Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged perpetrators

Rss Feed Group items tagged

Paul Merrell

Imagery and Empire: Understanding the Western Fear of Arab and Muslim Terrorists | Glob... - 0 views

  • Seven out of the top ten countries afflicted by terrorist attacks are predominately Muslim, according to the Australia-headquartered Institute for Economics and Peace’s Global Terrorism Index for 2014, which is based on the University of Maryland’s meta-analytic Global Terrorism Database. Using a maximum value of ten and a minimum value of zero, the entire international community is systematically ranked. Although the definition of terrorist incidents in the University of Maryland’s Global Terrorism Database can definitely be debated over, important inferences can be made from its data sets and the Institute for Economics and Peace’s Global Terrorism Index. Several key features can be noticed, if readers look at the nature and identities of the perpetrators of what is classified as acts of terrorism among the top thirty countries in the Global Terrorism Index for 2014. The first feature is that the violence generated from the ascribed terrorist groups falls within the framework of insurrections and civil wars that are generally equated as acts of terrorism. For example, this is the case for countries like Somalia, the Philippines, Thailand, Colombia, Turkey, Mali, the Democratic Republic of Congo, and Nepal, which are respectively ranked seventh, ninth, tenth, sixteenth, seventeenth, twenty-second, and twenty-fourth place. Under closer examination several of these insurgencies can be tied to international rivalries and power plays by the US and its allies. This becomes obvious when more observations are made.
  • The second feature is that the majority of the cases of terrorism in the indexed countries, especially the higher ranked they are on the list, are connected to Washington’s direct or indirect interference in their affair. For example, this is the case for Iraq, NATO-garrisoned Afghanistan, Pakistan, Syria, Somalia, Yemen, Russia, Lebanon, Libya, the Democratic Republic of Congo, Sudan, South Sudan, China, and Iran, which are respectively ranked first, second, third, fifth, seventh, eighth, eleventh, fourteenth, fifteenth, eighteenth, nineteenth, twentieth, twenty-fifth, and twenty-eighth. US-led wars, Pentagon interventions, US-backed coups, or US government support for so-called «opposition» groups or proxy regimes have all been a basis for the affliction of terrorism in these countries. Out of the above countries, according to the Global Terrorism Index, 82% of global deaths that are assigned to acts of terrorism happen in NATO-garrisoned Afghanistan, Iraq, Pakistan, Syria, and Nigeria. The ties to US foreign policy should be clear.
  • It has been claimed that if all terrorists are not Arabs or Muslims, that most terrorists are Arabs or Muslims. Is this true or another myth? An empirical look at data compiled in the US and Europe will help answer this question. In the US, which is ranked thirtieth in the Global Terrorism Index for 2014, the majority of terrorists are not Muslims and are non-Muslims according to the Federal Bureau of Investigation (FBI). Inside the US, 6% of terrorist cases from 1980 to 2005 were committed by Muslim terrorists. [1] The other 94% of terrorism cases and terrorists — in other words, the vast majority — were not related to Arabs, Muslims, or Islam. [2] While the FBI’s methodology on what is a terrorist attack and what is not a terrorist attack is questionable, it will be accepted herein for arguments sake. According to the same FBI report, there were actually more terrorist attacks launched by Jews from 1980 to 2005 on US soil. The same FBI data was compiled by the Princeton University-linked webpage loonwatch.com in a chart that describes the breakdown of cases of terrorist attacks on US soil from 1980 to 2005 as follows: 42% Hispanic terrorism; 24% extreme left-wing group terrorism; 16% other types of terrorists that do not fit into the other main categories; 7% Jewish terrorists; 6% Muslim terrorists; and 5% communist terrorists. [3] While Muslim terrorists comprised 6% of the attacks on US soil from 1980 to 2005, Jewish terrorists and Hispanic terrorists respectively comprised 7% and 42% of the terrorist attacks in the US during the same period. There, however, is no fear mongering about Jews or Hispanic people. The same media and government focus is not given to them as is given to ethnic Arabs and Muslims.
  • ...4 more annotations...
  • The same pattern repeats itself in the European Union. Loonwatch.com also compiles data on terrorism in the European Union from the reports of the European Union’s European Police Office (Europol) from 2007, 2008, and 2009 in its annual EU Terrorism Situation and Trend Reports. [4] The data further distances Muslims from terrorist acts. 99.6% of the terrorist attacks in the European Union were committed by non-Muslims. [5] The number of failed, foiled, or successful terrorist attacks by Muslims in the EU from 2007 to 2009 was simply five attacks whereas the number of terrorist attacks by separatist groups was 1,352 attacks, which equates to approximately 85% of all terrorist incidents in the European Union. [6] According to Europol, the number of failed, foiled, or successful terrorist attacks by so-called left-wing groups was 104 while another 52 attacks were categorized as non-specific. [7] In the same period, two attacks were attributed to so-called right-wing groups by Europol. [8]
  • There is a huge disparity in who is causing and committing terrorism and who is being victimized and blamed for it. Despite the overwhelming facts, whenever Arabs or Muslims commit crimes and acts of terrorism, they are the individuals that are focused on whereas non-Arabs and non-Muslims are ignored. If it does acknowledge that Muslims are the biggest victims of terrorism, Orientalism still manages to assess some guilt to the victims of terrorism by tacitly portraying them as members of a savage community or society that are as much prone to facing a violent end as animals in a jungle.
  • Illusions are at work in the world. The truth has been turned on its head. The victims are being portrayed as the perpetrators. Whether stated candidly, implied, or unmentioned, the notion of Arabs and Muslims as savages and terrorists plays on the imagery that the so-called Western World embodies equality, freedom, choice, civilization, tolerance, progress, and modernity whereas the so-called Arab-Muslim World underneath its surface represents inequality, restrictions, tyranny, a lack of choices, savagery, intolerance, backwardness, and primitiveness. This imagery actually serves to de-politize the political nature of tensions. It sanitizes the actions of empire, from coercive diplomacy with Iran and support for regime change in Syria to the invasions of Afghanistan and Iraq and US military intervention in Somalia, Yemen, and Libya. As mentioned earlier, in varying degrees, this imagery extends to other places that are seen by US Orientalists as non-Western places or entities, like Russia and China. At its roots, this imagery is really part of a discourse that sustains a system of power that allows power to be practiced by an empire over «outsiders» and against its own citizens. It is because of US foreign policy and economic interests that Arabs and Muslims are unempirically portrayed as terrorists while real world data that shows that US intervention is creating terrorism is ignored. This is why there is a fixation on the attack on Parliament Hill in Canada, the Martin Place hostage crisis in Sydney, and the Charlie Hebdo attack in Paris, but US, Canadian, Australian, and French governmental support for terrorism that has cost tens of thousands of lives in Syria is ignored.
  • It has been claimed that if all terrorists are not Arabs or Muslims, that most terrorists are Arabs or Muslims. Is this true or another myth? An empirical look at data compiled in the US and Europe will help answer this question.
  •  
    Very interesting statistics that depart from the common American belief. Note that the stats do not include "terrorism" inflicted by U.S. or foreign government military forces. But all wars produce terror far beyond the wildest capabilities of individual "terrorists."
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Gary Edwards

