Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged secret-funding

Rss Feed Group items tagged

Paul Merrell

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional committee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial institutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms with Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency with which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of its largest.19 The political clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [Italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘It was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 It also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the Italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter Maritime Bank, which interlocked with BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 It is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. It is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. It may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
Paul Merrell

Land Destroyer: Grisly Peshawar Slaughter - Who Created Taliban, Who Still Funds Them? - 0 views

  • Taliban militants stormed an army public school in the northern city of Peshawar, killing over 100, including many young students. It is believed up to 10 militants took part in the attack, dressed as soldiers to first infiltrate the school's grounds before beginning the attack.  While the details of the attack are forthcoming, the background of the Taliban and the persistent threat it represents is well established, though often spun across the Western media.  Who Put the Taliban into Power? Who is Funding them Now?  In the 1980's the United States, Saudi Arabia, and elements within the then Pakistani government funneled millions of dollars, weapons, equipment, and even foreign fighters into Afghanistan in a bid to oust Soviet occupiers. Representatives of this armed proxy front would even visit the White House, meeting President Ronald Reagan personally. 
  • In 1997, Taliban representatives would find themselves in Texas, discussing a possible oil pipeline with energy company Unocal (now merged with Chevron). The BBC would report in a 1997 article titled, "Taleban in Texas for talks on gas pipeline," that: A senior delegation from the Taleban movement in Afghanistan is in the United States for talks with an international energy company that wants to construct a gas pipeline from Turkmenistan across Afghanistan to Pakistan. A spokesman for the company, Unocal, said the Taleban were expected to spend several days at the company's headquarters in Sugarland, Texas.
  • However, it was already claimed by the US that the Taliban had been "harboring" Osama Bin Laden since 1996, and had branded the Taliban's human rights record as "despicable." The Telegraph in an artile titled, "Oil barons court Taliban in Texas," would report (emphasis added):  The Unocal group has one significant attraction for the Taliban - it has American government backing. At the end of their stay last week, the Afghan visitors were invited to Washington to meet government officials. The US government, which in the past has branded the Taliban's policies against women and children "despicable", appears anxious to please the fundamentalists to clinch the lucrative pipeline contract. The Taliban is likely to have been impressed by the American government's interest as it is anxious to win international recognition. So far, it has been recognised only by the UAE, Saudi Arabia and Pakistan. It is clear that to the West, as they were during the proxy war against the Soviets, and during attempts to forge an oil pipeline across Afghan territory, the Taliban remain a tool, not an ally - to be used and abused whenever and however necessary to advance Wall Street and Washington's agenda - a self-serving Machiavellian agenda clearly devoid of principles. 
  • ...4 more annotations...
  • The Global Post would reveal in a 2009 investigative report that the Taliban in neighboring Afghanistan was mostly funded via redirected US aid. The report titled, "Who is funding the Afghan Taliban? You don’t want to know," would state:  It is the open secret no one wants to talk about, the unwelcome truth that most prefer to hide. In Afghanistan, one of the richest sources of Taliban funding is the foreign assistance coming into the country. The report would also reveal that Taliban members were in the capital city of Kabul, directly involved in redirecting the funds, apparently under the nose of occupying NATO forces:
  • But the narrative of the "accidental" funding of Taliban militants in Afghanistan is betrayed when examining their counterparts in Pakistan and their source of funding. While the US funds roughly a billion USD a year to the Taliban in Afghanistan "accidentally," their allies in Riyadh, Saudi Arabia are confirmed to be funding the Taliban in Pakistan.In the Guardian's article, "WikiLeaks cables portray Saudi Arabia as a cash machine for terrorists," the US State Department even acknowledges that Saudi Arabia is indeed funding terrorism in Pakistan:   Saudi Arabia is the world's largest source of funds for Islamist militant groups such as the Afghan Taliban and Lashkar-e-Taiba – but the Saudi government is reluctant to stem the flow of money, according to Hillary Clinton."More needs to be done since Saudi Arabia remains a critical financial support base for al-Qaida, the Taliban, LeT and other terrorist groups," says a secret December 2009 paper signed by the US secretary of state. Her memo urged US diplomats to redouble their efforts to stop Gulf money reaching extremists in Pakistan and Afghanistan."Donors in Saudi Arabia constitute the most significant source of funding to Sunni terrorist groups worldwide," she said.Three other Arab countries are listed as sources of militant money: Qatar, Kuwait and the United Arab Emirates.
  • Pakistani terror organization Lashkar-e-Jhangvi - which maintains ties to the Taliban - has also been financially linked to the Persian Gulf monarchies. Stanford University's "Mapping Militant Organizations: Lashkar-e-Jhangvi," states under "External Influences:"  LeJ has received money from several Persian Gulf countries including Saudi Arabia and the United Arab Emirates[25] These countries funded LeJ and other Sunni militant groups primarily to counter the rising influence of Iran's revolutionary Shiism.   Astonishingly, despite these admission, the US still works politically, financially, economically, and even militarily in tandem with these very same state-sponsors of rampant, global terrorism. In fact, Wall Street and Washington are among the chief architects and beneficiaries of this global terrorism. 
  • Just as in Libya and Syria where the US and its Persian Gulf allies funded terrorist fronts in bids to overthrow each nation's respective governments, this unholy alliance is working in Pakistan to create a militant front with which to menace political groups in Islamabad and reorder the country to reflect and serve their collective interests. And just as in Syria now, where the US feigns to be locked in battle with terrorists of their own creation, the fact that the US is funding their own enemy billions of dollars while allegedly fighting them in Afghanistan creates a perpetual conflict justifying their continued intervention in the region - overtly and covertly.  When a terrorist attack is carried out in Pakistan by the "Taliban," it must then be looked at through this lens of global geopolitical reality. Attempts by the Western media to reduce this recent attack to mere "extremism," preying on global audiences emotionally, provides impunity for the state-sponsors of the Taliban - those funding, arming, and directing their operations across the region, and then benefiting from their horrific consequences.It appears, just as in Libya, Syria, and Iraq, the West and its allies are waging a proxy war in Pakistan as well. Attempts to exploit the tragedy in Peshawar compound this insidious agenda. Those across Pakistan's political landscape must understand that their is no line these foreign interests are unwilling to cross in achieving their agenda - be it a line crossed at a perceived ally's expense, or a perceived enemy's expense. 
  •  
    How to fight the "Long War?" Well, you need a constant supply of new enemies to fight ...
Paul Merrell

WikiLeaks Cables Portray Saudi Arabia As A Cash Machine For Terrorists - 0 views

  • Saudi Arabia is the world’s largest source of funds for Islamist militant groups such as the Afghan Taliban and Lashkar-e-Taiba – but the Saudi government is reluctant to stem the flow of money, according to Hillary Clinton. “More needs to be done since Saudi Arabia remains a critical financial support base for al-Qaida, the Taliban, LeT and other terrorist groups,” says a secret December 2009 paper signed by the US secretary of state. Her memo urged US diplomats to redouble their efforts to stop Gulf money reaching extremists in Pakistan and Afghanistan.
  • “Donors in Saudi Arabia constitute the most significant source of funding to Sunni terrorist groups worldwide,” she said. Three other Arab countries are listed as sources of militant money: Qatar, Kuwait and the United Arab Emirates. The cables highlight an often ignored factor in the Pakistani and Afghan conflicts: that the violence is partly bankrolled by rich, conservative donors across the Arabian Sea whose governments do little to stop them. The problem is particularly acute in Saudi Arabia, where militants soliciting funds slip into the country disguised as holy pilgrims, set up front companies to launder funds and receive money from government-sanctioned charities. One cable details how the Pakistani militant outfit Lashkar-e-Taiba, which carried out the 2008 Mumbai attacks, used a Saudi-based front company to fund its activities in 2005. Meanwhile officials with the LeT’s charity wing, Jamaat-ud-Dawa, travelled to Saudi Arabia seeking donations for new schools at vastly inflated costs – then siphoned off the excess money to fund militant operations. Militants seeking donations often come during the hajj pilgrimage – “a major security loophole since pilgrims often travel with large amounts of cash and the Saudis cannot refuse them entry into Saudi Arabia”. Even a small donation can go far: LeT operates on a budget of just $5.25m (£3.25m) a year, according to American estimates.
  • Saudi officials are often painted as reluctant partners. Clinton complained of the “ongoing challenge to persuade Saudi officials to treat terrorist funds emanating from Saudi Arabia as a strategic priority”. Washington is critical of the Saudi refusal to ban three charities classified as terrorist entities in the US. “Intelligence suggests that these groups continue to send money overseas and, at times, fund extremism overseas,” she said. There has been some progress. This year US officials reported that al-Qaida’s fundraising ability had “deteriorated substantially” since a government crackdown. As a result Bin Laden’s group was “in its weakest state since 9/11” in Saudi Arabia. Any criticisms are generally offered in private. The cables show that when it comes to powerful oil-rich allies US diplomats save their concerns for closed-door talks, in stark contrast to the often pointed criticism meted out to allies inPakistan and Afghanistan. Instead, officials at the Riyadh embassy worry about protecting Saudi oilfields from al-Qaida attacks. The other major headache for the US in the Gulf region is the United Arab Emirates. The Afghan Taliban and their militant partners the Haqqani network earn “significant funds” through UAE-based businesses, according to one report. The Taliban extort money from the large Pashtun community in the UAE, which is home to 1 million Pakistanis and 150,000 Afghans. They also fundraise by kidnapping Pashtun businessmen based in Dubai or their relatives.
  • ...2 more annotations...
  • “Some Afghan businessmen in the UAE have resorted to purchasing tickets on the day of travel to limit the chance of being kidnapped themselves upon arrival in either Afghanistan or Pakistan,” the report says. Last January US intelligence sources said two senior Taliban fundraisers hadregularly travelled to the UAE, where the Taliban and Haqqani networkslaundered money through local front companies. One report singled out a Kabul-based “Haqqani facilitator”, Haji Khalil Zadran, as a key figure. But, Clinton complained, it was hard to be sure: the UAE’s weak financial regulation and porous borders left US investigators with “limited information” on the identity of Taliban and LeT facilitators. The lack of border controls was “exploited by Taliban couriers and Afghan drug lords camouflaged among traders, businessmen and migrant workers”, she said. In an effort to stem the flow of funds American and UAE officials are increasinglyco-operating to catch the “cash couriers” – smugglers who fly giant sums of money into Pakistan and Afghanistan.
  • In common with its neighbours Kuwait is described as a “source of funds and a key transit point” for al-Qaida and other militant groups. While the government has acted against attacks on its own soil, it is “less inclined to take action against Kuwait-based financiers and facilitators plotting attacks outside of Kuwait”. Kuwait has refused to ban the Revival of Islamic Heritage Society, a charity the US designated a terrorist entity in June 2008 for providing aid to al-Qaida and affiliated groups, including LeT. There is little information about militant fundraising in the fourth Gulf country singled out, Qatar, other than to say its “overall level of CT co-operation with the US is considered the worst in the region”. The funding quagmire extends to Pakistan itself, where the US cables detail sharp criticism of the government’s ambivalence towards funding of militant groups that enjoy covert military support. The cables show how before the Mumbai attacks in 2008, Pakistani and Chinese diplomats manoeuvred hard to block UN sanctions against Jamaat-ud-Dawa. But in August 2009, nine months after sanctions were finally imposed, US diplomats wrote: “We continue to see reporting indicating that JUD is still operating in multiple locations in Pakistan and that the group continues to openly raise funds”. JUD denies it is the charity wing of LeT.
  •  
    Question for Hillary: Since you have known at least since December, 2009 that these Arab nations are funding al Qaida and its offshoot organizations, if elected will you impose strong sanctions on them to halt their funding of terrorism?
Paul Merrell

