Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged prior-knowledge

Rss Feed Group items tagged

Paul Merrell

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance |... - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the Court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the Court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
Paul Merrell

The Blood Sacrifice of Sergeant Bergdahl | Matthew Hoh - 0 views

  • Last week charges of Desertion and Misbehavior Before the Enemy were recommended against Sergeant Bowe Bergdahl. Tragically, Sergeant Bergdahl was once again crucified, without evidence or trial, throughout mainstream, alternative and social media. That same day Sergeant Bergdahl was offered as a sacrifice to primarily Republican politicians, bloggers, pundits, chicken hawks and jingoists, while Democrats mostly kept silent as Sergeant Bergdahl was paraded electronically and digitally in the latest Triumph of the Global War on Terror, President Ashraf Ghani was applauded, in person, by the American Congress. Such coincidences, whether they are arranged or accidental, often appear in literary or cinematic tales, but they do, occasionally, manifest themselves in real life, often appearing to juxtapose the virtues and vices of a society for the sake and advancement of political narratives. The problem with this specific coincidence for those on the Right, indulging in the fantasy of American military success abroad, as well as for those on the Left, desperate to prove that Democrats can be as tough as Republicans, is that reality may intrude. To the chagrin and consternation of many in DC, Sergeant Bergdahl may prove to be the selfless hero, while President Ghani may play the thief, and Sergeant Bergdahl's departure from his unit in Afghanistan may come to be understood as just and his time as a prisoner of war principled, while President Obama's continued propping up and bankrolling of the government in Kabul, at the expense of American servicemembers and taxpayers, comes to be fully acknowledged as immoral and profligate.
  • Buried in much of the media coverage this past week on the charges presented against Sergeant Bergdahl, with the exception of CNN, are details of the Army's investigation into Sergeant Bergdahl's disappearance, capture and captivity. As revealed by Sergeant Bergdahl's legal team, twenty-two Army investigators have constructed a report that details aspects of Sergeant Bergdahl's departure from his unit, his capture and his five years as a prisoner of war that disprove many of the malicious rumors and depictions of him and his conduct.
  • As documented in his lawyers' statement submitted to the Army on March 25, 2015, in response to Sergeant Bergdahl's referral to the Article 32 preliminary hearing (which is roughly the military equivalent of a civilian grand jury), the following facts are now known about Sergeant Bergdahl and his time prior to and during his captivity as a prisoner of war:• Sergeant Bergdahl is a "truthful person" who "did not act out of a bad motive"; • he did not have the intention to desert permanently nor did he have an intention to leave the Army when he left his unit's outpost in eastern Afghanistan in 2009; • he did not have the intention of joining the Taliban or assisting the enemy; • he left his post to report "disturbing circumstances to the attention of the nearest general officer". • while he was a prisoner of war for five years, he was tortured, but he did not cooperate with his captors. Rather, Sergeant Bergdahl attempted to escape twelve times, each time with the knowledge he would be tortured or killed if caught; • there is no evidence American soldiers died looking for Sergeant Bergdahl.
  • ...4 more annotations...
  • Again, these are the findings of the Army's investigation into Sergeant Bergdahl's disappearance; they are not the apologies or fantasies of his legal team, Marines turned anti-war peaceniks like myself, or Obama fawning conspirators. The details behind these facts are contained in the Army's report, authored by Major General Kenneth Dahl, which has not been publically released, but hopefully will be made available to the public after Sergeant Bergdahl's preliminary hearing next month or, if the desertion and misbehavior charges are pursued, during his court martial. Just what events Sergeant Bergdahl witnessed that would compel him to risk his life, traveling unarmed through enemy controlled territory, to provide information to an American general, are not presently known. We do know that the unit Sergeant Bergdahl belonged to underwent serious disciplinary actions both before and after Sergeant Bergdahl's capture, that several of his unit's leaders were fired and replaced both prior to and subsequent to his capture, and, from communications between Sergeant Bergdahl and his family prior to his capture, Sergeant Bergdahl was sickened and distraught over the actions of his unit, including its possible complicity in the death of an Afghan child. It is quite possible Sergeant Bergdahl left his unit to report a war crime(s) or other serious crime(s) committed by American forces. He may have been trying to report a failure of his immediate leadership or it may have been something, in hindsight, that we would now consider trivial. Such an action on Sergeant Bergdahl's part would help to explain why his former platoon mates, quite possibly the very men whom Sergeant Bergdahl left to report on, have been so forceful in their condemnation of him, so determined not to forgive him for his disappearance, and so adamant in their denial to show compassion for his suffering while a prisoner of war.
  • This knowledge may explain why the Taliban believed Sergeant Bergdahl had fallen behind on a patrol rather than deserted. If he truly was deserting, than Sergeant Bergdahl most likely would have told the Taliban disparaging information about US forces in an attempt to harvest friendship and avoid torture, but if he was on a personal mission to report wrongdoing, than he certainly would not relate such information to the enemy. This may explain why Sergeant Bergdahl told his captors a lie rather than disclose his voluntary departure from the platoon outpost. This would also justify why Sergeant Bergdahl left his base without his weapon or equipment. Before his departure from his outpost, Sergeant Bergdahl asked his team leader what would happen if a soldier left the base, without permission, with his weapon and other issued gear. Sergeant Bergdahl's team leader replied that the soldier would get in trouble. Understanding Sergeant Bergdahl as not deserting, but trying to serve the Army by reporting wrongdoing to another base would explain why he chose not to carry his weapon and issued gear off of the outpost. Sergeant Bergdahl was not planning on deserting, i.e. quitting the army and the war, and he did not want to get in trouble for taking his weapon and issued gear with him on his unauthorized mission.
  • This possible exposure to senior leaders, and ultimately the media and American public, of civilian deaths or other offenses would also account for the non-disclosure agreement Sergeant Bergdahl's unit was forced to sign after his disappearance. Non-disclosure agreements may be common in the civilian world and do exist in military fields such as special operations and intelligence, but for regular infantry units they are rare. Sergeant Bergdahl's capture by the enemy, possibly while en-route to reveal war crimes or other wrongdoings, would certainly be the type of event an embarrassed chain of command would attempt to hide. Such a cover up would certainly not be unprecedented in American military history.Similar to the assertions made by many politicians, pundits and former soldiers that Sergeant Bergdahl deserted because, to paraphrase, he hated America and wanted to join the Taliban, the notion that he cooperated and assisted the Taliban while a prisoner of war has also been debunked by the Army's investigation. We know that Sergeant Bergdahl resisted his captors throughout his five years as a prisoner of war. His dozen escape attempts, with full knowledge of the risks involved in recapture, are in keeping with the Code of Conduct all American service members are required to abide by during captivity by the enemy.
  • In his own words, Sergeant Bergdahl's description of his treatment reveals a ghastly and barbaric five years of non-stop isolation, exposure, malnutrition, dehydration, and physical and psychological torture. Among other reasons, his survival must be attested to an unshakeable moral fortitude and inner strength. The same inherent qualities that led him to seek out an American general to report "disturbing circumstances" could well be the same mental, emotional and spiritual strengths that kept him alive through half a decade of brutal shackling, caging, and torture. It is my understanding the US military's prisoner of war and survival training instructors are studying Sergeant Bergdahl's experience in order to better train American service members to endure future experiences as prisoners of war. Susan Rice, President Obama's National Security Advisor, was roundly lampooned and criticized last year for stating that Sergeant Bergdahl "served with honor and distinction". It is only the most callous and politically craven among us who, now understanding the torture Sergeant Bergdahl endured, his resistance to the enemy that held him prisoner, and his adherence to the US military's Code of Conduct for five years in horrific conditions, would argue that he did not serve with honor and distinction.
  •  
    There's more article than I highlighted and it's worth reading. Obama should step in here and issue a full pardon to end this young man's torment by Army generals playing to the press. Let's recall here that Obama, when asked to prosecute Bush II officials for war crimes, said he would rather look forward rather than backward. Sgt. Bergdahl, who committed no war crime, deserves no less. Five years of torture and malnutrition as a POW is more punishment than anyone deserves.
Gary Edwards

Rich Dad's Conspiracy of the Rich: The 8 New Rules of Money | Silver Monthly - The Silv... - 0 views