Exit polls 2012: How votes are shifting - The Washington Post - 0 views

  •  
    As one commentator to this posting said; "Those numbers don't add up to an 0bama victory, impossible.  Only one of two possibilities are presented here: either these numbers the Post listed are wrong, or there was MASSIVE fraud perpetrated here. There are NO other possible scenarios, so quit pretending that our elections are legit." "SOURCE: Preliminary results from interviews of randomly selected voters as they exited voting places across the country on Tuesday, Nov. 6. Some states included telephone interviews with early voters. The poll was conducted by Edison Media Research for the National Election Pool, The Washington Post and other media organizations. Typical characteristics have a margin of sampling error of plus or minus four percentage points; POLLING: Scott Clement, Jon Cohen and Peyton M. Craighill | GRAPHIC: Sisi Wei - The Washington Post. Published Nov. 6, 2012."
Gary Edwards

PETITION URGING CONGRESS TO IMPEACH PRESIDENT BARACK OBAMA - 0 views

  •  
    "PETITION URGENTLY REQUESTING THAT CONGRESS LAUNCH AN INDEPENDENT AND COMPREHENSIVE INVESTIGATION INTO UNCONSTITUTIONAL AND IMPEACHABLE OFFENSES ON THE PART OF PRESIDENT BARACK OBAMA To: All members of the U.S. Congress: Whereas, President Barack Obama not only failed to aid U.S. personnel under lethal and prolonged terrorist attack in Benghazi, Libya, on Sept. 11, 2012, resulting in the deaths of a U.S. ambassador and three other Americans, but also led an outrageously deceitful cover-up for weeks afterward, rivaling the Watergate-era cover-up that ended the presidency of Richard Nixon; Whereas, the IRS under Obama - in accord with direct instructions from congressional Democrats - has engaged in the most egregious and widespread attack on conservative groups in modern history, with the knowledge of top agency officials; Whereas, the Obama Justice Department, on top of its many first-term scandals, has spied on and harassed journalists at Fox News and the Associated Press, prompting widespread, bipartisan condemnation of the DOJ for "criminalizing journalism"; Whereas, top constitutional attorneys from across the political spectrum now agree that Obama has committed certain specific offenses that unquestionably rise to the level of impeachable "high crimes and misdemeanors"; Whereas, one of these offenses - that of illegally conducting war against Libya - has been deemed by a bipartisan panel of constitutional experts to be "clearly an impeachable offense" and "gross usurpation of the war power"; Whereas, Obama's policy of targeted assassinations of U.S. citizens without any constitutionally required due process - including the drone assassination of an American-born 16-year-old as he was eating dinner - is unanimously deemed by experts, both liberal and conservative, as "an impeachable offense"; Whereas, Obama's Justice Department has presided over the disastrous "Fast and Furious" operation in which approximately 2
Gary Edwards

The Farce-Hole Gets Deeper: Obama's "Bankster Robo-Settlement For Votes" Cost To Taxpay... - 1 views

  •  
    Incredible.  The Banksters were caught perpetrating a massive fraud on mortgage holders in default.  They set up document mills packed with "robo" signers forging legal documents to prove in a foreclosure procedure that they are in fact the mortgage provider for that property.  The fraud itself revelas the essentials of what went wrong with the entire mortgage securities scam that brought down the worlds financial structures in 2008. The MERS (Mortgage Electronic Registration systems, Inc.) electronic database was set up in 1995 as a means to enable participating Banksters to side step the quilt of State and County laws governing real estate transactions, non judicial foreclosure rights, and property ownership recording requirements.  MERS was essential to the bundling and trade in mortgage-backed securities.  In essence, MERS replaced public recordation requirements with a private, Bankster owned one. This all sounded good until waves of home owners facing default began to take their banksters to court.  Turns out that MERS mortgages lacked the legal documentation to establish a legal chain of ownership.  Realizing their mistake, and with thousands upon thousands of foreclosures hanging in the balance, the Banksters created the robo document industry, forging millions of foreclosure documents overnight.  Criminal fraud on steroids. The banksters got caught, with State Attorney Generals launching massive consumer protection law suits against the big banksters.  This put a halt to the illegal foreclosures, forcing banksters to turn to short sales on homes in default.  The short sale industry rocketed in 2011, but the to perfect a short sale, the banksters were taking the loss; sometimes as much as $100K to $250K per home.  But the real estate market inventory was effectively being cleared and market pricing corrected. The Banksters were unhappy.  Seeking to get back on the foreclosure track but facing what amounted to across the boards class action la
Gary Edwards

The Biggest Financial Scam In World History           : Information Clearing ... - 0 views