NYPD Blows Whistle on New Hillary Emails: Money Laundering, Sex Crimes with Children, C... - 1 views

  • New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence “to put Hillary (Clinton) and her crew away for life,” NYPD sources told True Pundit. NYPD sources said Clinton’s “crew” also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday.
  • But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department’s highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. “What’s in the emails is staggering and as a father, it turned my stomach,” the NYPD Chief said. “There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that.”
  • The NYPD Chief said once Comey saw the alarming contents of the emails he was forced to reopen a criminal probe against Clinton. “People are going to prison,” he said. Meanwhile, FBI sources said Abedin and Weiner were cooperating with federal agents, who have taken over the non-sexting portions the case from NYPD. The husband-and-wife Clinton insiders  are both shopping for separate immunity deals, sources said. “If they don’t cooperate they are going to see long sentences,” a federal law enforcement source said. NYPD sources said Weiner or Abedin stored all the emails in a massive Microsoft Outlook program on the laptop. The emails implicate other current and former members of Congress and one high-ranking Democratic Senator as having possibly engaged in criminal activity too, sources said. Prosecutors in the office of US Attorney Preet Bharara have issued a subpoena for Weiner’s cell phones and travel records, law enforcement sources confirmed. NYPD said it planned to order the same phone and travel records on Clinton and Abedin, however, the FBI said it was in the process of requesting the identical records. Law enforcement sources are particularly interested in cell phone activity and travel to the Bahamas, U.S. Virgin Islands and other locations that sources would not divulge.
  • ...4 more annotations...
  • The new emails contain travel documents and itineraries indicating Hillary Clinton, President Bill Clinton, Weiner and multiple members of Congress and other government officials accompanied convicted pedophile billionaire Jeffrey Epstein on his Boeing 727 on multiple occasions to his private island in the U.S Virgin Islands, sources said. Epstein’s island has also been dubbed Orgy Island or Sex Slave Island where Epstein allegedly pimps out underage girls and boys to international dignitaries. Both NYPD and FBI sources confirm based on the new emails they now believe Hillary Clinton traveled as Epstein’s guest on at least six occasions, probably more when all the evidence is combed, sources said. Bill Clinton, it has been confirmed in media reports spanning recent years, that he too traveled with Epstein over 20 times to the island.
  • According to other uncovered emails, Abedin and Clinton both sent and received thousands of classified and top secret documents to personal email accounts including Weiner’s unsecured campaign web site which is managed by Democratic political consultants in Washington D.C. Weiner maintained little known email accounts that the couple shared on the website anthonyweiner.com. Weiner, a former seven-term Democratic Congressman from New York, primarily used that domain to campaign for Congress and for his failed mayoral bid of New York City. At one point, FBI sources said, Abedin and Clinton’s classified and top secret State Department documents and emails were stored in Weiner’s email on a server shared with a dog grooming service and a western Canadian bicycle shop. However, Weiner and Abedin, who is Hillary Clinton’s closest personal aide, weren’t the only people with access to the Weiner’s email account. Potentially dozens of unknown individuals had access to Abedin’s sensitive State Department emails that were stored in Weiner’s email account, FBI sources confirmed. FEC records show Weiner paid more than $92,000 of congressional campaign funds to Anne Lewis Strategies LLC to manage his email and web site. According to FBI sources, the D.C.-based political consulting firm has served as the official administrator of the anthonyweiner.com domain since 2010, the same time Abedin was working at the State Department. This means technically Weiner and Abedin’s emails, including top secret State Department emails, could have been accessed, printed, discussed, leaked, or distributed by untold numbers of personnel at the Anne Lewis consulting firm because they can control where the website and it emails are pointed, FBI sources said.
  • According to FBI sources, the bureau’s newly-minted probe into Clinton’s use and handling of emails while she served as secretary of state, has also been broadened to include investigating new email-related revelations, including: Abedin forwarded classified and top secret State Department emails to Weiner’s email Abedin stored emails, containing government secrets, in a special folder shared with Weiner warehousing over 500,000 archived State Department emails. Weiner had access to these classified and top secret documents without proper security clearance to view the records Abedin also used a personal yahoo address and her Clintonemail.com address to send/receive/store classified and top secret documents A private consultant managed Weiner’s site for the last six years, including three years when Clinton was secretary of state, and therefore, had full access to all emails as the domain’s listed registrant and administrator via Whois email contacts. Because Weiner’s campaign website is managed by the third-party consultant and political email guru, FBI agents are burdened with the task of trying to decipher just how many people had access to Weiner’s server and emails and who were these people. Or if the server was ever compromised by hackers, or other actors.
  • Abedin told FBI agents in an April interview that she didn’t know how to consistently print documents or emails from her secure Dept. of State system. Instead, she would forward the sensitive emails to her yahoo, Clintonemail.com and her email linked to Weiner. Abedin said, according to FBI documents, she would then access those email accounts via webmail from an unclassified computer system at the State Dept. and print the documents, many of which were classified and top secret, from the largely unprotected webmail portals. Clinton did not have a computer in her office on Mahogany Row at the State Dept. so she was not able to read timely intelligence unless it was printed out for her, Abedin said. Abedin also said Clinton could not operate the secure State Dept. fax machine installed in her Chappaqua, NY home without assistance. Perhaps more alarming, according to the FBI’s 302 Report detailing its interview with Abedin, none of the multiple FBI agents and Justice Department officials who conducted the interview pressed Abedin to further detail the email address linked to Weiner. There was never a follow up, according to the 302 report. But now, all that has changed, with the FBI’s decision to reopen the Clinton email investigation and the husband and wife seeking immunity deals to testify against Clinton and other associates about the contents of the laptop’s emails.
  •  
    "New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence "to put Hillary (Clinton) and her crew away for life," NYPD sources told True Pundit. NYPD sources said Clinton's "crew" also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday. But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department's highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. "What's in the emails is staggering and as a father, it turned my stomach," the NYPD Chief said. "There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that." The NYPD
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
Gary Edwards

Google News - 0 views

  •  
    An incredible story is unfolding in Egypt where the new military government is digging through volumes of documents seized in raids on the Muslim Brotherhood. The documents are said to show that Barak Obama has been funneling Billions of dollars into the Muslim Brotherhood. excerpt: "Bare Naked Islam has done extensive reporting on the "bribes." The ... Evidence we have obtained lends credibility to the charges of "gifts" (bribes) being taken in U.S. dollars from the U.S. Embassy in Cairo" that were distributed to top ministerial level officials in the Mursi government. Via Almesryoon: "A judicial source stated that over the past few days, a number of complaints have beenfiled with the Attorney General Hisham Barakat. These complaints accuse the leaders of the Muslim Brotherhood and leaders of the centrist party of receiving gifts from the American embassy in Cairo. The sponsors of these complaints stated that among these leaders are Mohamed Badie, General Guide of the Muslim Brotherhood, Khairat Al-Shater, deputy leader and businessman, Mohamed Beltagy leading the group, Essam el-Erian, deputy head of the Freedom and Justice Party of, and Abu Ela Mady, head of the Wasat Party, Essam Sultan, deputy head of the Wasat Party." The strength of these allegations is seemingly bolstered by another case alluded to by the newspaper in which a document is referenced. This document reportedly reveals monthly "gifts" being paid to Muslim Brotherhood leaders in Egypt by the Prime Minister Hamad bin Jassim bin Jabor Al Thani, Minister of Foreign Affairs to the Mursi government. These monthly payments were said to be denominated in U.S. dollars to each leader. Evidence for such allegations are substantiated by a document we have obtained. It includes the names of several recipients of funds and even includes their signatures acknowledging receipt of the funds. This ledger, obtained from inside the Mursi government, lends additional credibility to the rep
Paul Merrell

NASA's Secret Relationships with U.S. Defense and Intelligence Agencies - 0 views

