Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged predator

Rss Feed Group items tagged

Paul Merrell

Tomgram: Gregoire Chamayou, Hunting Humans by Remote Control | TomDispatch - 0 views

  • It was during the Vietnam War that the U.S. Air Force, to counteract the Soviet surface-to-air missiles that had inflicted heavy casualties on it, invested in reconnaissance drones nicknamed “Lightning Bugs,” produced by Ryan Aeronautical. An American official explained that “these RPVs [remotely piloted vehicles] could help prevent aircrews from becoming casualties or prisoners… With RPVs, survival is not the driving factor.” Once the war was over, those machines were scrapped. By the late 1970s, the development of military drones had been practically abandoned in the United States. However, it continued elsewhere. Israel, which had inherited a few of these machines, recognized their potential tactical advantages. In 1973, the Israel Defense Forces (IDF), facing off against Egypt, ran up against the tactical problem of surface-to-air missiles. After losing around 30 planes in the first hours of the Yom Kippur War, Israeli aviation changed its tactics. They decided to send out a wave of drones in order to mislead enemy defenses: “After the Egyptians fired their initial salvo at the drones, the manned strikes were able to attack while the Egyptians were reloading.” This ruse enabled Israel to assume mastery of the skies. In 1982, similar tactics were employed against the Syrians in the Bekaa Valley. Having first deployed their fleet of Mastiff and Scout drones, the Israelis then sent out decoy planes that were picked up by enemy radar. The Syrians activated their surface-to-air missiles, to no effect whatsoever. The drones, which had been observing the scene from the sky, easily detected the positions of the antiaircraft batteries and relayed them to the Israeli fighter planes, which then proceeded to annihilate them.
  • The drones were used for other purposes as well: “Two days after a terrorist bomb destroyed the [U.S.] Marine Barracks in Beirut in October 1983, Marine Commandant Gen. P.X. Kelley secretly flew to the scene. No word of his arrival was leaked. Yet, across the border, Israeli intelligence officers watched live television images of Kelley arriving and inspecting the barracks. They even zoomed the picture in tight, placing cross hairs directly on his head. Hours later, in Tel Aviv, the Israelis played back the tape for the shocked Marine general. The scene, they explained, was transmitted by a Mastiff RPV circling out of sight above the barracks.” This was just one of a series of minor events that combined to encourage the relaunch of American drone production in the 1980s. “All I did,” confessed Al Ellis, the father of the Israeli drones, “was take a model airplane, put a camera in it, and take the pictures… But that started an industry.”
  • But it would take a “‘different kind of war’ to make the Predator into a predator.” No more than a few months before September 11, 2001, officers who had seen the Predator at work in Kosovo had the idea of experimentally equipping it with an antitank missile. Writes Bill Yenne in his history of the drone, “On February 16, 2001, during tests at Nellis Air Force Base, a Predator successfully fired a Hellfire AGM114C into a target. The notion of turning the Predator into a predator had been realized. No one could imagine that, before the year was out, the Predator would be preying upon live targets in Afghanistan.” Barely two months after the outbreak of hostilities in Afghanistan, George Bush was in a position to declare: “The conflict in Afghanistan has taught us more about the future of our military than a decade of blue ribbon panels and think-tank symposiums. The Predator is a good example… Now it is clear the military does not have enough unmanned vehicles.”
Paul Merrell

The Coming Drone Wars: Iran Unveils its own Drone, with a 1200-mile Range | Informed Co... - 0 views

  • It was foreseeable that when the United States began deploying drones wherever it likes, its rivals would also develop that capability. In fact, you wonder if sending the drones around doesn’t create an opportunity for others to capture them and reverse-engineer them. Iran captured a US Predator drone last winter and claimed to have gotten data from it. Instead of being cautious and prudent about a technology that could harm US citizens, the US government has rushed to deploy drones in several countries with which the US is not at war. So now Iran has announced a new “Fotros” drone in the same class with the Predator, with a 1200-mile range (2000 km). You wonder how the US will feel if Iran deploys it in nearby countries of the Middle East, just as Washington itself has done.
  •  
    Further detail in the article: Iran claims its Fotros drone has a much longer operational radius (1,100 miles with payload than the U.S. Predator (675 miles) and can stay aloft longer, bringing the whole of Israel and many U.S. bases in the Mideast within its reach. Moreover, it "is capable of being equipped with air-to-surface missiles and rockets of all kinds to carry out combat missions in addition to carrying out reconnaissance and surveillance missions."  Recently it was reported that some 80 nations now have drones in their military arsenals, so a new arms race in drones as a weapons, intelligence, and surveillance platform.  
Paul Merrell

TASS: Russian Politics & Diplomacy - Russia does not rule out strikes against Jaysh al-... - 0 views