  •  
    Marbux sent me this link to series of videos explaining the LiBOR bankster crisis.  The awesome Bill Black is featured in two of the video interviews.  Others include Matt Taibi of the Rolling Stone Magazine.  Matt's work on bankster criminals is legendary.  This is incredible stuff.  Very heated.  Clearly we are at the heart of the largest criminal fraud ever perpetrated, and it involves the worlds largest banksters.  Including the Queen of England (Bank of England).  $800 Trillion in fraud.  Incredible. Yes, the Libor Scandal Affects You By Jack Hough July 06, 2012 "Smart Money" - -A liger is a cross between a lion and a tiger. Libor, on the other hand, is a daily approximation of what banks charge each other for loans. It turns out only one of these things is real. Awkwardly, it's not the one used to set prices on an estimated $800 trillion in global financial instruments, or $116,000 worth for each person on earth, ranging from complex derivatives to student loans. That's a problem for holders of bank stocks - which includes just about anyone who owns a mutual fund or 401(k). Barclays (BCS) agreed last week to pay $453 million to settle allegations that it manipulated Libor, which stands for London interbank offered rate. As The Wall Street Journal reported Thursday, it's likely only the first: More than a dozen banks on three continents are under investigation. Libor is compiled by asking 18 banks what they think they would pay if they needed money. Some banks may have submitted artificially low responses during the global financial crisis to give the appearance of high creditworthiness. Others may have tinkered with the reading to profit from trades, or avoid losses. The Barclays settlement is affordable, at less than 7% of the company's projected profits this year, but the size of legal claims it and other banks face is difficult to imagine. Trial lawyers will do their best to work out the sums, of course. Libor may have been subject
Paul Merrell

No consensus on who was behind Sept 11: global poll | Reuters - 0 views

  • The survey of 16,063 people in 17 nations found majorities in only nine countries believe al Qaeda was behind the attacks on New York and Washington that killed about 3,000 people in 2001.U.S. officials squarely blame al Qaeda, whose leader Osama bin Laden has boasted of organizing the suicide attacks by his followers using hijacked commercial airliners.On average, 46 percent of those surveyed said al Qaeda was responsible, 15 percent said the U.S. government, 7 percent said Israel and 7 percent said some other perpetrator. One in four people said they did not know who was behind the attacks.The poll was conducted by WorldPublicOpinion.org, a collaborative project of research centers in various countries managed by the Program on International Policy Attitudes at the University of Maryland in the United States.In Europe, al Qaeda was cited by 56 percent of Britons and Italians, 63 percent of French and 64 percent of Germans. The U.S. government was to blame, according to 23 percent of Germans and 15 percent of Italians.
  • Respondents in the Middle East were especially likely to name a perpetrator other than al Qaeda, the poll found.Israel was behind the attacks, said 43 percent of people in Egypt, 31 percent in Jordan and 19 percent in the Palestinian Territories. The U.S. government was blamed by 36 percent of Turks and 27 percent of Palestinians.In Mexico, 30 percent cited the U.S. government and 33 percent named al Qaeda.The only countries with overwhelming majorities blaming al Qaeda were Kenya with 77 percent and Nigeria with 71 percent.Interviews were conducted in China, Indonesia, Nigeria, Russia, Egypt, France, Germany, Britain, Italy, Jordan, Kenya, Mexico, the Palestinian Territories, South Korea, Taiwan, Turkey and Ukraine.The poll, taken between July 15 and August 31, had a margin of error of plus or minus 3 to 4 percent.
  •  
    Poll from 2008. 
Gary Edwards

Can Inner-City Gangsters Be Stopped? - LewRockwell.com - 1 views

  •  
    Solid libertarian thinking applied to a problem that continues to confound democrat socialists and republican statists. One thing missing from this excellent analysis; "follow the money". There are reasons for the madness of the left and the right. Follow the money and follow the power of government. excerpt: "Gang violence is afflicting some of our major cities, Chicago chief amongst them. As I write, there are reports coming in regarding a shooting of 13 people at a basketball court in the Second City. Fortunately, no one was killed in this episode. But a three year old boy is now in critical condition as a result of being shot, and the not unreasonable expectation is that retaliation from the aggrieved gang toward the perpetrators of this particular act will soon follow. According to USA Today, this bout of gunfire was due to a dispute between the Gangster Disciples and the Black P Stone Nation gang.  Neither is likely to sue the other in a court of law to settle their grievances with each other. The purpose of the present essay is to offer the libertarian solution to this problem of inner city gangs, shootings, violence. How can we radically reduce if not entirely eliminate these acts of barbarism? But before we offer the correct (e.g., libertarian) analysis of this situation, let us consider those offered, and now often implemented, by our friends on the left and the right. (We libertarians fit into neither of these categories. We are neither "liberals" nor "progressives" nor "socialists" nor "communists" nor "neighborhood organizers" nor "left-wingers" nor "Democrats."  Nor are we "conservatives" or "right-wingers" or "fascists" or "constitutionalists" or "Republicans." We are something apart and separate from both of them. We are libertarians. Hear us ROAR! )"
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Gary Edwards

Obama - Soros Bailout of PIMCO and the Big Banks - 0 views

  •  
    Interfluidity has some very "Dark musings" about Treasury Sec Geithner's plan to bailout the big banks with trillions of dollars of taxpayer funds. The plan is "enronic" in that it proposes to use taxpayer funds to create a market for the toxic assets threatening to take down the big banks. The banks need to dump these AAA Fannie-Freddie mortgage securities, but the market has factored in a reality roughly discounting the value by 60% to 70%; Housing values having plummeted across the nation. If the Banks were to take the hit, and sell this GSA crap at true market value, they would not only suffer enormous losses for their high risk gambling, bu they would also be taken out of the lending market. Banks regulations require strict ratios between assets and lending funds.

    So the idea is to have the taxpayers create a toxic asset market enabling banks to dump their crap at above market prices, with taxpayers takign the hit. This hit is masked by a tricky equation; Taxpayers will put up 97% of the funds for the overpriced purchase of crap, with private sector banks, hedge funds, and bond holders contributing 3%. Such a deal!