  • Declassified Records Trace the Many Hidden Interactions Between the U.S. Civilian and National Security Space Programs Secret Cooperation Punctuated by Disputes over Budgets, Encryption of Scientific Data, and Fallout from the Challenger Tragedy National Security Archive Electronic Briefing Book No. 509
  • Furnishing cover stories for covert operations, monitoring Soviet missile tests, and supplying weather data to the U.S. military have been part of the secret side of the National Aeronautics and Space Administration (NASA) since its inception in 1958, according to declassified documents posted for the first time today by the National Security Archive at The George Washington University (www.nsarchive.org). James E. David, a curator in NASA's Division of Space History, obtained the documents in the course of researching his critically praised book, Spies and Shuttles: NASA's Secret Relationships with the DoD and CIA (University Press of Florida, 2015). David has compiled, edited and introduced more than 50 of these records for today's posting. Even though Congress's intention in forming NASA was to establish a purely civilian space agency, according to David a combination of circumstances led the agency to commingle its activities with black programs operated by the U.S. military and Intelligence Community. This often tight cooperation did not, however, keep disputes from bubbling over on issues such as cost sharing, access to classified information, encryption of data originally intended for civilian use, and delays to military satellite launches caused by the Challenger disaster. Over the years, classification restrictions have kept most of the story of NASA's secret activities out of the public eye. Today's posting brings to light previously unpublished primary source material that underpins Spies and Shuttles and other important literature on the subject. The records were acquired through agency declassification review procedures, specific declassification requests, and archival research.
  • The documents presented here were obtained in the research and writing of Spies and Shuttles: NASA's Secret Relationships with the DoD and CIA. Most were declassified by agencies under the automatic/systematic declassification review program or acquired through declassification requests. They are grouped into the following categories: NASA as a consumer of intelligence NASA's assistance to analyzing intelligence on foreign aeronautical and space programs NASA's participation in cover stories NASA's acquisition and use of classified technologies in its lunar exploration program Restrictions on NASA's remote sensing programs NASA's application satellites and national security requirements Space Shuttle
  •  
    For some reason, proponents of space exploration have a tendency to frame their arguments as an issue of moral necessity for human species preservation, often because self-extinction is likely. It's a weak argument. One can more forcefully argue that homo sapiens has no moral right to migrate outside the planet until such time as it learns to not destroy its own life support systems on Earth; in the meantime, the incredible funding devoted to space exploration would be better spent learning that lesson. But evidence of NASA ties to the Dark State, which has often come to mind when reading such drivel, has been wanting. Now we learn that it does exist but had been concealed. In light of these disclosures, we can discuss the moral issues with more clarity. But still missing: the obvious overlap of NASA's mission with the development of ICBMs and deployment of orbiting weapons platforms.   
Paul Merrell

Ukraine's Made-in-USA Finance Minister | Consortiumnews - 0 views

  • Ukraine’s new Finance Minister Natalie Jaresko, a former U.S. State Department officer who was granted Ukrainian citizenship only this week, headed a U.S. government-funded investment project for Ukraine that involved substantial insider dealings, including $1 million-plus fees to a management company that she also controlled. Jaresko served as president and chief executive officer of Western NIS Enterprise Fund (WNISEF), which was created by the U.S. Agency for International Development (U.S. AID) with $150 million to spur business activity in Ukraine. She also was cofounder and managing partner of Horizon Capital which managed WNISEF’s investments at a rate of 2 to 2.5 percent of committed capital, fees exceeding $1 million in recent years, according to WNISEF’s 2012 annual report.
  • Based on the data from WNISEF’s 2012 annual report, it also appeared that the U.S. taxpayers had lost about one-third of their investment in WNISEF, with the fund’s balance at $98,074,030, compared to the initial U.S. government grant of $150 million. Given the collapsing Ukrainian economy since the Feb. 22 coup, the value of the fund is likely to have slipped even further. (Efforts to get more recent data from WNISEF’s and Horizon Capital’s Web sites were impossible Friday because the sites were down.) Beyond the long list of “related party transactions” in the annual report, there also have been vague allegations of improprieties involving Jaresko from one company insider, her ex-husband, Ihor Figlus. But his whistle-blowing was shut down by a court order issued at Jaresko’s insistence. John Helmer, a longtime foreign correspondent in Russia, disclosed the outlines of this dispute in an article examining Jaresko’s history as a recipient of U.S. AID’s largesse and how it enabled her to become an investment banker via WNISEF, Horizon Capital and Emerging Europe Growth Fund.
  • Helmer wrote: “Exactly what happened when Jaresko left the State Department to go into her government-paid business in Ukraine has been spelled out by her ex-husband in papers filed in the Chancery Court of Delaware in 2012 and 2013. … “Without Figlus and without the US Government, Jaresko would not have had an investment business in Ukraine. The money to finance the business, and their partnership stakes, turns out to have been loaned to Figlus and Jaresko from Washington.” According to Helmer’s article, Figlus had reviewed company records in 2011 and concluded that some loans were “improper,” but he lacked the money to investigate so he turned to Mark Rachkevych, a reporter for the Kyiv Post, and gave him information to investigate the propriety of the loans. “When Jaresko realized the beans were spilling, she sent Figlus a reminder that he had signed a non-disclosure agreement” and secured a temporary injunction in Delaware on behalf of Horizon Capital and EEGF to prevent Figlus from further revealing company secrets, Helmer wrote.
  • ...3 more annotations...
  • Jaresco, who served in the U.S. Embassy in Kiev after the collapse of the Soviet Union, has said that Western NIS Enterprise Fund was “funded by the U.S. government to invest in small and medium-sized businesses in Ukraine and Moldova – in essence, to ‘kick-start’ the private equity industry in the region.” While the ultimate success of that U.S.-funded endeavor may still be unknown, it is clear that the U.S. AID money did “kick-start” Jaresco’s career in equity investments and put her on the path that has now taken her to the job of Ukraine’s new finance minister. Ukrainian President Petro Poroshenko cited her experience in these investment fields to explain his unusual decision to bring in an American to run Ukraine’s finances and grant her citizenship.
  • The substantial U.S. government sum invested in Jaresco’s WNISEF-based equity fund also sheds new light on how it was possible for Assistant Secretary of State for European Affairs Victoria Nuland to tally up U.S. spending on Ukraine since it became independent in 1991 and reach the astounding figure of “more than $5 billion,” which she announced to a meeting of U.S.-Ukrainian business leaders last December as she was pushing for “regime change” in Kiev. The figure was so high that it surprised some of Nuland’s State Department colleagues. Several months later – after a U.S.-backed coup had overthrown Yanukovych and pitched Ukraine into a nasty civil war – Under Secretary of State for Public Affairs Richard Stengel cited the $5 billion figure as “ludicrous” Russian disinformation after hearing the number on Russia’s RT network.
  • Stengel, a former Time magazine editor, didn’t seem to know that the figure had come from a fellow senior State Department official. Nuland’s “more than $5 billion” figure did seem high, even if one counted the many millions of dollars spent over the past couple of decades by U.S. AID (which puts its contributions to Ukraine at $1.8 billion) and the U.S.-funded National Endowment for Democracy, which has financed hundreds of projects for supporting Ukrainian political activists, media operatives and non-governmental organizations. But if one looks at the $150 million largesse bestowed on Natalie Jaresco, you can begin to understand the old adage that a hundred million dollars here and a hundred million dollars there soon adds up to real money.
  •  
    The Ukraine coup government just keeps getting more and more absurdly corrupt. 
Gary Edwards

Breakaway Civilizations/ Rethinking History - Shows - Coast to Coast AM - 0 views

  •  
    "Date: 03-16-14 Host: George Knapp Guests: Joseph P. Farrell, Brad Olsen In the first half, George Knapp was joined by author Joseph Farrell, who detailed his research into the possibility that a secret, breakaway civilization was formed by American elites following World War II. He explained that, after the war, the United States was faced with three formidable challenges: escaped Nazis bent on recreating their empire elsewhere, the Cold War, and the UFO phenomenon. In turn, Farrell surmised, a secret system was put into place to develop defenses against these dangers facing the country. He theorized that, in order to surreptitiously fund such a massive undertaking, the United States used the vast wealth that had been plundered by Japan during WWII to bankroll various projects. Farrell suggested that, over time, similar secret infrastructures were created by other technologically advanced countries such as England, Russia, and China. In the ensuing years since its creation, Farrell said, the American organization likely developed amazing technological capabilities far beyond what is known to the general population, hence the concept of a 'breakaway civilization,' which shares our planet but exists within a world of knowledge far different from our own. Manmade UFOs, weather control, and zero point energy may be achievements that have secretly been accomplished, but remain classified for fear of revealing technologies which could be weaponized and used against the United States. Farrell pointed to the emergence of 3D printing and the push for mining in space as potential signs of previously accomplished breakthroughs which are now slowly being introduced to the public. --------------------------------- In the latter half, author Brad Olsen discussed flaws in modern history and how conspiracy theories, esoteric insights, and fringe subjects can be used to help change a dead-end course for humanity. He contended that nearly every facet of human life, from science,
Paul Merrell

Syria war: new push against Assad being planned, reports suggest | World news | theguar... - 0 views

