Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged risk-assessment

Rss Feed Group items tagged

Paul Merrell

Pentagon report: scope of intelligence compromised by Snowden 'staggering' | World news... - 0 views

  • • Classified assessment describes impact of leaks as 'grave' • Report does not include specific detail to support conclusions• 12 of 39 heavily redacted pages released after Foia request• Read the full Defense Intelligence Agency report
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”.The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.”But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower.The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk.
  • ...8 more annotations...
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian.Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows.
  • The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m. Nor does the declassified portion of the report identify Snowden by name.“[Redacted] a former NSA contractor compromised [redacted] from NSA Net and the Joint Worldwide Intelligence Communications System (JWICS),” the report says. “On 6 June 2013, media groups published the first stories based on this material, and on 9 June 2013 they identified the source as an NSA contractor who had worked in Hawaii.”JWICS is identified as a “24 hour a day network designed to meet the requirements for secure [top-secret/sensitive compartmented information] multi-media intelligence communications worldwide. The Defense Intelligence Agency (DIA) has directed that all Special Security Offices (SSOs) will install the JWICS.”The Washington Post, quoting anonymous sources, reported last October that Snowden “lifted the documents from a top-secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines.” The Post further claimed that Snowden “took 30,000 documents that involve the intelligence work of one of the services” and that he gained access to the documents through JWICS.
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”. The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.” But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.
  • Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year. Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, questioned the decision to withhold specific details. "The essence of the report is contained in the statement that 'the scope of the compromised knowledge related to US intelligence capabilities is staggering'. But all elaboration of what this striking statement means has been withheld," he said. The assessment excluded NSA-related information and dealt exclusively with non-NSA defense materials. The report was distributed to multiple US military commands around the world and all four military branches.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower. The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk. In January, Rogers asserted that the report concluded that most of the documents Snowden took "concern vital operations of the US Army, Navy, Marine Corps and Air Force". "This report confirms my greatest fears — Snowden’s real acts of betrayal place America’s military men and women at greater risk. Snowden’s actions are likely to have lethal consequences for our troops in the field," Rogers said in a statement at the time.
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian. Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows. The declassified portion of the report obtained by the Guardian says only that DIA “assesses with high confidence that the information compromise by a former NSA contractor [redacted] and will have a GRAVE impact on US national defense”. The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m.
  • No evidence has surfaced to support persistent claims from pundits and lawmakers that Snowden has provided any of the NSA documents he obtained to a “foreign adversary”. Ben Wizner, Snowden’s attorney at the American Civil Liberties Union, said: "This report, which makes unsubstantiated claims about alleged harm to national security, is from December of 2013. Just this month, Keith Alexander admitted in an interview that he doesn’t 'think anybody really knows what he [Snowden] actually took with him, because the way he did it, we don’t have an accurate way of counting'. In other words, the government’s so-called damage assessment is based entirely on guesses, not on facts or evidence."
  • Steven Aftergood, of the Federation of American Scientists, pointed out that the report's finding that the Snowden leaks had a "grave" impact did not follow any of the levels defined in the annex. "That is a bit odd," he said, adding: "Within this hierarchy, it is not clear where 'grave impact' would fall."
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Paul Merrell

Int'l Criminal Court's Examination of U.S. Treatment of Detainees Takes Shape | Just Se... - 0 views

  • On Tuesday, the Chief Prosecutor of the International Criminal Court announced, in the most explicit and detailed terms to date, that the U.S. treatment of detainees captured in the Afghanistan conflict is under examination by her office. The statement is included in the Office of the Prosecutor’s (OTP) annual “Report on Preliminary Examination Activities,” released on the eve of the Assembly of States Parties this month.
  • In particular, the OTP is assessing the degree to which national proceedings are underway with respect to the allegations underlying the examination.  Furthermore, an affirmative determination that there is a reasonable basis to proceed with an investigation is far from a finding of strong evidence of criminal wrongdoing. Nevertheless, the appearance of the latter is surely one issue on the minds of administration officials. David Bosco, for instance, reported that “the U.S. delegation urged the court not to publish the allegations, even in preliminary form. They warned that the world would see any ICC mention of possible American war crimes as evidence of guilt, even if the court never brought a formal case.”
  • Here are the key graphs: “94. The Office has been assessing available information relating to the alleged abuse of detainees by international forces within the temporal jurisdiction of the Court. In particular, the alleged torture or ill-treatment of conflict-related detainees by US armed forces in Afghanistan in the period 2003-2008 forms another potential case identified by the Office. In accordance with the Presidential Directive of 7 February 2002, Taliban detainees were denied the status of prisoner of war under article 4 of the Third Geneva Convention but were required to be treated humanely. In this context, the information available suggests that between May 2003 and June 2004, members of the US military in Afghanistan used so-called “enhanced interrogation techniques” against conflict-related detainees in an effort to improve the level of actionable intelligence obtained from interrogations. The development and implementation of such techniques is documented inter alia in declassified US Government documents released to the public, including Department of Defense reports as well as the US Senate Armed Services Committee’s inquiry. These reports describe interrogation techniques approved for use as including food deprivation, deprivation of clothing, environmental manipulation, sleep adjustment, use of individual fears, use of stress positions, sensory deprivation (deprivation of light and sound), and sensory overstimulation.
  • ...4 more annotations...
  • The Prosecutor proceeds in 4 phases within any preliminary examination: (1) an initial assessment to analyze the seriousness of information received; (2) a jurisdictional analysis – the formal commencement of an examination involving “a thorough factual and legal assessment” of whether there is “a reasonable basis to believe that the alleged crimes fall within the subject-matter jurisdiction of the Court;” (3) an admissibility determination – assessing whether the gravity of the crimes or prospect of national investigations and prosecutions preclude the need for the ICC to proceed ; (4) prudential considerations — determining whether an investigation would serve the “interests of justice.” It appears that the examination of U.S. detention operations has reached the third phase and crossed over the important threshold of a finding that there is a reasonable basis to believe U.S. forces committed war crimes within the jurisdiction of the Court. Heller posited that some aspects of the Prosecutor’s Afghanistan examination had already reached this stage in 2013. The 2014 report provides further corroboration specifically with respect to U.S. detention practices. For example, paragraph 96 of the 2014 report states that the Office of the Prosecutor is now “analysing the relevance and genuineness of national proceedings by the competent national authorities for the alleged conduct described above as well as the gravity of the alleged crimes”—clearly a phase three inquiry. That said, paragraph 96 also states that the Office is “continuing to assess the seriousness and reliability of such allegations”—which sounds like phase two and even phase one.
  • 95. Certain of the enhanced interrogation techniques apparently approved by US senior commanders in Afghanistan in the period from February 2003 through June 2004, could, depending on the severity and duration of their use, amount to cruel treatment, torture or outrages upon personal dignity as defined under international jurisprudence. In addition, there is information available that interrogators allegedly committed abuses that were outside the scope of any approved techniques, such as severe beating, especially beating on the soles of the feet, suspension by the wrists, and threats to shoot or kill. 96. While continuing to assess the seriousness and reliability of such allegations, the Office is analysing the relevance and genuineness of national proceedings by the competent national authorities for the alleged conduct described above as well as the gravity of the alleged crimes.
  • The OTP is considering whether the war crimes of cruel treatment, torture or outrages upon personal dignity were committed by U.S. forces. Article 8 of the ICC statute places something of a qualification on the jurisdiction of the Court over war crimes. It states that the Court shall have jurisdiction over war crimes “in particular when committed as part of a plan or policy or as part of a large-scale commission of such crimes.” In 2013, the Prosecutor’s annual report stated that the Office “continues to seek information to determine whether there is any reasonable basis to believe any such alleged acts, which could amount to torture or humiliating and degrading treatment, may have been committed as part of a policy.” That reference to the “as a part of policy” qualification does not appear in the 2014 report. And, on the contrary, the 2014 report highlights elements that indicate the existence of a policy such as the Presidential Directive of 7 February 2002 on the determination of POW status and the senior US commanders’ approval of interrogation techniques.
  • Will bilateral agreements between the US and Afghanistan preclude the ICC from investigating or prosecuting “U.S. persons”? One final question that might arise from these proceedings is the legal viability of the bilateral agreement between the United States and Afghanistan regarding the surrender of persons to the International Criminal Court (full text).  Since the case arises out of Afghanistan’s status under the ICC treaty, the United States might try to claim that the bilateral agreement provides US nationals and employees immunity for actions that took place in Afghanistan. I have briefly discussed the legal viability of such article 98 agreements in an  earlier post at Just Security.
Paul Merrell

