Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged showing

Rss Feed Group items tagged

Paul Merrell

Americans fared better after Great Depression than today | Al Jazeera America - 0 views

  • The economy is improving — or so headlines tell us almost every day. But is that true? The answer to that question depends on the time frame used for comparison, whether inflation is taken into account and how you measure improvement. News reports tend to focus on the short term — on yesterday, on last year compared with the year before. But look back farther in time and an overwhelming case can be made that the vast majority of Americans are worse off. Indeed, coming out of the Great Depression eight decades ago, the vast majority fared vastly better than most people have coming out of the Great Recession, which officially ended on June 30 six years ago. It may be jarring to hear that the vast majority of Americans, the 90 percent, enjoyed bigger income gains in the 1930s than in recent years, but that is what the data show. The data also indicate tandem increases in both want and wealth, with the vast majority worse off in 2013 than in 2009, while those at the apex of the economy are enjoying a much larger — and growing — share of national income.
  •  
    Behind the facade of politico-speak of a recovering economy and dedication to growing the economy, the political class in Washington, D.C. has done nothing along those lines that is worthy of mention, not even removing the tax incentives for off-shoring middle class jobs. Unless you live in one of the small pockets of prosperity, reality sets in as soon as you walk out the door; the economy just keeps getting worse rather than better and it shows just about everywhere you go. This article takes a useful look at how the 90th percentile of American workers fared during the recovery from the Great Depression compared to how they fared in the "recovery" from the Great Recession, after adjusting for inflation and what-not. It's dismal reading. But there's a silver-lining on the edge of that tornado. That's the fact that a lot more Americans are now a lot more reality-based in how they view their government: This is not a government of, by, and for the People and it never has been. It's always been a government of, by, and for the oligarchs. So shed a tear for those lies you used to believe; at least you've gained a whole bunch of sanity.    
Paul Merrell

CIA's Self-Authorization for Ice-Drowning Human Beings | emptywheel - 0 views

  • The WaPo has a story that repeats what I’ve been harping on for over a year (and in some cases, has been clear even longer): the Senate Torture Report shows that CIA repeatedly lied to Congress. There are, however, ugly new details about the torture (though it’s not clear whether they show up in the report): particularly regarding the treatment of Ammar al-Baluchi. If declassified, the report could reveal new information on the treatment of a high-value detainee named Ali Abdul Aziz Ali, the nephew of Khalid Sheik Mohammed, the self-proclaimed mastermind of the Sept. 11 attacks. The Pakistanis captured Ali, known more commonly as Ammar al-Baluchi, on April, 30, 2003, in Karachi and turned him over to the CIA about a week later. He was taken to a CIA black site called “Salt Pit” near Kabul. At the secret prison, Baluchi endured a regime that included being dunked in a tub filled with ice water. CIA interrogators forcibly kept his head under the water while he struggled to breathe and beat him repeatedly, hitting him with a truncheon-like object and smashing his head against a wall, officials said. As with Zubaida and even Nashiri, officials said, CIA interrogators continued the harsh treatment even after it appeared that Baluchi was cooperating. The report notes that two other prisoners — members of the Libyan Islamic Fighting Group — were subjected to similar treatment at the same time.
  • Two other terrorism suspects, from Libya — Mohammed al-Shoroeiya and Khalid al-Sharif — endured similar treatment at Salt Pit, according to Human Rights Watch. One of the men said CIA interrogators “would pour buckets of very cold water over his nose and mouth to the point that he felt he would suffocate. Icy cold water was also poured over his body. He said it happened over and over again,” the report says. CIA doctors monitored their body temperatures so they wouldn’t suffer hypothermia. Ultimately, CIA got DOJ to authorize “water dousing” — in the manner that CIA always got DOJ to approve mere shadows of what they actually did, and the approval more closely matches the description of the LIFG prisoners — in the Bradbury Techniques Memo (see page 10). But not before it got used over and over at the Salt Pit (the same place where water dousing had already contributed to Gul Rahman’s death). Which is, I’m quite certain, one thing that CIA was doing with the Legal Principles document, a set of legal guidelines the CIA wrote for itself (with John Yoo’s freelance help) as the CIA’s legal problems started to mount. As I’ve noted, the first draft of the memos got hand-carried to John Yoo on April 28, 2003, just as these detainees were in the Salt Pit. There were several more discussions internally at CIA in anticipation of litigation before they tried (unsuccessfully) to create a fait accompli with Pat Philbin on June 16, 2003. At that point, the document only generally approved techniques equivalent to those already approved. As CIA would later explain,
  • We rely on the applicable law and OLC guidance to assess the lawfulness of detention and interrogation techniques. For example, using the applicable law and relying on OLC’s guidance, we concluded that the abdominal slap previously discussed with OLC (and mentioned in the June 2003 summary points) is a permissible interrogation technique. Similarly, in addition to the sitting and kneeling stress positions discussed earlier with OLC, the Agency has added to its list of approved interrogation techniques two standing stress positions involving the detainee leaning against a wall. I guess, in similar fashion, John Yoo and his CIA buddies believe ice-drowning is equivalent, as another kind of simulated drowning, to waterboarding, which had been approved? Then the next year, when Scott Muller tried the same trick with Jack Goldsmith — trying to get him to sign off on the techniques CIA had freelanced its own legal opinion — he asked to include water dousing (and another water-based technique and one still-redacted technique) explicitly. Of course, the description of water dousing fell far short of what the CIA was actually doing — dunking men in ice-water repeatedly — though the outlines, especially the concern about detainees ingesting water and hypothermia — show the outlines of the torture such language was meant to gloss. To understand the CIA’s torture program, you have to understand what these bureaucratic maneuvers were meant to cover. Now we know they were intended to authorize controlled drowning of men in ice water.
Paul Merrell

Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide - The Intercept - 0 views

  • When Apple and Google unveiled new encryption schemes last month, law enforcement officials complained that they wouldn’t be able to unlock evidence on criminals’ digital devices. What they didn’t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces — easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by The Intercept. We’re publishing in full, for the first time, manuals explaining the prominent commercial implant software “Remote Control System,” manufactured by the Italian company Hacking Team. Despite FBI director James Comey’s dire warnings about the impact of widespread data scrambling — “criminals and terrorists would like nothing more,” he declared — Hacking Team explicitly promises on its website that its software can “defeat encryption.”
  • The manuals describe Hacking Team’s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team’s manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software. Hacking Team’s efforts include a visible push into the U.S. Though Remote Control System is sold around the world — suspected clients include small governments in dozens of countries, from Ethiopia to Kazakhstan to Saudi Arabia to Mexico to Oman — the company keeps one of its three listed worldwide offices in Annapolis, Maryland, on the edge of the federal intelligence and law-enforcement cluster around the nation’s capital; has sent representatives to American homeland security trade shows and conferences, where it has led training seminars like “Cyber Intelligence Solutions to Data Encryption” for police; and has even taken an investment from a firm headed by America’s former ambassador to Italy. The United States is also, according to two separate research teams, far and away Hacking Team’s top nexus for servers, hosting upwards of 100 such systems, roughly a fifth of all its servers globally.
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Paul Merrell