  • After months of battlefield stalemate in Syria, a flurry of reports from Washington, Jerusalem, Amman and the Gulf suggests a major new clandestine effort is under way to open up a "southern front" against the regime of Bashar al-Assad.Central to the mooted plan is a renewed push to provide Syria's badly divided and often ineffectual moderate, secular rebel groups with additional funding, upgraded weapons and intelligence support.What use they may make of such support, if indeed it fully materialises, remains to be seen.The initiative, as reported in the region, is set against a backdrop of secret talks in the US last month between Susan Rice, Barack Obama's national security adviser, and Prince Mohammed bin Nayef, the Saudi interior minister in charge of covert action programmes in Syria.According to the usually well informed Washington Post columnist David Ignatius, spy chiefs from Jordan, Turkey, Qatar and other regional countries also attended the discussions, focused on making a "stronger effort" to help the rebels.
  • After months of battlefield stalemate in Syria, a flurry of reports from Washington, Jerusalem, Amman and the Gulf suggests a major new clandestine effort is under way to open up a "southern front" against the regime of Bashar al-Assad.Central to the mooted plan is a renewed push to provide Syria's badly divided and often ineffectual moderate, secular rebel groups with additional funding, upgraded weapons and intelligence support.What use they may make of such support, if indeed it fully materialises, remains to be seen.The initiative, as reported in the region, is set against a backdrop of secret talks in the US last month between Susan Rice, Barack Obama's national security adviser, and Prince Mohammed bin Nayef, the Saudi interior minister in charge of covert action programmes in Syria.
  • According to the usually well informed Washington Post columnist David Ignatius, spy chiefs from Jordan, Turkey, Qatar and other regional countries also attended the discussions, focused on making a "stronger effort" to help the rebels.This meeting has been linked in turn to last month's launching by the Free Syrian Army (FSA) of what they termed a spring offensive in the south of Syria. The offensive began days after they received new US weapons funding that may eventually total $31.4m (£18.9m), rebel commanders said.After holding back for months owing to fears that new arms might fall into the hands of al-Qaida affiliates, unidentified American officials said Congress had given closed-door approval in January for renewed cash for light weapons intended for the moderate, secular opposition in the south.The new US funding supposedly augments a fresh push by Gulf states to finance rebel operations in the southern region of Syria, which are ultimately aimed at Damascus. More than $1bn has been disbursed since last summer, much of it for weapons purchases in eastern Europe, according to Gulf government sources quoted by regional media.
  • ...1 more annotation...
  • Detailed media reports claim the operational plans, supply routes and tactics for the new push are being overseen by a secret international operations command centre in Amman staffed by military officials from 14 countries, including the US, Britain, Israel and Arab states opposed to the Assad regime."Rebel fighters and opposition members say the command centre, based in an intelligence headquarters building in Amman, channels vehicles, sniper rifles, mortars, heavy machine guns, small arms and ammunition to Free Syrian Army units," the Abu Dhabi-based National newspaper reported.Jordan denies the existence of the centre and of reportedly CIA-run rebel training facilities in northern Jordan.
Paul Merrell

Fresno Police Roll Out Dystopian 'Threat Ranking' System - 0 views

  • “On 57 monitors that cover the walls of the center, operators zoomed and panned an array of roughly 200 police cameras perched across the city. They could dial up 800 more feeds from the city’s schools and traffic cameras, and they soon hope to add 400 more streams from cameras worn on officers’ bodies and from thousands from local businesses that have surveillance systems.” Though the intricate surveillance apparatus described above seems straight from a dystopic novel, it is actually the Washington Post’s recent description of the the visual data collection system employed by a local California police department. The police department in Fresno, California, has taken extreme measures to combat high rates of crime in the city. As the Post reports, Fresno’s Real Time Crime Center, buried deep in the police station’s headquarters, has developed as a response to what many police call increasing threats. The system, according to police officials, can “provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases” — a feature they say is increasingly important in the wake of events like the November terror attack in Paris and the San Bernardino shooting last month.
  • “Our officers are expected to know the unknown and see the unseen,” Fresno Chief of Police Jerry Dyer said. “They are making split-second decisions based on limited facts. The more you can provide in terms of intelligence and video, the more safely you can respond to calls.” Programs similar to the Real Time Crime Center have launched in New York, Houston, and Seattle over the course of the last decade. Nationwide, the use of Stingrays, data fusion centers, and aerial drone surveillance have broadened the access local police have to private information. In another example, the FBI is continually developing a comprehensive biometric database that local police access every day. “This is something that’s been building since September 11,” says Jennifer Lynch, a senior attorney at the Electronic Frontier Foundation. Like the problem of police militarization, Lynch traces the trend back to the Pentagon: “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.”
  • While many of these programs may fail to shock Americans, one new software program takes police scrutiny of private citizens to a new level. Beware, a software tool produced by tech firm Intrado, not only surveils the data of the citizens of Fresno, the first city to test it — it calculates threat levels based on what it discovers. The software scours arrest records, property records, Deep Web searches, commercial databases, and social media postings. By this method, it was able to designate a man with a firearm and gang convictions involved in a real-time domestic violence dispute as the highest of three threat levels: a bright red ranking. Fresno police say the intelligence from Beware aided them, as the man eventually surrendered and officers found he was armed with a gun. Beware scours billions of data points to develop rankings for citizens, and though few recoil at the thought of catching criminals and miscreants, the program provides particular cause for concern because of both its invasiveness and its fallibility.
  • ...3 more annotations...
  • These shortcomings have sparked concern among Fresno’s city council members, who discussed the issue at a meeting in November. At that meeting, one council member cited an incident where a girl who posted on social media about a card game called “Rage” was consequently given an elevated threat ranking — all because “rage” could be a triggering keyword for Beware. At that same meeting, libertarian-leaning Republican councilman Clinton J. Olivier asked Chief Dyer to use the technology to calculate his threat level. In real-time, Olivier was given a green, or non-threatening ranking, but his home received a yellow, or medium, threat ranking. It was likely due to the record of his home’s prior occupant. “Even though it’s not me that’s the yellow guy, your officers are going to treat whoever comes out of that house in his boxer shorts as the yellow guy,” Olivier told Dyer. “That may not be fair to me.” He added later, “[Beware] has failed right here with a council member as the example.” “It’s a very unrefined, gross technique,” Fresno civil rights attorney, Rob Nabarro, has said of Beware’s color-coded levels. “A police call is something that can be very dangerous for a citizen,” he noted, echoing Olivier’s worries.
  • Further, though Fresno police use Beware, they are left in the dark about how it determines rankings. Intrado designates the method a “trade secret,” and as such, will not share it with the officers who use it. This element of the software’s implementation has concerned civil rights advocates like Nabarro. He believes the secrecy surrounding the technology may result in unfair, unchecked threat rankings. Nabarro cautioned that between the software’s secrecy and room for error, Beware could accidentally rank a citizen as dangerous based on, for example, posts on social media criticizing police. This potential carries with it the ability for citizens to be punished not for actual crimes, but for exercising basic constitutional rights. Further, it compromises the rights of individuals who have been previously convicted of crimes, potentially using past behavior to assume guilt in unrelated future incidents. Chief Dyer insists concerns are exaggerated and that a particular score does not guarantee a particular police response. Police maintain the tools are necessary to fight crime. Nevertheless, following the heated November meeting, Dyer suggested he would work to turn off the color-coded threat ranking due to citizens’ concerns. “It’s a balancing act,” he admitted.
  • It remains to be seen if Fresno police and residents will move forward with the technology or shut it down over privacy concerns. City officials in Oakland, California, for example, recently scaled back plans to establish a Real Time Crime Center after outraged citizens protested. At the very least, as Northern California ACLU attorney Matt Cagle said, “[W]henever these surveillance technologies are on the table, there needs to be a meaningful debate. There needs to be safeguards and oversight.”
  •  
    Claiming trade secrecy for the software's selection criteria for threat ranking actually constitutes policy policy, the trade secrecy claim would probably not survive judical review. It's at least arguably an unconstitutional delegation of a government function (ranking citizens as threats) to a private company. Police departments in Florida were sued to produce records of how a related surveillance device, the Stingray IMSI device that intercepts cell phone calls by mimicking a cell-phone tower, and only averted court-ordered disclosure of its trade secret workings by the FBI swooping in just before decision to remove all the software documentation from local police possession, custody, and control.    There is a long chain of case law holding that information that is legitimately trade secret and proprietary loses that protection if adopted by local or federal government as law. With a software program that classifies citizens as threats for governmental purposes if they meet the program's selection criteria, the software is performing a strictly governmental function that is in reality law. 
Gary Edwards

How the CIA made Google - Medium - 0 views

  •  
    "INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain 'information superiority.' The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world. The results have been catastrophic: NSA mass surveillance, a permanent state of global war, and a new initiative to transform the US military into Skynet."
Paul Merrell

John McCain, Conductor of the "Arab Spring" and the Caliph , by Thierry Meyssan - 0 views

