at least $60 billion per month on military excursions in Afghanistan, the Middle East, and northern and western Africa - including operating between 800 and 1,000 foreign military bases all over the world. Our country's over-used flying drone aircraft kills hundreds daily overseas, many of whom are only innocent bystanders. Meanwhile here on the home front, one in seven people are on food stamps, and at any given time one in four American children are going hungry today. Our country spends more money incarcerating people than it does on education. What's up with that? Our political system is openly rigged against the best interests of the American people. A massive market mechanism is securely entrenched in our political system where political influence is openly bought and sold. Tens of thousands of highly-paid middlemen called "lobbyists" facilitate the legal transfer of billions between moneyed special interests and our so-called "representatives" i
Paul Merrell

"The War is Worth Waging": Afghanistan's Vast Reserves of Minerals and Natural Gas | Gl... - 0 views

  • US and NATO forces invaded Afghanistan more than 13 years ago in October 2001.   Afghanistan is defined as a state sponsor of terrorism. The war on Afghanistan continues to be heralded as a war of retribution in response to the 9/11 attacks.  This article, first published in June 2010, points to the “real economic reasons”  why US-NATO forces invaded Afghanistan in the wake of 9/11. 
  • The legal argument used by Washington and NATO to invade and occupy Afghanistan under “the doctrine of collective security” was that the September 11 2001 attacks constituted an undeclared “armed attack” “from abroad” by an unnamed foreign power, namely Afghanistan. Under the proposed Afghan-US security pact,  which is an integral part of Obama’s Asian pivot, Washington and its NATO partners are preparing to ensure a permanent military presence in Afghanistan, with military facilities located in proximity of China’s Western frontier.  The pact would allow the US to maintain their nine permanent military bases, strategically located on the borders of  China, Pakistan and Iran as well as Turkmenistan, Uzbekistan and Tajikistan. In addition to its vast mineral and gas reserves, Afghanistan produces more than 90 percent of the World’s supply of opium which is used to produce grade 4 heroin. US military bases in Afghanistan are also intent upon protecting the multibillion narcotics trade.  Narcotics, at present, constitutes the centerpiece of Afghanistan’s export economy.
  • The heroin trade, instated at the outset of the Soviet-Afghan war in 1979 and protected by the CIA, generates cash earnings in Western markets in excess of $200 billion dollars a year. “The highest concentration of NATO servicemen in Afghanistan is being accompanied with the highest concentration of opium poppy, ….  That situation causes doubts about the anti-terrorist mission and leads to the conclusion about catastrophic consequences of the eight-year stay [of coalition forces] in Afghanistan,” (Russia’s Federal Drug Control Service head Viktor Ivanov, January 2010)
  •  
    It bears notice that Afghanistan was one nation targeted for capture by the neocon Project for the New American Century's Rebuilding American Defenses report in 2000, specifically because of Afghanistan's abundant natural resources detailed in this article. The PNAC report also advocated for a natural gas pipeline passing through Afghanistan. That is the same report that said a "new Pearl Harbor" would be needed to create public support for the plan's execution. Enter 9-11 from stage left as just such a justification for invasion of Afghanistan (and later Iraq, another targeted nation). Several of the PNAC report authors and signatories went on to become high ranking members of the U.S. State and Defense departments when Bush II took office in January 2001. Notably, the PNAC report and above history provides irrefutable evidence that key U.S. policymakers had military goals for Afghanistan before 9-11 because of that nation's natural resources.  
Paul Merrell

How the NSA Converts Spoken Words Into Searchable Text - The Intercept - 0 views

  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest. The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
  • ...9 more annotations...
  • The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s. What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds. In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited. Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
  • A 2008 document from the Snowden archive shows that  transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing: (U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing. A version of the system the NSA uses is now even available commercially.
  • But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.” The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states. A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
  • According to a 2011 memo, “How is Human Language Technology (HLT) Progressing?“, NSA that year deployed “HLT Labs” to Afghanistan, NSA facilities in Texas and Georgia, and listening posts in Latin America run by the Special Collection Service, a joint NSA/CIA unit that operates out of embassies and other locations. “Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
  • The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America. For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.” The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
  • VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
  • What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.” The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
  • Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
  • The presidentially appointed but independent Privacy and Civil Liberties Oversight Board (PCLOB) didn’t mention speech-to-text technology in its public reports. “I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept. His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
Gary Edwards

