Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged sabotage

Rss Feed Group items tagged

Paul Merrell

How the US Armed-up Syrian Jihadists - Consortiumnews - 0 views

  • “No one on the ground believes in this mission or this effort”, a former Green Beret writes of America’s covert and clandestine programs to train and arm Syrian insurgents, “they know we are just training the next generation of jihadis, so they are sabotaging it by saying, ‘Fuck it, who cares?’”. “I don’t want to be responsible for Nusra guys saying they were trained by Americans,” the Green Beret added. In a detailed report, US Special Forces Sabotage White House Policy gone Disastrously Wrong with Covert Ops in Syria, Jack Murphy, himself a former Green Beret (U.S. Special Forces), recounts a former CIA officer having told him how the “the Syria covert action program is [CIA Director John] Brennan’s baby …Brennan was the one who breathed life into the Syrian Task Force … John Brennan loved that regime-change bullshit.”
  • “No one on the ground believes in this mission or this effort”, a former Green Beret writes of America’s covert and clandestine programs to train and arm Syrian insurgents, “they know we are just training the next generation of jihadis, so they are sabotaging it by saying, ‘Fuck it, who cares?’”. “I don’t want to be responsible for Nusra guys saying they were trained by Americans,” the Green Beret added. In a detailed report, US Special Forces Sabotage White House Policy gone Disastrously Wrong with Covert Ops in Syria, Jack Murphy, himself a former Green Beret (U.S. Special Forces), recounts a former CIA officer having told him how the “the Syria covert action program is [CIA Director John] Brennan’s baby …Brennan was the one who breathed life into the Syrian Task Force … John Brennan loved that regime-change bullshit.”
  • In gist, Murphy tells the story of U.S. Special Forces under one Presidential authority, arming Syrian anti-ISIS forces, whilst the CIA, obsessed with overthrowing President Bashar al-Assad, and operating under a separate Presidential authority, conducts a separate and parallel program to arm anti-Assad insurgents. Murphy’s report makes clear the CIA disdain for combatting ISIS (though this altered somewhat with the beheading of American journalist James Foley in August 2014): “With the CIA wanting little to do with anti-ISIS operations as they are focused on bringing down the Assad regime, the agency kicked the can over to 5th Special Forces Group. Basing themselves out of Jordan and Turkey” — operating under “military activities” authority, rather than under the CIA’s coveted Title 50 covert action authority. The “untold story,” Murphy writes, is one of abuse, as well as bureaucratic infighting, which has only contributed to perpetuating the Syrian conflict.
  • ...1 more annotation...
  • But it is not the “turf wars,” nor the “abuse and waste,” which occupies the central part of Murphy’s long report, that truly matters; nor even the contradictory and self-defeating nature of U.S. objectives pursued. Rather, the report tells us quite plainly why the attempted ceasefires have failed (although this is not explicitly treated in the analysis), and it helps explain why parts of the U.S. Administration (Defense Secretary Ashton Carter and CIA Director Brenner) have declined to comply with President Obama’s will – as expressed in the diplomatic accord (the recent ceasefire) reached with the Russian Federation. The story is much worse than that hinted in Murphy’s title: it underlies the present mess which constitutes relations between the U.S. and Russia, and the collapse of the ceasefire.
Paul Merrell

Iran 'thwarts nuclear sabotage attempts' - Middle East - Al Jazeera English - 0 views

  • Iran has claimed it has thwarted a number of sabotage attempts against the country's nulcear programme and infrastructure, including one at its heavy water reactor. Asghar Zarean, a senior official in charge of nuclear security at the Atomic Energy Organisation of Iran, said that Iran's intelligence agencies were instrumental in uncovering plots over the last few months. They included one at the Arak facility, according to a report from the Fars semi-official news agency quoted by the Associated Press.  The organisation said: "Several cases of industrial sabotage have been neutralized in the past few months before achieving the intended damage, including sabotage at a part of the IR-40 facility at Arak." It did not state the nature of the attacks, nor the suspected culprits, but the statements coincided with the launch of an intelligence team to fight cyber-attacks and industrial sabotage.
  • Another of Iran's nuclear facilities, the uranium enrichment plant at Natanz, was the target of the "Stuxnet" computer virus in 2010 which temporarily disrupted operation of centrifuges, a key component in nuclear fuel production. Tehran says Stuxnet and other computer virus attacks are part of a concerted campaign by Israel, the US and their allies to undermine its nuclear programme. Arak was central to a deal cut last year between Western powers and Iran that lifted some sanctions in return for concessions on Iran's nuclear programme. Tehran pledged it would stop developing the facility, which Western powers say could yield plutonium as an alternative fuel for weapons. Iran denies any such goal, and says the facility is for research and peaceful purposes only.
  •  
    This part is misleading. "Tehran pledged it would stop developing the facility[.]" Tehran agreed to temporarily halt work at Arak, but only during the period of negotiations that is nearly done. Note that Stuxnet was a joint NSA-Israeli Unit 8200 cyberwar attack on Iran. 
Paul Merrell