Dianne Feinstein: Terrorist sleeper cells are in the U.S. - Washington Times - 0 views

  • A Senate leader said Sunday she thinks terrorist sleeper cells are in the U.S. — a claim sure to spark even greater fears of a strike on the homeland as the White House launches new efforts to confront growing Islamist extremism around the globe.Sen. Dianne Feinstein, California Democrat and her party’s ranking member on the Senate Select Committee on Intelligence, flatly stated that she believes terrorist cells are hiding in Europe and the U.S., waiting to be activated and carry out attacks similar to the ones that claimed 17 lives in France last week.“I think there are sleeper cells not only in France but certainly in other countries and, yes, in our own,” she told CNN. “This calls for vigilance. … Hopefully, we can be more active in terms of doing those things which enable us to find terrorists, see who they’re communicating with and to track that.”
  • Mrs. Feinstein and Obama administration officials did not elaborate on how many suspected terrorists are in the country, nor did they discuss details of any terrorist plot.Despite the apparent lack of specific threats, polling data show the American people are deeply worried about a strike in the U.S.A Rasmussen poll released Sunday shows that 65 percent of Americans believe it is at least somewhat likely that an attack “on those critical of Islam” in the U.S. will occur over the next year. Just 26 percent said such an attack is not likely, the survey shows.
  •  
    "Why, of course, the people don't want war. Why would some poor slob on a farm want to risk his life in a war when the best that he can get out of it is to come back to his farm in one piece. Naturally, the common people don't want war; neither in Russia nor in England nor in America, nor for that matter in Germany. That is understood. But, after all, it is the leaders of the country who determine the policy and it is always a simple matter to drag the people along, whether it is a democracy or a fascist dictatorship or a Parliament or a Communist dictatorship. …  "Oh, that is all well and good, but, voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is tell them they are being attacked and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same way in any country." - Hermann Goering; Quote verified, http://www.snopes.com/quotes/goering.asp
Paul Merrell

F.B.I. Is Broadening Surveillance Role, Report Shows - NYTimes.com - 0 views

  • Although the government’s warrantless surveillance program is associated with the National Security Agency, the Federal Bureau of Investigation has gradually become a significant player in administering it, a newly declassified report shows.In 2008, according to the report, the F.B.I. assumed the power to review email accounts the N.S.A. wanted to collect through the “Prism” system, which collects emails of foreigners from providers like Yahoo and Google. The bureau’s top lawyer, Valerie E. Caproni, who is now a Federal District Court judge, developed procedures to make sure no such accounts belonged to Americans.
  • Then, in October 2009, the F.B.I. started retaining copies of unprocessed communications gathered without a warrant to analyze for its own purposes. And in April 2012, the bureau began nominating new email accounts and phone numbers belonging to foreigners for collection, including through the N.S.A.’s “upstream” system, which collects communications transiting network switches.That information is in a 231-page study by the Justice Department’s inspector general about the F.B.I.’s activities under the FISA Amendments Act of 2008, which authorized the surveillance program. The report was entirely classified when completed in September 2012. But the government has now made a semi-redacted version of the report public in response to a Freedom of Information Act lawsuit filed by The New York Times.
  • The report also filled in a gap about the evolving legality of the warrantless wiretapping program, which traces back to a decision by President George W. Bush in October 2001 to direct the N.S.A. to collect Americans’ international phone calls and emails, from network locations on domestic soil, without the individual warrants required by the Foreign Intelligence Surveillance Act, or FISA. The Times revealed that program in December 2005.After the article appeared, telecommunications providers that had voluntarily participated in the program were sued, and a Federal District Court judge in Detroit ruled that the program was illegal, although that decision was later vacated. The Bush administration sought to put the program on more solid legal footing by gaining orders from the Foreign Intelligence Surveillance Court approving it.Continue reading the main story Continue reading the main story Continue reading the main story In January 2007, the Bush administration persuaded the court’s Judge Malcolm Howard to issue an order to telephone and network companies requiring them to let the security agency target foreigners’ accounts for collection without individual warrants. But in April 2007, when the order came up for renewal before Judge Roger Vinson, he said that it was illegal.
  • ...1 more annotation...
  • Judge Vinson’s resistance led Congress to enact, in August 2007, the Protect America Act, a temporary law permitting warrantless surveillance of foreigners from domestic network locations. The next year, Congress replaced that law with the FISA Amendments Act.Last month, as a result of separate Freedom of Information Act lawsuits by The Times and the Electronic Frontier Foundation, the government declassified the identities of the judges who disagreed in early 2007 and several court filings from that episode. But it remained unclear what the N.S.A. had done in June and July of 2007.The newly declassified report said Judge Vinson issued an order on May 31, 2007, that allowed existing surveillance to continue by approving collection on a long list of specific foreign phone numbers and email addresses. But after that, when the agency wanted to start wiretapping an additional person, it had to ask the court for permission.The report said that “the rigorous nature of the FISA Court’s probable cause review of new selectors submitted to the various FISA Court judges following Judge Vinson’s May 31, 2007, order caused the N.S.A. to place fewer foreign selectors under coverage than it wanted to.” That and other factors “combined to accelerate the government’s efforts” to persuade Congress to enact the Protect America Act.
Paul Merrell

Video: Chicago Jewish activists disrupt Rahm Emanuel, Michael Oren at Israel fundraiser... - 0 views

  • On Thursday night activists from Jewish Voice for Peace–Chicago (JVP-Chicago) disrupted the Jewish United Fund/Jewish Federation of Chicago “Israel Emergency Campaign” fundraiser at the Chicago Hilton, which was addressed by prominent officials and an Israeli soldier. The disruptions took place as dozens of Chicagoans rallied outside calling for an end to the attack on Gaza and for Israeli war criminals to be brought to justice.
  • The video above shows two activists, Lynn Pollack and K. Émilie, standing up during a speech by Chicago Mayor Rahm Emanuel and shouting “We are Jews, Shame on You! Stop killing children now!” Emanuel stands silently while a man grabs a sign out of the activists’ hands. As the two are led out by security personnel they continue to shout their message to jeers from the audience.
  • The video then shows a similar disruption to a speech by an Israeli soldier. During that disruption an Israeli citizen called Omer, who was sitting in the audience, stood up and disrupted, shouting in Hebrew his message against Israeli war crimes and the murder of children in Gaza. Yet more activists wave a banner and disrupt as Michael Oren, the former Israeli ambassador to the United States, addresses the audience. Oren was disrupted more than once, as the video shows.
  • ...2 more annotations...
  • Dozens of members of the Chicago Palestinian community and solidarity activists rallied outside the Chicago Hilton with banners and called out slogans against Israel’s massacre in Gaza. Here’s a brief video of the scene:
  • Bill Chambers reported on some of the rally speeches in The Chicago Monitor: Outside multiple speakers emphasized the injustice of the continued assault on Gaza. Nashisha Alam from SJP-Chicago said “While they sip cocktails and raise funds for war criminals, we are here supporting the people of Palestine…They are inside listening to Michael Oren trying to justify the killing of civilians.” Kait McIntyre from the Chicago Anti-War Committee and one of the activists arrested during a recent sit-in at Boeing headquarters described the outrage that “in Chicago with the largest Palestinian community in the country, Boeing is providing weapons to Israel to kill Palestinians in Gaza.”
  •  
    Perhaps during the ongoing slaughter in Gaza wasn't the wisest time for Mayor Rahm Emanuel to keynote an "emergency" fundraiser in support of Israel's violence. Jewish Voice for Peace activists simply had too much fun at Emanuel's expense. Even worse for Emanuel, his most embarrassing moment got fairly wide coverage in the Chicago media. 
Paul Merrell