Jenkins: Obama vs. the 1980s - WSJ.com - 0 views

  • "World Tax Reform: A Progress Report," his 1988 volume showed how country after country was following the U.S. in adopting Reagan-style rate-flattening and tax simplification.
  • Mr. Obama now craves a federal infrastructure bank, apparently still unable to see how growth might emerge except by bureaucrats bossing around tax dollars.
  • Simpson-Bowles Commission—proposed a Reagan-style tax reform
  •  
    excerpt:  Instead of a "stimulus" to create jobs by financing useful investments that would have paid a growth dividend in the future, we got a debt-fueled permanent expansion of entitlements and the size of government. In health care, instead of reforms to encourage competent consumers not to treat health care as a free lunch, we got a doubling down on health-care free lunchism. In banking, instead of new incentives to cause creditors to pull in the reins on risk-taking banks, we got a formalization of too big to fail. All economic crises begin differently-this one began in housing-but eventually they morph into the same old crisis of forgetting what works. Think about the last big crisis of faith in American capitalism in the early 1980s. The panic was eventually crystallized in dueling Harvard Business Review articles by George Gilder and Charles Ferguson. Mr. Ferguson, an MIT-based consultant, argued the U.S was dooming itself to vassalage unless Washington brushed aside small, poorly-funded entrepreneurs and concentrated regulatory favors and subsidies on giant firms like IBM, AT&T, Digital Equipment and Kodak. Mr. Gilder championed the then-emerging Silicon Valley paradigm. He quoted technologist Carver Mead: "We depend on the innovations of the citizens of a free economy to keep ahead of the bureaucrats and the people who make a living on control and planning. In the long term, it's the element of surprise that gives us the edge over more controlled economies." Who won hardly needs to be belabored except that it apparently does need to be belabored. Almost everything Mr. Obama understands as pro-growth consists of bets on "bureaucrats and the people who make a living on control and planning."
Paul Merrell

Utah lawmaker questions city water going to NSA - 0 views

  • SALT LAKE CITY – A Utah lawmaker concerned about government spying on its citizens is questioning whether city water service should be cut off to a massive National Security Agency data storage facility outside Salt Lake City.Republican Rep. Marc Roberts, of Santaquin, said there are serious questions about privacy and surveillance surrounding the center, and several Utah residents who spoke at a legislative committee hearing Wednesday agreed.During the last legislative session, lawmakers opted to hold off on Roberts' bill to shut off the facility's water and decided to study it during the interim."This is not a bill just about a data center. This is a bill about civil rights," web developer Joe Levi said. "This is a bill that needs to be taken up and needs to be taken seriously."Pete Ashdown, founder of Salt Lake City-based Internet provider XMission, called the center a stain upon the state and its technology industry. "I do encourage you to stand up and do something about it," he said.Lawmakers said they aren't considering shutting down $1.7 billion facility, but the committee chair acknowledged the concerns and said there might be another way to get the point across. "We may look at some type of a strong message to give our representatives to take back to Congress," said Republican Sen. David Hinkins, of Orangeville.
  • The NSA's largest data storage center in the U.S. was built in Utah over 37 other locations because of open land and cheap electricity. The center sits on a National Guard base about 25 miles south of Salt Lake City in the town of Bluffdale.NSA officials said the center is key to protecting national security networks and allowing U.S. authorities to watch for cyber threats. Beyond that, the agency has offered few details.The center attracted much discussion and concern after revelations last year that the NSA has been collecting millions of U.S. phone records and digital communications stored by major Internet providers.
  • Cybersecurity experts say the nondescript Utah facility is a giant storehouse for phone calls, emails and online records that have been secretly collected.Outside the computer storehouses are large coolers that keep the machines from overheating. The coolers use large amounts of water, which the nearby city of Bluffdale sells to the center at a discounted rate.City records released earlier this year showed monthly water use was much less than the 1 million gallons a day that the U.S. Army Corps of Engineers predicted the center would need, causing some to wonder if the center was fully operational.NSA officials have refused to say if the center is up and running after its scheduled opening in October 2013 was stalled by electrical problems.City utility records showed the NSA has been making monthly minimum payments of about $30,000 to Bluffdale. The city manager said that pays for more water than the center used.The state of Nevada shut off water to the site of the proposed Yucca Mountain nuclear waste dump 90 miles northwest of Las Vegas in 2002, after months of threats.The project didn't run dry because the Energy Department built a 1-million-gallon tank and a small well for the site. Department officials said the stored water, plus 400,000 gallons stored in other tanks at the Nevada Test Site, provided time for scientists to continue experiments and design work at the site.
  • ...1 more annotation...
  • SALT LAKE CITY – A Utah lawmaker concerned about government spying on its citizens is questioning whether city water service should be cut off to a massive National Security Agency data storage facility outside Salt Lake City.Rep
  •  
    Hey, go for their electricity too! But what do we do with the Bluffdale facility after we abolish the NSA? Turn it over to Internet Archives, with a $1 billion endowment for maintenance? Free and permanent web sites for everyone?  
Paul Merrell