    Heads the banks and Hedge funds win; tails the taxpayer loses. And loses to the tune of over $10 Trillion. GSA wonderkinds Fannie and Freddie have put $5 Trillion of securitized mortgages into the secondary money markets. Leverage that out at 40 : 1, and you have a $200 Trillion problem. Hummm, $10 Trillion looks cheap. "....I am filled with despair, not because what we are doing cannot "work", but because it is too unjust. This is not my country. The news of today is the Geithner plan. I think this plan might work very well in terms of repairing bank balance sheets...." Of course the whole notion of repairing bank balance sheet is a lie and misdirection. The balance sheets we should want to see repaired are household balance sheets. Banks have failed us profoundly. We want them reorganized, not repair
Gary Edwards

Putting the Freud in Fraud: Focus on the Human Element | Crowe Horwath LLP - 0 views

  •  
    Excellent study of corporate fraud, with advice on how to detect it. excerpt: By taking a closer look at high-profile individuals who have perpetrated massive corporate fraud at Enron, WorldCom, Tyco, and the like and instances of fraud identified in practice, as well as some recent research, we can identify a pattern of similar behavioral elements common to white-collar crooks and cultural elements common to their environments. Following are some key elements often associated with individuals who are more likely than others to commit fraud as well as settings in which fraud is more likely to occur than elsewhere. The presence in a company of any single element is not enough to indicate fraud. But the combination - any combination - of these elements increases the risk of fraud. Behavioral Elements Individuals who exhibit or have a combination of the following social characteristics might be more likely than others to stray from the straight and narrow. Detecting fraud is further complicated by the fact that many of these behavioral elements are the same ones that tend to make executives successful.
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

The NSA's New Partner in Spying: Saudi Arabia's Brutal State Police - The Intercept - 1 views

  • The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world’s most repressive and abusive government agencies. An April 2013 top secret memo provided by NSA whistleblower Edward Snowden details the agency’s plans “to provide direct analytic and technical support” to the Saudis on “internal security” matters. The Saudi Ministry of Interior—referred to in the document as MOI— has been condemned for years as one of the most brutal human rights violators in the world. In 2013, the U.S. State Department reported that “Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse,” specifically mentioning a 2011 episode in which MOI agents allegedly “poured an antiseptic cleaning liquid down [the] throat” of one human rights activist. The report also notes the MOI’s use of invasive surveillance targeted at political and religious dissidents.
  • But as the State Department publicly catalogued those very abuses, the NSA worked to provide increased surveillance assistance to the ministry that perpetrated them.
  • “With the approval of the Third Party SIGINT relationship,” the memo reports, the NSA “intends to provide direct analytic and technical support to TAD.” The goal is “to facilitate the Saudi government’s ability to utilize SIGINT to locate and track individuals of mutual interest within Saudi Arabia.”
  • ...1 more annotation...
  • The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world’s most repressive and abusive government agencies. An April 2013 top secret memo provided by NSA whistleblower Edward Snowden details the agency’s plans “to provide direct analytic and technical support” to the Saudis on “internal security” matters. The Saudi Ministry of Interior—referred to in the document as MOI— has been condemned for years as one of the most brutal human rights violators in the world. In 2013, the U.S. State Department reported that “Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse,” specifically mentioning a 2011 episode in which MOI agents allegedly “poured an antiseptic cleaning liquid down [the] throat” of one human rights activist. The report also notes the MOI’s use of invasive surveillance targeted at political and religious dissidents. But as the State Department publicly catalogued those very abuses, the NSA worked to provide increased surveillance assistance to the ministry that perpetrated them. The move is part of the Obama Administration’s increasingly close ties with the Saudi regime; beyond the new cooperation with the MOI, the memo describes “a period of rejuvenation” for the NSA’s relationship with the Saudi Ministry of Defense. In general, U.S. support for the Saudi regime is long-standing. One secret 2007 NSA memo lists Saudi Arabia as one of four countries where the U.S. “has [an] interest in regime continuity.”
Paul Merrell

Breaking the Silence about Colombia and Ourselves | Opinion | teleSUR - 0 views

  • The USA’s human rights record at home is terrible in some important (and quickly worsening) ways, but if one includes its victims beyond its borders then it is indisputably the most dangerous rogue state in the world. According to the UNHCR’s latest figures, there are about 200,000 Colombians living in Venezuela as refugees – but less than 237 Venezuelans living in Colombia as refugees.[1] It you rely on the international media, you can be forgiven for assuming it was the other way around – that Colombia must be hosting hundreds of thousands of Venezuelans who have fled their country.[2] Ever since the early 1990s, if one considers only crimes perpetrated within its own borders, Colombia has consistently had, by far, the worst human rights record in the Western Hemisphere (contrary to Ken Roth’s lunatic assertion that Venezuela and other ALBA bloc countries are the “most abusive”).  The Colombian military, and right wing paramilitaries with whom it is closely allied, have perpetrated the vast majority of atrocities in a civil war that has raged for decades.  In private, US officials have estimated hundreds of thousands of people killed by them. These killings have reached truly genocidal levels in the case of numerous indigenous groups who have been nearly wiped out. Colombia’s population of internally displaced people is almost 6 million, the highest in the world as of 2012.
  • If you follow Daniel Kovalik’s diligent work, you’ll understand why Colombia’s human rights record is so horrific and, at the same time, so widely ignored. Colombia has been lavishly funded and supported by the US government – and therefore depicted as one of the “good guys” by the international media. In September of last year, the New York Times editors singled out Colombia as a country that should “lead an effort to prevent Caracas from representing the region when it is fast becoming an embarrassment”. The NYT editors registered zero “embarrassment” when US General John Kelly recently told Congress “The beauty of having a Colombia – they’re such good partners, particularly in the military realm, they’re such good partners with us. When we ask them to go somewhere else and train the Mexicans, the Hondurans, the Guatemalans, the Panamanians, they will do it almost without asking. And they’ll do it on their own. They’re so appreciative of what we did for them. And what we did for them was, really, to encourage them for 20 years and they’ve done such a magnificent job.” General Kelly should add the international corporate media to his list of “magnificent partners”. It has kept most people ignorant of the mass murderers that US (and UK and Canadian) governments have been supporting for many years.
Paul Merrell