  • Everyone has noticed the contradiction of those who recently characterized the Islamic Emirate as "freedom fighters" in Syria and who are indignant today faced with its abuses in Iraq. But if that speech is incoherent in itself, it makes perfect sense in the strategic plan: the same individuals were to be presented as allies yesterday and must be as enemies today, even if they are still on orders from Washington. Thierry Meyssan reveals below US policy through the particular case of Senator John McCain, conductor of the "Arab Spring" and longtime partner of Caliph Ibrahim.
  • ohn McCain is known as the leader of the Republicans and unhappy 2008 US presidential candidate. This is, we will see, only the real part of his biography, which serves as a cover to conduct covert actions on behalf of his government. When I was in Libya during the "Western"attack, I was able to view a report of the foreign intelligence services. It stated that, on February 4, 2011 in Cairo, NATO organized a meeting to launch the "Arab Spring" in Libya and Syria. According to this document, the meeting was chaired by John McCain. The report detailed the list of Libyan participants, whose delegation was led by the No. 2 man of the government of the day, Mahmoud Jibril, who abruptly switched sides at the entrance of the meeting to become the opposition leader in exile. I remember that, among the French delegates present, the report quoted Bernard-Henry Lévy, although officially he had never exercised functions within the French government. Many other personalities attended the symposium, including a large delegation of Syrians living abroad.
  • Emerging from the meeting, the mysterious Syrian Revolution 2011 Facebook account called for demonstrations outside the People’s Council (National Assembly) in Damascus on February 11. Although this Facebook account at the time claimed to have more than 40,000 followers, only a dozen people responded to its call before the flashes of photographers and hundreds of police. The demonstration dispersed peacefully and clashes only began more than a month later in Deraa. [1] On February 16, 2011, a demonstration underway in Benghazi, in memory of members of the Islamic Fighting Group in Libya [2] massacred in 1996 in the Abu Selim prison, degenerated into shooting. The next day, a second event, this time in memory of those who died by attacking the Danish consulate during the Muhammad cartoons affair, also degenerated into shooting. At the same time, members of the Islamic Fighting Group in Libya ,coming from Egypt and coordinated by unidentified, hooded individuals, simultaneously attacked four military bases in four different cities. After three days of fighting and atrocities, the rebels launched the uprising of Cyrenaica against Tripolitania [3]; a terrorist attack that the western press falsely presented as a "democratic revolution" against "the regime" of Muammar el-Qaddafi.
  • ...16 more annotations...
  • On February 22nd, John McCain was in Lebanon. He met members of the Future Movement (the party of Saad Hariri) whom he charged to oversee the transfer of arms to Syria around the MP Okab Sakr [4]. Then, leaving Beirut, he inspected the Syrian border and the selected villages including Ersal, which were used as a basis to back mercenaries in the war to come. The meetings chaired by John McCain were clearly the trigger point for a long-prepared Washington plan; the plan that would have the UK and France attack Libya and Syria simultaneously, following the doctrine of "leadership from behind" and the annex of the Treaty of Lancaster House of November 2010. [5]
  • In May 2013, Senator John McCain made his way illegally to near Idleb in Syria via Turkey to meet with leaders of the "armed opposition". His trip was not made public until his return to Washington. [6] This movement was organized by the Syrian Emergency Task Force, which, contrary to its title, is a Zionist Organization led by a Palestinian employee of AIPAC [7]
  • John McCain in Syria. In the foreground at right is the director of the Syrian Emergency Task Force. In the doorway, center, Mohammad Nour.
  • In photographs released at that time, one noticed the presence of Mohammad Nour, a spokesman for the Northern Storm Brigade (of the Al-Nosra Front, that is to say, al-Qaeda in Syria), who kidnapped and held 11 Lebanese Shiite pilgrims in Azaz. [8] Asked about his proximity to al-Qaeda kidnappers, the Senator claimed not to know Mohammad Nour who would have invited himself into this photo. The affair made a great noise and the families of the abducted pilgrims lodged a complaint before the Lebanese judiciary against Senator McCain for complicity in kidnapping. Ultimately, an agreement was reached and the pilgrims were released. Let’s suppose that Senator McCain had told the truth and that he was abused by Mohammad Nour. The object of his illegal trip to Syria was to meet the chiefs of staff of the Free Syrian Army. According to him, the organization was composed "exclusively of Syrians" fighting for "their freedom" against the "Alouite dictatorship” (sic). The tour organizers published this photograph to attest to the meeting.
  • John McCain and the heads of the Free Syrian Army. In the left foreground, Ibrahim al-Badri, with which the Senator is talking. Next, Brigadier General Salim Idris (with glasses).
  • If we can see Brigadier General Idriss Salem, head of the Free Syrian Army, one can also see Ibrahim al-Badri (foreground on the left) with whom the senator is talking. Back from the surprise trip, John McCain claimed that all those responsible for the Free Syrian Army were "moderates who can be trusted" (sic).
  • However, since October 4, 2011, Ibrahim al-Badri (also known as Abu Du’a) was on the list of the five terrorists most wanted by the United States (Rewards for Justice). A premium of up to $ 10 million was offered to anyone who would assist in his capture. [9] The next day, October 5, 2011, Ibrahim al-Badri was included in the list of the Sanctions Committee of the UN as a member of Al Qaeda. [10] In addition, a month before receiving Senator McCain, Ibrahim al-Badri, known under his nom de guerre as Abu Bakr al-Baghdadi, created the Islamic State in Iraq and the Levant (ÉIIL) – all the while still belonging to the staff of the very "moderate" Free Syrian Army. He claimed as his own the attack on the Taj and Abu Ghraib prisons in Iraq, from which he helped between 500 and 1,000 jihadists escape who then joined his organization. This attack was coordinated with other almost simultaneous operations in eight other countries. Each time, the escapees joined the jihadist organizations fighting in Syria. This case is so strange that Interpol issued a note and requested the assistance of the 190 member countries. [11]
  • For my part, I have always said that there was no difference on the ground between the Free Syrian Army, Al-Nosra Front, the Islamic Emirate etc ... All these organizations are composed of the same individuals who continuously change flag. When they pose as the Free Syrian Army, they fly the flag of French colonization and speak only of overthrowing the "dog Bashar." When they say they belong to Al-Nosra Front, they carry the flag of al Qaeda and declare their intention to spread Islam in the world. Finally when they say they are the Islamic Emirate, they brandish the flag of the Caliphate and announce that they will clean the area of all infidels. But whatever the label, they proceed to the same abuses: rape, torture, beheadings, crucifixions. Yet neither Senator McCain nor his companions of the Syrian Emergency Task Force provided the information in their possession on Ibrahim al-Badri to the State Department, nor have they asked for the reward. Nor have they informed the anti-terrorism Committee of the UN.
  • But John McCain is not just the leader of the political opposition to President Obama, he is also one of his senior officials! He is in fact President of the International Republican Institute (IRI), the republican branch of NED / CIA [12], since January 1993. This so-called "NGO" was officially established by President Ronald Reagan to extend certain activities of the CIA, in connection with the British, Canadian and Australian secret services. Contrary to its claims, it is indeed an inter-governmental agency. Its budget is approved by Congress in a budget line dependent of the Secretary of State. It is also because it is a joint agency of the Anglo-Saxon secret services that several states in the world prohibit it from any activity on their territory.
  • he list of interventions by John McCain on behalf of the State Department is impressive. He participated in all the color revolutions of the last twenty years.
  • And an agent that has the best coverage imaginable: he is the official opponent of Barack Obama. As such, he can travel anywhere in the world (he is the most traveled US senator) and meet whoever he wants without fear. If his interlocutors approve Washington policy, he promised them to continue it, if they fight it, he hands over the responsibility to President Obama.
  • In 2003, France’s opposition was not enough to offset the influence of the Committee for the Liberation of Iraq. The United States attacked the country again and this time overthrew President Hussein. Of course, John McCain was a major contributor to the Committee. After handing to a private company the care of plundering the country for a year [17], they tried to partition Iraq into three separate states, but had to give it up due to the resistance of the population. They tried again in 2007, around the Biden-Brownback resolution, but again failed. [18] Hence the current strategy that attempts to achieve this by means of a non-state actor: the Islamic Emirate.
  • The operation was planned well in advance, even before the meeting between John McCain and Ibrahim al-Badri. For example, internal correspondence from the Qatari Ministry of Foreign Affairs, published by my friends James and Joanne Moriarty [19], shows that 5,000 jihadis were trained at the expense of Qatar in NATO’s Libya in 2012, and 2,5 million dollars was paid at the same time to the future Caliph. In January of 2014, the Congress of the United States held a secret meeting at which it voted, in violation of international law, to approve funding for the Al-Nosra Front (Al-Qaeda) and the Islamic emirate in Iraq and the Levant until September 2014. [20] Although it is unclear precisely what was really agreed to during this meeting revealed by the British Reuters news agency [21], and no media US media dared bypass censorship, it is highly probable that the law includes a section on arming and training jihadists.
  • Proud of this US funding, Saudi Arabia has claimed on its public television channel, Al-Arabiya, that the Islamic Emirate was headed by Prince Abdul Rahman al-Faisal, brother of Prince Saud al Faisal (Foreign Minister) and Prince Turki al-Faisal (Saudi ambassador to the United States and the United Kingdom) [22]. The Islamic Emirate represents a new step in the world of mercenaries. Unlike jihadi groups who fought in Afghanistan, Bosnia-Herzegovina and Chechnya around Osama bin Laden, it does not constitute a residual force but actually an army in itself. Unlike previous groups in Iraq, Libya and Syria, around Prince Bandar bin Sultan, they have sophisticated communication services at their disposal for recruitment and civilian officials trained in large western schools capable of instantly taking over the administration of a territory.
  • Brand new Ukrainian weapons were purchased by Saudi Arabia and conveyed by the Turkish secret services who gave them to the Islamic Emirate. Final details were coordinated with the Barzani family at a meeting of jihadist groups in Amman on 1 June 2014. [23] The joint attack on Iraq by the Islamic Emirate and the Kurdistan Regional Government began four days later. The Islamic Emirate seized the Sunni part of the country, while the Kurdistan Regional Government increased its territory by over 40%. Fleeing the atrocities of jihadists, religious minorities left the Sunni area, paving the way for the three-way partition of the country. Violating the Iraqi-US Defense agreement, the Pentagon did not intervene and allowed the Islamic Emirate to continue its conquest and massacres. A month later, while the Kurdish Peshmerga Regional Government had retreated without a fight, and when the emotions of world public opinion became too strong, President Obama gave the order to bomb some positions of the Islamic Emirate. However, according to General William Mayville, director of operations at the headquarters, "These bombings are unlikely to affect the overall capacity of the Islamic Emirate and its activities in other areas of Iraq or Syria ". [24] Obviously, they are not meant to destroy the jihadist army, but only to ensure that each player does not overlap the territory that has been assigned. Moreover, for the moment, they are symbolic and have destroyed only a handful of vehicles. It was ultimately the intervention of the Kurds of the Turkish and Syrian Kurdish PKK which halted the progress of the Islamic Emirate and opened a corridor to allow civilians to escape the massacre.
  • In the latest issue of its magazine, the Islamic Emirate devoted two pages to denounce Senator John McCain as "the enemy" and "double-crosser", recalling his support for the US invasion of Iraq. Lest this accusation remain unknown in the United States, Senator immediately issued a statement calling the Emirate the "most dangerous Islamist terrorist group in the world" [26]. This controversy is there only to distract the gallery. One would like to believe it ... if it were’t for this photograph from May 2013.
  •  
    Thierry Meysann makes the case that Sen. John McCain, working with  was the guiding force behind the Arab Spring, the overthrow of Qadaffi in Libya, and the invasion of Syria by mercenary Islamists, working with a Zionist but deliberately misnomered front group. Thierry goes on to show that McCain played a key role in the creation and deployment of ISIL.  
Paul Merrell