John McCain, Conductor of the "Arab Spring" and the Caliph , by Thierry Meyssan - 0 views

  • Everyone has noticed the contradiction of those who recently characterized the Islamic Emirate as "freedom fighters" in Syria and who are indignant today faced with its abuses in Iraq. But if that speech is incoherent in itself, it makes perfect sense in the strategic plan: the same individuals were to be presented as allies yesterday and must be as enemies today, even if they are still on orders from Washington. Thierry Meyssan reveals below US policy through the particular case of Senator John McCain, conductor of the "Arab Spring" and longtime partner of Caliph Ibrahim.
  • ohn McCain is known as the leader of the Republicans and unhappy 2008 US presidential candidate. This is, we will see, only the real part of his biography, which serves as a cover to conduct covert actions on behalf of his government. When I was in Libya during the "Western"attack, I was able to view a report of the foreign intelligence services. It stated that, on February 4, 2011 in Cairo, NATO organized a meeting to launch the "Arab Spring" in Libya and Syria. According to this document, the meeting was chaired by John McCain. The report detailed the list of Libyan participants, whose delegation was led by the No. 2 man of the government of the day, Mahmoud Jibril, who abruptly switched sides at the entrance of the meeting to become the opposition leader in exile. I remember that, among the French delegates present, the report quoted Bernard-Henry Lévy, although officially he had never exercised functions within the French government. Many other personalities attended the symposium, including a large delegation of Syrians living abroad.
  • Emerging from the meeting, the mysterious Syrian Revolution 2011 Facebook account called for demonstrations outside the People’s Council (National Assembly) in Damascus on February 11. Although this Facebook account at the time claimed to have more than 40,000 followers, only a dozen people responded to its call before the flashes of photographers and hundreds of police. The demonstration dispersed peacefully and clashes only began more than a month later in Deraa. [1] On February 16, 2011, a demonstration underway in Benghazi, in memory of members of the Islamic Fighting Group in Libya [2] massacred in 1996 in the Abu Selim prison, degenerated into shooting. The next day, a second event, this time in memory of those who died by attacking the Danish consulate during the Muhammad cartoons affair, also degenerated into shooting. At the same time, members of the Islamic Fighting Group in Libya ,coming from Egypt and coordinated by unidentified, hooded individuals, simultaneously attacked four military bases in four different cities. After three days of fighting and atrocities, the rebels launched the uprising of Cyrenaica against Tripolitania [3]; a terrorist attack that the western press falsely presented as a "democratic revolution" against "the regime" of Muammar el-Qaddafi.
  • ...16 more annotations...
  • On February 22nd, John McCain was in Lebanon. He met members of the Future Movement (the party of Saad Hariri) whom he charged to oversee the transfer of arms to Syria around the MP Okab Sakr [4]. Then, leaving Beirut, he inspected the Syrian border and the selected villages including Ersal, which were used as a basis to back mercenaries in the war to come. The meetings chaired by John McCain were clearly the trigger point for a long-prepared Washington plan; the plan that would have the UK and France attack Libya and Syria simultaneously, following the doctrine of "leadership from behind" and the annex of the Treaty of Lancaster House of November 2010. [5]
  • In May 2013, Senator John McCain made his way illegally to near Idleb in Syria via Turkey to meet with leaders of the "armed opposition". His trip was not made public until his return to Washington. [6] This movement was organized by the Syrian Emergency Task Force, which, contrary to its title, is a Zionist Organization led by a Palestinian employee of AIPAC [7]
  • John McCain in Syria. In the foreground at right is the director of the Syrian Emergency Task Force. In the doorway, center, Mohammad Nour.
  • In photographs released at that time, one noticed the presence of Mohammad Nour, a spokesman for the Northern Storm Brigade (of the Al-Nosra Front, that is to say, al-Qaeda in Syria), who kidnapped and held 11 Lebanese Shiite pilgrims in Azaz. [8] Asked about his proximity to al-Qaeda kidnappers, the Senator claimed not to know Mohammad Nour who would have invited himself into this photo. The affair made a great noise and the families of the abducted pilgrims lodged a complaint before the Lebanese judiciary against Senator McCain for complicity in kidnapping. Ultimately, an agreement was reached and the pilgrims were released. Let’s suppose that Senator McCain had told the truth and that he was abused by Mohammad Nour. The object of his illegal trip to Syria was to meet the chiefs of staff of the Free Syrian Army. According to him, the organization was composed "exclusively of Syrians" fighting for "their freedom" against the "Alouite dictatorship” (sic). The tour organizers published this photograph to attest to the meeting.
  • John McCain and the heads of the Free Syrian Army. In the left foreground, Ibrahim al-Badri, with which the Senator is talking. Next, Brigadier General Salim Idris (with glasses).
  • If we can see Brigadier General Idriss Salem, head of the Free Syrian Army, one can also see Ibrahim al-Badri (foreground on the left) with whom the senator is talking. Back from the surprise trip, John McCain claimed that all those responsible for the Free Syrian Army were "moderates who can be trusted" (sic).
  • However, since October 4, 2011, Ibrahim al-Badri (also known as Abu Du’a) was on the list of the five terrorists most wanted by the United States (Rewards for Justice). A premium of up to $ 10 million was offered to anyone who would assist in his capture. [9] The next day, October 5, 2011, Ibrahim al-Badri was included in the list of the Sanctions Committee of the UN as a member of Al Qaeda. [10] In addition, a month before receiving Senator McCain, Ibrahim al-Badri, known under his nom de guerre as Abu Bakr al-Baghdadi, created the Islamic State in Iraq and the Levant (ÉIIL) – all the while still belonging to the staff of the very "moderate" Free Syrian Army. He claimed as his own the attack on the Taj and Abu Ghraib prisons in Iraq, from which he helped between 500 and 1,000 jihadists escape who then joined his organization. This attack was coordinated with other almost simultaneous operations in eight other countries. Each time, the escapees joined the jihadist organizations fighting in Syria. This case is so strange that Interpol issued a note and requested the assistance of the 190 member countries. [11]
  • For my part, I have always said that there was no difference on the ground between the Free Syrian Army, Al-Nosra Front, the Islamic Emirate etc ... All these organizations are composed of the same individuals who continuously change flag. When they pose as the Free Syrian Army, they fly the flag of French colonization and speak only of overthrowing the "dog Bashar." When they say they belong to Al-Nosra Front, they carry the flag of al Qaeda and declare their intention to spread Islam in the world. Finally when they say they are the Islamic Emirate, they brandish the flag of the Caliphate and announce that they will clean the area of all infidels. But whatever the label, they proceed to the same abuses: rape, torture, beheadings, crucifixions. Yet neither Senator McCain nor his companions of the Syrian Emergency Task Force provided the information in their possession on Ibrahim al-Badri to the State Department, nor have they asked for the reward. Nor have they informed the anti-terrorism Committee of the UN.
  • But John McCain is not just the leader of the political opposition to President Obama, he is also one of his senior officials! He is in fact President of the International Republican Institute (IRI), the republican branch of NED / CIA [12], since January 1993. This so-called "NGO" was officially established by President Ronald Reagan to extend certain activities of the CIA, in connection with the British, Canadian and Australian secret services. Contrary to its claims, it is indeed an inter-governmental agency. Its budget is approved by Congress in a budget line dependent of the Secretary of State. It is also because it is a joint agency of the Anglo-Saxon secret services that several states in the world prohibit it from any activity on their territory.
  • he list of interventions by John McCain on behalf of the State Department is impressive. He participated in all the color revolutions of the last twenty years.
  • And an agent that has the best coverage imaginable: he is the official opponent of Barack Obama. As such, he can travel anywhere in the world (he is the most traveled US senator) and meet whoever he wants without fear. If his interlocutors approve Washington policy, he promised them to continue it, if they fight it, he hands over the responsibility to President Obama.
  • In 2003, France’s opposition was not enough to offset the influence of the Committee for the Liberation of Iraq. The United States attacked the country again and this time overthrew President Hussein. Of course, John McCain was a major contributor to the Committee. After handing to a private company the care of plundering the country for a year [17], they tried to partition Iraq into three separate states, but had to give it up due to the resistance of the population. They tried again in 2007, around the Biden-Brownback resolution, but again failed. [18] Hence the current strategy that attempts to achieve this by means of a non-state actor: the Islamic Emirate.
  • The operation was planned well in advance, even before the meeting between John McCain and Ibrahim al-Badri. For example, internal correspondence from the Qatari Ministry of Foreign Affairs, published by my friends James and Joanne Moriarty [19], shows that 5,000 jihadis were trained at the expense of Qatar in NATO’s Libya in 2012, and 2,5 million dollars was paid at the same time to the future Caliph. In January of 2014, the Congress of the United States held a secret meeting at which it voted, in violation of international law, to approve funding for the Al-Nosra Front (Al-Qaeda) and the Islamic emirate in Iraq and the Levant until September 2014. [20] Although it is unclear precisely what was really agreed to during this meeting revealed by the British Reuters news agency [21], and no media US media dared bypass censorship, it is highly probable that the law includes a section on arming and training jihadists.
  • Proud of this US funding, Saudi Arabia has claimed on its public television channel, Al-Arabiya, that the Islamic Emirate was headed by Prince Abdul Rahman al-Faisal, brother of Prince Saud al Faisal (Foreign Minister) and Prince Turki al-Faisal (Saudi ambassador to the United States and the United Kingdom) [22]. The Islamic Emirate represents a new step in the world of mercenaries. Unlike jihadi groups who fought in Afghanistan, Bosnia-Herzegovina and Chechnya around Osama bin Laden, it does not constitute a residual force but actually an army in itself. Unlike previous groups in Iraq, Libya and Syria, around Prince Bandar bin Sultan, they have sophisticated communication services at their disposal for recruitment and civilian officials trained in large western schools capable of instantly taking over the administration of a territory.
  • Brand new Ukrainian weapons were purchased by Saudi Arabia and conveyed by the Turkish secret services who gave them to the Islamic Emirate. Final details were coordinated with the Barzani family at a meeting of jihadist groups in Amman on 1 June 2014. [23] The joint attack on Iraq by the Islamic Emirate and the Kurdistan Regional Government began four days later. The Islamic Emirate seized the Sunni part of the country, while the Kurdistan Regional Government increased its territory by over 40%. Fleeing the atrocities of jihadists, religious minorities left the Sunni area, paving the way for the three-way partition of the country. Violating the Iraqi-US Defense agreement, the Pentagon did not intervene and allowed the Islamic Emirate to continue its conquest and massacres. A month later, while the Kurdish Peshmerga Regional Government had retreated without a fight, and when the emotions of world public opinion became too strong, President Obama gave the order to bomb some positions of the Islamic Emirate. However, according to General William Mayville, director of operations at the headquarters, "These bombings are unlikely to affect the overall capacity of the Islamic Emirate and its activities in other areas of Iraq or Syria ". [24] Obviously, they are not meant to destroy the jihadist army, but only to ensure that each player does not overlap the territory that has been assigned. Moreover, for the moment, they are symbolic and have destroyed only a handful of vehicles. It was ultimately the intervention of the Kurds of the Turkish and Syrian Kurdish PKK which halted the progress of the Islamic Emirate and opened a corridor to allow civilians to escape the massacre.
  • In the latest issue of its magazine, the Islamic Emirate devoted two pages to denounce Senator John McCain as "the enemy" and "double-crosser", recalling his support for the US invasion of Iraq. Lest this accusation remain unknown in the United States, Senator immediately issued a statement calling the Emirate the "most dangerous Islamist terrorist group in the world" [26]. This controversy is there only to distract the gallery. One would like to believe it ... if it were’t for this photograph from May 2013.
  •  
    Thierry Meysann makes the case that Sen. John McCain, working with  was the guiding force behind the Arab Spring, the overthrow of Qadaffi in Libya, and the invasion of Syria by mercenary Islamists, working with a Zionist but deliberately misnomered front group. Thierry goes on to show that McCain played a key role in the creation and deployment of ISIL.  
Paul Merrell