  • he makes it very clear that the rules of money changed dramatically when the U.S. went off the gold standard in 1971.  For up until that time, “technically, prior to 1971, the U.S. dollar was a derivative of gold.  After 1971, the U.S. dollar became a derivative of debt.”
  • The Invisible Bank Robbery
  • He says “since money is invisible, a derivative of debt, bank robberies by bankers have become invisible.” 
  • ...15 more annotations...
  • Two ways these invisible robberies occur are:  fractional reserve banking, which is nothing more than banks lending money they don’t have; and deposit insurance, which “protects the bankers – not savers.” 
  • “why should an insurance company like AIG receive bailout money in the first place?  Isn’t bailout money reserved for banks?”
  • “because it owed the biggest banks in the world a lot of money and didn’t have the cash to pay up.”
  • five new rules
  • money is knowledge; learn how to use debt;
  • learn to control cash flow;
  • prepare for bad times and you will only know good times;
  • and the need for speed. 
  • The name of the game, according to Kiyosaki, is “cash flow.”
  • The focus has to be on cash flow, not on capital gains.
  • Businesses that provide passive cash flow. Income-producing real estate. Paper assets – stocks, bonds, savings, annuities, insurance and mutual funds. Commodities – gold, silver, oil, platinum, etc.
  • invest in four basic areas:
  • By selling more than you buy, you can eventually become rich.
  • in Kiyosaki’s opinion, the ultimate definition of “sell” is building a business and then taking it public.
  • “knowledge is the new money.”
  •  
    As Kiyosaki writes in his book:  "So has there been a conspiracy?  I believe so, in a way."  He goes on to explain why he believes so, citing the lack of financial education in the school systems, the Federal Reserve Act, and Nixon's 1971 dismissal of the gold standard.  And most interestingly, Kiyosaki believes that 401(k) retirement vehicles placed the retirement money of average people in the hands of Wall Street. The first chapter of the book is entitled 'Can Obama Save the World?'  Kiyosaki's answer is no.  And apparently, Obama doesn't want to even if he could.  For he appointed Summers and Geithner, both of who played a part in repealing the Glass Steagall Act.  In other words, it's the same old same old.  Nothing has changed.  Which means that the average person needs to understand how taxes, debt, inflation, and retirement affect them.  Kiyosaki sums up the chapter by stating that once one understands the new rules of money, then one can "opt out of the conspiracy of the rich." From there, Kiyosaki moves on to explain how we got where we are.  He points the finger at the Federal Reserve Bank, which inflates the money supply, which destroys the value of savings and retirement plans.  And he makes it very clear that the rules of money changed dramatically when the U.S. went off the gold standard in 1971.  For up until that time, "technically, prior to 1971, the U.S. dollar was a derivative of gold.  After 1971, the U.S. dollar became a derivative of debt." Kiyosaki proceeds to discuss what he calls 'The Invisible Bank Robbery.'  He says "since money is invisible, a derivative of debt, bank robberies by bankers have become invisible."  Two ways these invisible robberies occur are:  fractional reserve banking, which is nothing more than banks lending money they don't have; and deposit insurance, which "protects the bankers - not savers."  Then he asks a very pertinent question:  "why should an ins
Gary Edwards

Byron York: Justice Department demolishes case against Trump order | Washington Examiner - 1 views

  •  
    "James Robart, the U.S. district judge in Washington State, offered little explanation for his decision to stop President Trump's executive order temporarily suspending non-American entry from seven terror-plagued countries. Robart simply declared his belief that Washington State, which in its lawsuit against Trump argued that the order is both illegal and unconstitutional, would likely win the case when it is tried. Now the government has answered Robart, and unlike the judge, Justice Department lawyers have produced a point-by-point demolition of Washington State's claims. Indeed, for all except the most partisan, it is likely impossible to read the Washington State lawsuit, plus Robart's brief comments and writing on the matter, plus the Justice Department's response, and not come away with the conclusion that the Trump order is on sound legal and constitutional ground. Beginning with the big picture, the Justice Department argued that Robart's restraining order violates the separation of powers, encroaches on the president's constitutional and legal authority in the areas of foreign affairs, national security, and immigration, and "second-guesses the president's national security judgment" about risks faced by the United States. Indeed, in court last week, Robart suggested that he, Robart, knows as much, or perhaps more, than the president about the current state of the terrorist threat in Yemen, Somalia, Libya, and other violence-plagued countries. In an exchange with Justice Department lawyer Michelle Bennett, Robart asked, "How many arrests have there been of foreign nationals for those seven countries since 9/11?" "Your Honor, I don't have that information," said Bennett. "Let me tell you," said Robart. "The answer to that is none, as best I can tell. So, I mean, you're here arguing on behalf of someone [President Trump] that says: We have to protect the United States from these individuals coming from these countries, and there's no support for that."
Gary Edwards

Are Federal Reserve Presidents Gaming the System? - Money Morning - 0 views

  •  
    While congress debates a ban on congressional inside trading, the news comes out that the thugs who run the Federal Reserve and own private banks with deep connections to Wall Street, are also profiting mightily from their indie trading activities.  C'mon, money is the fuel of Wall Street, and if you know a multi trillion dollar pump and dump is coming from the Federal Reserve how can you not crush the market?  These guys should heading to jail instead of Davos. excerpt: The presidents of the U.S. Federal Reserve may not have used their knowledge for personal gain, but a look at their assets does show several apparent conflicts of interests. More than 600 pages of disclosure documents were released last week after Bloomberg News filed a Freedom of Information Act request. The most troubling revelation concerned Atlanta Fed President Dennis Lockhart. Two weeks prior to the Federal Reserve's November 2010 decision to go ahead with the second phase of its quantitative easing program (QE2), Lockhart invested $289,000 in several stock index funds. The $600 billion of government bond-buying that followed helped push the Standard & Poor's 500 index up about 15% over the next six months.
Paul Merrell

U.S. Senate Select Committee on Intelligence - 0 views

  • Select Committee to Study Governmental Operations withRespect to Intelligence Activities ("Church Committee") Rules and Authorizing Resolution Rules of Procedure and S. Res. 21, 94th Congress
  • Interim and Staff Reports (1975) Interim Report, Alleged Assassination Plots Involving Foreign Leaders, S. Rep. No. 94-465 Staff Report, Covert Action in Chile, 1963-1973 Final Report, S. Rep. No. 94-755 (1976) Book I, Foreign and Military Intelligence Book II, Intelligence Activities and the Rights of Americans Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans Book IV, Supplementary Detailed Staff Reports on Foreign and Military Intelligence Book V, The Investigation of the Assassination of President John F. Kennedy: Performance of the Intelligence Agencies Book VI, Supplementary Reports on Intelligence Activities
  • Hearings Volume 1, Unauthorized Storage of Toxic Agents (September 16, 17, and 18, 1975) Volume 2, Huston Plan (September 23, 24, and 25, 1975) Volume 3, Internal Revenue Service (October 2, 1975) Volume 4, Mail Opening (October 21, 22, and 24, 1975 Volume 5, The National Security Agency and Fourth Amendment Rights (October 29 and November 6, 1975) Volume 6, Federal Bureau of Investigation (November 18, 19, December 2, 3, 9, 10, and 11, 1975) Volume 7, Covert Action (December 4 and 5, 1975) Additional Link Collection of Church Committee Reports and Hearings
  •  
    The records of the mid-1970s Church Committee investigation into covert government surveillance and illegal repression of political rights are now online. The revelations of this investigation led directly to passage of the Foreign Intelligence Surveillance Act and other legislation aimed at confining the U.S. military to surveillance of foreign targets and to dismantling of J. Edgar. Hoover's COINTEL program of political repression in the U.S., including blackmailing of elected officials and assassination of dissident political activists. The more recent NSA revelations should be viewed with knowledge that the NSA was already told decades earlier by Congress to butt out of domestic surveillance in no uncertain terms. Yet here we have the NSA gathering the entire "haystack" of U.S. citizens' domestic communications. In any event, this is a historical treasure trove of  prior misbehavior by the U.S. clandestine services, an overpowering  testimony that government officials cannot  be trusted with secret surveillance powers. 
Paul Merrell

CIA Documents Expose the Failed Torture Methods Used on Guantanamo's Most Famous Detain... - 0 views