Watchdog: FBI Facial Recognition May Not Be Accurate - Nextgov.com - 0 views

  • The FBI doesn’t know exactly how accurate its facial recognition technology is, new watchdog report finds. The bureau's Next Generation Identification-Interstate Photo System, a database including more than 30 million photos of criminals, lets law enforcement match a surveillance camera photo to that of a known criminal by narrowing their identity to between two and 50 possible candidates. But the FBI hasn't ensured its facial recognition technology doesn’t “unnecessarily include photos of innocent people as investigative leads,” according to a new report from the Government Accountability Office. The NGI-IPS and the FBI’s "Facial Analysis, Comparison and Evaluation Services," or FACE, which accesses databases from other federal, state and local groups, were the subject of a recent audit.  Most photos in NGI-IPS are submitted from 18,000 external groups among federal, state and local law enforcement -- about 70 percent are criminal mugshots. It’s the same technology that helped the FBI and a state track down a sex offender who had been on the run for 20 years. The FBI has spent about $55 million on facial recognition over the last six years.
  • FBI officials haven’t tested the detection rate -- how often a match is generated against a submitted photo -- for lists less than 50 candidates, according to GAO. Law enforcement may request a specific number of candidates for any search, though the default is 20. Verifying that NGI-IPS is accurate for all candidate list sizes would provide more assurance that the system helps to “enhance, rather than hinder, criminal investigations,” the GAO report said. <a href="http://pubads.g.doubleclick.net/gampad/jump?sz=300x300&c=801138892&iu=%2F617%2Fnextgov.com%2Fsection_emergingtech%2Fcontent%2Fpid_129155&t=noscript%3Dtrue%26referring_domain%3DTyped%252FBookmarked%26pos%3Dinjector%26level%3D0"> <img src="http://pubads.g.doubleclick.net/gampad/ad?sz=300x300&c=801138892&iu=%2F617%2Fnextgov.com%2Fsection_emergingtech%2Fcontent%2Fpid_129155&t=noscript%3Dtrue%26referring_domain%3DTyped%252FBookmarked%26pos%3Dinjector%26level%3D0"/> </a> The FBI also hasn’t assessed how often errors occur in facial matching. These can be caused both by lower-quality technology, but also by low-quality photos, the report said. The detection- and the false-positive rate are key data points that will help the bureau and the public understand these risks before the technology is deployed, the report said. GAO also found FBI hadn’t determined whether the facial recognition technology its federal, state and local partners use is accurate enough to support its own investigations. These oversights could impinge on citizen's privacy and civil liberties, the report noted. In 2012, the advocacy group the Electronic Frontier Foundation suggested facial recognition systems could allow “covert, remote, and mass capture and identification of images.”
  • In criminal cases, a false positive might force a defendant to prove he or she isn’t who the facial recognition system thought he was -- such a scenario might “alter the traditional presumption of innocence,” an EFF statement said. The FBI has also been slow in publishing its privacy protocol, the report found. The Justice Department hadn’t updated a key “Privacy Impact Assessment” between 2008 and 2015; and though NGI-IPS has existed since 2011, the FBI also didn’t publish the requisite System of Records Notice, explaining how the technology is used, until May 2016. Publishing these notices more promptly would reassure the public “the FBI is evaluating risks to privacy,” the report said.  The GAO review comes shortly after DOJ published a notice arguing its massive biometric database should be excluded from the Privacy Act, which requires the federal government to disclose, upon inquiry from the subject, the information it collects on the public. The system includes finger and palm prints, iris and facial scans, images of tattoos, from criminals, suspects, detainees and anyone undergoing background checks, security clearances and other government assessments.
Gary Edwards

A Government Failure, Not a Market Failure - WSJ.com - 0 views

  •  
    Excerpt: After 2000, the national push toward home ownership intensified in three dimensions, leading to a doubling of housing prices in just five years' time. First, the Federal Reserve Board's interest-rate policy drove down the cost of borrowing money to unprecedented lows. Second, a common conviction arose that home ownership should be available even to those who, under prevailing conditions, could not afford it. Finally, private agencies charged with determining the risk and value of securities were exceptionally generous in their assessment of the financial products known as "derivatives" whose collateral resided in the value of thousands of mortgages bundled together. The rating agencies understated the risks from these bundled mortgages by assuming that home prices were simply going to rise forever. When the housing bubble burst in 2006, the damage to the financial system pushed the global economy into the worst contraction since the Great Depression. In the midst of the pain and suffering that have accompanied financial collapse and economic contraction-over $15 trillion in wealth has been lost by American households alone while, to date, more than 6 million job losses have boosted the unemployment rate to 9.4 percent-much of the blame has been placed on unregulated financial markets whose behavior is said to have revealed a terrible flaw in the foundation of capitalism itself. This was a market failure, we are told, and the promise of capitalism has always been that the self-correcting mechanisms built into the system would preclude the possibility of a systemic market failure. But the housing bubble only burst after government subsidies pushed house prices up so fast that marginal buyers could no longer afford to chase prices even higher. A bubble created by rigged financial markets and a government-sponsored obsession with home ownership is not a result of market failure, but rather, a result of bad public policy. The belief that home ownership,
Paul Merrell

Nursery staff to be forced to report toddlers at risk of becoming terrorists - UK Polit... - 0 views

  • Nursery staff will be forced to report toddlers at risk of becoming terrorists under plans drawn up by the Home Office. It is part of the department’s consultation over ways to enhance its anti-terrorism strategy, Prevent.Critics have dismissed the proposals as being unnecessarily draconian and turning staff, who are meant to be caring for youngsters, into spies.The consultation document on the Prevent Strategy states: “Senior management and governors are expected to assess the risk of pupils being drawn into terrorism, including support for the extremist ideas that are part of terrorist ideology.”
  • It continues, staff are expected to “identify children at risk of being drawn into terrorism” and “challenge extremist ideas which can be used to legitimise terrorism”.The Home Office said it would not expect the hypothetical situation of a young child being taught that non-Muslims are wicked to be ignored. Equally, anti-Semitic comments made in front of nursery workers should be reported, the department added.But opponents of the plans are unsure how they will work in practice.
  •  
    Incredible.
Paul Merrell

Department of Defense Confronts Climate Change - 0 views

  • The Department of Defense is organizing itself to address the effects of climate change on the U.S. military, some of which are already being felt. “The DoD must be able to adapt current and future operations to address the impacts of climate change in order to maintain an effective and efficient U.S. military,” according to a Pentagon directive that was issued last week. See Climate Change Adaptation and Resilience, DoD Directive 4715.21, January 14, 2016. Among other things, the new directive requires the Under Secretary of Defense for Intelligence and the Director of National Intelligence to coordinate on “risks, potential impacts, considerations, vulnerabilities, and effects [on defense intelligence programs] of altered operating environments related to climate change and environmental monitoring.” “The Department of Defense sees climate change as a present security threat, not strictly a long-term risk,” DoD said last year in a report to Congress. “We are already observing the impacts of climate change in shocks and stressors to vulnerable nations and communities, including in the United States, and in the Arctic, Middle East, Africa, Asia, and South America…. Although DoD and the Combatant Commands cannot prepare for every risk and situation, the Department is beginning to include the implications of a changing climate in its frameworks for managing operational and strategic risks prudently.” See National Security Implications of Climate-Related Risks and a Changing Climate, DoD report to Congress, July 2015.
  • “We are almost done with a baseline survey to assess the vulnerability of our military’s more than 7,000 bases, installations, and other facilities,” wrote then-Secretary of Defense Chuck Hagel in a 2014 Climate Change Adaptation Roadmap. “In places like the Hampton Roads region in Virginia, which houses the largest concentration of US military sites in the world, we see recurrent flooding today, and we are beginning work to address a projected sea-level rise of 1.5 feet over the next 20 to 50 years.” “Politics or ideology must not get in the way of sound planning,” Secretary Hagel wrote.
Paul Merrell