The Russian Military Finally Speaks! - 0 views

  • Finally!  The Russian military has decided to speak out about some of what it knows about what happened to MH17.  It was a typical Russian event: the interpreters were nothing short of *terrible* (I speak as a former military interpreter myself), the visual aids were badly designed (the shape of a SU-24 bomber was used to represent a totally different SU-25 close air support aircraft), and there was no Q&A.  See for yourself:
  • Still, a few very interesting things came out of this press conference. First, the Ukies have been caught lying about their military aircraft in the area of the disaster.  They had claimed that no UAF aircraft were in the area.  The Russians have shown the recorded radar tracks which reveal the following: there was what appears to have been a military aircraft (with no transponder) flying below 5000m which suddenly began climbing just before MH17 was hit by some kind of missile.  This unidentified aircraft then stayed and observed as MH17 fell to the ground.  The Russians added that a SU-25 armed with a R-60 air to air missile could have shot down MH17.  Maybe.  But what is certain is that the civilian radars did detected this strange Ukie aircraft. Now, these radar tracks are from *civilian* radars.  The Russians apparently are not willing to share the data from their military radars.  This is why this mysterious Ukie aircraft 'appears' at 5'000m altitude and then 'disappears' again, but you can be certain that their military radars, especially on their A-50 AWACs did track that aircraft before and after its strange maneuver.  Again, I think that the Russians hope that the experts will come to the correct conclusions on the basis of what they have shown today and that they will not have to reveal more.  But we can be certain that they have the full picture and that they know exactly what happened.
  • Second, the Russians are challenging their American colleagues to show the images they claim show the launch of the BukM1 rocket.  They also point out at the interesting coincidence that an US experimental launch detection satellite was exactly over the area at the moment of the tragedy.  Clearly, they are tossing the world experts some kind of lead here, but I am not sure what this is. Third, the Russians have shown their own space-based imagery which shows that one battery of BukM1 had been moved just prior to the incident (See for yourself here).  It will be interesting to see if the Ukies explain what is shown on these picture and, if yes, how?
  • ...1 more annotation...
  • As a public information this conference gets a C+ but as a lead for experts I would give it a much higher A-.  We know have hard proof that the Ukies lied at least twice.  They lied about the footage of the Buk missiles being moved back to Russia (the footage was taken in Ukie-occupied territory) and they most definitely lied when they denied having any military aircraft in the area when in reality they had one in the immediate proximity of MH17.  That is a huge lie which the Ukies will have a very hard time dismissing. As I said in my first post about MH17, I have no hope whatsoever that the western plutocracy will ever admit that the junta did it.  Ditto for the corporate presstitues of the MSM, but I do hope that the world will see this tragedy for what is clearly was: a deliberate false flag on the part of the Nazi junta in Kiev.  As David Chandler correctly points out about 9/11, the proof of a cover up is in itself already a proof of a conspiracy.
Paul Merrell

Newly declassified documents reveal how U.S. agreed to Israel's nuclear program - Diplo... - 0 views

  • The Obama administration this week declassified papers, after 45 years of top-secret status, documenting contacts between Jerusalem and Washington over American agreement to the existence of an Israeli nuclear option. The Interagency Security Classification Appeals Panel (ISCAP), which is in charge of approving declassification, had for decades consistently refused to declassify these secrets of the Israeli nuclear program. The documents outline how the American administration worked ahead of the meeting between President Richard Nixon and Prime Minister Golda Meir at the White House in September 1969, as officials came to terms with a three-part Israeli refusal – to sign the Non-Proliferation Treaty; to agree to American inspection of the Dimona nuclear facility; and to condition delivery of fighter jets on Israel’s agreement to give up nuclear weaponry in exchange for strategic ground-to-ground Jericho missiles “capable of reaching the Arab capitals” although “not all the Arab capitals.”
  • The officials – cabinet secretaries and senior advisers who wrote the documents – withdrew step after step from an ambitious plan to block Israeli nuclearization, until they finally acceded, in internal correspondence – the content of the conversation between Nixon and Meir is still classified – to recognition of Israel as a threshold nuclear state. In fact, according to the American documents, the Nixon administration defined a double threshold for Israel’s move from a “technical option” to a “possessor” of nuclear weapons. The first threshold was the possession of “the components of nuclear weapons that will explode,” and making them a part of the Israel Defense Forces operational inventory.
  • The second threshold was public confirmation of suspicions internationally, and in Arab countries in particular, of the existence of nuclear weapons in Israel, by means of testing and “making public the fact of the possession of nuclear weapons.” Officials under Nixon proposed to him, on the eve of his conversation with Meir, to show restraint with regard to the Israeli nuclear program, and to abandon efforts to get Israel to cease acquiring 500-kilometer-range missiles with one-ton warheads developed in the Marcel Dassault factory in France, if it could reach an agreement with Israel on these points.
  • ...2 more annotations...
  • The Johnson and Nixon administrations concluded that, in talks with Rabin, it had been stated in a manner both “explicit and implicit” that “Israel wants nuclear weapons, for two reasons: First, to deter the Arabs from striking Israel; and second, if deterrence fails and Israel were about to be overrun, to destroy the Arabs in a nuclear Armageddon.”
  • According to the documents, the Nixon administration believed that Israel’s acquisition of nuclear weapons would spur the Arab countries to acquire their own such weapons within 10 years, through private contracts with scientists and engineers in Europe. Moreover, “deeply rooted in the Arab psyche is the concept that a settlement will be possible only when there is some parity in strength with Israel. A ‘kamikaze’ strike at the Dimona facilities cannot be ruled out,” the document states.
  •  
    "The Johnson and Nixon administrations concluded that, in talks with Rabin, it had been stated in a manner both 'explicit and implicit' that 'Israel wants nuclear weapons, for two reasons: First, to deter the Arabs from striking Israel; and second, if deterrence fails and Israel were about to be overrun, to destroy the Arabs in a nuclear Armageddon.'" Which just goes to show that Israel's leadership was very bit as looney-tunes as the U.S. leadership was with its "MAD" Mutually Assured Destruction strategy. What is there about democracy that permits psychopaths to acquire the power they so insanely crave? Humanity would have far better odds of surviving the next 100 years if all members of Congress now chosen by voting were instead chosen from the general population at random and limited to a single term. Then let Congress choose the President and Vice President from five people also randomly chosen. That would also result in a Congress far more representative of the People's interests. Anyone with a rudimentary understanding of Statistics could prove that mathematically. To boot, that would take care of the campaign finance issues, since there wouldn't be any elections for federal office. Give me 24 hours notice and I'll have the necessary constitutional amendments written. Let's call them the No More Lunatics Running This Asylum Amendments. Or with a bit more thought we could have a name with an acronym that's more descriptive, something like the SANE Amendments. Let's see: the Save America from Nutjobs Evermore Amendments, or ....   Never mind for now. You do the political organizing to get the Amendments adopted and let me know when. I'll crank out the wordsmith work product for the Amendments.  Sheesh! As I've said for years, if it be true that Man was was created in the image of the Creator, that is irrefutable proof that the Creator is as dumb as a doornail and insane to boot. "[I]t it is not really possible to deter Arab leaders when they themse
Paul Merrell