  • It is early on in Abu Zubaydah’s time at a CIA black site. He insists to his interrogators that he has no additional information on jihadist operations planned against the US, but his captor won’t stop slapping him. Eventually a hood is placed over Zubaydah's head and he is placed into a confinement box by unseen security officers. He is told this is his new home until he’s prepared to provide information on operations against the US.Several physically stressful hours in the confinement box fail to elicit any intelligence, so Zubaydah’s captors place him in an even smaller box. He makes painful groans and is forced to scoot out of the box on his hindquarters when he’s finally allowed out. He is immediately made to stand and backed up against a wall. Two interrogators begin to double-team him with rapid-fire questions. Zubaydah is told that if he does not cooperate, he will only bring more misery on himself. Again he denies having any additional knowledge, but this time, he isn’t slapped. Instead, Zubaydah is hooded and a water board is brought into the cell.Zubaydah is the first post-9/11 detainee to be waterboarded, and this is his first session. He coughs and vomits. The waterboarding lasts for over two hours, but he still insists he does not have any additional information beyond that which he already provided to the FBI. He is then put into the larger confinement box, where he spends the rest of the evening. The interrogation process resumes in the morning: more slapping, zero new information, and more time in the smaller box.This was a summary of CIA documents obtained by AlterNet’s Grayzone Project. The records were originally obtained by Zubaydah’s defense team through the discovery process and were provided to me by a source familiar with the case who considered their publication critical to the public’s understanding of Zubaydah’s treatment. The vast majority of the documents have not been available to the public prior to this story.
  • As clinically detailed as they are gut-wrenching, the documents comprise hundreds of pages on the interrogation of Zubaydah, perhaps Guantanamo Bay’s most famous detainee. The files revealed here have renewed significance as Zubaydah has decided to testify about conditions at Guantanamo Bay despite the likelihood that it will imperil his legal situation. The records also highlight the methods of psychologist James Mitchell, a top architect of the CIA’s “enhanced interrogation program.” Though Mitchell had previously worked as an Air Force psychologist, the Senate “Torture Report” noted that he had no prior experience as an interrogator. Mitchell’s private contracting company had received over $80 million from the CIA by the time their contract was terminated in 2009. The contract was terminated because, as the CIA Inspector General put it, there was no reason to believe Mitchell’s interrogation techniques were effective or even safe.Mitchell and the US government originally believed Zubaydah to be a top leader of Al Qaeda who had knowledge of imminent plots against the US; however, the government would later concede that Zubaydah was never an Al Qaeda leader but still contend that he poses a threat. According to the US government, Zubaydah "possibly" knew in advance about the bombing of the USS Cole in 2000 and attacks on American embassies in Africa in 1998.After his capture in Pakistan in 2002, Zubaydah was held in CIA black sites for four years where he was subjected to extended torture so intense he lost his left eye. Following his first waterboarding, he was subjected to the same form of torture 82 times. It is unclear the brutal methods applied to Zubaydah’s body elicited any valuable intelligence.
  •  
    In our name, they did this ...
Paul Merrell

The Engineered Destruction and Political Fragmentation of Iraq. Towards the Creation of... - 0 views

  • The Capture of Mosul:  US-NATO Covert Support to the Islamic State of Iraq and Syria (ISIS) Something unusual occurred in Mosul which cannot be explained in strictly military terms. On June 10, the insurgent forces of the Islamic State of Iraq and the Levant (ISIS) captured Mosul, Iraq’s second largest city, with a population of close to 1.5 million people.  While these developments were “unexpected” according to the Obama administration, they were known to the Pentagon and US intelligence, which were not only providing weapons, logistics and financial support to the ISIS rebels, they were also coordinating, behind the scenes, the ISIS attack on the city of Mosul. While ISIS is a well equipped and disciplined rebel army when compared to other Al Qaeda affiliated formations, the capture of Mosul, did not hinge upon ISIS’s military capabilities. Quite the opposite: Iraqi forces which outnumbered the rebels by far, equipped with advanced weapons systems could have easily repelled the ISIS rebels. There were 30,000 government forces in Mosul as opposed to 1000 ISIS rebels, according to reports. The Iraqi army chose not to intervene. The media reports explained without evidence that the decision of the Iraqi armed forces not to intervene was spontaneous characterized by mass defections.
  • Iraqi officials told the Guardian that two divisions of Iraqi soldiers – roughly 30,000 men – simply turned and ran in the face of the assault by an insurgent force of just 800 fighters. Isis extremists roamed freely on Wednesday through the streets of Mosul, openly surprised at the ease with which they took Iraq’s second largest city after three days of sporadic fighting. (Guardian, June 12, 2014, emphasis added) The reports point to the fact that Iraqi military commanders were sympathetic with the Sunni led ISIS insurgency: Speaking from the Kurdish city of Erbil, the defectors accused their officers of cowardice and betrayal, saying generals in Mosul “handed over” the city over to Sunni insurgents, with whom they shared sectarian and historical ties. (Daily Telegraph,  13 June 2014) What is important to understand, is that both sides, namely the regular Iraqi forces and the ISIS rebel army are supported by US-NATO. There were US military advisers and special forces including operatives from private military companies on location in Mosul working with Iraq’s regular armed forces. In turn, there are Western special forces or mercenaries within ISIS (acting on contract to the CIA or the Pentagon) who are in liaison with US-NATO (e.g. through satellite phones).
  • Under these circumstances, with US intelligence amply involved, there would have been routine communication, coordination, logistics and exchange of intelligence between a US-NATO military and intelligence command center, US-NATO military advisers forces or private military contractors on the ground assigned to the Iraqi Army and Western special forces attached to the ISIS brigades. These Western special forces operating covertly within the ISIS could have been dispatched by a private security company on contract to US-NATO.
  • ...14 more annotations...
  • In this regard, the capture of Mosul appears to have been a carefully engineered operation, planned well in advance. With the exception of a few skirmishes, no fighting took place. Entire divisions of the Iraqi National Army –trained by the US military with advanced weapons systems at their disposal– could have easily repelled the ISIS rebels. Reports suggest that they were ordered by their commanders not to intervene. According to witnesses, “Not a single shot was fired”. The forces that had been in Mosul have fled — some of which abandoned their uniforms as well as their posts as the ISIS forces swarmed into the city. Fighters with the Islamic State of Iraq and Syria (ISIS), an al-Qaeda offshoot, overran the entire western bank of the city overnight after Iraqi soldiers and police apparently fled their posts, in some instances discarding their uniforms as they sought to escape the advance of the militants. http://hotair.com/archives/2014/06/10/mosul-falls-to-al-qaeda-as-us-trained-security-forces-flee/
  • A contingent of one thousand ISIS rebels take over a city of more than one million? Without prior knowledge that the US controlled Iraqi Army (30,000 strong) would not intervene, the Mosul operation would have fallen flat, the rebels would have been decimated. Who was behind the decision to let the ISIS terrorists take control of Mosul? Had the senior Iraqi commanders been instructed by their Western military advisers to hand over the city to the ISIS terrorists? Were they co-opted?
  • The formation of the caliphate may be the first step towards a broader conflict in the Middle East, bearing in mind that Iran is supportive of the Al Maliki government and the US ploy may indeed be to encourage the intervention of Iran. The proposed redivision of Iraq is broadly modeled on that of the Federation of Yugoslavia which was split up into seven “independent states” (Serbia, Croatia, Bosnia-Herzegovina, Macedonia (FYRM), Slovenia, Montenegro, Kosovo). According to Mahdi Darius Nazemroaya, the re division of Iraq into three separate states is part of a broader process of redrawing the Map of the Middle East.
  • US forces could have intervened. They had been instructed to let it happen. It was part of a carefully planned agenda to facilitate the advance of the ISIS rebel forces and the installation of the ISIS caliphate. The whole operation appears to have been carefully staged.
  • In Mosul, government buildings, police stations, schools, hospitals, etc are formally now under the control of the Islamic State of Iraq and Syria (ISIS). In turn, ISIS has taken control of military hardware including helicopters and tanks which were abandoned by the Iraqi armed forces. What is unfolding is the installation of a US sponsored Islamist ISIS caliphate alongside the rapid demise of the Baghdad government. Meanwhile, the Northern Kurdistan region has de facto declared its independence from Baghdad. Kurdish peshmerga rebel forces (which are supported by Israel) have taken control of the cities of Arbil and Kirkuk. (See map above) Concluding Remarks There were no Al Qaeda rebels in Iraq prior to the 2003 invasion. Moreover, Al Qaeda was non-existent in Syria until the outset of the US-NATO-Israeli supported insurgency in March 2011. The ISIS is not an independent entity. It is a creation of US intelligence. It is a US intelligence asset, an instrument of non-conventional warfare.
  • Was the handing over of Mosul to ISIS part of a US intelligence agenda? Were the Iraqi military commanders manipulated or paid off into allowing the city to fall into the hands of the ISIS rebels without “a single shot being fired”. Shiite General Mehdi Sabih al-Gharawi who was in charge of the Mosul Army divisions “had left the city”. Al Gharawi had worked hand in glove with the US military. He took over the command of Mosul in September 2011, from US Col Scott McKean. Had he been co-opted, instructed by his US counterparts to abandon his command?
  • The ultimate objective of this ongoing US-NATO engineered conflict opposing Maliki government forces to the ISIS insurgency is to destroy and destabilize Iraq as a Nation State. It is part of an intelligence operation, an engineered process of  transforming countries into territories. The break up of Iraq along sectarian lines is a longstanding policy of the US and its allies. The ISIS is a caliphate project of creating a Sunni Islamist state. It is not a project of the Sunni population of Iraq which historically has been committed to a secular system of government. The caliphate project is a US design. The advances of ISIS forces is intended to garnish broad support within the Sunni population directed against the Al Maliki government The division of Iraq along sectarian-ethnic lines has been on the drawing board of the Pentagon for more than 10 years.
  • The above map was prepared by Lieutenant-Colonel Ralph Peters. It was published in the Armed Forces Journal in June 2006, Peters is a retired colonel of the U.S. National War Academy. (Map Copyright Lieutenant-Colonel Ralph Peters 2006). Although the map does not officially reflect Pentagon doctrine, it has been used in a training program at NATO’s Defense College for senior military officers”. (See Plans for Redrawing the Middle East: The Project for a “New Middle East” By Mahdi Darius Nazemroaya, Global Research, November 2006)
  • The Western media in chorus have described the unfolding conflict in Iraq as a “civil war” opposing the Islamic State of Iraq and al-Sham against the Armed forces of the Al-Maliki government. (Also referred to as Islamic State of Iraq and the Levant (ISIL) or Islamic State of Iraq and Syria (ISIS)) The conflict is casually described as “sectarian warfare” between Radical Sunni and Shia without addressing “who is behind the various factions”.  What is at stake is a carefully staged US military-intelligence agenda. Known and documented, Al Qaeda affiliated entities have been used by US-NATO in numerous conflicts as “intelligence assets” since the heyday of the Soviet-Afghan war. In Syria, the Al Nusrah and ISIS rebels are the foot-soldiers of the Western military alliance, which oversees and controls the recruitment and training of paramilitary forces.
  • The Al Qaeda affiliated Islamic State of Iraq (ISI) re-emerged in April 2013 with a different name and acronym, commonly referred to as the Islamic State of Iraq and Syria (ISIS). The formation of a terrorist entity encompassing both Iraq and Syria was part of a US intelligence agenda. It responded to geopolitical objectives. It also coincided with the advances of Syrian government forces against the US sponsored insurgency in Syria and the failures of both the Free Syrian Army (FSA) and its various “opposition” terror brigades. The decision was taken by Washington to channel its support (covertly) in favor of a terrorist entity which operates in both Syria and Iraq and which has logistical bases in both countries. The Islamic State of Iraq and al-Sham’s Sunni caliphate project coincides with a longstanding US agenda to carve up both Iraq and Syria into three separate territories: A Sunni Islamist Caliphate, an Arab Shia Republic, and a Republic of Kurdistan.
  • Whereas the (US proxy) government in Baghdad purchases advanced weapons systems from the US including F16 fighter jets from Lockheed Martin, the Islamic State of Iraq and al-Sham –which is fighting Iraqi government forces– is supported covertly by Western intelligence. The objective is to engineer a civil war in Iraq, in which both sides are controlled indirectly by US-NATO. The scenario is to arm and equip them, on both sides, finance them with advanced weapons systems and then “let them fight”.
  • The Islamic caliphate is supported covertly by the CIA in liaison with Saudi Arabia, Qatar and Turkish intelligence. Israel is also involved in channeling support to both Al Qaeda rebels in Syria (out of the Golan Heights) as well to the Kurdish separatist movement in Syria and Iraq.
  • First published by GR on June 14, 2014.  President Barack Obama has initiated a series of US bombing raids in Iraq allegedly directed towards the rebel army of the Islamic State (IS). The Islamic State terrorists are portrayed as an enemy of America and the Western world. Amply documented, the Islamic State is a creation of Western intelligence, supported by the CIA and Israel’s Mossad and financed by Saudi Arabia and Qatar. We are dealing with a diabolical military agenda whereby the United States is targeting a rebel army which is directly funded by the US and its allies. The incursion into Iraq of the Islamic State rebels in late June was part of a carefully planned intelligence operation. The rebels of the Islamic state, formerly known as the ISIS, were covertly supported by US-NATO-Israel  to wage a terrorist insurgency against the Syrian government of Bashar Al Assad.  The atrocities committed in Iraq are similar to those committed in Syria. The sponsors of IS including Barack Obama have blood on their hands.
  • The killings of innocent civilians by the Islamic state terrorists create a pretext and the justification for US military intervention on humanitarian grounds. Lest we forget, the rebels who committed these atrocities and who are a target of US military action are supported by the United States. The bombing raids ordered by Obama are not intended to eliminate the terrorists. Quite the opposite, the US is targeting the civilian population as well as the Iraqi resistance movement. The endgame is to destabilize Iraq as a nation state and trigger its partition into three separate entities.
  •  
    The destabilization and fragmentation of Israel's neighboring nations has indeed been on the Zionist/Neocon drawing board for a very long time. http://goo.gl/Z1gdoA In the Mideast, it's important to remember that there are no significant Islamist forces that are not under the control of the U.S. or its allies Saudi Arabia and Qatar. The Iraqi Army's withdrawal of the two divisions from the defense of Mosul is indeed curious. In that regard, Col. Peters' map of a future Mideast is almost certainly more than a coincidence. 
Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Paul Merrell