The Blood Sacrifice of Sergeant Bergdahl | Matthew Hoh - 0 views

  • Last week charges of Desertion and Misbehavior Before the Enemy were recommended against Sergeant Bowe Bergdahl. Tragically, Sergeant Bergdahl was once again crucified, without evidence or trial, throughout mainstream, alternative and social media. That same day Sergeant Bergdahl was offered as a sacrifice to primarily Republican politicians, bloggers, pundits, chicken hawks and jingoists, while Democrats mostly kept silent as Sergeant Bergdahl was paraded electronically and digitally in the latest Triumph of the Global War on Terror, President Ashraf Ghani was applauded, in person, by the American Congress. Such coincidences, whether they are arranged or accidental, often appear in literary or cinematic tales, but they do, occasionally, manifest themselves in real life, often appearing to juxtapose the virtues and vices of a society for the sake and advancement of political narratives. The problem with this specific coincidence for those on the Right, indulging in the fantasy of American military success abroad, as well as for those on the Left, desperate to prove that Democrats can be as tough as Republicans, is that reality may intrude. To the chagrin and consternation of many in DC, Sergeant Bergdahl may prove to be the selfless hero, while President Ghani may play the thief, and Sergeant Bergdahl's departure from his unit in Afghanistan may come to be understood as just and his time as a prisoner of war principled, while President Obama's continued propping up and bankrolling of the government in Kabul, at the expense of American servicemembers and taxpayers, comes to be fully acknowledged as immoral and profligate.
  • Buried in much of the media coverage this past week on the charges presented against Sergeant Bergdahl, with the exception of CNN, are details of the Army's investigation into Sergeant Bergdahl's disappearance, capture and captivity. As revealed by Sergeant Bergdahl's legal team, twenty-two Army investigators have constructed a report that details aspects of Sergeant Bergdahl's departure from his unit, his capture and his five years as a prisoner of war that disprove many of the malicious rumors and depictions of him and his conduct.
  • As documented in his lawyers' statement submitted to the Army on March 25, 2015, in response to Sergeant Bergdahl's referral to the Article 32 preliminary hearing (which is roughly the military equivalent of a civilian grand jury), the following facts are now known about Sergeant Bergdahl and his time prior to and during his captivity as a prisoner of war:• Sergeant Bergdahl is a "truthful person" who "did not act out of a bad motive"; • he did not have the intention to desert permanently nor did he have an intention to leave the Army when he left his unit's outpost in eastern Afghanistan in 2009; • he did not have the intention of joining the Taliban or assisting the enemy; • he left his post to report "disturbing circumstances to the attention of the nearest general officer". • while he was a prisoner of war for five years, he was tortured, but he did not cooperate with his captors. Rather, Sergeant Bergdahl attempted to escape twelve times, each time with the knowledge he would be tortured or killed if caught; • there is no evidence American soldiers died looking for Sergeant Bergdahl.
  • ...4 more annotations...
  • Again, these are the findings of the Army's investigation into Sergeant Bergdahl's disappearance; they are not the apologies or fantasies of his legal team, Marines turned anti-war peaceniks like myself, or Obama fawning conspirators. The details behind these facts are contained in the Army's report, authored by Major General Kenneth Dahl, which has not been publically released, but hopefully will be made available to the public after Sergeant Bergdahl's preliminary hearing next month or, if the desertion and misbehavior charges are pursued, during his court martial. Just what events Sergeant Bergdahl witnessed that would compel him to risk his life, traveling unarmed through enemy controlled territory, to provide information to an American general, are not presently known. We do know that the unit Sergeant Bergdahl belonged to underwent serious disciplinary actions both before and after Sergeant Bergdahl's capture, that several of his unit's leaders were fired and replaced both prior to and subsequent to his capture, and, from communications between Sergeant Bergdahl and his family prior to his capture, Sergeant Bergdahl was sickened and distraught over the actions of his unit, including its possible complicity in the death of an Afghan child. It is quite possible Sergeant Bergdahl left his unit to report a war crime(s) or other serious crime(s) committed by American forces. He may have been trying to report a failure of his immediate leadership or it may have been something, in hindsight, that we would now consider trivial. Such an action on Sergeant Bergdahl's part would help to explain why his former platoon mates, quite possibly the very men whom Sergeant Bergdahl left to report on, have been so forceful in their condemnation of him, so determined not to forgive him for his disappearance, and so adamant in their denial to show compassion for his suffering while a prisoner of war.