Obama Should Release Ukraine Evidence | Consortiumnews - 0 views

  • With the shoot-down of Malaysia Airlines Flight 17 over Ukraine turning a local civil war into a U.S. confrontation with Russia, U.S. intelligence veterans urge President Obama to release what evidence he has about the tragedy and silence the hyperbole. MEMORANDUM FOR: The President FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Intelligence on Shoot-Down of Malaysian Plane Executive Summary
  • U.S.–Russian tensions are building in a precarious way over Ukraine, and we are far from certain that your advisers fully appreciate the danger of escalation. The New York Times and other media outlets are treating sensitive issues in dispute as flat-fact, taking their cue from U.S. government sources. Twelve days after the shoot-down of Malaysian Airlines Flight 17, your administration still has issued no coordinated intelligence assessment summarizing what evidence exists to determine who was responsible – much less to convincingly support repeated claims that the plane was downed by a Russian-supplied missile in the hands of Ukrainian separatists.
  • We, the undersigned former intelligence officers want to share with you our concern about the evidence adduced so far to blame Russia for the July 17 downing of Malaysian Airlines Flight 17. We are retired from government service and none of us is on the payroll of CNN, Fox News, or any other outlet. We intend this memorandum to provide a fresh, different perspective.
  • ...4 more annotations...
  • As intelligence professionals we are embarrassed by the unprofessional use of partial intelligence information. As Americans, we find ourselves hoping that, if you indeed have more conclusive evidence, you will find a way to make it public without further delay. In charging Russia with being directly or indirectly responsible, Secretary of State John Kerry has been particularly definitive. Not so the evidence. His statements seem premature and bear earmarks of an attempt to “poison the jury pool.”
  • Regarding the Malaysia Airlines shoot-down of July 17, we believe Kerry has typically rushed to judgment and that his incredible record for credibility poses a huge disadvantage in the diplomatic and propaganda maneuvering vis-a-vis Russia. We suggest you call a halt to this misbegotten “public diplomacy” offensive. If, however, you decide to press on anyway, we suggest you try to find a less tarnished statesman or woman.
  • If the U.S. has more convincing evidence than what has so far been adduced concerning responsibility for shooting down Flight 17, we believe it would be best to find a way to make that intelligence public – even at the risk of compromising “sources and methods.” Moreover, we suggest you instruct your subordinates not to cheapen U.S. credibility by releasing key information via social media like Twitter and Facebook. The reputation of the messenger for credibility is also key in this area of “public diplomacy.” As is by now clear to you, in our view Secretary Kerry is more liability than asset in this regard. Similarly, with regard to Director of National Intelligence James Clapper, his March 12, 2013 Congressional testimony under oath to what he later admitted were “clearly erroneous” things regarding NSA collection should disqualify him. Clapper should be kept at far remove from the Flight 17 affair. What is needed, if you’ve got the goods, is an Interagency Intelligence Assessment – the genre used in the past to lay out the intelligence. We are hearing indirectly from some of our former colleagues that what Secretary Kerry is peddling does not square with the real intelligence. Such was the case late last August, when Kerry created a unique vehicle he called a “Government (not Intelligence) Assessment” blaming, with no verifiable evidence, Bashar al-Assad for the chemical attacks near Damascus, as honest intelligence analysts refused to go along and, instead, held their noses.
  • We believe you need to seek out honest intelligence analysts now and hear them out. Then, you may be persuaded to take steps to curb the risk that relations with Russia might escalate from “Cold War II” into an armed confrontation. In all candor, we see little reason to believe that Secretary Kerry and your other advisers appreciate the enormity of that danger. In our most recent (May 4) memorandum to you, Mr. President, we cautioned that if the U.S. wished “to stop a bloody civil war between east and west Ukraine and avert Russian military intervention in eastern Ukraine, you may be able to do so before the violence hurtles completely out of control.” On July 18, you joined the top leaders of Germany, France, and Russia in calling for an immediate ceasefire. Most informed observers believe you have it in your power to get Ukrainian leaders to agree. The longer Kiev continues its offensive against separatists in eastern Ukraine, the more such U.S. statements appear hypocritical. We reiterate our recommendations of May 4, that you remove the seeds of this confrontation by publicly disavowing any wish to incorporate Ukraine into NATO and that you make it clear that you are prepared to meet personally with Russian President Putin without delay to discuss ways to defuse the crisis and recognize the legitimate interests of the various parties. The suggestion of an early summit got extraordinary resonance in controlled and independent Russian media. Not so in “mainstream” media in the U.S. Nor did we hear back from you. The courtesy of a reply is requested.
  •  
    Veteran Intelligence Professionals for Sanity (VIPS) savage thecredibility of John Kerry and James Clapper, saying that Kerry's claims of Russian responsibility for shooting down MH17 are at odds with what they are being told by intelligence analysts still working for the government, and challenge Obama to release any evidence he has to support Kerry's version of events. Reading the entire communique is highly recommended.
Paul Merrell