PoppyLeaks, Part 1 - WhoWhatWhy - 0 views

  • The Story of Bush 41 the Establishment Won’t Publish
  • A particular memo caught his eye, and he leaned in for a closer look. Practically jumping off the screen was a memorandum from FBI director J. Edgar Hoover, dated November 29, 1963. Under the subject heading “Assassination of President John F. Kennedy,” Hoover reported that, on the day after JFK’s murder, the bureau had provided two individuals with briefings. One was “Captain William Edwards of the Defense Intelligence Agency.” The other: “Mr. George Bush of the Central Intelligence Agency.”
  • McBride shook his head. George H.W. Bush? In the CIA in 1963? Dealing with Cubans and the JFK assassination? Could this be the same man who was now vice president of the United States? Even when Bush was named CIA director in 1976 amid much agency-bashing, his primary asset had been the fact that he was not a part of the agency during the coups, attempted coups, and murder plots in Iran, Cuba, Chile, and other hot spots about which embarrassing information was being disclosed every day in Senate hearings.
  • ...3 more annotations...
  • Bush served at the CIA for one year, from early 1976 to early 1977. He worked quietly to reverse the Watergate-era reforms of CIA practices, moving as many operations as possible offshore and beyond accountability. Although a short stint, it nevertheless created an image problem in 1980 when Bush ran unsuccessfully for the Republican presidential nomination against former California governor Ronald Reagan. Some critics warned of the dangerous precedent in elevating someone who had led the CIA, with its legacy of dark secrets and covert plots, blackmail and murder, to preside over the United States government.
  •  George H.W. Bush: Spy from the age of 18 Almost a decade would pass between Bush’s election in 1988 and the declassification and release in 1996 of another government document that shed further light on the matter. This declassified document would help to answer some of the questions raised by the ’63 Hoover memo — questions such as, “If George Herbert Walker Bush was already connected with the CIA in 1963, how far back did the relationship go?”But yet another decade would pass before this second document would be found, read, and revealed to the public. Fast-forward to December 2006, on a day when JFK researcher Jerry Shinley sat, as he did on so many days, glued to his computer, browsing through the digitized database of documents on the Web site of the Mary Ferrell Foundation.On that December day, Shinley came upon an internal CIA memo that mentioned George H.W. Bush [the Bush designated Director of Central Intelligence (DCI)]. Dated November 29, 1975, it reported, in typically spare terms, the revelation that the man who was about to become the head of the CIA actually had prior ties to the agency. And the connection discussed here, unlike that unearthed by McBride, went back not to 1963, but to 1953 — a full decade earlier. Writing to the chief of the spy section of the analysis and espionage agency, the chief of the “cover and commercial staff” noted:
  • Through Mr. Gale Allen … I learned that Mr. George Bush, DCI designate has prior knowledge of the now terminated project WUBRINY/LPDICTUM which was involved in proprietary commercial operations in Europe. He became aware of this project through Mr. Thomas J. Devine, a former CIA Staff Employee and later, oil-wildcatting associate with Mr. Bush. Their joint activities culminated in the establishment of Zapata Oil [sic] [in 1953] which they eventually sold. After the sale of Zapata Oil, Mr. Bush went into politics, and Mr. Devine became a member of the investment firm of Train, Cabot and Associates, New York … The attached memorandum describes the close relationship between Messrs. Devine and Bush in 1967-1968 which, according to Mr. Allen, continued while Mr. Bush was our ambassador to the United Nations.In typical fashion for the highly compartmentalized and secretive intelligence organization, the memo did not make clear how Bush knew Devine, or whether Devine was simply dropping out of the spy business to become a true entrepreneur. For Devine, who would have been about twenty-seven years old at the time, to “resign” at such a young age, so soon after the CIA had spent a great deal of time and money training him was, at minimum, highly unusual. It would turn out, however, that Devine had a special relationship allowing him to come and go from the agency, enabling him to do other things without really leaving its employ. In fact, CIA history is littered with instances where CIA officers have tendered their “resignation” as a means of creating deniability while continuing to work closely with the agency …
Paul Merrell

Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com - 0 views

  • Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday.But Mr. Obama carved a broad exception for “a clear national security or law enforcement need,” the officials said, a loophole that is likely to allow the N.S.A. to continue to exploit security flaws both to crack encryption on the Internet and to design cyberweapons.
  • elements of the decision became evident on Friday, when the White House denied that it had any prior knowledge of the Heartbleed bug, a newly known hole in Internet security that sent Americans scrambling last week to change their online passwords. The White House statement said that when such flaws are discovered, there is now a “bias” in the government to share that knowledge with computer and software manufacturers so a remedy can be created and distributed to industry and consumers.Caitlin Hayden, the spokeswoman for the National Security Council, said the review of the recommendations was now complete, and it had resulted in a “reinvigorated” process to weigh the value of disclosure when a security flaw is discovered, against the value of keeping the discovery secret for later use by the intelligence community.“This process is biased toward responsibly disclosing such vulnerabilities,” she said.
  • One recommendation urged the N.S.A. to get out of the business of weakening commercial encryption systems or trying to build in “back doors” that would make it far easier for the agency to crack the communications of America’s adversaries. Tempting as it was to create easy ways to break codes — the reason the N.S.A. was established by Harry S. Truman 62 years ago — the committee concluded that the practice would undercut trust in American software and hardware products. In recent months, Silicon Valley companies have urged the United States to abandon such practices, while Germany and Brazil, among other nations, have said they were considering shunning American-made equipment and software. Their motives were hardly pure: Foreign companies see the N.S.A. disclosures as a way to bar American competitors.Continue reading the main story Continue reading the main story AdvertisementAnother recommendation urged the government to make only the most limited, temporary use of what hackers call “zero days,” the coding flaws in software like Microsoft Windows that can give an attacker access to a computer — and to any business, government agency or network connected to it. The flaws get their name from the fact that, when identified, the computer user has “zero days” to fix them before hackers can exploit the accidental vulnerability.
  • ...2 more annotations...
  • The N.S.A. made use of four “zero day” vulnerabilities in its attack on Iran’s nuclear enrichment sites. That operation, code-named “Olympic Games,” managed to damage roughly 1,000 Iranian centrifuges, and by some accounts helped drive the country to the negotiating table.Not surprisingly, officials at the N.S.A. and at its military partner, the United States Cyber Command, warned that giving up the capability to exploit undisclosed vulnerabilities would amount to “unilateral disarmament” — a phrase taken from the battles over whether and how far to cut America’s nuclear arsenal.“We don’t eliminate nuclear weapons until the Russians do,” one senior intelligence official said recently. “You are not going to see the Chinese give up on ‘zero days’ just because we do.” Even a senior White House official who was sympathetic to broad reforms after the N.S.A. disclosures said last month, “I can’t imagine the president — any president — entirely giving up a technology that might enable him some day to take a covert action that could avoid a shooting war.”
  • But documents released by Edward J. Snowden, the former N.S.A. contractor, make it clear that two years before Heartbleed became known, the N.S.A. was looking at ways to accomplish exactly what the flaw did by accident. A program code-named Bullrun, apparently named for the site of two Civil War battles just outside Washington, was part of a decade-long effort to crack or circumvent encryption on the web. The documents do not make clear how well it succeeded, but it may well have been more effective than exploiting Heartbleed would be at enabling access to secret data.The government has become one of the biggest developers and purchasers of information identifying “zero days,” officials acknowledge. Those flaws are big business — Microsoft pays up to $150,000 to those who find them and bring them to the company to fix — and other countries are gathering them so avidly that something of a modern-day arms race has broken out. Chief among the nations seeking them are China and Russia, though Iran and North Korea are in the market as well.
  •  
    Note that this is only an elastic policy, not law. Also notice that NYT is now reporting as *fact* that the NSA did the cyber attack on the Iranian enrichment centrifuges. By any legal measure, if true that was an act of war, a war of aggression.  So why wasn't the American public informed that we were at war with Iran? 
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Paul Merrell

Blair and Bush went to war in Iraq despite South Africa's WMD assurances, book states |... - 0 views

  • Tony Blair went to war in Iraq despite a report by South African experts with unique knowledge of the country that showed it did not possess weapons of mass destruction, according to a book published on Sunday.
  • God, Spies and Lies, by South African journalist John Matisonn, describes how then president Thabo Mbeki tried in vain to convince both Blair and President George W Bush that toppling Saddam Hussein in 2003 would be a terrible mistake. Mbeki’s predecessor, Nelson Mandela, also tried to convince the American leader, but was left fuming that “President Bush doesn’t know how to think”. The claim was this week supported by Mbeki’s office, which confirmed that he pleaded with both leaders to heed the WMD experts and even offered to become their intermediary with Saddam in a bid to maintain peace. South Africa had a special insight into Iraq’s potential for WMD because the apartheid government’s own biological, chemical and nuclear weapons programme in the 1980s led the countries to collaborate. The programme was abandoned after the end of white minority rule in 1994 but the expert team, known as Project Coast, was put back together by Mbeki to investigate the US and UK assertion that Saddam had WMD – the central premise for mounting an invasion.
  • Mbeki, who enjoyed positive relations with both Blair and Saddam, asked for the team to be granted access. “Saddam agreed, and gave the South African team the freedom to roam unfettered throughout Iraq,” writes Matisonn, who says he drew on sources in Whitehall and the South African cabinet. “They had access to UN intelligence on possible WMD sites. The US, UK and UN were kept informed of the mission and its progress.” The experts put their prior knowledge of the facilities to good use, Matisonn writes. “They already knew the terrain, because they had travelled there as welcome guests of Saddam when both countries were building WMD.” On their return, they reported that there were no WMDs in Iraq. “They knew where the sites in Iraq had been, and what they needed to look like. But there were now none in Iraq.”
  • ...1 more annotation...
  • In January 2003, Mbeki, who succeeded Mandela as president, sent a team to Washington to explain the findings, but with little success. Mbeki himself then met Blair for three hours at Chequers on 1 February, the book relates. He warned that the wholesale removal of Saddam’s Ba’ath party could lead to a national resistance to the occupying coalition forces. But with huge military deployments already under way, Blair’s mind was clearly made up. When Frank Chikane, director-general in the president’s office, realised that the South Africans would be ignored, it was “one of the greatest shocks of my life”, he later wrote in a memoir. Matisonn adds: “Mandela, now retired, had tried as well. On Iraq, if not other issues, Mandela and Mbeki were on the same page. Mandela phoned the White House and asked for Bush. Bush fobbed him off to [Condoleezza] Rice. Undeterred, Mandela called former President Bush Sr, and Bush Sr called his son the president to advise him to take Mandela’s call. Mandela had no impact. He was so incensed he gave an uncomfortable comment to the cameras: ‘President Bush doesn’t know how to think,’ he said with visible anger.”
  •  
    'President Bush doesn't know how to think,' 
Paul Merrell

The Ninth Circuit Holds-Correctly-That a Blogger Has the Same Defamation Protection as ... - 0 views