Profiting from Your Thirst as Global Elite Rush to Control Water Worldwide :: The Marke... - 0 views

  • A disturbing trend in the water sector is accelerating worldwide. The new “water barons” --- the Wall Street banks and elitist multibillionaires --- are buying up water all over the world at unprecedented pace. Familiar mega-banks and investing powerhouses such as Goldman Sachs, JP Morgan Chase, Citigroup, UBS, Deutsche Bank, Credit Suisse, Macquarie Bank, Barclays Bank, the Blackstone Group, Allianz, and HSBC Bank, among others, are consolidating their control over water. Wealthy tycoons such as T. Boone Pickens, former President George H.W. Bush and his family, Hong Kong’s Li Ka-shing, Philippines’ Manuel V. Pangilinan and other Filipino billionaires, and others are also buying thousands of acres of land with aquifers, lakes, water rights, water utilities, and shares in water engineering and technology companies all over the world. The second disturbing trend is that while the new water barons are buying up water all over the world, governments are moving fast to limit citizens’ ability to become water self-sufficient (as evidenced by the well-publicized Gary Harrington’s case in Oregon, in which the state criminalized the collection of rainwater in three ponds located on his private land, by convicting him on nine counts and sentencing him for 30 days in jail). Let’s put this criminalization in perspective:
  • Billionaire T. Boone Pickens owned more water rights than any other individuals in America, with rights over enough of the Ogallala Aquifer to drain approximately 200,000 acre-feet (or 65 billion gallons of water) a year. But ordinary citizen Gary Harrington cannot collect rainwater runoff on 170 acres of his private land. It’s a strange New World Order in which multibillionaires and elitist banks can own aquifers and lakes, but ordinary citizens cannot even collect rainwater and snow runoff in their own backyards and private lands.
  • In 2008, Goldman Sachs called water “the petroleum for the next century” and those investors who know how to play the infrastructure boom will reap huge rewards, during its annual “Top Five Risks” conference. Water is a U.S.$425 billion industry, and a calamitous water shortage could be a more serious threat to humanity in the 21st century than food and energy shortages, according to Goldman Sachs’s conference panel. Goldman Sachs has convened numerous conferences and also published lengthy, insightful analyses of water and other critical sectors (food, energy). Goldman Sachs is positioning itself to gobble up water utilities, water engineering companies, and water resources worldwide. Since 2006, Goldman Sachs has become one of the largest infrastructure investment fund managers and has amassed a $10 billion capital for infrastructure, including water.
  • ...7 more annotations...
  • Citigroup’s top economist Willem Buitler said in 2011 that the water market will soon be hotter the oil market (for example, see this and this): “Water as an asset class will, in my view, become eventually the single most important physical-commodity based asset class, dwarfing oil, copper, agricultural commodities and precious metals.” In its recent 2012 Water Investment Conference, Citigroup has identified top 10 trends in the water sector, as follows:
  • Specifically, a lucrative opportunity in water is in hydraulic fracturing (or fracking), as it generates massive demand for water and water services. Each oil well developed requires 3 to 5 million gallons of water, and 80% of this water cannot be reused because it’s three to 10 times saltier than seawater. Citigroup recommends water-rights owners sell water to fracking companies instead of to farmers because water for fracking can be sold for as much as $3,000 per acre-foot instead of only $50 per acre/foot to farmers.
  • One of the world’s largest banks, JPMorgan Chase has aggressively pursued water and infrastructure worldwide. In October 2007, it beat out rivals Morgan Stanley and Goldman Sachs to buy U.K.’s water utility Southern Water with partners Swiss-based UBS and Australia’s Challenger Infrastructure Fund. This banking empire is controlled by the Rockefeller family; the family patriarch David Rockefeller is a member of the elite and secretive Bilderberg Group, Council on Foreign Relations, and Trilateral Commission.
  • Barclays PLC is a U.K.-based major global financial services provider operating in all over the world with roots in London since 1690; it operates through its subsidiary Barclays Bank PLC and its investment bank called Barclays Capital. Barclays Bank’s unit Barclays Global Investors manages an exchange-traded fund (ETF) called iShares S&P Global Water, which is listed on the London Stock Exchanges and can be purchased like any ordinary share through a broker. Touting the iShares S&P Global Water as offering “a broad based exposure to shares of the world’s largest water companies, including water utilities and water equipment stocks” of water companies around the world, this fund as of March 31, 2007 was valued at U.S.$33.8 million.
  • Deutsche Bank is one of the major players in the water sector worldwide. Its Deutsche Bank Advisors have identified water as a part of the climate investment strategies. In its presentation, “Global Warming: Implications for Investors,” they have identified the four following major areas for water investment: § Distribution and management: (1) Supply and recycling, (2) water distribution and sewage, (3) water management and engineering. § Water purification: (1) Sewage purification, (2) disinfection, (3) desalination, (4) monitoring. § Water efficiency (demand): (1) Home installation, (2) gray-water recycling, (3) water meters. § Water and nutrition: (1) Irrigation, (2) bottled water.
  • Moreover, Deutsche Bank has channeled €6 billion (U.S.$8.55 billion) into climate change funds, which will target companies with products that cut greenhouse gases or help people adapt to a warmer world, in sectors from agriculture to power and construction (Reuters, October 18, 2007). In addition to SCM, Deutsche Bank also has the RREEF Infrastructure, part of RREEF Alternative Investments, headquartered in New York with main hubs in Sydney, Singapore, and London. RREEF Infrastructure has more than €6.7 billion in assets under management. One of its main targets is utilities, including electricity networks, water-treatment or distribution operations, and natural-gas networks. In October 2007, RREEF partnered with Goldman Sachs, GE, Prudential, and Babcok & Brown Ltd. to bid unsuccessfully for U.K.’s water utility Southern Water. § Crediting the boom in European infrastructure investment, the RREEF fund by August 2007 had raised €2 billion (U.S.$2.8 billion); Europe’s infrastructure market is valued at between U.S.$4 trillion to U.S.$6 trillion (DowJones Financial News Online, August 7, 2007). § Bulgaria --- Deutsche Bank Bulgaria is planning to participate in large infrastructure projects, including public-private partnership projects in water and sewage worth up to €1 billion (Sofia Echo Media, February 26, 2008). § Middle East --- Along with Ithmaar Bank B.S.C. (an private-equity investment bank in Bahrain), Deutsche Bank co-managed a U.S.$2 billion Shari'a-compliant Infrastructure and Growth Capital Fund and plans to target U.S.$630 billion in regional infrastructure.
  • In my 2008 article, I overlooked the astonishingly large land purchases (298,840 acres, to be exact) by the Bush family in 2005 and 2006. In 2006, while on a trip to Paraguay for the United Nation’s children’s group UNICEF, Jenna Bush (daughter of former President George W. Bush and granddaughter of former President George H.W. Bush) reportedly bought 98,840 acres of land in Chaco, Paraguay, near the Triple Frontier (Bolivia, Brazil, and Paraguay). This land is said to be near the 200,000 acres purchased by her grandfather, George H.W. Bush, in 2005. The lands purchased by the Bush family sit over not only South America’s largest aquifer --- but the world’s as well --- Acuifero Guaraní, which runs beneath Argentina, Brazil, Paraguay, and Uruguay. This aquifer is larger than Texas and California combined. Online political magazine Counterpunch quoted Argentinean pacifist Adolfo Perez Esquivel, the winner of 1981 Nobel Peace Prize, who “warned that the real war will be fought not for oil, but for water, and recalled that Acuifero Guaraní is one of the largest underground water reserves in South America….”
  •  
     Like the land rush for Arctic lands soon to be bared of ice by global warming, banksters are also moving to capitalize on looming water shortages, aided by IMF privatization loan conditions the the dwindling of potable water supplies globally via pollution, deforestation, and aquifer depletion. All trace to the common problem over human overpopulation of the planet.  
Paul Merrell