Is NSA spying really about blackmail? | This Can't Be Happening! - 0 views

  • A revealing page-one article in today’s New York Times (“Tap on Merkel Provides Peek a Vast Spy Net”) reports on how the NSA’s global spying program, dating back at least to early in the Bush/Cheney administration, was vacuuming up the phone conversations (and no doubt later the internet communications) of not just leaders like German Chancellor Angela Merkel, but opposition leader Merkel before her party took power in Germany. As the Times puts it, the phone monitoring, which actually dates back to the Cold War Era before 1990, “is hardly limited to the 35 leaders of countries like Germany, and also includes their top aides and the heads of opposing parties.” That’s pretty far-reaching, and the paper says that it has learned, primarily courtesy of revelations from the documents released by fugitive whistleblower Edward Snowden, that the spying went even beyond that, to target up-and-coming potential leaders of so-called “friendly states.”
  • What the Times does not ask in its entire report on this spying program on leaders and potential leaders is whether there could be another motive for this extraordinary spying campaign on leaders: blackmail.
  • How else to explain the remarkably tepid response from the leaders who are the victims of this spying by the NSA on their private communications? How else to explain Europe’s unwillingness to grant sanctuary to Snowden, who after all has allowed them to know about the perfidy of the US? How else to explain Europe’s supine acquiescence to the US in its criminal wars against Iraq and Afghanistan, and its unquestioning support of Israel?
  •  
    The author goes on to raise the question whether NSA surveillance is also being used to blackmail U.S. leaders. This is a question that has been on my mind too. Certainly, J. Edgar Hoover used the apparatus of the FBI to assemble dossiers on U.S. leaders; that was the key to his power, the knowledge that he had the ability to end the political careers of elected officials. Hoover and the FBI also played a key role in the COINTELPRO abusive surveillance, disruption, and sabotage efforts aimed at peace, environmental, and black activists and leaders, along with the NSA and CIA, that was thoroughly aired in the 1976 Church Committee hearings. See https://en.wikipedia.org/wiki/COINTELPRO  
Paul Merrell

Finian Cunningham - Brussels Sabotages EU Energy with South Stream Politicking - Strate... - 0 views

  • The European Union’s ruling elite just hammered another nail into its creaky coffin this week with the critical loss of the South Stream gas project. Russian President Vladimir Putin may have been the one to formally pull the plug on the project while on an official visit to Turkey, but most observers can see that it is EU politicking that lay behind the collapse. Putin said that continual obstruction to the South Stream project from Brussels had made it unviable. Putin said that Russia would henceforth be applying its energy resources elsewhere and unveiled a new pipeline route to Turkey from the Black Sea. It was reminiscent of how Russia has directed new energy trade with China and Asia over the past year partly as a result of Western unilateral sanctions and obstinacy. And who could fault for Russia for that?
  • the contradictions betray an ulterior agenda. The EU’s «probity» over the South Stream is just a cover for its own petty political reasons and a direct corollary of the Washington-Brussels aggressive agenda toward Russia over Ukraine.   Reactions to the news of the project’s cancellation were also indicative of which party was to blame for the debacle. The governments of Bulgaria, Hungary, Slovenia and Serbia described the decision as a blow. The tone of chagrin was deafening. Tellingly they did not rebuke Russia over the decision. Indeed, the Hungarian government said it was Russia’s right to cancel the project given the backdrop of wearisome wrangling by Brussels. While Slovenia’s prime minister Miro Cerar said he was «not surprised» by Russia giving up on the $40 billion undertaking, which was to come into operation in 2018 following its commencement last year.   The above countries were to have acted as key transit partners and stood to gain billions of dollars worth of fees over the long-term supply of gas to Europe. The pipeline was being contracted to supply some 63 billion cubic metres of natural gas from Russia to Central and Southern Europe, including Austria and Italy. That represents about 40 per cent of Russia’s total supply of gas to Europe in 2013. The South Stream route would thus have been a critical component of European energy security and would have reduced gas costs for millions of households. 
  • Both Brussels and Washington have piled intense pressure on the Eastern European countries that were key to the project. Bulgaria, one of the newest and poorest members of the EU, was singled out for acute pressure from Brussels and Washington.   ‘Bulgaria halts work on the South Stream after US talks,’ reported the BBC back in June this year. Among the US Senators to have lobbied the government in Sofia was John McCain, the self-styled champion of the neo-Nazi and anti-Russian Kiev regime in Kiev that Washington and Brussels helped to install in February.   Bulgaria’s reported halt to the South Stream due to American «talks» finally became a matter of full suspension two months later, in August, after Brussels conducted more «talks». The exact nature of this coercion is not sure. But it is not hard to imagine how all sorts of financial leverage could have been exerted by Brussels and Washington on the vulnerable Bulgarian government. 
  • ...2 more annotations...
  • The reaction of Bulgaria, Hungary, Slovenia and Serbia to the South Stream collapse of course expressed disappointment over the impact on their economies. But their muted regret was more a reflection of consternation with Brussels for its policy of antagonism with Russia. Brussels’ high-handed slapping on of sanctions against Moscow and its repeated baseless accusations of Russian expansionism in Ukraine have led to the present juncture of badly frayed relations. That has, in turn, put the kibosh on what would have been a critically important improvement in Europe’s energy security, with financial benefits to several countries and millions of EU citizens.   It’s one thing for Brussels to be cavalier towards Russia; it’s quite another for the same elitist power centre to be cavalier towards its own increasingly hard-pressed citizens and their best interests. 
  • he debacle over the South Stream clearly shows that the European political elite have no interest in the welfare of its ordinary citizens or poorer member states. It is reported that cancellation of the project will cost manufacturing firms and other businesses at least $2 billion in the immediate term. These firms include German and Italian pipe manufacturers. Thousands of jobs across recession-hit Europe are thus being put at risk by political games that Brussels is playing against Russia for its own arcane geopolitical reasons in cahoots with Washington. 
  •  
    The U.S. demands obedience, not loyalty, from the EU --- and gets it. 
Paul Merrell