  • This knowledge may explain why the Taliban believed Sergeant Bergdahl had fallen behind on a patrol rather than deserted. If he truly was deserting, than Sergeant Bergdahl most likely would have told the Taliban disparaging information about US forces in an attempt to harvest friendship and avoid torture, but if he was on a personal mission to report wrongdoing, than he certainly would not relate such information to the enemy. This may explain why Sergeant Bergdahl told his captors a lie rather than disclose his voluntary departure from the platoon outpost. This would also justify why Sergeant Bergdahl left his base without his weapon or equipment. Before his departure from his outpost, Sergeant Bergdahl asked his team leader what would happen if a soldier left the base, without permission, with his weapon and other issued gear. Sergeant Bergdahl's team leader replied that the soldier would get in trouble. Understanding Sergeant Bergdahl as not deserting, but trying to serve the Army by reporting wrongdoing to another base would explain why he chose not to carry his weapon and issued gear off of the outpost. Sergeant Bergdahl was not planning on deserting, i.e. quitting the army and the war, and he did not want to get in trouble for taking his weapon and issued gear with him on his unauthorized mission.
  • This possible exposure to senior leaders, and ultimately the media and American public, of civilian deaths or other offenses would also account for the non-disclosure agreement Sergeant Bergdahl's unit was forced to sign after his disappearance. Non-disclosure agreements may be common in the civilian world and do exist in military fields such as special operations and intelligence, but for regular infantry units they are rare. Sergeant Bergdahl's capture by the enemy, possibly while en-route to reveal war crimes or other wrongdoings, would certainly be the type of event an embarrassed chain of command would attempt to hide. Such a cover up would certainly not be unprecedented in American military history.Similar to the assertions made by many politicians, pundits and former soldiers that Sergeant Bergdahl deserted because, to paraphrase, he hated America and wanted to join the Taliban, the notion that he cooperated and assisted the Taliban while a prisoner of war has also been debunked by the Army's investigation. We know that Sergeant Bergdahl resisted his captors throughout his five years as a prisoner of war. His dozen escape attempts, with full knowledge of the risks involved in recapture, are in keeping with the Code of Conduct all American service members are required to abide by during captivity by the enemy.
  • In his own words, Sergeant Bergdahl's description of his treatment reveals a ghastly and barbaric five years of non-stop isolation, exposure, malnutrition, dehydration, and physical and psychological torture. Among other reasons, his survival must be attested to an unshakeable moral fortitude and inner strength. The same inherent qualities that led him to seek out an American general to report "disturbing circumstances" could well be the same mental, emotional and spiritual strengths that kept him alive through half a decade of brutal shackling, caging, and torture. It is my understanding the US military's prisoner of war and survival training instructors are studying Sergeant Bergdahl's experience in order to better train American service members to endure future experiences as prisoners of war. Susan Rice, President Obama's National Security Advisor, was roundly lampooned and criticized last year for stating that Sergeant Bergdahl "served with honor and distinction". It is only the most callous and politically craven among us who, now understanding the torture Sergeant Bergdahl endured, his resistance to the enemy that held him prisoner, and his adherence to the US military's Code of Conduct for five years in horrific conditions, would argue that he did not serve with honor and distinction.
  •  
    There's more article than I highlighted and it's worth reading. Obama should step in here and issue a full pardon to end this young man's torment by Army generals playing to the press. Let's recall here that Obama, when asked to prosecute Bush II officials for war crimes, said he would rather look forward rather than backward. Sgt. Bergdahl, who committed no war crime, deserves no less. Five years of torture and malnutrition as a POW is more punishment than anyone deserves.
Paul Merrell