Update on Iran Sanctions Legislation « LobeLog - 0 views

  • The sponsors of the latest Kirk-Menendez Iran sanctions bill appear determined to move the legislation as quickly as possible, although it has yet to be formally introduced. Of course, both Obama and visiting British Prime Minister David Cameron came out strongly against any sanctions legislation during their joint press appearance at the White House Friday, warning that approval risked sabotaging not only the ongoing negotiations, but also unity among the P5+1 (U.S., U.K, France, Russia, China plus Germany) themselves. In olden times one would have expected most Republicans to take seriously what a British prime minister–especially one from Winston Churchill’s Conservative Party–has to say about a foreign policy issue of mutual interest. But the combination of their real hatred for Obama and purported love for Israel (and especially for the campaign funds from wealthy Republican Jewish Coalition donors like Sheldon Adelson) is likely to supersede the historic “special relationship” extolled by Churchill himself. In any event, the best and most up-to-date summary of where things stand was provided in the weekly Legislative Round-Up by Lara Friedman of Americans for Peace Now (APN), lengthy excerpts of which are reproduced below with permission. (APN legislative round-ups are an excellent source for tracking what’s happening on Capitol Hill on Middle East policy.) Note that there are two parts to her account: the first is regarding an AIPAC draft that circulated earlier this week (and Lara’s analysis of that legislation); the second, an updated version circulated at week’s end apparently in the hope of securing more Democratic support, as well as Lara’s analysis of that draft.
  • Updated analysis of Kirk-Menendez text (as of 3pm, 1/16) In some annoying corollary to Murphy’s Law, shortly after posting analysis of the draft text of the new Kirk-Menendez sanctions bill (in which it was noted that the text should not be considered final or authoritative), a newer draft of the bill began circulating (underscoring the oddness of AIPAC circulating a “summary” of the bill while it was/is apparently still being tweaked).  Bearing in mind that this new text should still not be considered final or authoritative, the following are some observations about this newer text:
  • Existing sanctions don’t snap back, but additional sanctions relief remains elusive: This newer text repeats language in the earlier draft to the effect that while following an agreement (and required notification to Congress) the President may not waive any sanctions on Iran until Congress has had time to review the deal and the Administration’s plans to verify Iranian compliance. The newer version includes language – completely absent in the earlier draft – stipulating that this ban on waiving sanctions does not apply to sanctions previously waived under the JPOA. Notably, the updated version of the bill still stipulates that the Congressional review period during which the President is barred from waiving any new sanctions must last “30 days of continuous session of Congress,” and defines “continuous session” as not including periods where Congress is in recess for more than 3 days.  What does this mean? Looking at the House Calendar for 2105 and counting the days, it means that if the President sends the details of a deal and the required “verification assessment” to Congress on July 5, no new sanctions may be waived until at least November 13.
  • ...3 more annotations...
  • Automatic new sanctions if no agreement or further delay: Like the earlier version, this text stipulates that new sanctions would automatically be imposed, escalating over a period of months, in the event that  the Presidents fails to send to Congress the details of a comprehensive deal reached with Iran and the required “verification assessment” by July 5. This appears to apply even in the case of an additional extension or the sides agreeing to a period to iron out the details of implementation of an agreement.  It also stipulates that in the event that the President fails to send to Congress the details of a comprehensive deal reached with Iran and the required “verification assessment” by July 5, any sanctions previously waived by the President under the JPOA will automatically snap back on.
  • Laying out far-reaching parameters for a deal: Like in the previous version, the Sense of Congress included in the bill is, by definition, non-binding. It nonetheless sends a strong statement of Congressional intent. And this Sense of Congress, like the previous version, sends a statement of hardline red lines in order for any deal to be acceptable to Congress (and the lengthy review period imposed by this bill clearly implies that Congress will be reviewing any agreement to determine if it meets its standards – and implies that if it does not meet its standards, there will be concrete consequences). Promising that sanctions will continue, regardless of a deal. While, like in the previous version, the Sense of Congress is by definition non-binding, it nonetheless sends a strong statement of Congressional intent. And this Sense of Congress once again makes clear that even if there is a deal that verifiably addresses U.S. concerns about Iran’s nuclear program, Congress will seek to continue to impose far-reaching sanctions against Iran for other reasons.
  • Planting the seeds for a deal to far apart:  The key provisions of this updated version of the bill, even amended, are a clear poison pill for any agreement.  In effect, this bill undermines negotiations and weakens U.S. negotiators. Rather than offering more sanctions relief to Iran in exchange for a deal, it prohibits it, and establishes a 4-month period during which the President is explicitly deprived of any authority to deliver anything to Iran beyond what was already delivered during negotiations. Assuming Iran would agree to a deal under such circumstances – which is doubtful – this bill sets into motion a dynamic in which Iranian opponents of a diplomacy will have an easy time arguing against the deal, and in which mischief-makers in Congress will have ample time to push ahead with new legislation rejecting a deal or putting new conditions on its implementation and limitations on sanctions relief. And given the Sense of Congress in this bill – which makes the case for continued Iran sanctions even after a nuclear deal, it is not a stretch to imagine that members of Congress would adopt such an approach during this 4 month waiting period.
  •  
    Remember that the Israeli-firsters goal is not actually do do anything about Iranian nuclear weapons: there are none. There goal is to shoot down the negotiations and for the U.S. to bomb Iran back into the Stone Age.
Paul Merrell

IRBIL, Iraq: Iraqi army remains on defensive as extent of June debacle becomes clearer ... - 0 views

  • Iraqi and U.S. officials have confirmed that fighters allied with the Islamic State not only captured hundreds of U.S.-supplied Humvees and large amounts of ammunition in their march across Iraq, but they also now possess as many as 52 U.S.-supplied artillery pieces with GPS aiming systems. The 155mm guns have a range of 20 miles, putting many Iraqi cities still in government hands easily within range of Islamic State positions.
  • Iraqi and U.S. officials have confirmed that fighters allied with the Islamic State not only captured hundreds of U.S.-supplied Humvees and large amounts of ammunition in their march across Iraq, but they also now possess as many as 52 U.S.-supplied artillery pieces with GPS aiming systems. The 155mm guns have a range of 20 miles, putting many Iraqi cities still in government hands easily within range of Islamic State positions.
  • Iraqi and U.S. officials have confirmed that fighters allied with the Islamic State not only captured hundreds of U.S.-supplied Humvees and large amounts of ammunition in their march across Iraq, but they also now possess as many as 52 U.S.-supplied artillery pieces with GPS aiming systems. The 155mm guns have a range of 20 miles, putting many Iraqi cities still in government hands easily within range of Islamic State positions.
  • ...5 more annotations...
  • Iraqi and U.S. officials have confirmed that fighters allied with the Islamic State not only captured hundreds of U.S.-supplied Humvees and large amounts of ammunition in their march across Iraq, but they also now possess as many as 52 U.S.-supplied artillery pieces with GPS aiming systems. The 155mm guns have a range of 20 miles, putting many Iraqi cities still in government hands easily within range of Islamic State positions.
  • Iraqi and U.S. officials have confirmed that fighters allied with the Islamic State not only captured hundreds of U.S.-supplied Humvees and large amounts of ammunition in their march across Iraq, but they also now possess as many as 52 U.S.-supplied artillery pieces with GPS aiming systems. The 155mm guns have a range of 20 miles, putting many Iraqi cities still in government hands easily within range of Islamic State positions.
  • With five teams of 90 U.S. troops completing their initial assessment of what it would take to help the Iraqi army reverse its military losses, the situation as described by Iraqi soldiers, a senior Iraqi politician and outside analysts who are carefully watching developments underscores how difficult a task awaits any American advisers asked to rejuvenate the Iraqi military. They describe a military riddled with incompetence, unable to provide support to troops in combat, widespread cowardice among the officer corps, and without a coherent plan for reversing the Islamic State’s advance.The initial U.S. assessment, which arrived at the Pentagon Monday, apparently is just as grim. In one of its most alarming findings, according to a Pentagon official, the advisers concluded that while Iraqi troops could defend Baghdad against an attack now, they would be unable to launch the kind of offensive maneuvers required to fend off the insurgents for the long term, leaving the capital at continued risk. The official asked to remain anonymous because he had not been authorized to discuss the report.The advisers also warned that the majority of Iraqi brigades are infiltrated by either Sunni extremists or Shiite militias, the official said.
  • Four Iraqi army divisions have simply disappeared and won’t be easily resurrected.The 2nd Division was routed from Mosul, Iraq’s second largest city, on June 9 at the beginning of the Islamic State’s advance, and its four brigades have dissolved. The 1st Division also is basically gone, losing two brigades in Anbar province earlier in the year, then two more during last month’s Islamic State onslaught, including one brigade that in the words of the senior Iraqi politician was “decimated” in Diyala province northeast of Baghdad.The same is true of Iraq’s 3rd Division. The division’s 6th and 9th Brigades fled the Islamic State’s advance in the north, and the status of its 11th Brigade is unknown. A small unit of its 10th Brigade is still in Tal Afar, but it is trapped by Islamic State forces.
  • The 4th Division also was routed. Half its members have disappeared _ many suspect they were massacred when the Islamic State captured Tikrit _ and only one small unit is known to still exist, surrounded by Islamists at a one-time U.S. military base near Tikrit known as Camp Speicher.
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

security theater, martial law, and a tale that trumps every cop-and-donut joke you've e... - 0 views