​Energy ballet: Iran, Russia and 'Pipelineistan' - RT Op-Edge - 0 views

  • A fascinating nuclear/energy ballet involving Iran, Russia, the US and the EU is bound to determine much of what happens next in the new great game in Eurasia. Let’s start with what’s going on with the Iranian nuclear dossier.
  • As we stand, the gap between the US, Russia, China, Britain, France and Germany on one side, and Iran on the other side, remains very wide. Essentially, the gap that really matters is between Washington and Tehran. And that, unfortunately, translates as a few more months for the vast sabotage brigade – from US neo-cons and assorted warmongers to Israel and the House of Saud – to force the deal to collapse. One of Washington’s sabotage mantras is “breakout capability”; a dodgy concept which boils down to total centrifuge capacity/capability to produce enough enriched uranium for a single nuclear bomb. This implies an arbitrary limit on Iran’s capacity to enrich uranium. The other sabotage mantra forces Iran to shut down the whole of its uranium enrichment program, and on top of it negotiate on its missiles. That’s preposterous; missiles are part of conventional armed forces. Washington in this instance is changing the subject to missiles that might carry the nuclear warheads that Iran does not have. So they should also be banned. Moscow and Beijing see “breakout capability” for what it is; a manufactured issue. While Washington says it wants a deal, Moscow and Beijing do want a deal – stressing it can be respected via strict monitoring.
  • ranian Supreme Leader Ayatollah Khamenei has established his red line on the record, so there should be no misunderstanding; the final nuclear deal must preserve Tehran’s legitimate right to enrich uranium - on an industrial scale – as part of a long-term energy policy. This is what Iranian negotiators have been saying from the beginning. So shutting down uranium enrichment is a non-starter. Sanction me baby one more time Uranium enrichment, predictably, is the key to the riddle. As it stands, Tehran now has more than 19,000 installed enrichment centrifuges. Washington wants it reduced to a few thousand. Needless to add, Israel – which has over 200 nuclear warheads and the missiles to bomb Iran, the whole thing acquired through espionage and illegal arms deals – presses for zero enrichment. In parallel undercurrents, we still have the usual US/Israeli “experts” predicting that Iran can produce a bomb in two to three months while blasting Tehran for “roadblocks” defending its “illicit” nuclear program. At least US National Security Adviser Susan Rice has momentarily shut up.
  • ...4 more annotations...
  • Another key contention point is the Arak heavy-water research reactor. Washington wants it scrapped – or converted into a light-water plant. Tehran refuses, arguing the reactor would only produce isotopes for medicine and agriculture. And then there’s the sanctions hysteria. The UN and the US have been surfing a sanction tidal wave since 2006. Tehran initially wanted those heavy sanctions which amount to economic war lifted as soon as possible; then it settled for a progressive approach. Obama might be able to lift some sanctions – but a US Congress remote-controlled by Tel Aviv will try to keep others for eternity. Here, with plenty of caveats is a somewhat detailed defense of a good deal compared to what may lead towards an apocalyptic road to war.
  • It’s a tragicomedy, really. Washington plays The Great Pretender, faking it full-time that Israel is not a nuclear-armed power while trying to convince the whole planet Israel is entitled to amass as many weapons as it wants while Iran is not allowed to even have conventional means to defend itself. Not to mention that nuclear-armed Israel has threatened and invaded virtually all of its neighbors, while Iran has invaded nothing.
  • As harsh as they really are, sanctions did not force Tehran to kneel and submit. Khamenei has repeatedly said he’s not optimistic about a nuclear deal. What he really wants, much more than a deal, is an improved economy. Now, with the sanctions cracking after the initial Geneva agreement, there is light at the end of the tunnel. Enter turbo-charged Russia-Iran negotiations. They include a power deal worth up to $10 billion, including new thermal and hydroelectric plants and a transmission network.
  • In many overlapping ways, the Iranian nuclear dossier now is like a hall of mirrors. It reflects an unstated Washington dream; unfettered access for US corporations to a virgin market of 77 million, including a well- educated young urban population, plus an energy bonanza for US Big Oil. But in the hall of mirrors there’s also the Iranian projection – as in fulfilling its destiny as the top geopolitical power in Southwest Asia, the ultimate crossroads between East and West. So in a sense the Supreme Leader has it all covered. If Rouhani shines and there is a final nuclear deal, the economic scenario will vastly improve, especially via massive European investment. If Washington scotches the deal over pressure from the usual lobbies, Tehran can always say it exercised all of its “heroic flexibility,” and move on – as in closer and closer integration with both Russia and China.
  •  
    Pepe Escobar
Paul Merrell

M of A - Obama Ordered Abuse Of Intelligence To Sabotage Trump Policies - 0 views

  • In its last months the Obama administration ordered the intelligence agencies to collect and distribute information of contacts between the Trump campaign and Russia. This to prevent any change by the Trump administration of the hostile policy towards Russia that the Obama administration instituted. The intent was also to give the intelligence services blackmail material against the Trump crew to prevent any changes in their undue, freewheeling independence. The above is reported in a little discussed New York Times piece published yesterday. The reporting angle captured in the headline is biased to set the Obama efforts into a positive light: Obama Administration Rushed to Preserve Intelligence of Russian Election Hacking.
  • Make no mistake by straight-reading that headline. Not single shred of evidence has been provided that "Russia hacked the election" or had anything to do with various leaks of Clinton related emails. A lot of fluff and chaff was thrown around but not even one tiny bit of evidence. The Obama effort was clearly to sabotage the announced policy of the incoming administration of seeking better relations with Russia. Obama intended to undermine the will of the voters by abusing instruments of the state. Excerpts from the piece: In the Obama administration’s last days, some White House officials scrambled to spread information about  ... possible contacts between associates of President-elect Donald J. Trump and Russians — across the government. Former American officials say they had two aims: to ensure that such meddling isn’t duplicated in future American or European elections, and to leave a clear trail of intelligence for government investigators.
Paul Merrell

Thierry Meyssan :   The Sore Losers Of The Syrian Crisis    :   Information C... - 0 views