How 'Free Markets' Defame 'Democracy' | Consortiumnews - 0 views

  • Venezuela seems to be following Ukraine on the neocon hit list for “regime change” as Washington punishes Caracas for acting against a perceived coup threat. But a broader problem is how the U.S. conflates “free markets” with “democracy,” giving “democracy” a bad name, writes Robert Parry.
  • The one common thread in modern U.S. foreign policy is an insistence on “free market” solutions to the world’s problems. That is, unless you’re lucky enough to live in a First World ally of the United States or your country is too big to bully.So, if you’re in France or Canada or – for that matter – China, you can have generous health and educational services and build a modern infrastructure. But if you’re a Third World country or otherwise vulnerable – like, say, Ukraine or Venezuela – Official Washington insists that you shred your social safety net and give free reign to private investors.
  • If you’re good and accept this “free market” domination, you become, by the U.S. definition, a “democracy” – even if doing so goes against the wishes of most of your citizens. In other words, it doesn’t matter what most voters want; they must accept the “magic of the market” to be deemed a “democracy.”Thus, in today’s U.S. parlance, “democracy” has come to mean almost the opposite of what it classically meant. Rather than rule by a majority of the people, you have rule by “the market,” which usually translates into rule by local oligarchs, rich foreigners and global banks.Governments that don’t follow these rules – by instead shaping their societies to address the needs of average citizens – are deemed “not free,” thus making them targets of U.S.-funded “non-governmental organizations,” which train activists, pay journalists and coordinate business groups to organize an opposition to get rid of these “un-democratic” governments.
  • ...6 more annotations...
  • If a leader seeks to defend his or her nation’s sovereignty by such means as requiring these NGOs to register as “foreign agents,” the offending government is accused of violating “human rights” and becomes a candidate for more aggressive “regime change.”Currently, one of the big U.S. complaints against Russia is that it requires foreign-funded NGOs that seek to influence policy decisions to register as “foreign agents.” The New York Times and other Western publications have cited this 2012 law as proof that Russia has become a dictatorship, while ignoring the fact that the Russians modeled their legislation after a U.S. law known as the “Foreign Agent Registration Act.”So, it’s okay for the U.S. to label people who are paid by foreign entities to influence U.S. policies as “foreign agents” – and to imprison people who fail to register – but not for Russia to do the same. A number of these NGOs in Russia and elsewhere also are not “independent” entities but instead are financed by the U.S.-funded National Endowment for Democracy (NED) and the U.S. Agency for International Development.
  • There is even a circular element to this U.S. complaint. Leading the denunciation of Russia and other governments that restrain these U.S.-financed NGOs is Freedom House, which marks down countries on its “freedom index” when they balk at letting in this back-door U.S. influence. However, over the past three decades, Freedom House has become essentially a subsidiary of NED, a bought-and-paid-for NGO itself.
  • That takeover began in earnest in 1983 when CIA Director William Casey was focused on creating a funding mechanism to support Freedom House and other outside groups that would engage in propaganda and political action that the CIA had historically organized and financed covertly. Casey helped shape the plan for a congressionally funded entity that would serve as a conduit for this U.S. government money.But Casey recognized the need to hide the CIA’s strings. “Obviously we here [at CIA] should not get out front in the development of such an organization, nor should we appear to be a sponsor or advocate,” Casey said in one undated letter to then-White House counselor Edwin Meese III – as Casey urged creation of a “National Endowment.” [See Consortiumnews.com’s “CIA’s Hidden Hand in ‘Democracy’ Groups.”]Casey’s planning led to the 1983 creation of NED, which was put under the control of neoconservative Carl Gershman, who remains in charge to this day. Gershman’s NED now distributes more than $100 million a year, which included financing scores of activists, journalists and other groups inside Ukraine before last year’s coup and now pays for dozens of projects in Venezuela, the new emerging target for “regime change.”
  • But NED’s cash is only a part of how the U.S. government manipulates events in vulnerable countries. In Ukraine, prior to the February 2014 coup, neocon Assistant Secretary of State Victoria Nuland reminded Ukrainian business leaders that the United States had invested $5 billion in their “European aspirations.”Nuland then handpicked who would be the new leadership, telling U.S. Ambassador Geoffrey Pyatt that “Yats is the guy,” referring to “free market” politician Arseniy Yatsenyuk, who not surprisingly emerged as the new prime minister after a violent coup ousted elected President Viktor Yanukovych on Feb. 22, 2014.The coup also started a civil war that has claimed more than 6,000 lives, mostly ethnic Russians in eastern Ukraine who had supported Yanukovych and were targeted for a ruthless “anti-terrorist operation” spearheaded by neo-Nazi and other far-right militias dispatched by the U.S.-backed regime in Kiev. But Nuland blames everything on Russia’s President Vladimir Putin. [See Consortiumnews.com’s “Nuland’s Mastery of Ukraine Propaganda.”]On top of Ukraine’s horrific death toll, the country’s economy has largely collapsed, but Nuland, Yatsenyuk and other free-marketeers have devised a solution, in line with the wishes of the Washington-based International Monetary Fund: Austerity for the average Ukrainian.
  • Before the Senate Foreign Relations Committee on Tuesday, Nuland hailed “reforms” to turn Ukraine into a “free-market state,” including decisions “to reduce and cap pension benefits, increase work requirements and phase in a higher retirement age; … [and] cutting wasteful gas subsidies.”In other words, these “reforms” are designed to make the hard lives of average Ukrainians even harder – by slashing pensions, removing work protections, forcing people to work into their old age and making them pay more for heat during the winter.‘Sharing’ the Wealth In exchange for those “reforms,” the IMF approved $17.5 billion in aid that will be handled by Ukraine’s Finance Minister Natalie Jaresko, who until last December was a former U.S. diplomat responsible for a U.S. taxpayer-financed $150 million investment fund for Ukraine that was drained of money as she engaged in lucrative insider deals – deals that she has fought to keep secret. Now, Ms. Jaresko and her cronies will get a chance to be the caretakers of more than 100 times more money. [See Consortiumnews.com’s “Ukraine’s Finance Minister’s American ‘Values.’”]
  • Other prominent Americans have been circling around Ukraine’s “democratic” opportunities. For instance, Vice President Joe Biden’s son Hunter was named to the board of directors of Burisma Holdings, Ukraine’s largest private gas firm, a shadowy Cyprus-based company linked to Privat Bank.Privat Bank is controlled by the thuggish billionaire oligarch Ihor Kolomoysky, who was appointed by the Kiev regime to be governor of Dnipropetrovsk Oblast, a south-central province of Ukraine. In this tribute to “democracy,” the U.S.-backed Ukrainian authorities gave an oligarch his own province to rule. Kolomoysky also has helped finance paramilitary forces killing ethnic Russians in eastern Ukraine.Burisma has been lining up well-connected American lobbyists, too, some with ties to Secretary of State John Kerry, including Kerry’s former Senate chief of staff David Leiter, according to lobbying disclosures.As Time magazine reported, “Leiter’s involvement in the firm rounds out a power-packed team of politically-connected Americans that also includes a second new board member, Devon Archer, a Democratic bundler and former adviser to John Kerry’s 2004 presidential campaign. Both Archer and Hunter Biden have worked as business partners with Kerry’s son-in-law, Christopher Heinz, the founding partner of Rosemont Capital, a private-equity company.” [See Consortiumnews.com’s “The Whys Behind the Ukraine Crisis.”]
Paul Merrell

The Perfect Storm In Turkey - Corruption Conflict Conspiracy | Scoop News - 0 views

  • The Republic of Turkey is consumed by intense conflict, conspiracy charges, and underlying financial problems that simply won't go away. A perfect storm is brewing in Turkey.
  • Prime Minister Recep Tayyip Erdogan's government and supporters are charged with a secret gold-for-oil deal with Iran. The deal, in violation of trade sanctions against Iran, enriched the PM's ministers and other key supporters involved (including the PM's son), according to prosecutors. The deal also involved misreporting billions of dollars in trade, which, in turn, resulted in Turkey overstating national income and understating its current account deficit. A more ominous charge focuses on Erdogan's open support of a wealthy Saudi known for funding al Qaeda and the PM's alleged support of Al Qaeda fighters engaged against the Syrian government. Just today, we say this headline: Turkish governor blocks police search on Syria-bound truck reportedly carrying weapons . Erdogan is a strong supporter of the Syrian rebels, assumed recipients of the weapons.The crisis started on December 17, 2013 when dozens of Erdogan's close associates were arrested for corruption. The arrests included the CEO of Turkey's state bank caught with million in euros stuffed in shoeboxes. Charges and arrests continued. Prosecutors and police who handled the case were fired at the behest of the Prime Minister. The Turkish supreme court ruled that the government couldn't interfere with police investigations through firings and intimidation. Undeterred, Erdogan fired more prosecutors claiming the charges were an attack on the Turkish state. To top it all off, authorities banned reporters from police stations and pressured the media to stop focusing on the scandals.
  • The risks to Erdogan are substantial and can impact the entire nation.The two biggest concerns are Erdogan's ongoing support for Syrian rebels, particularly the Islamist jihadists sponsored by Saudi Arabia, the Islamic Front. Critics of the PM are raising his open association with Yasin al-Qadi, an alleged funding source for Al Qaeda and a designated international terrorist by the U.S. government. Erdogan was dismissive of any problems when confronted on the association saying that al-Qadi was "a charitable person who loves Turkey." He may have more explaining to do if investigations continue.Reporting on evidence from prosecutors and first hand witnesses, Michael Rubin found:"According to Turkish interlocutors, there are consistent irregularities in 28 government tenders totaling in the tens of billions of dollars, in which kickbacks and other payments were made, a portion of which Turkish investigators believe ended up with al-Qadi’s funds and charities. These funds and charities were then used to support al-Qaeda affiliates and other radical Islamist groups operating in Syria like the Nusra Front." Dec. 27
  • ...1 more annotation...
  • "Irregularities" in government tenders is part of a much larger financial crisis brought on by Erdogan's policies. As noted in a an article earlier this week:"While the focus to date has been on charges of personal enrichment by Erdogan’s ministers and associates, the real problem for the current government is financial fraud in reporting its current account deficit and national income. These figures are the basis for access to international financing. Intentional, inaccurate reporting constitutes fraud that understates the risk to lenders and provides a more favorable interest rate for the borrower than is warranted." Michael Collins, Dec 29Mustafa Sonmez detailed the problems in Hurriyet Daily News, an important analysis overshadowed by the more spectacular charges of late. Turkey's secret gold-for-oil deal with Iran distorted financial reporting figure. Debt was understated and income overstated as a result. Turkey's economic success is based on foreign investments. When foreign investors look at the political instability combined with the financial reporting problems, they will vote with their feed. A survey of Middle East fund managers found that none planned to raise investments in Turkey in 2014 and 13% planned to reduce their investments.
  •  
    Finally, an article that does a fairly good job of summarizing the situation in Turkey. In a single word, it's a mess. 
Paul Merrell