  • First, just in case it's not utterly obvious, I'm glad that the two murderous cowards who attacked civilians in Boston recently are off the streets. One dead and one in custody is a great outcome. That said, a large percent of the reaction in Boston has been security theater. "Four victims brutally killed" goes by other names in other cities. In Detroit, for example, they call it "Tuesday". …and Detroit does not shut down every time there are a few murders.
  • "Then why the hell do you care, Clark?" First, the unprecendented shutdown of a major American city may have increased safety some small bit, but it was not without a cost: keeping somewhere between 2 and 5 million people from work, shopping, and school destroyed a nearly unimaginable amount of value. If we call it just three million people, and we peg the cost at a mere $15 per person per hour, the destroyed value runs to a significant fraction of a billion dollars. "Yeah, maybe…but in this day and age where the federal government is borrowing an extra $3.85 billion per day, a couple of hundred million doesn't sound like much. After all, if we're borrowing money that our children and grandchildren will have to pay back to fund Cowboy Poetry Festival and military golf courses, then what's another $200 or $400 million to keep people safe?"
  • Second, the cost isn't just measured in dollars – it's measured in the degree to which it trains a population to freak out over minor risk and to trust blindly in authorities. Third, keeping citizens off the street meant that 99% of the eyes and brains that might solve a crime were being wasted. Eric S Raymond famously said that "given enough eyeballs, all bugs are shallow". It was thousands of citizen photographs that helped break this case, and it was a citizen who found the second bomber. Yes, that's right – it wasn't until the stupid lock-down was ended that a citizen found the second murderer
  • ...2 more annotations...
  • We had thousands of police going door-to-door, searching houses…and yet not one of them saw the evidence that a citizen did just minutes after the lock-down ended. "But Clark," you protest, "you may not trust the government to decide what's risky and what's not, but I do. If it saves even one life, then shutting down a major city is the right move. That's obvious!" But the Boston police didn't shut down an entire city. They shut down an entire city except for the donut shops. boston.com Law enforcement asked Dunkin' Donuts to keep restaurants open in locked-down communities to provide… food to police… including in Watertown, the focus of the search for the bombing suspect.
  • The government and police were willing to shut down parts of the economy like the universities, software, biotech, and manufacturing…but when asked to do an actual risk to reward calculation where a small part of the costs landed on their own shoulders, they had no problem weighing one versus the other and then telling the donut servers "yeah, come to work – no one's going to get shot." And they were right.
Paul Merrell

Obama's crackdown views leaks as aiding enemies of U.S. | McClatchy - 0 views

  • Even before a former U.S. intelligence contractor exposed the secret collection of Americans’ phone records, the Obama administration was pressing a government-wide crackdown on security threats that requires federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions. President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.
  • Government documents reviewed by McClatchy illustrate how some agencies are using that latitude to pursue unauthorized disclosures of any information, not just classified material. They also show how millions of federal employees and contractors must watch for “high-risk persons or behaviors” among co-workers and could face penalties, including criminal charges, for failing to report them. Leaks to the media are equated with espionage.
  • Employees must turn themselves and others in for failing to report breaches. “Penalize clearly identifiable failures to report security infractions and violations, including any lack of self-reporting,” the strategic plan says.The Obama administration already was pursuing an unprecedented number of leak prosecutions, and some in Congress – long one of the most prolific spillers of secrets – favor tightening restrictions on reporters’ access to federal agencies, making many U.S. officials reluctant to even disclose unclassified matters to the public. The policy, which partly relies on behavior profiles, also could discourage creative thinking and fuel conformist “group think” of the kind that was blamed for the CIA’s erroneous assessment that Iraq was hiding weapons of mass destruction, a judgment that underpinned the 2003 U.S. invasion. “The real danger is that you get a bland common denominator working in the government,” warned Ilana Greenstein, a former CIA case officer who says she quit the agency after being falsely accused of being a security risk. “You don’t get people speaking up when there’s wrongdoing. You don’t get people who look at things in a different way and who are willing to stand up for things. What you get are people who toe the party line, and that’s really dangerous for national security.”
  • ...3 more annotations...
  • The program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations of loyal Americans, according to these current and former officials and experts. Some non-intelligence agencies already are urging employees to watch their co-workers for “indicators” that include stress, divorce and financial problems.
  • The program, however, gives agencies such wide latitude in crafting their responses to insider threats that someone deemed a risk in one agency could be characterized as harmless in another. Even inside an agency, one manager’s disgruntled employee might become another’s threat to national security. Obama in November approved “minimum standards” giving departments and agencies considerable leeway in developing their insider threat programs, leading to a potential hodgepodge of interpretations. He instructed them to not only root out leakers but people who might be prone to “violent acts against the government or the nation” and “potential espionage.”
  • The Department of Education, meanwhile, informs employees that co-workers going through “certain life experiences . . . might turn a trusted user into an insider threat.” Those experiences, the department says in a computer training manual, include “stress, divorce, financial problems” or “frustrations with co-workers or the organization.”An online tutorial titled “Treason 101” teaches Department of Agriculture and National Oceanic and Atmospheric Administration employees to recognize the psychological profile of spies.
Paul Merrell

Legislative Cyber Threats: CISA's Not The Only One | Just Security - 0 views

  • If anyone in the United States Senate had any doubts that the proposed Cyber Information Sharing Act (CISA) was universally hated by a range of civil society groups, a literal blizzard of faxes should’ve cleared up the issue by now. What’s not getting attention is a CISA “alternative” introduced last week by Sens. Mark Warner (D-Va) and Susan Collins (R-Me). Dubbed the “FISMA Reform Act,” the authors make the following claims about the bill:  This legislation would allow the Secretary of Homeland Security to operate intrusion detection and prevention capabilities on all federal agencies on the .gov domain. The bipartisan bill would also direct the Secretary of Homeland Security to conduct risk assessments of any network within the government domain. The bill would allow the Secretary of Homeland Security to operate defensive countermeasures on these networks once a cyber threat has been detected. The legislation would strengthen and streamline the authority Congress gave to DHS last year to issue binding operational directives to federal agencies, especially to respond to substantial cyber security threats in emergency circumstances.
  • The bill would require the Office of Management and Budget to report to Congress annually on the extent to which OMB has exercised its existing authority to enforce government wide cyber security standards. On the surface, it actually sounds like a rational response to the disastrous OPM hack. Unfortunately, the Warner-Collins bill has some vague or problematic language and non-existent definitions that make it potentially just as dangerous for data security and privacy as CISA. The bill would allow the Secretary of Homeland Security to carry out cyber security activities “in conjunction with other agencies and the private sector” [for] “assessing and fostering the development of information security technologies and capabilities for use across multiple agencies.” While the phrase “information sharing” is not present in this subsection, “security technologies and capabilities” is more than broad — and vague — enough to allow it.
  • The bill would also allow the secretary to “acquire, intercept, retain, use, and disclose communications and other system traffic that are transiting to or from or stored on agency information systems and deploy countermeasures with regard to the communications and system traffic.”
  • ...2 more annotations...
  • The bill also allows the head of a federal agency or department “to disclose to the Secretary or a private entity providing assistance to the Secretary…information traveling to or from or stored on an agency information system, notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary.” (Emphasis added.) So confidential, proprietary or other information otherwise precluded from disclosure under laws like HIPAA or the Privacy Act get waived if the Secretary of DHS or an agency head feel that your email needs to be shared with a government contracted outfit like the Hacking Team for analysis. And the bill explicitly provides for just this kind of cyber threat analysis outsourcing:
  • (3) PRIVATE ENTITIES. — The Secretary may enter into contracts or other agreements, or otherwise request and obtain the assistance of, private entities that provide electronic communication or information security services to acquire, intercept, retain, use, and disclose communications and other system traffic in accordance with this subsection. The bill further states that the content of your communications, will be retained only if the communication is associated with a known or reasonably suspected information security threat, and communications and system traffic will not be subject to the operation of a countermeasure unless associated with the threats. (Emphasis added.) “Reasonably suspected” is about as squishy a definition as one can find.
  •  
    "The bill also allows the head of a federal agency or department "to disclose to the Secretary or a private entity providing assistance to the Secretary…information traveling to or from or stored on an agency information system, notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary."" Let's see: if your information is intercepted by the NSA and stored on its "information system" in Bluffdale, Utah, then it can be disclosed to the Secretary of DHS or any private entity providing him/her with assistance, "notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary." And if NSA just happens to be intercepting every digital bit of data generated or received in the entire world, including the U.S., then it's all in play, "notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary.". Sheesh! Our government voyeurs never stop trying to get more nude pix and videos to view.  
Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Paul Merrell

Iceland Stuns Banks: Plans To Take Back The Power To Create Money | Global Research - C... - 0 views