  • During a recent Round Table in Ankara, Admiral James Winnfeld, Vice-Chairman of the U.S. Joint Chiefs of Staff, announced that Washington would reveal its intentions toward Syria once the 6 November presidential elections were over. He made it plainly understood to his Turkish counterparts that a peace plan had already been negotiated with Moscow, that Bashar al-Assad would remain in power and that the Security Council would not authorize the creation of buffer zones. For his part, Herve Ladsous, the U.N. Assistant Secretary General for Peacekeeping Operations, announced that he was studying the possible deployment of peacekeepers ("blue helmets") in Syria. All regional actors are preparing for the cease-fire which will be overseen by a U.N. force composed principally by troops of the Collective Security Treaty Organization (Armenia, Belarus, Kazakhstan, Kyrgyzstan, Russia, Tajikstan). These events signify that the United States is effectively continuing a process, begun in Iraq, of retreat from the region and has accepted to share its influence with Russian.
  • At the same time, the New York Times revealed that direct negotiations between Washington and Iran are slated to restart even as the United States continues its attack on Iranian monetary values. It is becoming clear that, after 33 years of containment, Washington is acknowledging that Teheran is an established regional power, all the while continuing to sabotage its economy. This new situation comes at the expense of Saudi Arabia, France, Israel, Qatar and Turkey all of whom had placed their bets on regime change in Damascus. This diverse coalition is now suffering divisions between those demanding a consolation prize and those trying to sabotage outright the process underway.
  • Only Israel and France remain in the opposition camp. The new scheme would offer a guarantee of protection to the state of Israel but it would also alter its special status on the international scene and end its expansionist dreams. Tel-Aviv would be relegated to being a secondary power. France, also, would lose influence in the region, particularly in Lebanon. Accordingly, the intelligence services of both states have concocted an operation to collapse the U.S.-Russia-Iran agreement which, even if it fails, would allow them to erase the traces of their involvement in the Syrian crisis.
Paul Merrell

The Alamo II: Texans Up in Arms over TransCanada Land Grab - 0 views

  • Texans are having nightmares of a Niger Delta nature, and while they have always been the friends of Big Oil, TransCanada is changing the rules of the game in a legally-aided land grab that will test just how tough Texans are.
  • The lawsuits against TransCanada are piling up to the dismay of the Keystone XL pipeline project, which has been beleaguered by political, socio-economic, environmental and legal woes at every step from its US origins in Montana to its final destination point in south Texas. No one thought Texas would be part of the problem: Texans love their pipelines. Why the change of heart, then? The simplest answer is that Texans love their pipelines because Big Oil has been paying big bucks for the privilege of running them through Texas farmland, but TransCanada is bullying them out of their fair share. This is how it works: TransCanada makes an unacceptably low offer for the land it needs; the landowner rejects the offer; TransCanada gets the land condemned in court; then it legally acquires the land for a fraction of its original offer. Condemning land is not a new tactic by Big Oil, but while US oil companies have traditionally kept this to a minimum, TransCanada has taken far too much advantage of this legal loophole to get what it wants. According to CNBC.com, the Canadian company has so far condemned over 100 tracts of land out of the 800 tracts it has acquired for the pipeline in Texas.
  • Since Texans are being forced to give up their land for peanuts for the bigger picture “common good”, let’s look at why they aren’t buying it and why they don’t feel any less patriotic for their opinion. (Common good in this case meaning “national interest”)
  • ...2 more annotations...
  • First of all, Texans point out that TransCanada is a foreign company that does not feel obliged necessarily to use American steel for its pipeline construction. According to media reports, a large percentage of the steel used for construction is imported. They also balk at the idea that much of the tar sands oil refined it Texas will be exported via the Gulf of Mexico. If the US is going to export its crude oil that should mean that it is producing more than it needs. In other words, the US must achieve oil independence before it starts exporting oil; otherwise it’s moving away from rather than toward independence. Every good Texan knows this. The US is producing about 6.2 million bpd this year, and consuming twice that. To the Texan mind, foreign-company plus exports does not add up to a reduction of US independence on foreign oil. It only adds up to revenues for TransCanada and Big Oil.
  • What is most interesting is that Texans will end up making Keystone XL a bipartisan issue. Previously, anyone who balked at Keystone XL environmental and socio-economic risks was a tree-hugging hippie. Anyone supporting Keystone XL was a Big Oil “yes man” with no respect for the environment. With Texans now up in arms over Keystone XL thanks to TransCanada, the debate will metamorphose into something more rational. The Texans, in their own unique way, will bring legitimacy to this debate. After all, no one could accuse them of being tree-hugging liberals. Texans want Keystone, they want pipelines, but they won’t stand for being cut out of the “common good” equation. To this end, some landowners are opening the gates to activists to stage protests, and this has so far ended in a handful of arrests.
  •  
    Keep your eye on this battle. It sounds like the same conditions that led to the farmer uprising over the Minnesota Powerline Project in the late 70s. < http://en.wikipedia.org/wiki/CU_project_controversy#Organizations_formed_to_fight_the_power_line >.   In that fiasco, farmers occupied tower construction sites, tore down towers, shot out over 10K power line insulators, and sprayed hog manure on the state police using manure spreaders, on and on. And the establishment couldn't get a single criminal conviction because juries simply refused to find accused protesters guilty. A good time was had by all. 'Twas a marvelous rebellion, going well beyond passive resistance to include rampant sabotage. Will Texas farmers and ranchers follow that lead? It sounds like they may be.    
Paul Merrell

Giuliani: Trump asked me how to do a Muslim ban 'legally' | TheHill - 0 views

  • Former New York City Mayor Rudy Giuliani (R) said in an interview on Saturday that President Trump had previously asked him about legally implementing a "Muslim ban."But Giuliani then disputed the notion that the president's sweeping executive order barring refugees and people from seven predominantly Muslim nations amounts to a ban on Muslims."I’ll tell you the whole history of it: When he first announced it, he said&nbsp;‘Muslim ban,'" Giuliani said on Fox News."He called me up, he said,&nbsp;‘Put a commission together, show me the right way to do it legally.’"ADVERTISEMENTGiuliani said he then put together a commission that included lawmakers and expert lawyers."And what we did was we focused on, instead of religion, danger," Giuliani said."The areas of the world that create danger for us, which is a factual basis, not a religious basis. Perfectly legal, perfectly sensible."Giuliani reiterated that the ban is "not based on religion.""It's based on places where there are substantial evidence that people are sending terrorists into our country," he said.
  •  
    So discriminatory intent without discrimination? That won't fly in court, which probably explains the rash of injunctions against the ban. But why is Giuliani admitting this? Is he trying to sabotage the order?
Paul Merrell