  • Russia does not rule out strikes against groups that have merged with the terrorist organization Islamic State (outlawed in Russia), Russian Deputy Foreign Minister Sergey Ryabkov told reporters on Thursday. "We are witnesses to the continuing merger of these groups [Jaysh al-Islam and Ahrar Al-Sham - TASS] with the organizations that have been universally recognized as terrorist. It goes without saying that the task of struggle against terrorism remains a key one for us," he said, when asked if these groups might now be regarded as legitimate targets for the Russians Aerospace Force. "I would not rule out any options in that sphere. But normalization of the situation requires implementation of what has been agreed on." 
  • The diplomat reminded reporters about statements from the US side, including from Pentagon, that the US allegedly had confirmation of Russia’s involvement in an attack on a humanitarian convoy near Aleppo. "We utterly and completely deny it and say that such far-reaching statements without analysis of objective facts, without a bid to look into other versions.... it is simply inadmissible to speak like this," the top diplomat said. "We should not put the carrier before the horse, but sit down calmly and look what has to be done to keep the agreements afloat, how to give them a new lease of life, as we see no alternative in this sphere," the high-ranking diplomat told reporters.
  • At a session of the UN Security Council on Syria at the level of the heads of delegations taking part in the 71st session of the UN General Assembly, US Secretary of State John Kerry said facts furnished by Russia as to an attack on a humanitarian convoy at Aleppo on September 19, were allegedly contradicting one another. However, Russian Foreign Minister Sergey Lavrov said Russia had presented all available information on the attack. The minister said Russia urged a thorough and professional investigation into that. Since the news on an attack on the convoy came, the Russian Defense Ministry has stressed in its statements that Russian and Syrian warplanes conducted no strikes on the convoy. An attack drone Predator, capable of hitting targets on the ground, was registered in the area where the UN humanitarian convoy came under attack near Aleppo in the evening of September 19, Russian Defense Ministry spokesman, Igor Konashenkov, said after the ministry analyzed objective air situation monitoring data. "In the evening of September 19 an attack drone of the international coalition was registered in that area at an altitude of 3,600 meters. It was flying at a speed of about 200 kilometers per hour. The drone had taken off from Turkey’s Incirlik air base. Our air situation monitoring means identified the drone as Predator," Konashenkov said.
  • ...1 more annotation...
  • Ryabkov pointed out that Russia was not walking out of the agreement with the United States on Syria. "We are not about to quit that agreement. On the contrary, we believe that the events of the past few days have underscored its super-relevance," he said. "Regrettably, the agreement has too many opponents, if not foes. We cannot but feel concern and alarm as we see this agreement defied by a number of actors - anti-government forces in Syria and their foreign sponsors." "Regrettably, the US Administration is still unable to do what is required for the full implementation of the agreement," Ryabkov said. "To be more precise, to bring about the separation of the moderates and the terrorists. Nor can the United States guarantee the implementation of a number of other components of this agreement which we’ve been witnesses to over the past few days." Ryabkov said he was referring to several incidents, including the strike against Syrian government troops. "It is not a tragedy, it is a very dramatic development regarding the agreement as such. It is a heavy blow on its groundwork," he said.
Gary Edwards

How American Corporations Transformed from Producers to Predators - 1 views

  •  
    Bankster hunter and economist Yves Smith has posted a collection of comments from William Lazonick, professor of economics and director of the UMass Center for Industrial Competitiveness. His book, "Sustainable Prosperity in the New Economy? Business Organization and High-Tech Employment in the United States" (Upjohn Institute, 2009) won the 2010 Schumpeter Prize. Lazonick traces the history of US Corporations as they transitioned from their historical reliance on investing in the productive capacity of their employees to, the financial game of increasing their share prices. He class this the "financialization" of Corporate America. And it's been a disaster. The history looks like a very good read, but i really disagree with Lazonick's recommendations. Maybe the title of his book is a dead giveaway of where Lazonick's head is really at. He uses the word "sustainability". A word that has come to represent the tyranny of a new world order: Globalism. This is where the Banksters and Corporatist impose a tyranny of financial control using a mechanism of United Nations "Agenda 21" based socialism. Sustainability is the unifying themes linking the tyranny of UN Agenda 21 to pantheistic socialism and control of globalist Banksters and their Corporate cronies. So his remedies trouble me greatly. And what would i do? End all income tax (and the IRS), and levy an immediate 33% tariff on all imports. Of course, that will be difficult because the Globalist (Banksters, Corporatists, Pantheists and Agenda 21 types) all support open trade policies. Good read though.
Joe La Fleur

Government, Military To Fly Predator Drones Over North Dakota - BlackListedNews.com - 1 views

  •  
    BARAK OBAMAS WAR ON OIL
Gary Edwards

Private Currency Competition Is The Monetary Answer - Forbes - 0 views

  •  
    "The push for monetary reform is on, and intellectuals seeking to reform the monetary system in accordance with free market principles are seriously debating two alternative solutions. One is a return to the gold standard in some fashion. The other is a free market in currency, i.e., private currency competition. Toward the latter end, Rep. Ron Paul has sponsored a bill repealing legal tender law. Their primary concern is the establishment of perfect money, which they define as money which changes in value the least. A much stronger case can be made for private currency competition than for a national gold standard in achieving this goal. Broadly speaking, private currency competition can provide the means to both a better concept of money (i.e., the development of an ideal monetary standard), and a better practical implementation of a monetary system." The argument that gold is the intrinsically right standard, so people do not need any choice in the matter because the government would only be making them do what is best for them anyway, is a philosophical can of worms that ultimately undermines the moral case for free markets. This is probably why the Ayn Rand Institute, that flagship of right moral political philosophy, migrated its support from the gold standard to a system of free banking with private currencies. Even if one remains unconvinced of the superiority of private currency competition and believes that a fiat gold standard would work, one should always argue for liberty, not try to work within the bounds of statism to ameliorate its effects. The advocates of freedom, individual rights, limited government, and capitalism should not waste any effort trying to revive a statist concept. They should adopt the boldest possible vision of a free market and then pursue it relentlessly. This is your clarion call. Some believe that because a denationalization of money is the ideal state of affairs, a monetary Holy Grail, its achievement must be far off in th
Paul Merrell

How The CIA Can Send A Drone After Any Mobile Phone | Fast Company | Business + Innovation - 0 views