Nemtsov's Killers Also Planned to Kill Putin - 0 views

  • FSB source to "Komsomolskaya Pravda": "the customer of Nemtsov's murder was preparing an assassination of Vladimir Putin" The main suspect in the organization of the high-profile crime - is a commander of the Ukrainian battalion in the name of Dzhokhar Dudayev, Adam Osmayev. The correspondent of "Komsomolskaya Pravda" met with the FSB agent, who is part of the team investigating the murder of Boris Nemtsov. In an exclusive interview he spoke about the new details of the crime and named the most likely customer of the murder.
  • Today the investigators have irrefutable proof that all persons detained on suspicion of murder of the politician are the perpetrators, - said our source in the FSB. First of all, billing (data about calls and movements of the subscriber. - Ed.) from their mobile phones showed that they conducted surveillance of Nemtsov before the murder, following him closely. The suspects were tracked with their phones at the location where Nemtsov was present with his phone. During the murder all the detainees "were in the area": some under the bridge, some in a car, some nearby. Zaur Dadaev pulled the trigger. He first made a confession, and then, on the advice of his lawyers, took it back. But it changes nothing, the investigation has already collected compelling evidence of his guilt. I will not give details of how this was done. The pistol was thrown into the river after the crime, it was later recovered by divers. That Zaur Dadaev immediately said to the TV cameras: "I love prophet Muhammad" - is just a cover. There was no religious motive for the killings. They cynically carried out an order. They are far from devout Muslims. In fact, just real gangsters. And the most important thing. The executor of the murder was in close contact with Adam Osmaev, who recently became the commander of the Ukrainian battalion in the name of Dzhokhar Dudayev. They met, talked a lot on the phone. Zaur Dadaev and his cronies worked with Osmaev on Ukrainian affairs. And also with Chechens, who fought on the territory of Ukraine for the new regime. Zaur Dadaev was listed in the battalion "North" ("Sever") of the Chechen Interior Ministry, but while serving in it, in fact, was engaged in activities against Russia. He was associated with Osmaev by a certain relationship and mutual obligations.
  • The evidence is still being gathered. But I can say that today the main suspected customer of Nemtsov's murder is Adam Osmayev.
  • ...6 more annotations...
  • - The perpetrators were told to execute the order in the place where it was committed, - continues our source. - Another words not just to kill him in the alley, but do it in the heart of Moscow across from the Kremlin - deliberately to cause outrage around the world. Before the crime they received the advance payment, it was agreed that the remainder of the money for the "job" will be transferred to their bank account. - Why did they have to kill Nemtsov, who spoke out against Putin's policies? It turns out, they had killed their ideological ally! - [Ultra-] Nationalists and criminals will not stop at anything. To kill their ally for them is not a question of morality. Nemtsov became a bargaining chip. The goal was - to slander Russia, to show it in a bad light, to prevent peace in Donbass (especially after talks with Merkel and Hollande). To show the President of Russia in the eyes of the world community as the "ultimate evil" - to show: look, how he strangled the opposition. The world just began to warm up to Putin's politics, which he is following in relation to Ukraine. And this cynical murder of Nemtsov has caused a wave of discontent, fueled by the world media. The American and European press immediately began to show this murder in their own light, placing the responsibility on the President of Russia.
  • Adam Osmayev was previously suspected in the attempt to organize the 2012 assassination of Vladimir Putin, at that time a Prime Minister and presidential candidate. Osmayev  planned to blow up Putin's motorcade, which was confirmed by a video, found in his laptop, of Prime Minister's motorcade travelling through Moscow. Then Osmaev cooperated with the investigation - admitted he came to Odessa from the United Arab Emirates with instructions from field commander Doku Umarov. But in court Osmayev refused to testify, claiming he gave his testimony after a beating. His lawyers wrote a complaint to the Prosecutor's office and the European Court of Human Rights. - Osmaev failed to get to Putin himself, but it seems that he did not calm down, - says our source in the FSB. - And later the most accessible target to attack the President was selected - Boris Nemtsov. Nemtsov lately was not seen as an active member of the opposition, was no competition to Putin, but his name was known. The choice of a sacrificial lamb was quite successful. The gangsters do not stop at anything. And gangsters involved in politics is a devilish blend.
  • - Will Osmaev be charged? - Now everything is in the stage of investigation and evidence collection. Some of the evidence we already gathered, but I don't want to tell everything in order not to hinder the investigation.
  • What was Adam Osmayev "famous" for... In 2007 in Moscow on the eve of Victory Day a terrorist attack was averted - explosives were found in a parked car. A native of Grozny, Adam Osmayev, a suspect in the case, was arrested in absentia by the Lefortovsky district court of Moscow and declared for international search. The investigation found that Osmayev with a group of Chechens and Ingush was also preparing an assassination on May 9 of the head of Chechnya, Ramzan Kadyrov. According to the press, after that Osmayev was hiding in the UK, where he was contacted by associates of Doku Umarov and was offered to organize a new terrorist attack. Adam agreed and went to Ukraine with a fake passport. In 2012, he was arrested after an explosion in a rented apartment - the terrorist was preparing homemade bombs. Osman and his "right hand", a Kazakh citizen, Ilya Pyanzin, admitted: they were preparing an assassination of the head of the government of Russian Federation, Vladimir Putin. The suspects also reported that they recruited fighters for future terrorist attacks in Russia. But later they took back their testimony.
  • Russia demanded to extradite Adam Osmayev, however, the European Court of Human Rights had blocked it, declaring: "In Russia the detainee may be subjected to torture". Pyanzin eventually was extradited to Russia, and in September 2013 he was sentenced to ten years in a colony with a strict regime. On November 18, 2014, the court of Odessa declared a sentence for Osmaev: 2 years and 9 months imprisonment. He was released in the courtroom "for lack of evidence of preparation of assassination" - he was credited the time he already spent in jail. The court room reacted to the sentence of Osmaev with applause, and he, in turn, encouraged them to "protect Ukraine". In February of this year Osmayev headed the Ukrainian battalion  in the name of Dzhokhar Dudayev, succeeding the general, deceased under Debaltsevo, Isa Munaev. 
  • OFFICIAL COMMENT Dmitry Peskov: In the coming days, the prosecutors will announce the motives for the murder "We hope that in the coming days all legal formalities will be completed and prosecutors will announce their versions of the murder, will name those who are behind this," said the President's press secretary Dmitry Peskov to the journalists of "AP", answering the question about the prospects of completing the investigation of the murder of Boris Nemtsov.
  •  
    According to this translated-from-Russian Pravda report, the investigation of the Boris Nemtsov assassination in Russia is closing in on the commander of a Ukrainian battalion, Adam Osmayev, as the person who set in motion the assassination by a professional hit team that had also been tasked to assassinate Vladimir Putin. In other words, a false flag attack on Nemtsov to make Russia look bad, to be followed up by killing the Russian Prime Minister.  The pseudonym reportedly used by Osmayev in Ukraine is Dzhokar Dudayev. That is the name of the first President of the Chechen Republic of Ichkeria, a breakaway state in the North Caucasus. Wikpedia says, "Dudayev was killed on 21 April 1996, by two laser-guided missiles when he was using a satellite phone, after his location was detected by a Russian reconnaissance aircraft, which intercepted his phone call." http://goo.gl/67qPVR  In comments by the translator that I did not highlight, she speculates that the trail may lead further to the CIA and SBU, which is roughly the Ukrainian equivalent of the CIA. See also this 2014 article, http://www.interfax.com/newsinf.asp?id=488090 (.) That article reports, inter alia, that the CIA had personnel working within the SBU between 2006-10 and that CIA had been provided with the personnel files of Ukraine "special services" officers. If true, that would mean that CIA had penetrated SBU long before the coup and may in fact have been in control of SBU. Approximately the first paragraph of this article was reported by the Kyev Post, without mention of the CIA officials working within SBU. http://goo.gl/9HX1n
  •  
    Correction: I misunderstood the translation. The plot to kill Putin happened in 2012 and Adam Osmayev was allegedly tied to it. I have no information that the other defendants in the present incident were involved with that. Also, Dzhokar Dudayev is not a pseudonym used by Osmayev but instead the name of his militia battalion in Ukraine. It's composed of "international" volunteers, one might suspect largely of Chechnyans. I'll be bookmarking another article soon that makes more sense of all this. Osmayev is himself Chechnyan.
Paul Merrell