The Daily Dot - The NSA has nearly complete backdoor access to Apple's iPhone - 0 views

  • The U.S. National Security Agency has the ability to snoop on nearly every communication sent from an Apple iPhone, according to leaked documents shared by security researcher Jacob Appelbaum and German news magazine Der Spiegel.&nbsp; An NSA program called DROPOUTJEEP allows the agency to intercept SMS messages, access contact lists, locate a phone using cell tower data, and even activate the device’s microphone and camera.&nbsp;
  • According to leaked documents, the NSA claims a 100 percent success rate when it comes to implanting iOS devices with spyware. The documents suggest that the NSA needs physical access to a device to install the spyware—something the agency has achieved by rerouting shipments of devices purchased online—but a remote version of the exploit is also in the works. Appelbaum says that presents one of two possibilities: “Either [the NSA] have a huge collection of exploits that work against Apple products, meaning they are hoarding information about critical systems that American companies produce, and sabotaging them, or Apple sabotaged it themselves,” Appelbaum said at the Chaos Communication Conference in Hamburg, Germany.&nbsp;
  • “Do you think Apple helped them with that?” Appelbaum asked. “I hope Apple will clarify that.”
  •  
    Nice image of a very revealing NSA document and an embedded video of Appelbaum's presentation at the annual Chaos Communication Conference in Hamburg, Germany.  Much of this year's conference was devoted to issues raised by this year's outing of the NSA's activities. 
Paul Merrell

If GCHQ wants to improve national security it must fix our technology | Technology | th... - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
Paul Merrell

F.B.I. Informant Is Tied to Cyberattacks Abroad - NYTimes.com - 0 views

  • An informant working for the F.B.I. coordinated a 2012 campaign of hundreds of cyberattacks on foreign websites, including some operated by the governments of Iran, Syria, Brazil and Pakistan, according to documents and interviews with people involved in the attacks.Exploiting a vulnerability in a popular web hosting software, the informant directed at least one hacker to extract vast amounts of data — from bank records to login information — from the government servers of a number of countries and upload it to a server monitored by the F.B.I., according to court statements.
  • The attacks were coordinated by Hector Xavier Monsegur, who used the Internet alias Sabu and became a prominent hacker within Anonymous for a string of attacks on high-profile targets, including PayPal and MasterCard. By early 2012, Mr. Monsegur of New York had been arrested by the F.B.I. and had already spent months working to help the bureau identify other members of Anonymous, according to previously disclosed court papers.One of them was Jeremy Hammond, then 27, who, like Mr. Monsegur, had joined a splinter hacking group from Anonymous called Antisec. The two men had worked together in December 2011 to sabotage the computer servers of Stratfor Global Intelligence, a private intelligence firm based in Austin, Tex.
  • Shortly after the Stratfor incident, Mr. Monsegur, 30, began supplying Mr. Hammond with lists of foreign websites that might be vulnerable to sabotage, according to Mr. Hammond, in an interview, and chat logs between the two men. The New York Times petitioned the court last year to have those documents unredacted, and they were submitted to the court last week with some of the redactions removed.Continue reading the main story “After Stratfor, it was pretty much out of control in terms of targets we had access to,” Mr. Hammond said during an interview this month at a federal prison in Kentucky, where he is serving a 10-year sentence after pleading guilty to the Stratfor operation and other computer attacks inside the United States. He has not been charged with any crimes in connection with the hacks against foreign countries.
  • ...2 more annotations...
  • according to an uncensored version of a court statement by Mr. Hammond, leaked online the day of his sentencing in November, the target list was extensive and included more than 2,000 Internet domains. The document said Mr. Monsegur had directed Mr. Hammond to hack government websites in Iran, Nigeria, Pakistan, Turkey and Brazil and other government sites, like those of the Polish Embassy in Britain and the Ministry of Electricity in Iraq.
  • The hacking campaign appears to offer further evidence that the American government has exploited major flaws in Internet security — so-called zero-day vulnerabilities like the recent Heartbleed bug — for intelligence purposes. Recently, the Obama administration decided it would be more forthcoming in revealing the flaws to industry, rather than stockpiling them until the day they are useful for surveillance or cyberattacks. But it carved a broad exception for national security and law enforcement operations.
  •  
    Has no one in government ever heard of the concept of leadership by example? Or the Golden Rule?
Paul Merrell

Venezuela's Maduro to Present Evidence of US Economic Sabotage as Gold Tumbles | venezu... - 0 views

  • Venezuelan President Nicolas Maduro pledged yesterday evening to share evidence in the coming days of the United States’ “Plan Vulture”, which he claims is currently destabilizing leftist Latin American governments through economic sabotage.&nbsp;“I have proof of how the [US] Southern Command, personally, has placed functionaries in the US embassy in Venezuela to direct the Vulture Plan,” Maduro said during a council meeting of the ALBA trade bloc.The Venezuelan leader called upon the thirteen Latin American and Caribbean countries represented in the ALBA bloc to “unite to defend themselves” against the plan, which “tries to destroy…progressive, revolutionary processes from the inside” by “creating criminal groups and attacking national currencies.”The accusation echoed similar claims made by Argentine President Christina Fernandez last month.
Paul Merrell