  • Since 2001, armed Predator drones have been used by the CIA in many foreign nations to attack individuals on the ground. There's a new revelation about them, too: In some cases, the NSA helped the CIA find targets by locking onto their powered-off mobile phones. Even when phones have their batteries removed, it appears the NSA still has the ability to locate them. Buried inside a Washington Post story by Dana Priest is the following tidbit: By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off. JSOC troops called this "The Find," and it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq, according to members of the unit. At the same time, the NSA developed a new computer linkup called the Real Time Regional Gateway into which the military and intelligence officers could feed every bit of data or seized documents and get back a phone number or list of potential targets. It also allowed commanders to see, on a screen, every type of surveillance available in a given territory.
  • "The Find," the Post article says, is run by a team in the basement of the NSA's headquarters whose job is to track the location of mobile phones in real time. Because many phones have chips that stay on even after a battery has been removed, tracking powered-down phones is within the realm of possibility. The revelations fit right in with the Edward Snowden disclosures, but the NSA isn't the only one tracking phones: Other government agencies and private companies regularly track them without warrants or court orders as well.
Gary Edwards

Predatory lending with a smiley face; How tax payer subsidized "loan modification" prog... - 0 views

  •  
    They say California is a harbinger of the future. If so, we should all be thinking about possible safe havens. The article begins with a description of loan modification seminars attended by the same mortgage brokers whose predatory lending practices got us into this fix. At the seminars, these predators learn how to make even more money off of the exact same clients they pushed off the ledge. It's all about fees and high pressure churning techniques. With one very big difference: Obama is banking on tax payer funded "loan modifications" to help struggling homeowners. The ugly truth is that mortgage brokers are the real winners. Just like mortgage brokers, loan mod companies are under no obligation to act in borrowers' financial interests, short- or long-term. Under California's model contract, which brokers are encouraged to emulate in their dealings with borrowers, almost any change to a mortgage is an acceptable result, whether or not it saves a borrower money. And while the client has to accept the proposed deal in order for the company to get paid in full, the sales forces at these firms are veterans of pressure pitches to people in tough financial situations. Both Carlson and a spokesman for Mortgage Bailout Assistance indicate that their clients almost invariably take the offers they are given. The proverbial fox is helping the hens hold on to their coops, and not just in California. Seventeen states now have laws on the books effectively banning "foreclosure consultants," but most make an exception for mortgage brokers. As consumer complaints about fraudulent loan mod operations proliferate across the country, other government officials, including New York's City Council, are now following California's lead and exploring the creation of an official registry of mod brokers.
Paul Merrell

PressTV - US planning for a post-Israel Middle East - 0 views

  • So what is all the fuss about? It’s a paper entitled: Preparing for a Post-Israel Middle East, an 82-page analysis that concludes that the American national interest in fundamentally at odds with that of Zionist Israel. The authors conclude that Israel is currently the greatest threat to US national interests because its nature and actions prevent normal US relations with Arab and Muslim countries and, to a growing degree, the wider international community. The study was commissioned by the US Intelligence Community comprising 16 American intelligence agencies with an annual budget in excess of $ 70 billion. The IC includes the departments of the Navy, Army, Air Force, Marine Corps, Coast Guard, Defense Intelligence Agency, Departments of Energy, Homeland Security, State, Treasury, Drug Enforcement Agency, Federal Bureau of Investigation, National Security Agency, National Geospatial Intelligence Agency, National Reconnaissance Agency and the Central Intelligence Agency commissioned the study.
  • srael, given its current brutal occupation and belligerence cannot be salvaged any more than apartheid South Africa could be when as late as 1987 Israel was the only “Western” nation that upheld diplomatic ties with South Africa and was the last country to join the international boycott campaign before the regime collapsed;
  • Simultaneous with, but predating, rapidly expanding Arab and Muslim power in the region as evidenced by the Arab Spring, Islamic Awakening and the ascendancy of Iran, as American power and influence recedes, the US commitment to belligerent oppressive Israel is becoming impossible to defend or execute consistent given paramount US national interests which include normalizing relations with the 57 Islamic countries; · Gross Israeli interference in the internal affairs of the United States through spying and illegal US arms transfers. This includes supporting more than 60 ‘front organizations’ and approximately 7,500 US officials who do Israel’s bidding and seek to dominate and intimidate the media and agencies of the US government which should no longer be condoned;
  • ...2 more annotations...
  • The international opposition to the increasingly apartheid regime can no longer be synchronized with American claimed humanitarian values or US expectations in its bilateral relations with the 193 member United Nations. The Draft ends with language about the need to avoid entangling alliances that alienate much of the World and condemn American citizens to endure the consequences.
  • Franklin Lamb, former Assistant Counsel, US House Judiciary Committee and Professor of International Law at Northwestern College of Law in Oregon, earned his Law Degree at Boston University and his LLM, M.Phil., and PhD degrees at the London School of Economics. Following three years at the International Court of Justice in The Hague, Lamb was visiting fellow at the Harvard Law School’s East Asian Legal Studies Center.
Paul Merrell

US demands Russia and Syria ground all aircraft as five medical charity staff killed in... - 0 views