  • Who knew that the revolution would start with those radical Icelanders? It does, though. One Frosti Sigurjonsson, a lawmaker from the ruling Progress Party, issued a report today that suggests taking the power to create money away from commercial banks, and hand it to the central bank and, ultimately, Parliament. Can’t see commercial banks in the western world be too happy with this. They must be contemplating wiping the island nation off the map. If accepted in the Iceland parliament , the plan would change the game in a very radical way. It would be successful too, because there is no bigger scourge on our economies than commercial banks creating money and then securitizing and selling off the loans they just created the money (credit) with. Everyone, with the possible exception of Paul Krugman, understands why this is a very sound idea. Agence France Presse reports: Iceland Looks At Ending Boom And Bust With Radical Money Plan Iceland’s government is considering a revolutionary monetary proposal – removing the power of commercial banks to create money and handing it to the central bank. The proposal, which would be a turnaround in the history of modern finance, was part of a report written by a lawmaker from the ruling centrist Progress Party, Frosti Sigurjonsson, entitled “A better monetary system for Iceland”.
  • “The findings will be an important contribution to the upcoming discussion, here and elsewhere, on money creation and monetary policy,” Prime Minister Sigmundur David Gunnlaugsson said. The report, commissioned by the premier, is aimed at putting an end to a monetary system in place through a slew of financial crises, including the latest one in 2008.
  • According to a study by four central bankers, the country has had “over 20 instances of financial crises of different types” since 1875, with “six serious multiple financial crisis episodes occurring every 15 years on average”. Mr Sigurjonsson said the problem each time arose from ballooning credit during a strong economic cycle. He argued the central bank was unable to contain the credit boom, allowing inflation to rise and sparking exaggerated risk-taking and speculation, the threat of bank collapse and costly state interventions. In Iceland, as in other modern market economies, the central bank controls the creation of banknotes and coins but not the creation of all money, which occurs as soon as a commercial bank offers a line of credit. The central bank can only try to influence the money supply with its monetary policy tools.
  • ...1 more annotation...
  • Under the so-called Sovereign Money proposal, the country’s central bank would become the only creator of money. “Crucially, the power to create money is kept separate from the power to decide how that new money is used,” Mr Sigurjonsson wrote in the proposal. “As with the state budget, the parliament will debate the government’s proposal for allocation of new money,” he wrote. Banks would continue to manage accounts and payments, and would serve as intermediaries between savers and lenders. Mr Sigurjonsson, a businessman and economist, was one of the masterminds behind Iceland’s household debt relief programme launched in May 2014 and aimed at helping the many Icelanders whose finances were strangled by inflation-indexed mortgages signed before the 2008 financial crisis.
  •  
    In closely related news, a Pentagon spokesman announced that soldiers of the U.S. Army's 101st Airborne Brigade and 22nd and 26th Marine Expeditionary Units were in the "mopping up stage" of routing terrorists who had captured the city of Reykjavík, Iceland in an April 7, 2015 surpise attack. According to knowledgeable sources in the White House, the terrorist invasion was reported by an unidentified official of the Federal Reserve Bank of New York, who had received urgent telephone calls from counterparts in Iceland's central bank. "We're still assessing the situation, but it looks like all members of the Icelandic government were brutally executed by the terrorists just before they retreated," Rear Adm. John Kirby said. Asked for the name of the terrorist organization that carried out the attack, Adm. Kirby said that the name had not yet been declassified, but said that he hoped to be able to announce that information soon.     
Paul Merrell

Little consensus within administration on how to stop fall of Aleppo to Assad - The Was... - 0 views

  • There is no consensus within the administration about what the United States can or should do to try to bring a halt to the killing and stop what appears to be the increasingly inevitable fall of Aleppo, Syria’s largest city, to government forces.
  • But last Thursday, as the discussion moved up the chain to a contentious White House meeting of national security principals, top defense officials made clear that their position had not changed. They advised a possible increase in weapons aid to opposition fighters but said the United States should focus its own military firepower on the anti-Islamic State mission rather than risk a direct confrontation with Russia. Asked about the perception of a double shift, a senior defense official said the Pentagon’s position had not changed. “We still believe there are a number of ways to bolster the opposition and not compromise the anti-Islamic State mission,” this official said.
  • But others felt that they had been spun by the defense leadership. Amid increasing internal tension, one senior administration official insisted that both the Syrian opposition and U.S. allies have pressed for a continuation of negotiations and discouraged talk of military intervention. Obama’s position on the subject, this official said, has been “consistent. We do not believe there is a military solution to this conflict. There are any number of challenges that come with applying military force in this context.” In Obama’s recent speech at the United Nations, the official noted, Obama repeated that “there’s no ultimate military victory to be won” in Syria. Instead, Obama said, “we’re going to have to pursue the hard work of diplomacy that aims to stop the violence, and deliver aid to those in need, and support those who pursue a political settlement.” No proposals have been presented to Obama for a decision, and some in the administration think the White House is willing to let time run out on Aleppo, in part to preserve options for a new administration.
  • ...6 more annotations...
  • De Mistura has predicted that if Russian and Syrian air attacks and artillery bombardment do not stop, the city will fall before the end of the year; the U.S. intelligence community assesses that it could be a matter of weeks.
  • An estimated 275,000 civilians, one-third of them children, and 10,000 rebels are surrounded in the eastern side of the city, now under constant aerial attack
  • While Aleppo is the proximate prize sought by the government and its Russian backers, at least 50,000 opposition fighters — many of whom owe their training, weapons and inspiration in large part to the United States — remain in pockets spread across western Syria. Many of those forces have been advised and supplied by the CIA, whose director, John Brennan, is said to favor military action or, at the very least, dispatching more and better weapons to the opposition, particularly if Aleppo is lost. That decision, which would allow the rebels to continue to fight a guerrilla war, or to defend those pockets of the country still in opposition hands, might not be the administration’s to make. Allied governments in the region, including Qatar, Turkey and, to a lesser extent, Saudi Arabia, have long advocated for increased support for the rebels and could decide on their own to send more sophisticated armaments — some of which, including shoulder-launched antiaircraft weapons, the United States has refused to make available on the grounds that they could end up in the wrong hands.
  • As they assess Russian President Vladi­mir Putin’s goals in Syria, intelligence officials think he is less interested in an outright military victory than in being able to set the terms for a settlement that ensures Assad’s survival. But at least in the short term, they believe, the big winner may be the Front for the Conquest of Syria, the al-Qaeda affiliate formerly known as Jabhat al-Nusra. The jihadist group, which U.S. officials have said is planning “external operations” against the United States, has grown in strength and respect as a formidable, well-equipped fighting force against Assad. While senior White House aides are said to be opposed to U.S. military action, one other official who is said to have argued in favor of a military response is Samantha Power, the U.S. ambassador to the United Nations,
  • Echoing the arguments for accountability in the book, “A Problem From Hell,” Kerry last week publicly called for Russia and Syria to be investigated for war crimes for the targeted killing of civilians and wanton destruction in Aleppo and beyond. On Friday, Moscow described Kerry’s call as “propaganda” and repeated its assertion that the United States, by failing to separate rebel forces from the targetable terrorists it insists control Aleppo, is to blame for the failure of the cease-fire. According to international-law experts, however, the likelihood of a war crimes prosecution of either country is virtually nonexistent. Neither Russia nor Syria belongs to the treaty-based International Criminal Court, and a referral to its jurisdiction would require a resolution by the U.N. Security Council, a body in which Russia holds a veto. At the same time, both the ICC and the International Court of Justice, the United Nations’ judicial branch, are designed to prosecute individuals rather than states.
  • “The law of war crimes is individual and personal,” said Kenneth Anderson, a law professor at American University. “Talk of war crimes trials by itself is not serious,” Anderson said. “It’s an evasion of policy by a state that does not want to have to respond to the concerted actions of another state, another two states.”
  •  
    The WaPo statistics on the number of people surrounded in East Aleppo are way off. Most of the city is government controlled, but WaPo uses the city's entire population as the number of surrounded people. Best estimates for the number surrounded in the cauldron are in the neighborhood of 10,000 fighters and 20,000 of their camp followers. Let's hope that Obama has a sane moment and doesn't buckle to the chickenhawk pressure.
Paul Merrell