AIPAC spending estimated $40 million to oppose Iran Deal - Mondoweiss - 0 views

  • The American Israel Public Affairs Committee (AIPAC) is throwing mountains of money around in an attempt to derail the Iran nuclear deal. Mondoweiss reported in early August that AIPAC’s education wing was taking all but three freshmen House Representatives on a visit to Israel in hopes of sabotaging the US government’s negotiations with Iran. A few days later, the New York Times picked up the story. It reported that 58 congresspeople—including 22 Democrats and 36 Republicans—in total would be traveling to Israel in August. The Times also revealed just how much money AIPAC is hemorrhaging in hopes of stymieing the international diplomacy between the P5+1 (the US, the UK, France, China, and Russia, as well as Germany) and Iran. In the first half of 2015, AIPAC spent approximately $1.7 million lobbying Congress to oppose the deal. Yet this is mere chump change compared to what it has since funneled into advertisements and lobbying.
  • IPAC created a new tax-exempt lobbying group in July called Citizens for a Nuclear Free Iran. The sole purpose of the organization is to oppose the Iran deal—which, in spite of the name of the group, will in fact prevent Iran from developing nuclear weapons (weapons the Iranian government denies ever even seeking in the first place, and for which there is not a shred of evidence) in return for an end to Western sanctions on the country. Citizens for a Nuclear Free Iran is spending up to $40 million to place anti-Iran deal ads in 35 states, according to the Times, up from a previous estimate of $20 million. This figure may increase even more as the 60-day period in which Congress can review the deal draws to a close. In August 2013, AIPAC paid for a congressional trip to Israel. The organization paid around $18,000 for each congressperson who went. Assuming these costs remain the same today, AIPAC will be shelling out another $1 million to send US lawmakers to Israel. NPR estimates AIPAC will spend $20 million to $40 million to oppose the Iran deal. In light of the above findings, $40 million may in fact be a lower limit. AIPAC’s spending dwarfs the estimated $5 million liberal pro-Israel organization J-Street plans to spend in support of the international diplomacy.
  •  
    The elephant in the room here is that AIPAC's ability to dictate Congressional outcomes through the threat of funding opposing candidates is broken, with AIPAC forced to lobby indirectly to motivate voters to lobby Congress. 
Paul Merrell

Sorry for letting them snoop? Dell apologizes for 'inconvenience' caused by NSA backdoo... - 0 views

  • Security researcher Jacob Appelbaum dropped a bombshell of sorts earlier this week when he accused American tech companies of placing government-friendly backdoors in their devices. Now Texas-based Dell Computers is offering an apology. Or to put it more accurately, Dell told an irate customer on Monday that they “regret the inconvenience” caused by selling to the public for years a number of products that the intelligence community has been able to fully compromise in complete silence up until this week. Dell, Apple, Western Digital and an array of other Silicon Valley-firms were all name-checked during Appelbaum’s hour-long presentation Monday at the thirtieth annual Chaos Communication Congress in Hamburg, Germany. As RT reported then, the 30-year-old hacker-cum-activist unveiled before the audience at the annual expo a collection of never-before published National Security Agency documents detailing how the NSA goes to great lengths to compromise the computers and systems of groups on its long list of adversaries.
  • Spreading viruses and malware to infect targets and eavesdrop on their communications is just one of the ways the United States’ spy firm conducts surveillance, Appelbaum said. Along with those exploits, he added, the NSA has been manually inserting microscopic computer chips into commercially available products and using custom-made devices like hacked USB cables to silently collect intelligence. One of the most alarming methods of attack discussed during his address, however, comes as a result of all but certain collusion on the part of major United States tech companies. The NSA has information about vulnerabilities in products sold by the biggest names in the US computer industry, Appelbaum said, and at the drop off a hat the agency has the ability of launching any which type of attack to exploit the flaws in publically available products.
  • The NSA has knowledge pertaining to vulnerabilities in computer servers made by Dell and even Apple’s highly popular iPhone, among other devices, Appelbaum told his audience. “Hey Dell, why is that?” Appelbaum asked. “Love to hear your statement about that.”
  • ...4 more annotations...
  • TechDirt reporter Mike Masnick noticed early Tuesday that Dell’s official customer service Twitter account opted to issue a cookie-cutter response that drips of insincerity. “Thanks you for reaching out and regret the inconvenience,” the Dell account tweeted to Wismeijer. “Our colleagues at @DellCaresPro will be able to help you out.” “Inconvenience? You got to be F*ckin kidding me!” Wismeijer responded. “You place an NSA bug in our servers and call it an inconvenience?”
  • @DellCares @dellcarespro Inconvenience? You got to be F*ckin kidding me! You place an NSA bug in our servers and call it an inconvenience? — Martijn Wismeijer (@twiet) December 31, 2013
  • Appelbaum didn’t leave Dell off the hook after revealing just that one exploit known to the NSA, however. Before concluding his presentation, he displayed a top-secret document in which the agency makes reference to a hardware implant that could be manually installed onto Dell PowerEdge servers to exploit the JTAG debugging interface on its processor — a critical circuitry component that apparently contains a vulnerability known to the US government. “Why did Dell leave a JTAG debugging interface on these servers?” asked Appelbaum. “Because it’s like leaving a vulnerability in. Is that a bugdoor, or a backdoor or just a mistake? Well hopefully they will change these things or at least make it so that if you were to see this, you would know that you have some problems. Hopefully Dell will release some information about how to mitigate this advance persistent threat.” Appelbaum also provoked Apple by acknowledging that the NSA boasts of being able to hack into any of their mobile devices running the iOS operating system. “Either they have a huge collection of exploits that work against Apple products — meaning they are hoarding information about critical systems American companies product and sabotaging them — or Apple sabotages it themselves,” he said.
  • Security researcher Jacob Appelbaum dropped a bombshell of sorts earlier this week when he accused American tech companies of placing government-friendly backdoors in their devices. Now Texas-based Dell Computers is offering an apology. Or to put it more accurately, Dell told an irate customer on Monday that they “regret the inconvenience” caused by selling to the public for years a number of products that the intelligence community has been able to fully compromise in complete silence up until this week. Dell, Apple, Western Digital and an array of other Silicon Valley-firms were all name-checked during Appelbaum’s hour-long presentation Monday at the thirtieth annual Chaos Communication Congress in Hamburg, Germany. As RT reported then, the 30-year-old hacker-cum-activist unveiled before the audience at the annual expo a collection of never-before published National Security Agency documents detailing how the NSA goes to great lengths to compromise the computers and systems of groups on its long list of adversaries.
Paul Merrell