  • The United States has called for an effective no-fly zone over Syria after a spate of airstrikes on humanitarian convoys by Russian and Syrian aircraft left the country’s future “hanging by a thread.” John Kerry, the US Secretary of State told a session of the United Nations Security Council on Wednesday that only a grounding of all aircraft could protect civilians from Bashar al-Assad’s regime and said Vladimir Putin must face a “moment of truth” over the bombing of a UN aid convoy on Monday. “The future of Syria is hanging by a thread,” Mr Kerry said. “We cannot go back to business as usual.” Halting flight would offer a “chance for humanitarian assistance to flow unimpeded," he added.
  • However, Mr Kerry did not use the term "no-fly zone", and his demand is unlikely to lead to formal air policing. 
  • Russian and regime forces have also resumed their bombardment of the rebel-held eastern half of Aleppo, with dozens of airstrikes pummelling the city.  “It is unbelievable the number of airstrikes that are targeting Aleppo neighbourhoods”, said Abdelkafe al-Hamdo, an opposition activist in the city.        Western diplomats said they were urgently trying to revive the ceasefire agreement with Russia, which they see as the only real path to slowing the violence in Syria and trying to restart political negotiations to be bring the five-year war to an end.  The chances for a renewed deal appeared slim after a furious exchanges between the US and Russia at the Security Council on Wednesday. Sergey Lavrov, the Russian foreign minister, ruled out a fresh ceasefire unless “all sides” agreed, saying rebel groups had used previous truces as an opportunity to rearm and that the US had failed to use its influence with militants to persuade them to respect the ceasefire.
  • ...3 more annotations...
  • Boris Johnson, the foreign secretary, said a genuine ceasefire would depend on transition away from the Assad government. “It is a conflict that is being fed and nourished and armed and abetted and protracted and made more hideous by the actions and the inactions of governments in this room,” he said at the Security Council Session. Theresa May said “there can be no military solution to the conflict in Syria” in a speech in New York. Speaking to President Barack Obama’s US refugee summit, the prime minister said: “We must all put our weight behind efforts in New York to agree a ceasefire and reopen space UN-led negotiations, leading to real political transition away from Assad to a new, inclusive government that governs for all Syrians.
  • Mr Kerry replied that his colleague was living in “a different universe” and accused Russia of deliberately obfuscating about the aid convoy bombing. “This is not a joke,” he said after listing several conflicting accounts of the attack put forward by Russia. Russia’s defence ministry claimed on Wednesday to have spotted a US Predator drone over the UN convoy attacked on Wednesday. It did not directly accuse the US of carrying out the attack, however. In earlier statements, Russian officials variously said the convoy had caught fire spontaneously and that drone footage had spotted a group of militants driving a pick-up truck with a mortar alongside it.
  • Russia dispatched an aircraft carrier to reinforce its flotilla off the Syrian coast on Wednesday, in a deepening of its military commitment there.    The Admiral Kuznetsov, Russia’s only carrier and the flagship of the Russian navy, will join an existing flotilla of six war ships and  four support vessels, Sergei Shoigu, the Russian defence minister, said.   The Soviet- built vessel carries MiG-29 jets and Ka-52 attack helicopters that are expected to take part in combat operations over Syria. 
Paul Merrell

Israeli firm that imprisons Gaza aims to build Trump's wall with Mexico | The Electroni... - 0 views

  • A firm that has helped isolate Gaza from the outside world is hoping for a windfall building President Donald Trump’s wall on the US-Mexico border. Ironically, the firm already does a lot of business with Mexico’s own government. Shares of Israel’s Magal Security Systems, which also helped build Israel’s illegal barrier in the occupied West Bank, surged following Trump’s election victory last November. During the campaign, Magal touted its experience caging Palestinians as the ideal credentials to build the wall that Trump repeatedly promised during his campaign and which has united Mexicans in opposition. In recent decades, increasing US militarization of its southern border has torn apart communities on both sides, including indigenous communities that long predate the existence of the United States. Gaza “has become a key sales prop for Magal’s ‘smart fences,’” the financial news agency Bloomberg reported in August.
  •  
    Of course.
Paul Merrell

USAF Drones May Conduct "Incidental" Domestic Surveillance | Secrecy News - 0 views

  • “Collecting information on specific targets inside the US raises policy and legal concerns that require careful consideration, analysis and coordination with legal counsel.  Therefore, Air Force components should use domestic imagery only when there is a justifiable need to do so, and then only IAW [in accordance with] EO 12333, the National Security Act of 1947, as amended, DoD 5240.1-R, and this instruction,” it said.
  • In its new mark of the FY2013 defense authorization bill, the House Armed Services Committee is proposing to provide the Air Force with even more money than it requested for its Predator and Reaper drone programs.  See “Congress Funds Killer Drones the Air Force Says It Can’t Handle” by Spencer Ackerman, Wired Danger Room, May 7, 2012.
Paul Merrell

Bipartisan Letter Urging President Obama to Get Congressional Approval Before Striking ... - 0 views

  • Dear Mr. President,  We strongly urge you to consult and receive authorization from Congress before ordering the use of U.S. military force in Syria. Your responsibility to do so is prescribed in the Constitution and the War Powers Resolution of 1973.  While the Founders wisely gave the Office of the President the authority to act in emergencies, they foresaw the need to ensure public debate – and the active engagement of Congress – prior to committing U.S. military assets. Engaging our military in Syria when no direct threat to the United States exists and without prior congressional authorization would violate the separation of powers that is clearly delineated in the Constitution.  Mr. President, in the case of military operations in Libya you stated that authorization from Congress was not required because our military was not engaged in “hostilities.” In addition, an April 1, 2011, memorandum to you from your Office of Legal Counsel concluded: “…President Obama could rely on his constitutional power to safeguard the national interest by directing the anticipated military operations in Libya—which were limited in their nature, scope, and duration—without prior congressional authorization.” We view the precedent this opinion sets, where “national interest” is enough to engage in hostilities without congressional authorization, as unconstitutional. If the use of 221 Tomahawk cruise missiles, 704 Joint Direct Attack Munitions, and 42 Predator Hellfire missiles expended in Libya does not constitute “hostilities,” what does?  If you deem that military action in Syria is necessary, Congress can reconvene at your request. We stand ready to come back into session, consider the facts before us, and share the burden of decisions made regarding U.S. involvement in the quickly escalating Syrian conflict.  Sincerely,
  •  
    The page says that 116 members of Congress signed this letter (their names follow the quoted portion) but latest figure I saw was that 150 are now on board.  The letter is far tougher than has been reported. They've put it very bluntly both on what he did in Libya without consulting Congress and on the separation of powers in the Constitution that allocates to Congress the power to declare war, not to the Executive. 
Paul Merrell