Portuguese Debt Crisis Brings New Trouble for Euro - NYTimes.com - 0 views

  • Just weeks after European leaders tamped down a banking crisis in Cyprus, troubles in the euro zone have again reared their head, this time in Portugal.
  • “The risks in the euro zone have increased markedly over the past six weeks or so,” wrote Nicholas Spiro, managing director of Spiro Sovereign Strategy, a London-based consultancy that assesses risk on sovereign debt. A critical moment for the latest trouble took place on Friday, when Portugal’s Constitutional Court struck down four of nine contested austerity measures that the government introduced as part of a 2013 budget that included about 5 billion euros, or $6.5 billion, of tax increases and spending cuts. The ruling left the government short about 1.4 billion euros of expected revenue, or more than one-fifth of the 2013 austerity package.
  • Specifically, the court, which began reviewing the legality of the government’s austerity measures in January, ruled as unconstitutional and discriminatory the government’s plans to cut holiday bonuses for civil servants and pensioners, as well as to reduce sick leave and unemployment benefits.
Paul Merrell

President Xi's speech to Davos in full | World Economic Forum - 0 views

  • “It was the best of times, it was the worst of times.” These are the words used by the English writer Charles Dickens to describe the world after the Industrial Revolution. Today, we also live in a world of contradictions. On the one hand, with growing material wealth and advances in science and technology, human civilization has developed as never before. On the other hand, frequent regional conflicts, global challenges like terrorism and refugees, as well as poverty, unemployment and widening income gap have all added to the uncertainties of the world. Many people feel bewildered and wonder: What has gone wrong with the world? To answer this question, one must first track the source of the problem. Some blame economic globalization for the chaos in the world. Economic globalization was once viewed as the treasure cave found by Ali Baba in The Arabian Nights, but it has now become the Pandora’s box in the eyes of many. The international community finds itself in a heated debate on economic globalization.
  • Today, I wish to address the global economy in the context of economic globalization. The point I want to make is that many of the problems troubling the world are not caused by economic globalization. For instance, the refugee waves from the Middle East and North Africa in recent years have become a global concern. Several million people have been displaced, and some small children lost their lives while crossing the rough sea. This is indeed heartbreaking. It is war, conflict and regional turbulence that have created this problem, and its solution lies in making peace, promoting reconciliation and restoring stability. The international financial crisis is another example. It is not an inevitable outcome of economic globalization; rather, it is the consequence of excessive chase of profit by financial capital and grave failure of financial regulation. Just blaming economic globalization for the world’s problems is inconsistent with reality, and it will not help solve the problems.
  • But we should also recognize that economic globalization is a double-edged sword. When the global economy is under downward pressure, it is hard to make the cake of global economy bigger. It may even shrink, which will strain the relations between growth and distribution, between capital and labor, and between efficiency and equity. Both developed and developing countries have felt the punch. Voices against globalization have laid bare pitfalls in the process of economic globalization that we need to take seriously. As a line in an old Chinese poem goes, “Honey melons hang on bitter vines; sweet dates grow on thistles and thorns.” In a philosophical sense, nothing is perfect in the world. One would fail to see the full picture if he claims something is perfect because of its merits, or if he views something as useless just because of its defects. It is true that economic globalization has created new problems, but this is no justification to write economic globalization off completely. Rather, we should adapt to and guide economic globalization, cushion its negative impact, and deliver its benefits to all countries and all nations.
  • ...15 more annotations...
  • Whether you like it or not, the global economy is the big ocean that you cannot escape from. Any attempt to cut off the flow of capital, technologies, products, industries and people between economies, and channel the waters in the ocean back into isolated lakes and creeks is simply not possible. Indeed, it runs counter to the historical trend.
  • First, lack of robust driving forces for global growth makes it difficult to sustain the steady growth of the global economy. The growth of the global economy is now at its slowest pace in seven years. Growth of global trade has been slower than global GDP growth. Short-term policy stimuli are ineffective. Fundamental structural reform is just unfolding. The global economy is now in a period of moving toward new growth drivers, and the role of traditional engines to drive growth has weakened. Despite the emergence of new technologies such as artificial intelligence and 3-D printing, new sources of growth are yet to emerge. A new path for the global economy remains elusive. Second, inadequate global economic governance makes it difficult to adapt to new developments in the global economy. Madame Christine Lagarde recently told me that emerging markets and developing countries already contribute to 80 percent of the growth of the global economy. The global economic landscape has changed profoundly in the past few decades. However, the global governance system has not embraced those new changes and is therefore inadequate in terms of representation and inclusiveness. The global industrial landscape is changing and new industrial chains, value chains and supply chains are taking shape. However, trade and investment rules have not kept pace with these developments, resulting in acute problems such as closed mechanisms and fragmentation of rules.
  • Third, uneven global development makes it difficult to meet people’s expectations for better lives. Dr. Schwab has observed in his book The Fourth Industrial Revolution that this round of industrial revolution will produce extensive and far-reaching impacts such as growing inequality, particularly the possible widening gap between return on capital and return on labor. The richest one percent of the world’s population own more wealth than the remaining 99 percent. Inequality in income distribution and uneven development space are worrying. Over 700 million people in the world are still living in extreme poverty. For many families, to have warm houses, enough food and secure jobs is still a distant dream. This is the biggest challenge facing the world today. It is also what is behind the social turmoil in some countries. All this shows that there are indeed problems with world economic growth, governance and development models, and they must be resolved. The founder of the Red Cross Henry Dunant once said, “Our real enemy is not the neighboring country; it is hunger, poverty, ignorance, superstition and prejudice.” We need to have the vision to dissect these problems; more importantly, we need to have the courage to take actions to address them.
  • First, we should develop a dynamic, innovation-driven growth model. The fundamental issue plaguing the global economy is the lack of driving force for growth.Innovation is the primary force guiding development. Unlike the previous industrial revolutions, the fourth industrial revolution is unfolding at an exponential rather than linear pace. We need to relentlessly pursue innovation. Only with the courage to innovate and reform can we remove bottlenecks blocking global growth and development. With this in mind, G-20 leaders reached an important consensus at the Hangzhou Summit, which is to take innovation as a key driver and foster new driving force of growth for both individual countries and the global economy. We should develop a new development philosophy and rise above the debate about whether there should be more fiscal stimulus or more monetary easing. We should adopt a multipronged approach to address both the symptoms and the underlying problems. We should adopt new policy instruments and advance structural reform to create more space for growth and sustain its momentum. We should develop new growth models and seize opportunities presented by the new round of industrial revolution and digital economy. We should meet the challenges of climate change and aging population. We should address the negative impact of IT application and automation on jobs. When cultivating new industries and new forms models of business models, we should create new jobs and restore confidence and hope to our peoples.
  • Second, we should pursue a well-coordinated and inter-connected approach to develop a model of open and win-win cooperation. Today, mankind has become a close-knit community of shared future. Countries have extensive converging interests and are mutually dependent. All countries enjoy the right to development. At the same time, they should view their own interests in a broader context and refrain from pursuing them at the expense of others. We should commit ourselves to growing an open global economy to share opportunities and interests through opening-up and achieve win-win outcomes. One should not just retreat to the harbor when encountering a storm, for this will never get us to the other shore of the ocean. We must redouble efforts to develop global connectivity to enable all countries to achieve inter-connected growth and share prosperity. We must remain committed to developing global free trade and investment, promote trade and investment liberalization and facilitation through opening-up and say no to protectionism. Pursuing protectionism is like locking oneself in a dark room. While wind and rain may be kept outside, that dark room will also block light and air. No one will emerge as a winner in a trade war.