MH17: Still Waiting for Evidence « LobeLog.com - 0 views

  • When flight MH17 was hit with a missile over eastern Ukraine on July 17, US officials immediately blamed pro-Russian separatists for bringing the plane down. Secretary of State John Kerry said the evidence “obviously points a very clear finger at the separatists,” using “a system that was transferred from Russia.” The preliminary evidence — including photographs allegedly showing a Buk system in the area where the aircraft was shot down, satellite imagery supposedly showing a missile plume that trailed back to separatist-controlled territory, and intercepts of separatists purportedly discussing the shooting — supported Kerry’s assertion, but was at best circumstantial (Kerry himself called it “extraordinary circumstantial evidence”), and in the case of the missile plume, has not been made public. Doubts have been raised about the veracity of the initial MH17 story, particularly by independent journalist Robert Parry, who claims that a reliable (though anonymous) source told him that US satellite imagery actually suggests the flight was shot down by a Buk battery under the control of Ukrainian forces. Parry’s reporting initially suggested that the battery fired on MH17 accidentally, or due to carelessness on the part of its crew, but he has since reported (based on additional anonymous sourcing) that the attack may have been a deliberate attempt to assassinate Russian President Vladimir Putin, who was returning from the World Cup in Brazil that day and whose plane may have resembled MH17 in both physical appearance and flight path.
  • Obviously Parry’s story suffers from its reliance on anonymous sources and the lack of any publicly available evidence supporting it. However, it remains a plausible alternative to the Western narrative about MH17, in large part due to the failure of the US government to bolster the initial circumstantial evidence it raised against the separatists with anything more substantive (it claims doing so would compromise its intelligence-gathering capabilities). Parry is certainly not the only journalist to notice this failure, as shown by a heated July 25 exchange between AP reporter Matt Lee and State Department spokeswoman Marie Harf. As Gawker’s Matthew Phelan points out, the evidence that has been made public so far is hardly impressive considering the massive US intelligence apparatus that is supposed to be investigating what really happened to MH17. Yet for the most part, American mainstream news outlets have hardly challenged the US’ official MH17 story.
  • Others have publicly raised questions. A group of former intelligence and foreign service officials called Veteran Intelligence Professionals for Sanity (VIPS) released a public memo on July 29 to President Obama via Parry’s website. The authors argued that “the charges against Russia should be rooted in solid, far more convincing evidence” and asked that “if you [Obama] indeed have more conclusive evidence, you will find a way to make it public without further delay.” VIPS has also critiqued Colin Powell’s February 2003 speech to the UN Security Council making the case for the Iraq War, the Obama administration’s unwillingness to investigate and prosecute those behind the Bush-era torture program, and last year’s plans to launch cruise missile strikes against Syria. Granted, some of this group’s claims have been seriously challenged. In any case, if VIPS demand for more conclusive evidence seemed premature early on, their demands seem considerably more reasonable now that Russia’s supposed culpability in MH17′s downing has been used to justify additional US and EU sanctions. Yet there has still been no effort by the Obama administration to release more substantive evidence to support allegations of the separatists’ culpability. Gawker spoke to members of VIPS, who argued that given all the assets that must have been sent to eastern Ukraine in the midst of the ongoing fighting, the US government probably has substantial evidence showing what really happened to MH17. They also said that the seriousness of the deteriorating US-Russia relationship warranted releasing that evidence even if doing so would compromise intelligence-gathering operations. “We’re talking about the possibility of an armed confrontation with Russia. I mean, you couldn’t think of higher stakes,” retired CIA analyst Ray McGovern told Gawker.
Paul Merrell