How NSA Can Secretly Aid Criminal Cases | Consortiumnews - 0 views

  • Though the NSA says its mass surveillance of Americans targets only “terrorists,” the spying may turn up evidence of other illegal acts that can get passed on to law enforcement which hides the secret source through a ruse called “parallel construction,” writes ex-CIA analyst Ray McGovern. By Ray McGovern Rarely do you get a chance to ask a just-retired FBI director whether he had “any legal qualms” about what, in football, is called “illegal procedure,” but at the Justice Department is called “parallel construction.” Government wordsmiths have given us this pleasant euphemism to describe the use of the National Security Agency’s illegal eavesdropping on Americans as an investigative tool to pass on tips to law enforcement agencies which then hide the source of the original suspicion and “construct” a case using “parallel” evidence to prosecute the likes of you and me.
  • For those interested in “quaint” things like the protections that used to be afforded us by the Fourth and Fifth Amendments to the Constitution, information about this “parallel construction” has been in the public domain, including the “mainstream media,” for at least a year or so. So, I welcomed the chance to expose this artful practice to still more people with cameras rolling at a large conference on “Ethos & Profession of Intelligence” at Georgetown University on Wednesday, during the Q & A after former FBI Director Robert Mueller spoke. Mueller ducked my question regarding whether he had any “legal qualms” about this “parallel construction” arrangement. He launched into a discursive reply in which he described the various ”authorities” enjoyed by the FBI (and the CIA), which left the clear impression not only that he was without qualms but that he considered the practice of concealing the provenance of illegally acquired tip-off information somehow within those professed “authorities.”
  • Bottom line? Beware, those of you who think you have “nothing to hide” when the NSA scoops up your personal information. You may think that the targets of these searches are just potential “terrorists.” But the FBI, Internal Revenue Service, Drug Enforcement Administration and countless other law enforcement bodies are dipping their cursors into the huge pool of mass surveillance.
  • ...8 more annotations...
  • Former FBI Division Counsel in Minneapolis Coleen Rowley – who, with Jesselyn Radack, Tom Drake and me, visited Snowden in Russia last October – told me of two legal doctrines established many decades ago: the “exclusionary rule” and the rule regarding the “fruit of the poisonous tree.” These were designed to force over-zealous law enforcement officers to adhere to the Constitution by having judges throw out cases derived from improperly obtained evidence. To evade this rule, law enforcement officials who have been on the receiving end of NSA’s wiretap data must conceal what tipped off an investigation.
  • Last week a journalist asked me why I thought Congress’ initial outrage – seemingly genuine in some quarters – over bulk collection of citizens’ metadata had pretty much dissipated in just a few months. What started out as a strong bill upholding Fourth Amendment principles ended up much weakened with only a few significant restraints remaining against NSA’s flaunting of the Constitution? Let me be politically incorrect and mention the possibility of blackmail or at least the fear among some politicians that the NSA has collected information on their personal activities that could be transformed into a devastating scandal if leaked at the right moment. Do not blanch before the likelihood that the NSA has the book on each and every member of Congress, including extramarital affairs and political deal-making. We know that NSA has collected such information on foreign diplomats, including at the United Nations in New York, to influence votes on the Iraq War and other issues important to U.S. “national security.”
  • We also know how the late FBI Director J. Edgar Hoover used much more rudimentary technology a half century ago to develop dossiers on the personal indiscretions of political and ideological opponents. It makes sense that people with access to the NSA’s modern surveillance tools would be sorely tempted to put these new toys to use in support of their own priorities.
  • We cannot escape some pretty dismal conclusions here. Not only have the Executive and Legislative branches been corrupted by establishing, funding, hiding and promoting unconstitutional surveillance programs for over 12 years, but the Judicial branch has been corrupted, too. The discovery process in criminal cases is now stacked in favor of the government through its devious means for hiding unconstitutional surveillance and using it in ways beyond the narrow declared purpose of thwarting terrorism. Moreover, federal courts at the district, appeals and Supreme Court levels have allowed the government to evade legal accountability by insisting that plaintiffs must be able to prove what often is not provable, that they were surveilled through highly secretive NSA means. And, if the plaintiffs make too much progress, the government can always get a lawsuit thrown out by invoking “state secrets.” The Separation of Powers designed by the Constitution’s Framers to prevent excessive accumulation of power by one of the branches has stopped functioning amid the modern concept of “permanent war” and the unwillingness of all but a few hearty souls to challenge the invocation of “national security.” Plus, the corporate-owned U.S. media, with very few exceptions, is fully complicit.
  • The concept of a “United Stasi of America,” coined by Pentagon Papers whistleblower Daniel Ellsberg a year ago, has been given real meaning by the unconstitutional behavior and dereliction of duty on the part of both the George W. Bush and Obama administrations. Just days after the first published disclosure from Snowden, Ellsberg underscored that the NSA, FBI and CIA now have surveillance capabilities that East Germany’s Stasi secret police could scarcely have imagined.
  • Last June, Mathew Schofield of McClatchy conducted an interesting interview of Wolfgang Schmidt, a former lieutenant colonel in the Stasi, in Berlin. With the Snowden revelations beginning to tumble out into the media, Schofield described Schmidt as he pondered the sheer magnitude of domestic spying in the United States.
  • “So much information, on so many people,” says Schmidt who, at that point, volunteers a stern warning for Schofield and the rest of us: “It is the height of naiveté to think that, once collected, this information won’t be used. This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.”
  • Take note, those of you who may still feel fearless, those of you with “nothing to hide.”
Paul Merrell

Obama halted NSA spying on IMF and World Bank headquarters | Reuters - 0 views

  • (Reuters) - President Barack Obama has ordered the National Security Agency to stop eavesdropping on the headquarters of the International Monetary Fund and World Bank as part of a review of intelligence gathering activities, according to a U.S. official familiar with the matter.
  • The first official said Obama had ordered a halt to such practices within the last few weeks, about the same time he instructed the NSA to curtail eavesdropping on the United Nations headquarters in New York.
  • It is no secret that U.S. spy agencies historically have collected and analyzed information related to economic affairs - in public briefings to Congress, top intelligence officials have discussed assessments of economic issues.But a former senior U.S. intelligence official said that the Obama Administration had put greater emphasis and resources than predecessors into collecting and assessing economic information.In February 2009, shortly after Obama entered the White House, the Central Intelligence Agency began producing a new "Economic Intelligence Brief" for him to review along with the regular President's Daily Brief on international security and threats.Leon Panetta, Obama's first CIA director, said at the time the change was aimed at understanding the implications of the global economic crisis, and that the agency was considering hiring more economic analysts.The former U.S. intelligence official noted that insider detail on economic policy developments - for example, financial crises affecting the economies of European countries such as Greece, Italy and Spain, and the stability of the Euro - is the type of critical information U.S. policymakers welcome.
  • ...1 more annotation...
  • The desire by U.S. policymakers for such information could help explain why NSA collected information on foreign leaders such as Merkel. Her cellphone number was listed in a NSA targeting document, which German media outlets apparently obtained from Snowden's cache. U.S. officials have now indicated that much NSA eavesdropping on Merkel and other allied leaders is likely to be curtailed if not halted.
  •  
    Heaven forbid that anyone should even suspect that the NSA's economic intelligence is also being used by banksters to make investment decisions. No every NSA and NSA contractor staffer can be trusted to never disclose NSA secrets to others... er ... except Edward Snowden and he gave those secrets to journalists, not to banksters. The rest can all be trusted, no matter how much money they are offered. 
Paul Merrell

The U.S. Government's Secret Plans to Spy for American Corporations - The Intercept - 0 views

  • Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. So critical is this denial to the U.S. government that last August, an NSA spokesperson emailed The Washington Post to say (emphasis in original): “The department does ***not*** engage in economic espionage in any domain, including cyber.” After that categorical statement to the Post, the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations.
  • Director of National Intelligence James Clapper, for instance, responded to the Petrobras revelations by claiming: “It is not a secret that the Intelligence Community collects information about economic and financial matters…. What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of—or give intelligence we collect to—U.S. companies to enhance their international competitiveness or increase their bottom line.” But a secret 2009 report issued by Clapper’s own office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies as they identify future threats to the U.S. and lay out the actions the U.S. intelligence community should take in response. It anticipates a series of potential scenarios the U.S. may face in 2025, from a “China/Russia/India/Iran centered bloc [that] challenges U.S. supremacy” to a world in which “identity-based groups supplant nation-states,” and games out how the U.S. intelligence community should operate in those alternative futures—the idea being to assess “the most challenging issues [the U.S.] could face beyond the standard planning cycle.”
  • One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” Such a development, the report says “could put the United States at a growing—and potentially permanent—disadvantage in crucial areas such as energy, nanotechnology, medicine, and information technology.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence” (emphasis added). In particular, the DNI’s report envisions “cyber operations” to penetrate “covert centers of innovation” such as R&D facilities.
  • ...3 more annotations...
  • In a graphic describing an “illustrative example,” the report heralds “technology acquisition by all means.” Some of the planning relates to foreign superiority in surveillance technology, but other parts are explicitly concerned with using cyber-espionage to bolster the competitive advantage of U.S. corporations. The report thus envisions a scenario in which companies from India and Russia work together to develop technological innovation, and the U.S. intelligence community then “conducts cyber operations” against “research facilities” in those countries, acquires their proprietary data, and then “assesses whether and how its findings would be useful to U.S. industry” (click on image to enlarge):
  • he report describes itself as “an essential long-term piece, looking out between 10 and 20 years” designed to enable ”the IC [to] best posture itself to meet the range of challenges it may face.” Whatever else is true, one thing is unmistakable: the report blithely acknowledges that stealing secrets to help American corporations secure competitive advantage is an acceptable future role for U.S. intelligence agencies. In May, the U.S. Justice Department indicted five Chinese government employees on charges that they spied on U.S. companies. At the time, Attorney General Eric Holder said the spying took place “for no reason other than to advantage state-owned companies and other interests in China,” and “this is a tactic that the U.S. government categorically denounces.” But the following day, The New York Times detailed numerous episodes of American economic spying that seemed quite similar. Harvard Law School professor and former Bush Justice Department official Jack Goldsmith wrote that the accusations in the indictment sound “a lot like the kind of cyber-snooping on firms that the United States does.” But U.S. officials continued to insist that using surveillance capabilities to bestow economic advantage for the benefit of a country’s corporations is wrong, immoral, and illegal.
  • Yet this 2009 report advocates doing exactly that in the event that ”that the technological capacity of foreign multinational corporations outstrip[s] that of U.S. corporations.” Using covert cyber operations to pilfer “proprietary information” and then determining how it ”would be useful to U.S. industry” is precisely what the U.S. government has been vehemently insisting it does not do, even though for years it has officially prepared to do precisely that.
  •  
    DNI James Clapper caught telling another whopper. 
1 - 20 of 117 Next › Last »
Showing 20 items per page