Afghanistan Exit Is Seen as Peril to C.I.A. Drone Mission - NYTimes.com - 0 views

  • The risk that President Obama may be forced to pull all American troops out of Afghanistan by the end of the year has set off concerns inside the American intelligence agencies that they could lose their air bases used for drone strikes against Al Qaeda in Pakistan and for responding to a nuclear crisis in the region. Until now, the debate here and in Kabul about the size and duration of an American-led allied force in Afghanistan after 2014 had focused on that country’s long-term security. But these new concerns also reflect how troop levels in Afghanistan directly affect long-term American security interests in neighboring Pakistan, according to administration, military and intelligence officials.
  • The concern has become serious enough that the Obama administration has organized a team of intelligence, military and policy specialists to devise alternatives to mitigate the damage if a final security deal cannot be struck with the Afghan president, Hamid Karzai, who has declined to enact an agreement that American officials thought was completed last year. If Mr. Obama ultimately withdrew all American troops from Afghanistan, the C.I.A.’s drone bases in the country would have to be closed, according to administration officials, because it could no longer be protected. Their concern is that the nearest alternative bases are too far away for drones to reach the mountainous territory in Pakistan where the remnants of Al Qaeda’s central command are hiding. Those bases would also be too distant to monitor and respond as quickly as American forces can today if there were a crisis in the region, such as missing nuclear material or weapons in Pakistan and India.
  • Their base inside Pakistan was closed after a shooting involving a C.I.A. security contractor, Raymond Davis, and the raid into Pakistani territory that killed Osama bin Laden, both in 2011. Crucial to the surveillance of Bin Laden’s house in Abbottabad was the use of an RQ-170 drone. Pakistani officials talked openly in the weeks after that raid about their fear that the unmanned aircraft was also being used to monitor their nuclear arsenal, now believed to be the fastest growing in the world. The raid, and those drones, came out of American facilities just over the Afghan border.
  • ...2 more annotations...
  • The C.I.A.’s drone bases in Afghanistan, including one in the eastern part of the country, allow operators to respond quickly to fresh intelligence. The proximity to Pakistan’s tribal areas also allows the Predator drones and their larger, faster cousin, the Reaper, to fly longer missions without having to return to base.
  • The Reapers, the newest, largest and most capable of the unmanned armed vehicles, have a range of up to 1,100 miles. That puts Pakistan’s tribal areas within range of some bases the American military has flown from, especially in Kyrgyzstan, where for more than a decade the Pentagon has conducted air operations, include cargo and troop flights, out of a base at Manas. But the United States said last fall that it would pull out of that base in July. Other allied countries are within the Reaper’s range — in the Persian Gulf, for example. But the distances would be too great to carry out drone operations effectively, officials said, and it is very unlikely that any of those nations would approve launching the diplomatically sensitive strikes missions from their soil.“There’s no easy alternative to Afghanistan,” one former senior American counterterrorism official said.
Paul Merrell

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
Paul Merrell

The White House Has Been Covering Up the Presidency's Role in Torture for Years - The I... - 0 views