  • On January 17, a three-judge panel of the U.S. Court of Appeals for the Ninth Circuit ruled, as a matter of first impression, that First Amendment defamation rules apply equally to both the institutional press and individual speakers and writers, such as bloggers.
  • In reaching this conclusion, the Ninth Circuit analyzed two key prior Supreme Court precedents: New York Times v. Sullivan (public official seeking damages for defamation must show “actual malice” as defined as a showing thatthe defendant published the defamatory statement with knowledge that it was false, or with reckless disregard as to whether it was false or not) and Gertz v. Robert Welch, Inc. (First Amendment requires only a negligence standard for private defamation actions). Notably, Gertz involved an institutional media defendant, and the Gertz Court invoked the need to shield “the press and broadcast media from the rigors of strict liability for defamation.” Yet neither New York Times nor Gertz, as the Ninth Circuit noted, were expressly limited to the institutional press. Moreover,a number of other Supreme Court cases have rejected such a limitation: Bartnicki v. Vopper; Cohen v. Cowles Media Co.; First National Bank of Boston v. Bellotti; and Citizens United v. Federal Election Commission.
Paul Merrell

Yahoo webcam images from millions of users intercepted by GCHQ | World news | The Guardian - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy".
  • GCHQ does not have the technical means to make sure no images of UK or US citizens are collected and stored by the system, and there are no restrictions under UK law to prevent Americans' images being accessed by British analysts without an individual warrant.The documents also chronicle GCHQ's sustained struggle to keep the large store of sexually explicit imagery collected by Optic Nerve away from the eyes of its staff, though there is little discussion about the privacy implications of storing this material in the first place.
  • "Face detection has the potential to aid selection of useful images for 'mugshots' or even for face recognition by assessing the angle of the face," it reads. "The best images are ones where the person is facing the camera with their face upright."The agency did make efforts to limit analysts' ability to see webcam images, restricting bulk searches to metadata only.However, analysts were shown the faces of people with similar usernames to surveillance targets, potentially dragging in large numbers of innocent people. One document tells agency staff they were allowed to display "webcam images associated with similar Yahoo identifiers to your known target".Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
  • ...3 more annotations...
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs.Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.One document even likened the program's "bulk access to Yahoo webcam images/events" to a massive digital police mugbook of previously arrested individuals.
  • Programs like Optic Nerve, which collect information in bulk from largely anonymous user IDs, are unable to filter out information from UK or US citizens. Unlike the NSA, GCHQ is not required by UK law to "minimize", or remove, domestic citizens' information from its databases. However, additional legal authorisations are required before analysts can search for the data of individuals likely to be in the British Isles at the time of the search.There are no such legal safeguards for searches on people believed to be in the US or the other allied "Five Eyes" nations – Australia, New Zealand and Canada.
  • The documents also show that GCHQ trialled automatic searches based on facial recognition technology, for people resembling existing GCHQ targets: "[I]f you search for similar IDs to your target, you will be able to request automatic comparison of the face in the similar IDs to those in your target's ID".
Gary Edwards

Seymour M. Hersh · The Red Line and the Rat Line · LRB 6 April 2014 - 0 views

  • In 2011 Barack Obama led an allied military intervention in Libya without consulting the US Congress. Last August, after the sarin attack on the Damascus suburb of Ghouta, he was ready to launch an allied air strike, this time to punish the Syrian government for allegedly crossing the ‘red line’ he had set in 2012 on the use of chemical weapons.[*]​* Then with less than two days to go before the planned strike, he announced that he would seek congressional approval for the intervention. The strike was postponed as Congress prepared for hearings, and subsequently cancelled when Obama accepted Assad’s offer to relinquish his chemical arsenal in a deal brokered by Russia. Why did Obama delay and then relent on Syria when he was not shy about rushing into Libya? The answer lies in a clash between those in the administration who were committed to enforcing the red line, and military leaders who thought that going to war was both unjustified and potentially disastrous.
  •  
    Sy Hersh walks us through his investigation into the reasons behind Obama's last-minute decision to postpone missile (and as it turns out, B52) strikes on Syria. His trail leads through the Benghazi incident and the CIA's running of weapons from Libya to jihadists in Syria (the "rat line") through Turkey engineering a false flag gas attack in Syria to draw Obama into attacking Syria for crossing his "red line" against Syrian use of chemical weapons. Note that Hersh's account of the "red line" events largely fits with the earlier accounts by Yossef Bodansky.  http://oilprice.com/Geopolitics/Middle-East/Syrian-Chemical-Attack-More-Evidence-Only-Leads-to-More-Questions.html http://www.worldtribune.com/2013/09/09/new-granular-evidence-points-to-saudi-involvement-in-syrias-chemical-weapons-terror-attack/ http://www.globalresearch.ca/did-the-white-house-help-plan-the-syrian-chemical-attack Note however that Hersh's account omits Bodansky's evidence that the U.S. State Department and CIA were part of the planning for the false flag attack.
  • ...1 more comment...
  •  
    Note also the previous account by Wayne Madsen of events leading Obama to postpone his atack on Syria. http://www.strategic-culture.org/news/2013/09/04/american-generals-stand-between-war-and-peace.html "Obama is faced with another grim reality. Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that «smoking gun» proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal «Iran-contra»-like scandal. The proof is said to be highly «[un]impeachable»." This is another "red line" / "rat line" tie, suggesting that the reason the Benghazi investigation has not produced an even larger scandal is that it would expose the War Party's efforts to supply captured Libyan arms to jihadists in Syria.  On the Iran/Contra parallel, note that bills to approve supply of weapons to Syrian "rebels" were then stalled in Congress, evidencing Congressional intent that it rather than the President would authorize arming the "rebel" forces. The fact that CIA and the State Dept. were already covertly doing so completes the Iran/Contra scandal analogy.
  •  
    See also Hersh's article in December 2013, establishing that the White House had "cooked" the alleged evidence offered in support of Obama's claim that Syria had been responsible for the attack. It also establishes Obama's prior knowledge that the "rebel" forces had sarin weapons. http://www.lrb.co.uk/v35/n24/seymour-m-hersh/whose-sarin
  •  
    "The Red Line and the Rat Line: Seymour M. Hersh on Obama, Erdoğan and the Syrian rebels excerpt/intro: In 2011 Barack Obama led an allied military intervention in Libya without consulting the US Congress. Last August, after the sarin attack on the Damascus suburb of Ghouta, he was ready to launch an allied air strike, this time to punish the Syrian government for allegedly crossing the 'red line' he had set in 2012 on the use of chemical weapons.​* Then with less than two days to go before the planned strike, he announced that he would seek congressional approval for the intervention. The strike was postponed as Congress prepared for hearings, and subsequently cancelled when Obama accepted Assad's offer to relinquish his chemical arsenal in a deal brokered by Russia. Why did Obama delay and then relent on Syria when he was not shy about rushing into Libya? The answer lies in a clash between those in the administration who were committed to enforcing the red line, and military leaders who thought that going to war was both unjustified and potentially disastrous. Obama's change of mind had its origins at Porton Down, the defence laboratory in Wiltshire. British intelligence had obtained a sample of the sarin used in the 21 August attack and analysis demonstrated that the gas used didn't match the batches known to exist in the Syrian army's chemical weapons arsenal. The message that the case against Syria wouldn't hold up was quickly relayed to the US joint chiefs of staff. The British report heightened doubts inside the Pentagon; the joint chiefs were already preparing to warn Obama that his plans for a far-reaching bomb and missile attack on Syria's infrastructure could lead to a wider war in the Middle East. As a consequence the American officers delivered a last-minute caution to the president, which, in their view, eventually led to his cancelling the attack."
Paul Merrell