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
Gary Edwards

Hersh, Gauthier and the Coming of Terror in Xinjiang - 0 views

  •  
    "Seymour Hersh created a stir with his most recent piece in the London Review of Books, Military to Military. Hersh reported that the Joint Chiefs of Staff under General Dempsey had actively sabotaged President Obama's Syria policy in 2013, when they took issue with the White House's apparent acquiescence to Turkey secretly funneling support to unvetted Islamist militants. The anti-Hersh forces have been in full cry but his claims appears credible.  Quite possibly, the Pentagon has fallen out of love with wonk-warrior COIN fetish for the umpteenth time, and has returned to the reassuring "massive use of conventional forces in pursuit of explicit US goals" Powell Doctrine.  Anyway, plenty of grist for the mill. My interest, naturally, was attracted to Hersh's description of a "Uyghur rat-line" organized by Turkey to funnel militants from the PRC's Xinjiang Autonomous Region into Syria:"
Paul Merrell

M of A - Syria - The U.S. Propaganda Shams Now Openly Fail - 0 views

  • The Obama administration, and especially the CIA and the State Department, seem to be in trouble. They shout everything they can against Russia and allege that the cleansing of east-Aleppo of al-Qaeda terrorist is genocidal. Meanwhile no mention is ever made of the famine of the Houthis in Yemen which the U.S. and Saudi bombing and their blockade directly causes.
  • But more and more major news accounts support the Russian allegation that the "moderate rebels" the U.S. is coddling in Syria are actually in cahoots with al-Qaeda if not al-Qaeda itself.
  • The new news reports follow after an interview by the German former politician and journalist Jürgen Todenhöfer with an al-Qaeda commander published in English on this site. The commander said that Nusra (aka al-Qaeda) were directly supplied, via a subgroup, with U.S. TOW missiles. He added about such groups: They are all with us. We are all the al-Nusra Front. A groups is created and calls itself "Islamic Army", or "Fateh al-Sham". Each group has its own name but their believe is homogeneous. The general name is al-Nusra Front. One person has, for example, 2,000 fighters. Then he creates from these a new group and calls it "Ahrar al-Sham". Brothers, who's believe, thoughts and aims are identical to those of al-Nusra Front. Another interview recently published by the former military Jack Murphy was with a Green Beret soldier who served in Turkey and Syria. The Green Berets are special forces of the U.S. army. They are specialists in training and&nbsp; fighting with indigenous guerrilla groups against governments the U.S. dislikes. The soldier interviewed was ordered to train "moderate Syrian rebels" in Turkey. Parts of the interview (paywalled) are quoted here:
  • ...4 more annotations...
  • "No one on the ground believes in this mission or this effort”, a former Green Beret writes of America’s covert and clandestine programs to train and arm Syrian insurgents, “they know we are just training the next generation of jihadis, so they are sabotaging it by saying, ‘Fuck it, who cares?’”. “I don’t want to be responsible for Nusra guys saying they were trained by Americans,” the Green Beret added. ... Murphy states bluntly: “distinguishing between the FSA and al-Nusra is impossible, because they are virtually the same organization. As early as 2013, FSA commanders were defecting with their entire units to join al-Nusra. There, they still retain the FSA monicker, but it is merely for show, to give the appearance of secularism so they can maintain access to weaponry provided by the CIA and Saudi intelligence services. The reality is that the FSA is little more than a cover for the al-Qaeda-affiliated al-Nusra. ... It is one thing when Russia says somesthing, but another when Reuters, WSJ, and independent German and U.S. subject experts report this as facts. The first can be shunned as "Putin lies" but the others are extremely hard to refute. The Russians are right. The U.S. did not separate the "moderate rebels" from al Qaeda, as it had agreed to in the ceasefire agreement, because the "moderates" and al-Qaeda are the same. The "moderates" are al-Qaeda. This was not unknown. The 2012 Defense Intelligence Analysis said as much. The CIA of course knew this all along. But the Saudi tool heading the CIA, John Brennan, can not admit such as his masters in the Gulf are also the ones who finance al-Qaeda. They buy the weapons Brennan's people hadn over to al-Qaeda. The "end-user" according to this certificate for a weapon buy in Ukraine is Saudi Arabia. But who will believe that the Saudi dictators need for example 100 obsolete T-55 tanks? The weapons on the certificate, for an estimated $300-$500 million, are obviously for al-Qaeda in Yemen and in Syria. (Did Joe Biden or his son, both heavily engaged in Ukraine, get a provision from the deal?)
  • As the facts accumulate how long can the New York Times and Washington Post keep up with their propaganda claims. One has to admit, they really try their best. Unfortunately for them, their best is only mediocre. The NYT today found out that Vladimir Putin Relishes His Role as Disrupter. How does the NYT know what Putin "relishes"? The reporter did not ask Putin himself. But he did ask some knowledgeable experts with insight into Putin's inner mind and those assured the author that this is indeed the case. They know exactly how Putin feels. They are Richard Haass, the president of the Council on Foreign Relations, James R. Clapper Jr., the director of national intelligence, James B. Comey, the F.B.I. director and Robert Kagan, leading voice of of the neocons and Clinton promoter. Some "experts". Add that to dozens of stories on how "Russia indiscriminately bombs civilians/hospitals/bakeries in east-Aleppo" but never hits any "rebels" because none occur in these stories at all. A recent NYT piece of that kind had 14 "voices" in it. Eight belonged to various propagandists associated with the "White Helmets", four were "western" diplomats, one Syrian government official and a Russian spokesperson were quoted at the end. No Russian military and no one from west-Aleppo, where by far most people in the city live under government protection and daily rocket hail by the "rebels", were even asked. But all those tales we hear about the devilish Russians MUST be true! Even the 7 years old Bana Alabeb now tweets from east-Aleppo about her tragic fate under indiscriminate Russian assaults. This in perfect English and with an excellent WiFi and Internet connection as her many "White Helmets" photo attachments and her videos attest. But the whole city is devastated and in ruins she says, with phosphor bombs going off right in front of her house.
  • But Bana is a very responsible little lady: Bana Alabed @AlabedBana Dear world, it's better to start 3rd world war instead of letting Russia &amp; assad commit #HolocaustAleppo 1:53 PM - 29 Sep 2016 Here "mother" phoned up the Daily Mail for an "exclusive" and assures us that this is all true. The Telegraph has her in a slideshow with sad music and the Guardian promotes her too. Another Gay Girl in Damascus media fail. In 2011 the Guardian also was part of that scam. If that 7-year old girl is in east-Aleppo and not in Denmark or the UK, I must be on Mars. No sane reader will take such a stunt serious. What Public Relation company came up with this sorry flimflam? Like the "moderate rebels" fantasy, such tales and the nonsense the "White Helmet" propaganda outlet distributes, are starting to fail. The UAE's National, a well established international newspaper, recently dug a bit around the White Helmet's creator, a "former" British military agent working for Gulf defense interests. That does not sound charitable. This is noticeable report, even as it still lacks any details, as it is the first in a major paper that shows some auspiciousness against that outlet. The Obama administration's lies about the "moderate rebels" are now openly discussed in major media. The propaganda of #HolocaustAleppo (isn't abusing the holocaust meme anti-semitic?) is turning into a laughing stock.
  • Russia is upping its stake in Syria. Additional Russian SU-24, SU-25 and SU-34 jets are arriving. Nearly 6,000 Russian soldiers are on the ground. The CIA's&nbsp; al-Qaeda "rebels" are losing in east-Aleppo and are in stalemate and under pressure elsewhere. They will be bombed to smithereens. A few new BM-21 multiple missile launchers and heavier anti-air artillery was delivered to them. But those are just band-aids on lethally bleeding wounds. Even MANPADs will not change the situation one bit. The U.S., the Saudis and especially Brennan's CIA have lost that fight. Will Obama and Kerry admit it? Or will they throw another Hail Mary and do something crazy?
  •  
    I omitted a nice set of set of links in this article to MSM reports of Syiran "moderates" being one and the same with the jihadis.
Gary Edwards