  • On May 10, 2013, John Brennan presented CIA’s response to the Senate Intelligence Committee Torture Report to the President. Official White House Photo by Pete Souza. The fight between the CIA and the Senate Intelligence Committee over the Committee’s Torture Report – which Dan Froomkin covered here – has now zeroed in on the White House. Did the White House order the CIA to withdraw 920 documents from a server made available to Committee staffers, as Senator Dianne Feinstein says the agency claimed in 2010? Were those documents – perhaps thousands of them – pulled in deference to a White House claim of executive privilege, as Senator Mark Udall and then CIA General Counsel Stephen Preston suggested last fall? And is the White House continuing to withhold 9,000 pages of documents without invoking privilege, as McClatchy reported yesterday? We can be sure about one thing: The Obama White House has covered up the Bush presidency’s role in the torture program for years. Specifically, from 2009 to 2012, the administration went to extraordinary lengths to keep a single short phrase, describing President Bush’s authorization of the torture program, secret.
  • As Steven Aftergood, director of the Federation of American Scientists Project on Government Secrecy, noted  in 2009 – shortly after Hayden revealed that torture started as a covert operation – this means there should be a paper trail implicating President Bush in the torture program. “[T]here should be a Presidential ‘finding’ authorizing the program,” he said, “and [] such a finding should have been provided to Congressional overseers.” The National Security Act dictates that every covert operation must be supported by a written declaration finding that the action is necessary and important to the national security. The Congressional Intelligence committees – or at least the Chair and Ranking Member – should receive notice of the finding. But there is evidence that those Congressional overseers were never told that the finding the president signed on September 17, 2001 authorized torture. For example, a letter from then ranking member of the House Intelligence Committee, Jane Harman, to the CIA’s General Counsel following her first briefing on torture asked: “Have enhanced techniques been authorized and approved by the President?” The CIA’s response at the time was simply that “policy as well as legal matters have been addressed within the Executive Branch.”
  • Nevertheless, the finding does exist. The CIA even disclosed its existence in response to the ACLU FOIA, describing it as “a 14-page memorandum dated 17 September 2001 from President Bush to the Director of the CIA pertaining to the CIA’s authorization to detain terrorists.” In an order in the ACLU suit, Judge Alvin K. Hellerstein confirmed that the declaration was “intertwined with” the administration’s effort to keep the language in the Tenet document hidden. When the administration succeeded in keeping that short phrase secret, all effort to release the declaration also ended.
  • ...4 more annotations...
  • Enduring confusion about this particular finding surely exists because of its flexible nature. As Bob Woodward described in Bush at War, CIA Director Tenet asked President Bush to sign “a broad intelligence order permitting the CIA to conduct covert operations without having to come back for formal approval for each specific operation.” As Jane Mayer described in The Dark Side, such an order not only gave the CIA flexibility, it also protected the President. “To give the President deniability, and to keep him from getting his hands dirty, the finding called for the President to delegate blanket authority to Tenet to decide on a case-by-case basis whom to kill, whom to kidnap, whom to detain and interrogate, and how.” When George Tenet signed written guidelines for the CIA’s torture program in 2003, however, he appeared to have deliberately deprived the President of that deniability by including the source of CIA’s authorization – presumably naming the President – in a document interrogators would see. You can’t blame the CIA Director, after all; Tenet signed the Guidelines just as CIA’s Inspector General and DOJ started to review the legality of the torture tactics used against detainees like Abd al-Rahim al-Nashiri, who was threatened with a drill and a gun in violation of DOJ’s ban on mock executions.
  • The White House’s fight to keep the short phrase describing Bush’s authorization of the torture program hidden speaks to its apparent ambivalence over the torture program. Even after President Obama released the DOJ memos authorizing torture – along with a damning CIA Inspector General Report and a wide range of documents revealing bureaucratic discussions within the CIA about torture – the White House still fought the release of the phrase that would have made it clear that the CIA conducted this torture at the order of the president. And it did so with a classified declaration from Jones that would have remained secret had Judge Hellerstein not insisted it be made public. As Aftergood noted, such White House intervention in a FOIA suit is rare. “The number of times that a national security advisor has filed a declaration in a FOIA lawsuit is vanishingly small,” he said. “It almost never happens.” But as ACLU Deputy Legal Director Jameel Jaffer noted of the finding, “It was the original authority for the CIA’s secret prisons and for the agency’s rendition and torture program, and apparently it was the authority for the targeted killing program as well.  It was the urtext.  It’s remarkable that after all this time it’s still secret.”
  • President Obama’s willingness to go to such lengths to hide this short phrase may explain the White House’s curious treatment of potentially privileged documents with the Senate now – describing President Bush’s authorization of the torture program and its seemingly contradictory stance supporting publishing the Torture Report while thwarting its completion by withholding privileged documents. After all, the documents in question, like the reference to the presidential finding, may deprive the President of plausible deniability. Furthermore, those documents may undermine one of the conclusions of the Torture Report. According to Senator Ron Wyden, the Senate Torture Report found that “the CIA repeatedly provided inaccurate information about its interrogation program to the White House.” Perhaps the documents reportedly withheld by the White House undermine this conclusion, and instead show that the CIA operated with the full consent and knowledge of at least some people within the White House. Finally, the White House’s sensitivity about documents involved in the torture program may stem from the structure of the finding. As John Rizzo made clear, the finding authorizes not just torturing, but killing, senior al Qaeda figures. Bob Woodward even reported that that CIA would carry out that killing using Predator drones, a program CIA still conducts. And in fact, when the Second Circuit ultimately ruled to let the White House to keep the authorization phrase secret, it did so because the phrase also relates to “a highly classified, active intelligence activity” and “pertains to intelligence activities unrelated to the discontinued [torture] program.” Given what we know about the September 17, 2001 finding, that may well refer to President Obama’s still active drone program.
  • In any case, the White House’s seemingly contradictory statements about the Torture Report might best be understood by its past treatment of CIA documents. By releasing the DOJ memos and other materials, the White House provided what seemed to be unprecedented transparency about what the CIA had done. But all the while it was secretly hiding language describing what the White House has done.
  •  
    See also U.N. Convention Against Torture, which the U.S. is a party to. http://www.un.org/documents/ga/res/39/a39r046.htm
Paul Merrell