  • Third, we should develop a model of fair and equitable governance in keeping with the trend of the times. As the Chinese saying goes, people with petty shrewdness attend to trivial matters, while people with vision attend to governance of institutions. There is a growing call from the international community for reforming the global economic governance system, which is a pressing task for us. Only when it adapts to new dynamics in the international economic architecture can the global governance system sustain global growth. Countries, big or small, strong or weak, rich or poor, are all equal members of the international community. As such, they are entitled to participate in decision-making, enjoy rights and fulfill obligations on an equal basis. Emerging markets and developing countries deserve greater representation and voice. The 2010 IMF quota reform has entered into force, and its momentum should be sustained. We should adhere to multilateralism to uphold the authority and efficacy of multilateral institutions. We should honor promises and abide by rules. One should not select or bend rules as he sees fit. The Paris Agreement is a hard-won achievement which is in keeping with the underlying trend of global development. All signatories should stick to it instead of walking away from it as this is a responsibility we must assume for future generations.
  • Despite a sluggish global economy, China’s economy is expected to grow by 6.7 percent in 2016, still one of the highest in the world. China’s economy is far bigger in size than in the past, and it now generates more output than it did with double-digit growth in the past. Household consumption and the services sector have become the main drivers of growth. In the first three quarters of 2016, added value of the tertiary industry took up 52.8 percent of the GDP and domestic consumption contributed to 71 percent of economic growth. Household income and employment have steadily risen, while per unit GDP energy consumption continues to drop. Our efforts to pursue green development are paying off. The Chinese economy faces downward pressure and many difficulties, including acute mismatch between excess capacity and an upgrading demand structure, lack of internal driving force for growth, accumulation of financial risks, and growing challenges in certain regions. We see these as temporary hardships that occur on the way forward. And the measures we have taken to address these problems are producing good results. We are firm in our resolve to forge ahead. China is the world’s largest developing country with over 1.3 billion people, and their living standards are not yet high. But this reality also means China has enormous potential and space for development. Guided by the vision of innovative, coordinated, green, open and shared development, we will adapt to the new normal, stay ahead of the curve, and make coordinated efforts to maintain steady growth, accelerate reform, adjust economic structure, improve people’s living standards and fend off risks. With these efforts, we aim to achieve medium-high rate of growth and upgrade the economy to higher end of the value chain.
  • We should foster a culture that values diligence, frugality and enterprise and respects the fruits of hard work of all. Priority should be given to addressing poverty, unemployment, the widening income gap and the concerns of the disadvantaged to promote social equity and justice. It is important to protect the environment while pursuing economic and social progress so as to achieve harmony between man and nature and between man and society. The 2030 Agenda for Sustainable Development should be implemented to realize balanced development across the world. A Chinese adage reads, “Victory is ensured when people pool their strength; success is secured when people put their heads together.” As long as we keep to the goal of building a community of shared future for mankind and work hand in hand to fulfill our responsibilities and overcome difficulties, we will be able to create a better world and deliver better lives for our peoples.
  • This is a path that puts people’s interests first. China follows a people-oriented development philosophy and is committed to bettering the lives of its people. Development is of the people, by the people and for the people. China pursues the goal of common prosperity. We have taken major steps to alleviate poverty and lifted over 700 million people out of poverty, and good progress is being made in our efforts to finish building a society of initial prosperity in all respects. This is a path of pursuing reform and innovation. China has tackled difficulties and met challenges on its way forward through reform. China has demonstrated its courage to take on difficult issues, navigate treacherous rapids and remove institutional hurdles standing in the way of development. These efforts have enabled us to unleash productivity and social vitality. Building on progress of 30-odd years of reform, we have introduced more than 1,200 reform measures over the past four years, injecting powerful impetus into China’s development.
  • This is a path of pursuing common development through opening-up. China is committed to a fundamental policy of opening-up and pursues a win-win opening-up strategy. China’s development is both domestic and external oriented; while developing itself, China also shares more of its development outcomes with other countries and peoples. China’s outstanding development achievements and the vastly improved living standards of the Chinese people are a blessing to both China and the world. Such achievements in development over the past decades owe themselves to the hard work and perseverance of the Chinese people, a quality that has defined the Chinese nation for several thousand years. We Chinese know only too well that there is no such thing as a free lunch in the world. For a big country with over 1.3 billion people, development can be achieved only with the dedication and tireless efforts of its own people. We cannot expect others to deliver development to China, and no one is in a position to do so. When assessing China’s development, one should not only see what benefits the Chinese people have gained, but also how much hard effort they have put in, not just what achievements China has made, but also what contribution China has made to the world. Then one will reach a balanced conclusion about China’s development.
  • Between 1950 and 2016, despite its modest level of development and living standard, China provided more than 400 billion yuan of foreign assistance, undertook over 5,000 foreign assistance projects, including nearly 3,000 complete projects, and held over 11,000 training workshops in China for over 260,000 personnel from other developing countries. Since it launched reform and opening-up, China has attracted over $1.7 trillion of foreign investment and made over $1.2 trillion of direct outbound investment, making huge contribution to global economic development. In the years following the outbreak of the international financial crisis, China contributed to over 30 percent of global growth every year on average. All these figures are among the highest in the world. The figures speak for themselves. China’s development is an opportunity for the world; China has not only benefited from economic globalization but also contributed to it. Rapid growth in China has been a sustained, powerful engine for global economic stability and expansion. The inter-connected development of China and a large number of other countries has made the world economy more balanced. China’s remarkable achievement in poverty reduction has contributed to more inclusive global growth. And China’s continuous progress in reform and opening-up has lent much momentum to an open world economy.
  • Fourth, we should develop a balanced, equitable and inclusive development model. As the Chinese saying goes, “A just cause should be pursued for common good.”Development is ultimately for the people. To achieve more balanced development and ensure that the people have equal access to opportunities and share in the benefits of development, it is crucial to have a sound development philosophy and model and make development equitable, effective and balanced.
  • — China will foster an enabling and orderly environment for investment. We will expand market access for foreign investors, build high-standard pilot free trade zones, strengthen protection of property rights, and level the playing field to make China’s market more transparent and better regulated. In the coming five years, China is expected to import $8 trillion of goods, attract $600 billion of foreign investment and make $750 billion of outbound investment. Chinese tourists will make 700 million overseas visits. All this will create a bigger market, more capital, more products and more business opportunities for other countries. China’s development will continue to offer opportunities to business communities in other countries. China will keep its door wide open and not close it. An open door allows both other countries to access the Chinese market and China itself to integrate with the world. And we hope that other countries will also keep their door open to Chinese investors and keep the playing field level for us.
  • — China will vigorously foster an external environment of opening-up for common development. We will advance the building of the Free Trade Area of the Asia Pacific and negotiations of the Regional Comprehensive Economic Partnership to form a global network of free trade arrangements. China stands for concluding open, transparent and win-win regional free trade arrangements and opposes forming exclusive groups that are fragmented in nature. China has no intention to boost its trade competitiveness by devaluing the RMB, still less will it launch a currency war. Over three years ago, I put forward the “Belt and Road” initiative. Since then, over 100 countries and international organizations have given warm responses and support to the initiative. More than 40 countries and international organizations have signed cooperation agreements with China, and our circle of friends along the “Belt and Road” is growing bigger. Chinese companies have made over $50 billion of investment and launched a number of major projects in the countries along the routes, spurring the economic development of these countries and creating many local jobs. The “Belt and Road” initiative originated in China, but it has delivered benefits well beyond its borders.
  • Ladies and Gentlemen,Dear Friends, World history shows that the road of human civilization has never been a smooth one, and that mankind has made progress by surmounting difficulties. No difficulty, however daunting, will stop mankind from advancing. When encountering difficulties, we should not complain about ourselves, blame others, lose confidence or run away from responsibilities. We should join hands and rise to the challenge. History is created by the brave. Let us boost confidence, take actions and march arm-in-arm toward a bright future.
  •  
    Very important speech. A must-read (I snipped only portions).
1 - 20 of 40 Next ›
Showing 20 items per page