ANALYSIS: Chipotle is a victim of corporate sabotage... biotech industry food terrorist... - 1 views

  •  
    "(NaturalNews) After observing recent events involving Chipotle and e.coli, here's my analysis of the situation: Chipotle's e.coli outbreaks are not random chance. They are the result of the biotech industry unleashing bioterrorism attacks against the only fast food company that has publicly denounced GMOs. How do we know? The CDC has already admitted that some of these e.coli outbreaks involve a "rare genetic strain" of e.coli not normally seen in foods. Furthermore, we also know the track record of the biotech industry engaging in the most criminal, dirty, sleazebag tactics imaginable against any person or company that speaks out against GMOs. Doctor Oz, for example, was maliciously targeted in a defamation campaign funded by the biotech industry earlier this year. The onslaught against Oz was initiated because he publicly expressed his support for honest GMO labeling on foods. As the attacks escalated, Doctor Oz had his own team investigate the source of the attacks and found they were all biotech industry shills, some with felony criminal records and long histories of dubious propaganda activities targeting anti-GMO activists. "
Paul Merrell

US and Russia reach tentative agreement for Syria ceasefire | World news | The Guardian - 0 views

  • The US and Russia agreed a tentative ceasefire deal for Syria late on Friday night, intended to lead the way to a joint US-Russian air campaign against Islamic State and other extremist groups and new negotiations on the country’s political future.
  • Lavrov described the situation in Syria as a “quagmire” with multiple warring parties, some of whom would seek to undermine the US-Russian deal. For that reason, he added, much of the deal would remain secret to prevent efforts at sabotage. But the Russian foreign minister said Russia had secured the agreement of Bashar al-Assad’s regime in Damascus.
  • As part of the complex agreement, a seven-day pause in the fighting would begin on Monday evening, the beginning of the Muslim holiday of Eid al-Adha. During that time, the Syrian army would relax its stranglehold on rebel held areas of Aleppo allowing for the delivery of humanitarian aid to the starving city, while rebels would stop fighting around government areas. The Syrian regime would suspend airstrikes on rebel-held areas around the country, the main source of civilian casualties. If the ceasefire holds, the Russian and US military would start planning joint air operations against extremist groups, including Isis and al-Nusra Front (also referred to as the Front for the Conquest of Syria). The Syrian air force would stay out of zones being targeted by the US and Russia. The US is also aiming to convince other rebel groups to separate themselves from the Nusra Front where they have been fighting the regime together.
  • ...2 more annotations...
  • Lavrov said he hoped the ceasefire would lead to the prompt resumption of negotiations over Syria’s political future. Kerry said that he had been in contact with the opposition groups in the High Negotiation Committee over the course of the week and they were prepared to take part in such talks if the ceasefire held and humanitarian aid was delivered to besieged civilian populations.
  • If the ceasefire holds for the first week, US and Russian military officers would form a joint cell to plan and coordinate airstrikes against Isis and al-Nusra. Delineating the zones deemed to be controlled by Nusra Front was one of the thorniest issues at the negotiations, as the extremist group has fought with a range of other rebel organisations on different fronts in western Syria. Disentangling them from their allies on the ground will be one of the biggest challenges of maintaining the ceasefire deal.
  •  
    This would seem to be a major capitulation by the U.S. because there is now agreement that both ISIL and al-Nusrah will be targeted by both nations when fighting resumes. To date, the U.S. has attempted in negotiations to shield al-Nusrah (al-Qaeda in Syria), despite having voted for the U.N. Security Council resolution that mandates an end of any kind of assistance to al-Nusrah and calls for strong military action to defeat the group. But bear in mind that the U.S. and its allies (Turkey, Saudi Arabia, Qatar, and Israel, direct both ISIL and al-Nusrah and provide them with funding, weapons, supplies, and intelligence. So the U.S. is almost without doubt playing a double game here.
1 - 20 of 65 Next › Last »
Showing 20 items per page