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
Paul Merrell

U.S. Prepares to Gas Russia Into Submission | Black Agenda Report - 0 views

  • “Washington’s strategy is to permanently ratchet up tensions to ‘new cold war’ levels to justify sanctions against Russian energy exports.” The massive – and desperate – American offensive against world order is entering a new phase, as the U.S. prepares to resume its historical status as global energy superpower. The Obama administration’s brazen implantation of a rabidly anti-Russian, fascist-led regime in Ukraine places U.S. proxies astride pipelines that carry much of Siberia’s gas to Europe and beyond. Seventy-six percent of Russia’s natural gas exports are bound for Europe, the bulk of it to Germany, Italy, France and the United Kingdom. Russia’s weight in the world is largely derived, not from its economically burdensome nuclear arsenal, but as an energy giant. The U.S.-engineered coup in Kiev sets the stage for a protracted assault on Russia’s energy trade, which accounts for more than half of Moscow’s federal expenditures. Without its huge oil and gas exports, Russia deflates like a leaky dirigible. Even the Americans were not so stupid as to believe that their neo-Nazi friends in Kiev could somehow pry Russia from its naval base in Crimea. Such was never the plan. Rather, Moscow’s response to the overthrow of Ukraine’s elected government was predictable, as was that of the Russian-speaking Crimean majority. Washington’s strategy is to permanently ratchet up tensions to “new cold war” levels to justify sanctions against Russian energy exports while exploiting America’s own natural gas “surplus” as an enhanced weapon of global hegemony.
Paul Merrell

China's Official Press Agency Calls For New Reserve Currency, And New World Order | Zer... - 1 views

  • We assume it is a coincidence that on the day in which we demonstrate China's relentless appetite for gold, driven by what we and many others believe is the country's desire to have a call option on a gold-backed reserve currency when the time comes, just posted in China's official press agency, Xinhua, is an op-ed by writer Liu Chang in which he decries the "US fiscal failure which warrants a de-Americanized world" and flatly states that the world should consider a new reserve currency "that is to be created to replace the dominant U.S. dollar, so that the international community could permanently stay away from the spillover of the intensifying domestic political turmoil in the United States." Of course, if China were serious, and if the world were to voluntarily engage in such a (r)evolutionary reserve currency transition, then all Magic Money Tree theories that the only thing better than near infinite debt is beyond infinite debt, would promptly be relegated to the historic dust heap of idiotic theories where they belong. Some of China's (which as a reminder is the single largest offshore holder of US Treasury paper, and the second largest of all only second naturally to the Federal Reserve whose $85 billion in monthly monetizing "flow" is what is keeping rates from exploding higher) thoughts as captured in the Xinhua Op-ed:
  • Reform of the world’s financial system should include the introduction of a new internatonal reserve currency to replace the U.S. dollar The international community could thus permanently stay away from the spillover of intensifying domestic political turmoil in the U.S. Fiscal impasse in the U.S. is a good time for “befuddled world” to start considering building a “de-Americanized world” Impasse has left many nations’ dollar assets in jeopardy and the international community agonized Other cornerstones should be laid to underpin a de-Americanized world, including respect for sovereignty, recognizing authority of UN in handling global hotspot issues and giving developing and emerging market economies more say in major international financial institutions Purpose of such changes is not to “completely toss the United States aside,” rather to encourage Washington to play a much more constructive role in addressing global affairs Of course, if and when the day comes that the USD is no longer the reserve currency, kiss America's superpower, or any power, status, which is now based purely on the USD's reserve currency status, and the ability to fund half the US budget deficit with debt promptly monetized by the Fed, goodbye.
  •  
    Sounds like more than a hint from China that Congress needs to act quickly to remove concerns that the U.S. may default on its debt. (The Xinhua op-ed is republished on the linked page.)  I must admit that I have my moments when I like the idea of the entire corrupt Western bankster cartel would just get on with committing financial suicide so the world could get on with whatever is to rise from those ashes. 
1 - 20 of 72 Next › Last »
Showing 20 items per page