The Virtue of Subtlety: A U.S. Strategy Against the Islamic State - 0 views

  • U.S. strategy is sound. It is to allow the balance of power to play out, to come in only when it absolutely must — with overwhelming force, as in Kuwait — and to avoid intervention where it cannot succeed. The tactical application of strategy is the problem. In this case the tactic is not direct intervention by the United States, save as a satisfying gesture to avenge murdered Americans. But the solution rests in doing as little as possible and forcing regional powers into the fray, then in maintaining the balance of power in this coalition. Such an American strategy is not an avoidance of responsibility. It is the use of U.S. power to force a regional solution. Sometimes the best use of American power is to go to war. Far more often, the best use of U.S. power is to withhold it. The United States cannot evade responsibility in the region. But it is enormously unimaginative to assume that carrying out that responsibility is best achieved by direct intervention. Indirect intervention is frequently more efficient and more effective.
  • The United States cannot win the game of small mosaic tiles that is emerging in Syria and Iraq. An American intervention at this microscopic level can only fail. But the principle of balance of power does not mean that balance must be maintained directly. Turkey, Iran and Saudi Arabia have far more at stake in this than the United States. So long as they believe that the United States will attempt to control the situation, it is perfectly rational for them to back off and watch, or act in the margins, or even hinder the Americans. The United States must turn this from a balance of power between Syria and Iraq to a balance of power among this trio of regional powers. They have far more at stake and, absent the United States, they have no choice but to involve themselves. They cannot stand by and watch a chaos that could spread to them. It is impossible to forecast how the game is played out. What is important is that the game begins. The Turks do not trust the Iranians, and neither is comfortable with the Saudis. They will cooperate, compete, manipulate and betray, just as the United States or any country might do in such a circumstance. The point is that there is a tactic that will fail: American re-involvement. There is a tactic that will succeed: the United States making it clear that while it might aid the pacification in some way, the responsibility is on regional powers. The inevitable outcome will be a regional competition that the United States can manage far better than the current chaos.
  • There is then the special case of the Islamic State. It is special because its emergence triggered the current crisis. It is special because the brutal murder of two prisoners on video showed a particular cruelty. And it is different because its ideology is similar to that of al Qaeda, which attacked the United States. It has excited particular American passions. To counter this, I would argue that the uprising by Iraq’s Sunni community was inevitable, with its marginalization by Nouri al-Maliki’s Shiite regime in Baghdad. That it took this particularly virulent form is because the more conservative elements of the Sunni community were unable or unwilling to challenge al-Maliki. But the fragmentation of Iraq into Shiite, Sunni and Kurdish regions was well underway before the Islamic State, and jihadism was deeply embedded in the Sunni community a long time ago. Moreover, although the Islamic State is brutal, its cruelty is not unique in the region. Syrian President Bashar al Assad and others may not have killed Americans or uploaded killings to YouTube, but their history of ghastly acts is comparable. Finally, the Islamic State — engaged in war with everyone around it — is much less dangerous to the United States than a small group with time on its hands, planning an attack. In any event, if the Islamic State did not exist, the threat to the United States from jihadist groups in Yemen or Libya or somewhere inside the United States would remain.
  • ...11 more annotations...
  • The issue is whether the United States can live with this situation or whether it must reshape it. The immediate question is whether the United States has the power to reshape it and to what extent. The American interest turns on its ability to balance local forces. If that exists, the question is whether there is any other shape that can be achieved through American power that would be superior. From my point of view, there are many different shapes that can be imagined, but few that can be achieved. The American experience in Iraq highlighted the problems with counterinsurgency or being caught in a local civil war. The idea of major intervention assumes that this time it will be different. This fits one famous definition of insanity.
  • A national strategy emerges over the decades and centuries. It becomes a set of national interests into which a great deal has been invested, upon which a great deal depends and upon which many are counting. Presidents inherit national strategies, and they can modify them to some extent. But the idea that a president has the power to craft a new national strategy both overstates his power and understates the power of realities crafted by all those who came before him. We are all trapped in circumstances into which we were born and choices that were made for us. The United States has an inherent interest in Ukraine and in Syria-Iraq. Whether we should have that interest is an interesting philosophical question for a late-night discussion, followed by a sunrise when we return to reality. These places reflexively matter to the United States. The American strategy is fixed: Allow powers in the region to compete and balance against each other. When that fails, intervene with as little force and risk as possible. For example, the conflict between Iran and Iraq canceled out two rising powers until the war ended. Then Iraq invaded Kuwait and threatened to overturn the balance of power in the region. The result was Desert Storm.
  • The American strategy is fixed: Allow powers in the region to compete and balance against each other. When that fails, intervene with as little force and risk as possible. For example, the conflict between Iran and Iraq canceled out two rising powers until the war ended. Then Iraq invaded Kuwait and threatened to overturn the balance of power in the region. The result was Desert Storm. This strategy provides a model. In the Syria-Iraq region, the initial strategy is to allow the regional powers to balance each other, while providing as little support as possible to maintain the balance of power. It is crucial to understand the balance of power in detail, and to understand what might undermine it, so that any force can be applied effectively. This is the tactical part, and it is the tactical part that can go wrong. The strategy has a logic of its own. Understanding what that strategy demands is the hard part. Some nations have lost their sovereignty by not understanding what strategy demands. France in 1940 comes to mind. For the United States, there is no threat to sovereignty, but that makes the process harder: Great powers can tend to be casual because the situation is not existential. This increases the cost of doing what is necessary. The ground where we are talking about applying this model is Syria and Iraq. Both of these central governments have lost control of the country as a whole, but each remains a force. Both countries are divided by religion, and the religions are divided internally as well. In a sense the nations have ceased to exist, and the fragments they consisted of are now smaller but more complex entities.
  • This strategy provides a model. In the Syria-Iraq region, the initial strategy is to allow the regional powers to balance each other, while providing as little support as possible to maintain the balance of power. It is crucial to understand the balance of power in detail, and to understand what might undermine it, so that any force can be applied effectively. This is the tactical part, and it is the tactical part that can go wrong. The strategy has a logic of its own. Understanding what that strategy demands is the hard part. Some nations have lost their sovereignty by not understanding what strategy demands. France in 1940 comes to mind. For the United States, there is no threat to sovereignty, but that makes the process harder: Great powers can tend to be casual because the situation is not existential. This increases the cost of doing what is necessary. The ground where we are talking about applying this model is Syria and Iraq. Both of these central governments have lost control of the country as a whole, but each remains a force. Both countries are divided by religion, and the religions are divided internally as well. In a sense the nations have ceased to exist, and the fragments they consisted of are now smaller but more complex entities.