America Is Guilty if We Don't Prosecute Obama Washington's Blog - 0 views

  • I write both as a Democrat (which Barack Obama merely claims to be, but shows by his actions that he is not) and as an American (which he, unfortunately, actually is, but which Republicans often deny), in the hope of preserving the honor not just of my Country, but of my Party, both of which he violates routinely. When President Obama refused to allow the prosecution of George W. Bush and Dick Cheney for their manifest crimes, after they had been in office (their having lied this country into invading a country that was no imminent threat to the United States, tortured people, violated the 4th Amendment by unleashing the NSA against the American public, unleashed Wall Street crooks against the American people via MBS frauds, etc.), Obama thereby took upon himself Bush’s and Cheney’s crimes, as being his own. Those crimes still need to be prosecuted — now by America prosecuting Obama himself, for his covering them up: he still does it, after all of these years. Those crimes are no less heinous and, indeed, no less treasonous, now that a so-called “Democrat” is hiding them, than they were when his self-acknowledged Republican predecessors, and now in some cases even the fake “Democrat” Obama himself, were and have been and still are perpetrating them.
  • On 11 July 2014, Rebecca Gordon at rinf.com bannered, “America: Where the ‘Good Guys’ Torture,” and she noted that: There are several important reasons why the resurgence of torture remains a possibility in post-Bush America:     Torture did not necessarily end when Obama took office.     We have never had a full accounting of all the torture programs in the “war on terror.”     Not one of the senior government officials responsible for activities that amounted to war crimes has been held accountable, nor were any of the actual torturers ever brought to court. She documented each one of her points, the last two of which are urgent indicators of the necessity for Democrats (yes, Democrats, since Obama claims to be one of us) to bring forth in the U.S. House of Representatives an impeachment resolution and proceedings against the worst “Democratic” President in U.S. history, or else we shall be implicitly accepting his crimes as being unpunished crimes by our Party, in the person of Obama, just like the Republican Party accepts Bush’s and Cheney’s crimes as being unpunished crimes by their Party, in the persons of Bush and Cheney. And, if Obama’s crimes are acceptable by our Party, then our Party is an embarrassment to our country and should be dissolved,
  • However, there are two more reasons why Obama needs to be impeached, removed from office, and then prosecuted for treason: PROTECTING BANKSTERS:
  • ...2 more annotations...
  • PERPETRATING ETHNIC CLEANSING ABROAD: Finally, just as President Bush defiled the Presidency by unwarrantedly invading Iraq in 2003 and lying through his teeth all the way there and afterward about it, Obama has defiled the Presidency in 2014 by overthrowing the democratically elected President of Ukraine and lying through his teeth all the way and afterward, about that. And Obama’s crime in Ukraine is even worse than Bush’s crime in Iraq, because it’s much more dangerous, with even bigger stakes and risks (all of which are purely downside for both the American and the Ukrainian peoples — much as Bush’s Iraq-invasion also was, for both Americans and Iraqis).
  • DO-OR-DIE TIME FOR DEMOCRATS: If Democrats don’t initiate impeachment proceedings against Obama, then the Democratic Party will be at least as dishonored as the Republican Party is after George W. Bush, for their protecting him; and I, for one, will quit it and urge its replacement, hoping for a leader like Abraham Lincoln to emerge, who had quit the Whig Party and who succeeded at replacing it by the new (and, tragically, only briefly progressive) Republican Party (which tragically then became taken over by northern aristocrats the very moment when Lincoln was assassinated). Either Democrats need to retake our Party, or else to end it, now. We have tolerated Obama’s outrages too long, as it is. For Democrats to retake the Party, requires Democrats to impeach President Obama.
Paul Merrell