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com - 0 views

  • It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords, briefly locking out the FBI until it gained back control. The new details emerged in local press reports from a Thursday bail hearing in Dublin, Ireland, where Marques, 28, is fighting extradition to America on charges that Freedom Hosting facilitated child pornography on a massive scale. He was denied bail today for the second time since his arrest in July. Freedom Hosting was a provider of turnkey “Tor hidden service” sites — special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network. Tor hidden services are used by sites that need to evade surveillance or protect users’ privacy to an extraordinary degree – including human rights groups and journalists. But they also appeal to serious criminal elements, child-pornography traders among them.
  • On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the Tor Browser Bundle, reporting back to a mysterious server in Northern Virginia. The FBI was the obvious suspect, but declined to comment on the incident. The FBI also didn’t respond to inquiries from WIRED today. But FBI Supervisory Special Agent J. Brooke Donahue was more forthcoming when he appeared in the Irish court yesterday to bolster the case for keeping Marques behind bars, according to local press reports. Among the many arguments Donahue and an Irish police inspector offered was that Marques might reestablish contact with co-conspirators, and further complicate the FBI probe. In addition to the wrestling match over Freedom Hosting’s servers, Marques allegedly dove for his laptop when the police raided him, in an effort to shut it down.
  • The apparent FBI-malware attack was first noticed on August 4, when all of the hidden service sites hosted by Freedom Hosting began displaying a “Down for Maintenance” message. That included at least some lawful websites, such as the secure email provider TorMail. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address. By midday, the code was being circulated and dissected all over the net. Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. Though many older revisions of Firefox were vulnerable to that bug, the malware only targeted Firefox 17 ESR, the version of Firefox that forms the basis of the Tor Browser Bundle – the easiest, most user-friendly package for using the Tor anonymity network. That made it clear early on that the attack was focused specifically on de-anonymizing Tor users. Tor Browser Bundle users who installed or manually updated after June 26 were safe from the exploit, according to the Tor Project’s security advisory on the hack.
  • ...2 more annotations...
  • Perhaps the strongest evidence that the attack was a law enforcement or intelligence operation was the limited functionality of the malware. The heart of the malicious Javascript was a tiny Windows executable hidden in a variable named “Magneto.” A traditional virus would use that executable to download and install a full-featured backdoor, so the hacker could come in later and steal passwords, enlist the computer in a DDoS botnet, and generally do all the other nasty things that happen to a hacked Windows box. But the Magneto code didn’t download anything. It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
  • The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway. The code’s behavior, and the command-and-control server’s Virginia placement, is also consistent with what’s known about the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007. Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor. Prior to the Freedom Hosting attack, the code had been used sparingly, which kept it from leaking out and being analyzed.
  •  
    Taking down the entire Freedom Hosting service because some content was kiddie porn is reminiscent of the U.S. government's proxy take-down of Mega-Upload in New Zealand. Such actions that disable legitimate users or deny access to their data are in my opinion violative of the 1st and 4th Amendments.  It suppresses the Freedom of Speech and seizes more than the 4th Amendment allows.  That our own government would use malware for surveillance purposes under any circumstance is just plain chilling.
Paul Merrell

How Wall Street Money Is Driving Out the Last Populist House Republican | The Nation - 0 views

  • Congressman Walter Jones, a Republican who represents a wide swath of eastern North Carolina, might not strike you as a populist. But as a lawmaker, the veteran politician with a slow Southern drawl has become a gadfly in his own party for thumbing his nose at powerful political interests. He is the only GOP co-sponsor of the DISCLOSE Act, a measure to reveal the donors of dark-money campaign advertisements. He is among the loudest critics of the war in Iraq and Afghanistan, telling an audience one that “Lyndon Johnson’s probably rotting in hell right now because of the Vietnam War, and he probably needs to move over for Dick Cheney.” And Speaker John Boehner removed Jones from the House Financial Services Committee, which oversees Wall Street. His sin? Bucking leadership and supporting many bills to further regulate the financial sector, along with serving as the last remaining House Republican to have voted for the Dodd-Frank reform package. The Republican establishment has attempted to remove Jones from office by dispatching a number of primary challengers over the years. For this cycle, a former Bush administration aide named Taylor Griffin is the party favorite to finally wipe out Jones. Several outlets, such as Bloomberg News, have reported that Griffin’s candidacy is being heavily promoted by the financial industry. JPMorgan Chase, Bank of America, Wells Fargo and other banks helped fuel the $114,000 fundraising haul Griffin reported in his first campaign disclosure report. Earlier this week, a Super PAC financed in part by hedge fund titan Paul Singer went on air with a negative ad against Jones.
  • What hasn’t been reported, however, is that Griffin himself is a longtime political consultant for the biggest predators on Wall Street. Republic Report has obtained a disclosure report that shows that Griffin’s client list reads like a who’s who of financial interests that have preyed upon North Carolina families for short term gain.
Paul Merrell

[Heart of Empire] | The Long Shadow of a Neocon, by Andrew Cockburn | Harper's Magazine - 0 views