U.S. rejects claim that Turkey planned Syria atrocity Anadolu Agency - 0 views

  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency.
  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency. Seymour Hersh, a freelance journalist, published an article in the London Review of Books (LRB) in which he claimed that Ankara had supplied the al Nusra Front with chemical weapons that they used to carry out the August 2013 attack. The Washington Post and the New Yorker declined the story prior to its publication in the LRB. “The Assad regime, and only the Assad regime, could have been responsible for the chemical weapons attack that took place on August 21,” said Shawn Turner and Caitlyn Hayden in a statement initially issued to fact checkers working on the report and later sent to AA. “The suggestion that there was an effort to suppress or alter intelligence is simply false.” State Department Spokesperson, Jen Psaki, in her daily press briefing said there is no doubt that the chemical attack was carried out by the Syrian regime.
  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency.
  • ...2 more annotations...
  • Psaki said, "In light of our reports and intelligence we had recieved, we believe beyond any doubt that the attack on 21 August had been carried out by the Syrian regime and we are still behind the same view shared by the international community." Hersh cited unidentified American officials and a classified intelligence analysis on the opposition's chemical weapons capabilities to back up his claim. “No such paper was ever requested or produced by Intelligence Community analysts,” said Turner and Hayden.     Hersh wrote that U.S. President Barack Obama had established September 2, 2013 as a fixed deadline for the U.S. military to undertake action in Syria following the chemical attack. Turner and Hayden rejected the claim as “completely fabricated”.  The journalist also wrote that the Obama administration had channeled weapons from Libya to the Syrian opposition through southern Turkey, a claim described by Turner and Hayden as “false”.
  • Turkey also reacted to the claim when Turkey's Deputy Prime Minister Bulent Arinc was asked a question about Hersh's claim that Turkey had provided Sarin gas to the people who had conducted chemical attack in Ghouta region. He said "A note sent by the Turkish Foreign Ministry in this regard says that it is absolutely not true. The White House official has also qualified these claims as definitely false and speculative in response to a question regarding the matter." Arinc said, "The claims based on anonymous sources have been conclusively rejected by the White House officials and it has been reconfirmed that the Assad regime is solely responsible for the chemical attack." Noting that they are well aware of previous articles written by Hersh, Arinc said, "Everyone knows very well that the individual's views and claims heard from some unnamed persons are certainly not any verified information and knowledge. In fact, the U.S. officials have quite fairly explained the matter and strictly rejected the claim."
  •  
    Seymour M. Hersh is among the most highly regarded journalists in the world. Mainstream media used to compete for the rights to publish his articles. But apparently he's been digging a little to deeply in the belly of the beast lately. See his latest article that the White House is denying. http://www.lrb.co.uk/2014/04/06/seymour-m-hersh/the-red-line-and-the-rat-line
Paul Merrell

WikiLeaks - NSA Helped CIA Outmanoeuvre Europe on Torture - 0 views

  • Central to today's publication is a Top Secret NSA intercept of the communications of Foreign Minister Steinmeier. The intercept dates from just after an official visit to the United States on 29 November 2005, where FM Steinmeier met his US counterpart, Secretary of State Condoleezza Rice. According to the intercept, Steinmeier "seemed relieved that he had not received any definitive response from the U.S. Secretary of State regarding press reports of CIA flights through Germany to secret prisons in eastern Europe allegedly used for interrogating terrorism suspects." The visit occurred in the context of an escalating and ongoing scandal in Europe over clandestine "rendition flights" conducted by the Central Intelligence Agency (CIA) using the airspace and airport facilities of cooperating European countries, in which it was alleged by leading news publications that European citizens and residents had been abducted outside of any legal process and taken to secret "black site" prisons, where they could be tortured with impunity. After the scandal emerged, European governments defied their publics, continuing to cooperate with the United States while denying all knowledge of rendition flights. These denials relied heavily on the insistence of European governments that they had received confidential "diplomatic assurances" from the United States that nothing illegal was taking place. It was subsequently shown in numerous court proceedings and commissions of inquiry that the activity was illegal. At the time of Steinmeier's meeting, reports of CIA rendition flights through Germany had recently emerged, and were publicly dismissed as unconfirmed by German authorities.
  • In the years since 2005, successive investigations by human rights groups and international bodies, such as the Council of Europe, have substantiated that extraordinary rendition was indeed occurring. In 2007 the European Parliament approved a finding in a report by a special investigative committee where it was stated that Germany, among other states, aided or knew about the CIA's extraordinary rendition programme. Prior to becoming Foreign Minister in 2005, Frank-Walter Steinmeier served as Head of Chancellery (Chief of Staff) in the government of Chancellor Gerhard Schroeder, where he was responsible for coordinating the work of German intelligence agencies. In 2004, during this tenure, Khaled El-Masri, a German citizen, was abducted by the CIA and renditioned to a black site in Afghanistan where he was interrogated and tortured for four months. Eventually the CIA realised that it had the wrong "El-Masri", and dumped the German on a desolate road in Albania and began a cover-up. El-Masri's case has been substantiated and confirmed in numerous inquiries, and at the European Court of Human Rights.
  • Today's publication of the 20 target selectors adds to the previous WikiLeaks publication of 125 German numbers targeted by the NSA, showing systematic mass spying on the Chancellor and the Chancellery (All the Chancellor's Men, 8 July) and German politicians and officials handling economic, trade and financial affairs (The Euro Intercepts, 1 July).
  •  
    Hmmmm.... I don't remember anything in the Senate Intelligence Committee's published executive summary on CIA torture about the CIA getting an assist from NSA on its rendition and torture projects. 
Paul Merrell

Land Destroyer: NATO's War on Syria Just Got Dirtier - 0 views

  • But even with the West's capitulation in Syria, and months passing without a shred of credible evidence produced, hacks among Western media continue to perpetuate the original narrative. Among these are of course corporate-financier funded think-tanks and propaganda fronts like the Brookings Institution, Foreign Policy Magazine, the Foundation for the Defense of Democracies (FDD), and establishment papers like the Guardian. In the middle of it all is couch-potato self-proclaimed weapons expert, Eliot Higgins, a representation of the West's propaganda 2.0 campaign.  UK-based Higgins lost his job and now spends his days combing social media sites for "evidence" he then analyzes and reports on. The Western media, with its propagandists expelled from Syria and many of its "sources" in Syria exposed in humiliating attempts to fabricate and manipulate evidence, quickly picked Higgins up and elevated his armchair blogging to "expert analysis." Since then, Higgins has joined the already discredited "Syrian Observatory for Human Rights" another UK-based individual, as the basis upon which the West's Syrian narrative spins. 
  • Whitaker is desperately attempting to keep the wheels on the establishment's new propaganda 2.0 vehicle - manipulating social media, much the way Hersh describes intelligence being manipulated, to create any outcome necessary to bolster a predetermined narrative.  What he doesn't address is the fact that Higgins' work almost entirely depends on videos posted online by people he does not know, who may be misrepresenting who they are, what they are posting, and their motivations for doing so - such is the nature of anonymity on the web and why this evidence alone is useless outside of a larger geopolitical context.  Both Whitaker and Higgins, who maintain that the Syrian government was behind the attacks, fail to address another glaring reality. A false flag attack is designed to look like the work of one's enemy. In other words, terrorists in Syria would use equipment, uniforms, weapons, and tactics that would pin the crime on the Syrian government. All Higgins has proved, thus far, is that the superficial details of the operation made for a convincing false flag attack. 
  • Toward the end of Higgin's piece, he, like his friends at the Guardian, attempt to claim Al Nusra, contrary to Hersh's report, are most likely not capable of producing sarin.
  • ...5 more annotations...
  • The e-mails illustrate prior knowledge of chemical weapons falling into the hands of terrorists who fully planned on using them in a false flag operation. Higgins and others had this information, and now, have Seymour Hersh's report as well, yet they still pose the argument that the militants had neither the ability nor the means to carry out the attacks. In fact, it appears that the Western media and underlings like Higgins went out of their way specifically to discredit the notion from even being considered.  In other words, a concerted cover-up.  The e-mails above, and others in the large cache also reveal the possible motivation for these lies. So-called journalists and researchers peddling the West's narrative appear to have a wide range of lucrative offers presented to them, as well as funding for them to continue doing the work they are already involved in. This of course is only the case so long as their narratives mesh with the institutions, corporations, and individuals cutting the checks. 
  • The e-mails reveal multiple correspondences regarding chemical weapons falling into the hands of terrorists aimed at using them in a false flag operation, Higgins' and Van Dyke's mutual "benefactor" located in Virginia, "near DC" (Langley, Virginia?), and job offers for Higgins from NGOs and a defense contractor involving "open source intelligence," the new buzzword used by Higgins and Whitaker in regards to the new form of propaganda they both participate in. 
  • While perhaps Higgins and company missed that CNN report, it is now revealed that at least Higgins, and several other journalists were told by an American contractor on the ground inside of Syria, that militants had gained access to chemical weapons and more importantly, were planning to use them in a false flag attack - this months before the August 21 attack in Damascus.   The Syrian Electronic Army (SEA) has released e-mails this week between American contractor Matthew Van Dyke and members of the Western media, including Higgins. The e-mails indicated that militants had chemical weapons and were planning to use them in an attack to frame the Syrian government - serving as impetus for wider foreign intervention. SEA's emails have been confirmed by Higgins himself in a series of self-incriminating tweets where he goes, point-by-point, attempting to provide explanations for the damning revelations. 
  • Why would Higgins even mention the possibility of a false flag attack, when all that would do is alienate him from the establishment he is so eagerly trying to be a part of? His recent piece in Foreign Policy and the Guardian's ceaseless promotion of his work are favors that demand reciprocation - in the form of toeing the line and selling a narrative Higgins and others know is deceitful.  That Higgins, the Guardian, and Foreign Policy are prepared to throw veteran journalist Seymour Hersh under the bus to protect their interests, gives us a look into the depths of depravity within which this "new" media Whitaker celebrates, operate.  Worst of all for the West, is that the transparency and accountability they claim to uphold, had to be kept in check by the SEA - an organization wanted by the FBI as "terrorists." We would be led to believe by the likes of Whitaker, Higgins, and Van Dyke that the Syrian government and their supporters are the villains, but in their own words and actions we see the truth. 
  • Note: The full extent of SEA's leaked e-mails exposes Van Dyke and the journalists he associates with as utterly depraved, deceitful, unprincipled individuals each driven by untethered greed and narcissism. The e-mails also reveal that "aid ships" are used to bring in weapons and foreign fighters, that the Syrians are almost entirely behind the government and that the so-called revolution was "fake." Van Dyke is exposed as having conspired to kill a man and his entire family over a trivial personal dispute and much, much more. Readers are encouraged to comb through the archives, and to follow SEA on Twitter  @Official_SEA16.
  •  
    "Brown Moses" (Eliot Higgins) has been the principle source of "evidence" that the Assad government used chemical weapons, arguing strenuously that the "rebels" had no such capability. But the Syrian Electronic Army obtained a large number of emails between Higgins and an American mercenary working in Syria showing beyond doubt that Higgins had been put on notice in May 2013 -- months before the sarin gas attack near Damascus in late August -- that the "rebels" had sarin.   Oopsies!
Paul Merrell