Edward Snowden: US government has been hacking Hong Kong and China for years | South Ch... - 0 views

  • US whistle-blower Edward Snowden yesterday emerged from hiding in Hong Kong and revealed to the South China Morning Post that he will stay in the city to fight likely attempts by his government to have him extradited for leaking state secrets. In an exclusive interview carried out from a secret location in the city, the former Central Intelligence Agency analyst also made explosive claims that the US government had been hacking into computers in Hong Kong and on the mainland for years.
  • Snowden believed there had been more than 61,000 NSA hacking operations globally, with hundreds of targets in Hong Kong and on the mainland. “We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” he said.
  • Snowden's revelations threaten to test new attempts to build US-Sino bridges after a weekend summit in California between the nations' presidents, Barack Obama and Xi Jinping. If true, Snowden's allegations lend credence to China's longstanding position that it is as much a victim of hacking as a perpetrator, after Obama pressed Xi to rein in cyber-espionage by the Chinese military.
Paul Merrell

Obama, Biden are war criminals under UN Charter: Analyst - 0 views

  • Most Americans, their minds focused at the moment on the tragic slaughter of 20 young children aged 5 and 6, along with five teachers and a school principal in Connecticut by a heavily-armed psychotic 21-year-old, are blissfully unaware that their previous president, George W. Bush, along with five key members of his administration, were recently convicted in absentia of war crimes at a tribunal in Kuala Lumpur, Malaysia. They are unaware because the US corporate media have ignored the story, just as that same corporate media have failed to note that the crimes of which Bush, Vice President Dick Cheney, former Defense Secretary Donald Rumsfeld and five White House lawyers, were convicted all could apply equally well to current President Barack Obama and his administration. Bush, Cheney, White House counsel (and later Attorney General) Alberto Gonzalez and others were found guilty earlier this month of war crimes and crimes against humanity relating to the executive orders that launched the wars against Iraq and Afghanistan, as well as of authorizing and failing to punish torture and other war crimes by US forces, including the military and the CIA.
  • But as international law expert Francis Boyle, a professor of law at the University of Illinois, notes, under the Geneva Convention, failing to take action to prosecute those guilty of war crimes such as the “Crime against Peace” (invading a country that does not pose an imminent threat to the attacker), and torture, are war crimes in and of themselves. Speaking last week at a Summit Conference on Human Rights held at the University of the Sacred Heart in the US island colony of Puerto Rico, Boyle said US authorities, including President Obama, are engaged in an “ongoing criminal conspiracy under international law” both to cover up and protect criminals like Bush, Cheney and Rumsfeld, and to continue the commission of war crimes by the US government.
  • Obama, when initially campaigning in 2008 for the presidency, vowed that he wanted to restore the respect for the law and the Constitution, once elected President, he and his attorney general Eric Holder quickly made it clear that they were “looking forward, not backward,” and that there would be no prosecutions or indictments for war crimes of any Bush administration people.   The thing is, at that moment, both President Obama and AG Holder became war criminals themselves under the UN Charter and the Nuremberg Principles, which declare that covering up war crimes by prior government and military leaders, and failure to prosecute such war crimes, are in themselves war crimes.
  • ...1 more annotation...
  • But as Boyle noted in his address in San Juan, P.R., Obama, Vice President Joseph Biden, and the various secretaries of defense and state, the head of the CIA and the Pentagon Chiefs of Staff, as well as other Obama administration personnel, are also guilty of perpetrating ongoing war crimes themselves. Boyle accuses the Obama administration of continuing to conduct a “bogus” war on “international terrorism” including the ever escalating campaign of drone strikes in Pakistan, Afghanistan, Somalia, Yemen and other jurisdictions. He termed the president’s program of “targeted killings,” in which President Obama himself draws up the “kill list,” to be simply a case of “pure murder” under both traditional British common law and international law, and says these attacks constitute a “Crime against Humanity under Article 7(1)(a) of the Rome Statute for the International Criminal Court.”
  •  
    While the charge that Obama and other administration officials committed crimes under the Rome Statute for the International Criminal Court might seem odd because the U.S. never acceded to that treaty or to the jurisdiction of the ICC, the statute applies to those who commit war crimes within the jurisdictions of nations that have acceded to the treaty and to their superiors who either knew of should have known that such crimes would be committed and did not act to prevent them.  Pakistan  and Yemen have acceded to the treaty. The Rome treaty requires the arrest of those classified as war criminals under that treaty if they set foot in any nation that has acceded to the treaty. So just as Bush administration figures have done, Obama and crew will need to restrict where they travel after he leaves office.
  •  
    The linked article should have mentioned that it was a mock tribunal, without legal authority or powers.
Gary Edwards

Major Banksters, Governmental Officials and Their Comrade Capitalists Targets of Spire ... - 0 views