  • There is then the special case of the Islamic State. It is special because its emergence triggered the current crisis. It is special because the brutal murder of two prisoners on video showed a particular cruelty. And it is different because its ideology is similar to that of al Qaeda, which attacked the United States. It has excited particular American passions. To counter this, I would argue that the uprising by Iraq’s Sunni community was inevitable, with its marginalization by Nouri al-Maliki’s Shiite regime in Baghdad. That it took this particularly virulent form is because the more conservative elements of the Sunni community were unable or unwilling to challenge al-Maliki. But the fragmentation of Iraq into Shiite, Sunni and Kurdish regions was well underway before the Islamic State, and jihadism was deeply embedded in the Sunni community a long time ago. Moreover, although the Islamic State is brutal, its cruelty is not unique in the region. Syrian President Bashar al Assad and others may not have killed Americans or uploaded killings to YouTube, but their history of ghastly acts is comparable. Finally, the Islamic State — engaged in war with everyone around it — is much less dangerous to the United States than a small group with time on its hands, planning an attack. In any event, if the Islamic State did not exist, the threat to the United States from jihadist groups in Yemen or Libya or somewhere inside the United States would remain.
  • The issue is whether the United States can live with this situation or whether it must reshape it. The immediate question is whether the United States has the power to reshape it and to what extent. The American interest turns on its ability to balance local forces. If that exists, the question is whether there is any other shape that can be achieved through American power that would be superior. From my point of view, there are many different shapes that can be imagined, but few that can be achieved. The American experience in Iraq highlighted the problems with counterinsurgency or being caught in a local civil war. The idea of major intervention assumes that this time it will be different. This fits one famous definition of insanity.
  • Because the Islamic State operates to some extent as a conventional military force, it is vulnerable to U.S. air power. The use of air power against conventional forces that lack anti-aircraft missiles is a useful gambit. It shows that the United States is doing something, while taking little risk, assuming that the Islamic State really does not have anti-aircraft missiles. But it accomplishes little. The Islamic State will disperse its forces, denying conventional aircraft a target. Attempting to defeat the Islamic State by distinguishing its supporters from other Sunni groups and killing them will founder at the first step. The problem of counterinsurgency is identifying the insurgent. There is no reason not to bomb the Islamic State’s forces and leaders. They certainly deserve it. But there should be no illusion that bombing them will force them to capitulate or mend their ways. They are now part of the fabric of the Sunni community, and only the Sunni community can root them out. Identifying Sunnis who are anti-Islamic State and supplying them with weapons is a much better idea. It is the balance-of-power strategy that the United States follows, but this approach doesn’t have the dramatic satisfaction of blowing up the enemy. That satisfaction is not trivial, and the United States can certainly blow something up and call it the enemy, but it does not address the strategic problem. In the first place, is it really a problem for the United States?
  • There is no reason not to bomb the Islamic State’s forces and leaders. They certainly deserve it. But there should be no illusion that bombing them will force them to capitulate or mend their ways. They are now part of the fabric of the Sunni community, and only the Sunni community can root them out. Identifying Sunnis who are anti-Islamic State and supplying them with weapons is a much better idea. It is the balance-of-power strategy that the United States follows, but this approach doesn’t have the dramatic satisfaction of blowing up the enemy. That satisfaction is not trivial, and the United States can certainly blow something up and call it the enemy, but it does not address the strategic problem. In the first place, is it really a problem for the United States? The American interest is not stability but the existence of a dynamic balance of power in which all players are effectively paralyzed so that no one who would threaten the United States emerges. The Islamic State had real successes at first, but the balance of power with the Kurds and Shia has limited its expansion, and tensions within the Sunni community diverted its attention. Certainly there is the danger of intercontinental terrorism, and U.S. intelligence should be active in identifying and destroying these threats. But the re-occupation of Iraq, or Iraq plus Syria, makes no sense. The United States does not have the force needed to occupy Iraq and Syria at the same time. The demographic imbalance between available forces and the local population makes that impossible.
  • The danger is that other Islamic State franchises might emerge in other countries. But the United States would not be able to block these threats as well as the other countries in the region. Saudi Arabia must cope with any internal threat it faces not because the United States is indifferent, but because the Saudis are much better at dealing with such threats. In the end, the same can be said for the Iranians. Most important, it can also be said for the Turks. The Turks are emerging as a regional power. Their economy has grown dramatically in the past decade, their military is the largest in the region, and they are part of the Islamic world. Their government is Islamist but in no way similar to the Islamic State, which concerns Ankara. This is partly because of Ankara’s fear that the jihadist group might spread to Turkey, but more so because its impact on Iraqi Kurdistan could affect Turkey’s long-term energy plans.
  • The United States cannot win the game of small mosaic tiles that is emerging in Syria and Iraq. An American intervention at this microscopic level can only fail. But the principle of balance of power does not mean that balance must be maintained directly. Turkey, Iran and Saudi Arabia have far more at stake in this than the United States. So long as they believe that the United States will attempt to control the situation, it is perfectly rational for them to back off and watch, or act in the margins, or even hinder the Americans. The United States must turn this from a balance of power between Syria and Iraq to a balance of power among this trio of regional powers. They have far more at stake and, absent the United States, they have no choice but to involve themselves. They cannot stand by and watch a chaos that could spread to them. It is impossible to forecast how the game is played out. What is important is that the game begins. The Turks do not trust the Iranians, and neither is comfortable with the Saudis. They will cooperate, compete, manipulate and betray, just as the United States or any country might do in such a circumstance. The point is that there is a tactic that will fail: American re-involvement. There is a tactic that will succeed: the United States making it clear that while it might aid the pacification in some way, the responsibility is on regional powers. The inevitable outcome will be a regional competition that the United States can manage far better than the current chaos.
  • U.S. strategy is sound. It is to allow the balance of power to play out, to come in only when it absolutely must — with overwhelming force, as in Kuwait — and to avoid intervention where it cannot succeed. The tactical application of strategy is the problem. In this case the tactic is not direct intervention by the United States, save as a satisfying gesture to avenge murdered Americans. But the solution rests in doing as little as possible and forcing regional powers into the fray, then in maintaining the balance of power in this coalition. Such an American strategy is not an avoidance of responsibility. It is the use of U.S. power to force a regional solution. Sometimes the best use of American power is to go to war. Far more often, the best use of U.S. power is to withhold it. The United States cannot evade responsibility in the region. But it is enormously unimaginative to assume that carrying out that responsibility is best achieved by direct intervention. Indirect intervention is frequently more efficient and more effective.
  •  
    The article is by the Chairman of Stratfor, a private intelligence company. I don't agree with its analysis because I am decidedly non-interventionist. But this article should be required reading for all who have fallen for the war fever being spread by the War Party for full-scale military invasion of Iraq and Syria. The article at least lays a sound basis for a large degree of restraint.
Paul Merrell