  • As jihadists everywhere celebrate their stunning victories in Mosul and Tikrit, as well as the abject retreat of the United States from Afghanistan, we can only hope that they accord due credit to a man who was indispensable to their success. Now an obscure businessman seeking crumbs from the table as an “international consultant,” Zalmay Khalilzad was in his day an imperial envoy sent by the United States to decree the fates of Afghanistan and Iraq. His decisions, most especially his selection of puppet overseers to administer the conquered lands, were uniformly disastrous, contributing in large degree to the catastrophes of today. To be sure, many others among the neocon clique and their liberal-democrat interventionist allies deserve a place on the jihadist honor roll of useful idiots, but few contributed as much as Khalilzad, the Afghan-born former academic who selected Hamid Karzai and Nuri al-Maliki as suitable leaders for their respective countries. Initially promoted up the ranks of the national-security clerisy by Albert Wohlstetter, the dark eminence of neoconservative theology who also mentored neocon godfather Richard Perle, Khalilzad found a useful niche in such company as the only Muslim any of them knew, ready to spout their militarist nostrums at the flutter of a grant check. I myself got an early intimation of Khalilzad’s tenuous grasp on military reality in 1981, when he assured me in all seriousness that the Afghan mujahideen were enjoying great success in disabling Soviet tanks by thrusting thick carpets into their treads. During the administration of the elder Bush, he worked in the Pentagon under Paul Wolfowitz and Scooter Libby. In 1992 he wrote the initial draft of the Defense Planning Guidance, which became an iconic neoconservative text.
  • Khalilzad’s leap out of relative obscurity came with the post-9/11 invasion and occupation of Afghanistan. Following the collapse of the Taliban regime in 2001, an Afghan Loya Jirga assembly indicated by a clear majority that they wanted their aged king, Zahir Shah, to return from his long exile in Rome to preside over the government. This was not to the taste of presidential special envoy, and later ambassador, Khalilzad, who importuned Italian premier Silvio Berlusconi to prevent the Shah from leaving Rome as he meanwhile brusquely informed the Loya Jirga that their leader was to be Hamid Karzai, a Pashtun of modest reputation. Afghan politicians of all stripes concluded that Khalilzad had purposefully picked someone with little internal support in order to ensure that his own authority remained unchallenged. This authority he exercised by operating as supreme warlord, rewarding or threatening the lesser strongmen who had emerged in various provincial power bases with grants of aid or threats of airstrikes from the bombers and Predator drones at his command. Afghans who could foresee the inevitable consequence of this laissez-faire policy toward the universally hated warlords did their best to persuade Khalilzad to change course. One of them later related to me that he suggested that Khalilzad put “ten of them in handcuffs and ship them off to the International Court at The Hague for crimes against humanity.”
  • “I’m going to bring them in and demobilize them,” countered Khalilzad confidently. “No, Zal,” replied the Afghan sadly, “you’re going to legitimize them.” So it transpired. While Karzai presided, in his self-designed costume of furry hat and cape, over a regime of staggering corruption, large swaths of Afghanistan fell under the control of characters like Hazrat Ali, a ruffian of pliable loyalties who used American support to gain control of the eastern city of Jalalabad and installed himself, with Khalilzad’s approval, as security chief of Nangahar Province. He then began vying with fellow warlord Sher Mohammed Akhunzada for the title of world’s leading heroin trafficker (a practice both men denied engaging in) while delivering hapless victims labeled “high value targets” to the torture cells of Bagram or the oubliette of Guantánamo. In inevitable consequence, disgusted Afghans rallied to a resurgent Taliban. The rest is history.
  • ...2 more annotations...
  • Resolutely failing upward, Khalilzad became the U.S. ambassador to Iraq in 2005. His signal accomplishment came in 2006, when, searching for a suitable candidate to replace Ibrahim al-Jaafari as prime minister, he summoned Nuri al-Maliki, a relatively low-ranking Dawa Party functionary who had spent much of his adult life in exile in Damascus (with an intervening spell in Tehran), where he subsisted on the earnings of a butcher shop he’d opened. Maliki’s party activities were largely related to security, and his experiences imbued him with a generally paranoid attitude to the outside world — not the best preparation for reconciling Iraq’s disparate sects and factions. Nevertheless, Khalilzad thought Maliki was just the man to make piece with the Sunnis, crack down on Moqtada al-Sadr (whom the American government mistakenly believed to be an Iranian pawn), and stand up to the Iranians. Summoned by Khalilzad, Maliki was abruptly informed that he was to become prime minister. “Are you serious?” said the astonished erstwhile butcher. The British ambassador, William Patey, had been invited to attend the meeting but when he started to object to Maliki’s anointment, Khalilzad promptly kicked him out of the room.
  • True to form, all of Khalilzad’s presumptions about Maliki turned out to be wholly in error. So far from reconciling with Sunnis, Maliki went out of his way to alienate them, combining paranoia about the possibility of a neo-Baathist coup with an opportunistic calculation that heightened sectarian tension would bolster his support among Shia. He showed no sign of serving as the wished-for bulwark against Tehran, and, most importantly, evinced little interest in building a responsible administration. Instead, Iraqi government, never a model of probity, devolved into a midden of corruption in which every office, including those in the military, was for sale. By 2014, the going price for command of an Iraqi army division was reported to be around $1 million, payable over two years as the purchaser recouped his investment via fees levied at roadblocks and other revenue streams. Little wonder that when called on to fight the disciplined and ruthless ISIS, the Iraqi army has melted away. Meanwhile, Khalilzad’s other choice, Hamid Karzai, has overseen a reign of pillage similar in scale to Maliki’s, opening the way for a Taliban restoration and rendering futile the entire American investment in Afghanistan. Defeat is an orphan, they say, but it would be a shame if this particular parent of America’s twenty-first-century humiliations were to be totally forgotten.
  •  
    With neocons angling again to have Iraq's Maliki replaced by Ahmed Chalibi, it's a good time to check in again on the neocon kingmaker for Southwest Asia, Zalmay Khalilzad.
Paul Merrell

Obama preserves renditions as counter-terrorism tool - Los Angeles Times - 0 views

  • The CIA's secret prisons are being shuttered. Harsh interrogation techniques are off-limits. And Guantanamo Bay will eventually go back to being a wind-swept naval base on the southeastern corner of Cuba.But even while dismantling these programs, President Obama left intact an equally controversial counter-terrorism tool.Under executive orders issued by Obama recently, the CIA still has authority to carry out what are known as renditions, secret abductions and transfers of prisoners to countries that cooperate with the United States.Current and former U.S. intelligence officials said that the rendition program might be poised to play an expanded role going forward because it was the main remaining mechanism -- aside from Predator missile strikes -- for taking suspected terrorists off the street.
  •  
    From February 1, 2009, less than a month after Obama's inauguration.
1 - 20 of 41 Next › Last »
Showing 20 items per page