  •  
    "NEW YORK, Oct. 25, 2012 /PRNewswire via COMTEX/ -- Spire Law Group, LLP's national home owners' lawsuit, pending in the venue where the "Banksters" control their $43 trillion racketeering scheme (New York) - known as the largest money laundering and racketeering lawsuit in United States History and identifying $43 trillion ($43,000,000,000,000.00) of laundered money by the "Banksters" and their U.S. racketeering partners and joint venturers - now pinpoints the identities of the key racketeering partners of the "Banksters" located in the highest offices of government and acting for their own self-interests. In connection with the federal lawsuit now impending in the United States District Court in Brooklyn, New York (Case No. 12-cv-04269-JBW-RML) - involving, among other things, a request that the District Court enjoin all mortgage foreclosures by the Banksters nationwide, unless and until the entire $43 trillion is repaid to a court-appointed receiver - Plaintiffs now establish the location of the $43 trillion ($43,000,000,000,000.00) of laundered money in a racketeering enterprise participated in by the following individuals (without limitation): Attorney General Holder acting in his individual capacity, Assistant Attorney General Tony West, the brother in law of Defendant California Attorney General Kamala Harris (both acting in their individual capacities), Jon Corzine (former New Jersey Governor), Robert Rubin (former Treasury Secretary and Bankster), Timothy Geitner, Treasury Secretary (acting in his individual capacity), Vikram Pandit (recently resigned and disgraced Chairman of the Board of Citigroup), Valerie Jarrett (a Senior White House Advisor), Anita Dunn (a former "communications director" for the Obama Administration), Robert Bauer (husband of Anita Dunn and Chief Legal Counsel for the Obama Re-election Campaign), as well as the "Banksters" themselves, and their affiliates and conduits. The lawsuit alleges serial violations of the United States Patri
  •  
    This is the first time anyone has tried to go after the Bankster class of midievil (mediæval) elites to recover theft of funds. Charges include racketeering, fraud and international money laundering. The mass tort action is now in the Brooklyn Federal Courts. Dead bodies are starting to show up as the Banksters move to shut down press coverage. Amazing stuff.
Paul Merrell

U.S. Military Operations Are Biggest Motivation for Homegrown Terrorists, FBI Study Finds - 0 views

  • A secret FBI study found that anger over U.S. military operations abroad was the most commonly cited motivation for individuals involved in cases of “homegrown” terrorism. The report also identified no coherent pattern to “radicalization,” concluding that it remained near impossible to predict future violent acts. The study, reviewed by The Intercept, was conducted in 2012 by a unit in the FBI’s counterterrorism division and surveyed intelligence analysts and FBI special agents across the United States who were responsible for nearly 200 cases, both open and closed, involving “homegrown violent extremists.” The survey responses reinforced the FBI’s conclusion that such individuals “frequently believe the U.S. military is committing atrocities in Muslim countries, thereby justifying their violent aspirations.” Online relationships and exposure to English-language militant propaganda and “ideologues” like Anwar al-Awlaki are also cited as “key factors” driving extremism. But grievances over U.S. military action ranked far above any other factor, turning up in 18 percent of all cases, with additional cases citing a “perceived war against Islam,” “perceived discrimination,” or other more specific incidents. The report notes that between 2009 and 2012, 10 out of 16 attempted or successful terrorist attacks in the United States targeted military facilities or personnel.
  • The report is titled “Homegrown Violent Extremists: Survey Confirms Key Assessments, Reveals New Insights about Radicalization.” It is dated December 20, 2012. An FBI unit called the “Americas Fusion Cell” surveyed agents responsible for 198 “current and disrupted [homegrown violent extremists],” which the report says represented a fraction of all “pending, U.S.-based Sunni extremist cases” at the time. The survey seems designed to look only at Muslim violent extremism. (The FBI declined to comment.) Agents were asked over 100 questions about their subjects in order to “identify what role, if any,” particular factors played in their radicalization — listed as “known radicalizers,” extremist propaganda, participation in web forums, family members, “affiliation with religious, student, or social organization(s) where extremist views are expressed,” overseas travel, prison or military experience, and “significant life events and/or grievances.” Among the factors that did not “significantly contribute” to radicalization, the study found, were prison time, military service, and international travel. Although, the report notes, “the FBI historically has been concerned about the potential for prison radicalization,” in fact, “survey results indicate incarceration was rarely influential.” The report ends with recommendations that agents focus their attention on web forums, social media, and other online interactions, and step up surveillance of “known radicalizers” and those who contact them.
  • The study echoes previous findings, including a 2011 FBI intelligence assessment, recently released to MuckRock through a public records request, which concluded that “a broadening U.S. military presence overseas” was a motivating factor for a rise in plotted attacks, specifically the wars in Iraq and Afghanistan. That study also found “no demographic patterns” among the plotters. “Insofar as there is an identifiable motivation in most of these cases it has to do with outrage over what is happening overseas,” says John Mueller, a senior research scientist with the Mershon Center for International Security Studies at Ohio State University and co-author of “Chasing Ghosts: The Policing of Terrorism.” “People read news reports about atrocities and become angry,” Mueller said, adding that such reports are often perceived as an attack on one’s own in-group, religion, or cultural heritage. “It doesn’t have to be information from a jihadist website that angers someone, it could be a New York Times report about a drone strike that kills a bunch of civilians in Afghanistan.”
  • ...2 more annotations...
  • Perpetrators of more recent attacks have latched onto U.S. foreign policy to justify violence. The journals of Ahmad Rahami, accused of bombings in Manhattan and New Jersey last month, cited wars in Iraq, Syria, and Afghanistan. In a 911 call, Omar Mateen, who killed 49 people in an Orlando nightclub earlier this year, claimed he acted in retaliation for a U.S. airstrike on an ISIS fighter. Dzhokhar Tsarnaev told investigators that the wars in Iraq and Afghanistan motivated his and his brother’s attack on the Boston Marathon. In many of these cases, pundits and politicians focus on the role of religion, something Marc Sageman, a former CIA officer and author of “Leaderless Jihad: Terror Networks in the Twenty-First Century,” describes as a “red herring,” citing a history of shifting ideologies used to justify terrorist acts.
  • The U.S. government has announced plans to spend millions of dollars on “Countering Violent Extremism” initiatives, which are supposed to involve community members in spotting and stopping would-be extremists. These initiatives have been criticized as discriminatory, because they have focused almost exclusively on Muslim communities while ignoring political motivations behind radicalization. “Politicians try very hard not to talk about foreign policy or military action being a major contributor to homegrown terrorism,” Sageman says, adding that government reticence to share raw data from terrorism cases with academia has hindered analysis of the subject.
1 - 20 of 96 Next › Last »
Showing 20 items per page