Israel deploys a new weapons system in Gaza - Intellihub.com - 0 views

  • Reports, including photographic evidence reveal that Israel is using an energy weapon to attack targets in Gaza. The destructive beam, thought to be a high energy laser, is emitted from a plane identified as a Boeing KC707 “Re’em,” originally configured for Electronic Warfare. Those observing the attacks cite a beam from a 4 engine jet hitting a target which immediately turns “white hot.” After these attacks, the target area is then hit with either bombs or artillery to destroy evidence of the use of an American designed and built energy weapon illegally given to Israel. BACKGROUND The weapon used is identified as part of the YAL 1 system, a COIL laser (chemical, oxygen/iodine laser), originally intended as an aircraft mounted system to shoot down ICBMs. Boeing approached the Department of Defense in 2002 and by 2004 had mounted its first system on a 747/400 previously flown by Air India. Boeing had convinced Secretary of Defense Donald Rumsfeld that this system, mounted on as many as 7 aircraft, could fly 24 hours a day around Iran and defend “the free world” against nuclear tipped ICBMs that Rumsfeld believed Iran was planning to use. Please note that it was Rumsfeld that told television audiences that Afghanistan was “peppered” with underground cities serviced by rail links that supported division sized Al Qaeda units that, after ten years, no one was able to locate.
  • Boeing tested the system in 2007. The Department of Defense claimed the system could shoot down low earth orbit satellites and that in tests conducted in 2010, destroyed multiple test missiles. There is no reliable confirmation of this other than a press release from then Secretary of Defense Robert Gates. CANCELLATION AND MYSTERIOUS DISAPPEARANCE The Center for Strategic Studies, in an interview with then Defense Secretary Gates published the following: “I don’t know anybody at the Department of Defense who thinks that this program should, or would, ever be operationally deployed. The reality is that you would need a laser something like 20 to 30 times more powerful than the chemical laser in the plane right now to be able to get any distance from the launch site to fire.” So, right now the ABL would have to orbit inside the borders of Iran in order to be able to try and use its laser to shoot down that missile in the boost phase. And if you were to operationalize this you would be looking at 10 to 20 747s, at a billion and a half dollars apiece, and $100 million a year to operate. And there’s nobody in uniform that I know who believes that this is a workable concept.”
  • After $5 billion was spent, the functioning prototype only capable of being fired directly at nearby targets, a system very capable of acquisition and destruction of ground targets with no air defense protection only, was said to have been flown to a scrap yard. The plane itself is still there, at Davis Monthan Air Force Base, with other failed dreams and nightmares. However, the weapons system disappeared, only to reappear in Israel as a “missile defense” project, an adjunct to the “Iron Dome” system. Israel’s Rafael Defense had been trying to develop laser weapons on its own to intercept rockets being fired from Gaza. It was never able to neither deploy a laser powerful enough nor develop a radar system able to be effective.
  • ...5 more annotations...
  • “Friends of Israel,” within the US defense community were convinced by Israel that the system could be finished and deployed to protect Israel against a purported “missile onslaught” from Tehran. In truth, there was no such intention. Instead, as in the film “Real Genius,” the laser system was always intended to be deployed against ground targets, for terrorism and assassinations. The “delivery system,” a Boeing airliner configured for AWAC, electronic warfare or refueling, could easily be modified to “clone” commercial air traffic and attack targets thousands of miles away or as close as Gaza, Lebanon, Syria or Iraq with total impunity.
  • McLeod and Rogers, in The Law of War, examine the history of prohibition of incendiary weapons. Israel’s use of white phosphorous, intended as a “smoke market” as a corrosive anti-personnel weapon against civilian populations in Lebanon and Gaza skirts initial language, as cited below, in the St. Petersburg Declaration of 1868, but falls well short of evading later prohibition on the use of chemical agents. “The first treaty to deal with weapons was the St Petersburg Declaration of 1868. Here states were concerned about the development of explosive or incendiary bullets for use against the wagon trains of enemy forces. It was felt that these bullets might be used against enemy personnel15 and cause unnecessary injury. The Contracting Parties agreed ‘mutually to renounce, in case of war among themselves, the employment by their military or naval troops of any projectile of a weight below 400 grammes, which is either explosive or charged with fulminating or inflammable substances’.
  • The declaration does not seem to have affected the practice of states in using tracer for range finding, even mixed with normal ammunition, nor the use of small explosive projectiles for anti-aircraft and anti-material uses. It did not prevent states from using four pound, thermite-based incendiary bombs during the Second World War. These, obviously, were more than 400 grammes in weight. Furthermore it could be argued that they were not ‘projectiles’, a term that certainly would not include illuminating flares or smoke canisters.” The use of energy weapons for assassinations and terrorism had, prior to only a few short days ago, been subject of speculative fiction only. No one had imagined that a failed American weapons system would be pirated for deployment in acts of terrorism by a rogue state. A greater question arises, if this “failed system” costing many billions has been shipped off “in the dark of night” without public knowledge or official authorization for use in a criminal manner, what other systems may have been similarly pirated? There is conclusive evidence that W54/Davy Crocket nuclear weapons made their way to Israel after 1991 after an accident at Dimona is reputed to have made that facility useless for weapons development.
  • Similarly, when the Ukraine retired its “fleet” of SS21 tactical nuclear missiles, Israel took possession of the warheads, servicing their deuterium booster gas all these years to keep them ready for deployment. Intercepted communications between the Kiev junta and Israel now indicate that Israel is ready to “repatriate” some of these nuclear weapons to the Ukraine for use against pro-Russian separatists. Ukrainian leaders have spoken of the intent to deploy and use these nuclear weapons publicly on several recent occasions. From USA Today: “KIEV, Ukraine — Ukraine may have to arm itself with nuclear weapons if the United States and other world powers refuse to enforce a security pact that obligates them to reverse the Moscow-backed takeover of Crimea, a member of the Ukraine parliament told USA TODAY. ‘We gave up nuclear weapons because of this agreement,’ said Rizanenko, a member of the Udar Party headed by Vitali Klitschko, a candidate for president. ‘Now there’s a strong sentiment in Ukraine that we made a big mistake.’”
  • With the recent bombing of a UN refugee facility in Gaza, with the use of chemical and now energy weapons, with Israel’s planned sale of nuclear warheads to Ukraine, there is little more that could be done to establish Israel, not only as a rogue state, but as a “clear and present danger” to not only regional but global security as well. As Jim W. Dean of Veterans Today recently stated, “Their fingerprints are at every crime scene.”
1 - 20 of 29 Next ›
Showing 20 items per page