News Roundup and Notes: September 12, 2014 | Just Security - 0 views

  • Iraq and Syria The Pentagon has begun rolling out the expanded campaign against the Islamic State, although operations will increase gradually over a number of months [Wall Street Journal’s Julian E. Barnes]. Retired Marine general, John R. Allen, has been chosen to coordinate the international coalition against ISIS, according to a senior administration official [New York Times’ Michael R. Gordon]. In an interview with NPR (Eyder Peralta), Obama’s national security advisor Susan Rice emphasized that the operation against ISIS would not be “Iraq war redux” and that the U.S. is not going to deploy ground troops with a combat role.
  • Democratic senators are reportedly unnerved by President Obama’s attempt to gain swift authority from Congress to arm and train Syrian rebels [Politico’s Burgess Everett and Seung Min Kim]. House Republicans are said to be split on their views, with some, including Intelligence Chairman Mike Rogers speaking out in favor, whereas others showed more caution [The Hill’s Scott Wong et al]. The New York Times (Jonathan Weisman) reports that House Republican leaders will call members back to the Capitol early next week, in “a rare show of unity” with President Obama, to authorize the arming and training of rebels in Syria. Arab states remained reserved about the extent of their commitment to military efforts to combat the Islamic State yesterday, even as Secretary of State John Kerry succeeded in obtaining their support at a meeting in Saudi Arabia [Wall Street Journal’s Maria Abi-Habib and Jay Solomon].   Al Jazeera reports that French President Francois Hollande is travelling to Iraq in an act of visible support ahead of possible airstrikes with the U.S.-led coalition against the Islamic State.
  • The Syrian deputy foreign minister has said that Syria has “no reservations” about airstrikes in the territory, but said that “it is a must” for Obama to call Syrian President Assad [NBC News]. Anne Bernard [New York Times] writes that the prospect of U.S. strikes in Syria “captivated” the people on Thursday, with debate over whether the strikes would help or hinder President Assad. The New York Times (Ben Hubbard et al.) explores the complexities faced by the U.S. in using decentralized and diverse Syrian rebels to counter the Islamic State in Syria. Tom Perry and Alexander Dziadosz [Reuters] explore the impact that U.S. support for the Syrian opposition against the Islamic State will have on the Assad regime.
  • ...3 more annotations...
  • In Politico Magazine, Mary Ellen O’Connell argues that President Obama’s strategy against the Islamic State in Syria has no basis in international law, drawing comparison in legal terms between Obama and Russian President Vladimir Putin in Ukraine: “arming rebels and conducting airstrikes.” The New York Times editorial board discusses the legal basis for U.S. action against ISIS, accusing Congress of “outrageous” cowardice and allowing President Obama a “free reign to set a dangerous precedent that will last well past this particular military campaign.” The Washington Post editorial board calls President Obama’s strategy “incomplete,” suggesting that airstrikes alone are insufficient and that the U.S. must assist Iraq and Syria to develop so that “terrorist organizations do not emerge again as soon as Americans look away.” Dan Froomkin [The Intercept] discusses media coverage of Obama’s strategy, which indicates that news organizations have realized the plan is a “hot mess.”
  • In other developments, the new UN special envoy to Syria met with President Bashar al-Assad yesterday, pressing for more truces in the country and saying the UN’s first priority was to “facilitate reduction of the violence” [Wall Street Journal’s Sam Dagher]. The CIA has estimated that the number of fighters with the Islamic State in Iraq and Syria may have reached 31,000, a number three times their previous calculation [BBC]. The German interior ministry is working on banning the Islamic State terrorist group due to concerns over returning ISIS fighters and public expressions of sympathy with the group [Wall Street Journal’s Andrea Thomas and Harriet Torry]. The Australian government has raised the terror alert level to the second highest, as Prime Minister Tony Abbott warned that a terrorist attack on home soil was likely, though no specific plots were known of [Wall Street Journal’s Rob Taylor].
  • The head of Homeland Security has warned that while ISIS is the most apparent threat to the U.S. currently, officials must stay vigilant to other threats to the United States [Associated Press]. Dennis B. Ross [New York Times] cautions that “Islamists are not our friends,” noting that the “new fault line” in the Middle East is defined by Islamists who “subordinate national identities to an Islamic identity.” The New York Times (David E. Sanger) discusses how President Obama’s decision to take on the Islamic State in Iraq and Syria shifts his focus in the Middle East away from his previous objective of preventing Iran from obtaining nuclear weapons.
Paul Merrell

Oil surges 8 percent as U.S. rig count plunges, shorts scramble - Yahoo Finance - 0 views

  • EW YORK (Reuters) - Oil prices roared back from six-year lows on Friday, rocketing more than 8 percent as a record weekly decline in U.S. oil drilling fueled a frenzy of short-covering. In a rally that may spur speculation that a seven-month price collapse has ended, global benchmark Brent crude shot up to more than $53 per barrel, its highest in more than three weeks in its biggest one-day gain since 2009. The late-session surge was primed by Baker Hughes data showing the number of rigs drilling for oil in the United States fell by 94 - or 7 percent - this week. Earlier gains were fueled by reports of Islamic State militants striking at Kurdish forces southwest of the oil-rich city of Kirkuk.
  • Poised for a bounce many thought was overdue, short traders raced to cover their positions on fears that the rout, sparked by massive U.S. shale crude supplies, was nearing its end. "The rig count drop was a lot more than people expected and it really got the market going," said Phil Flynn, analyst at Price Futures Group in Chicago. According to Baker Hughes, the decline in oil drilling rigs was the most since it began keeping records in 1987. With drillers having idled about 24 percent of their oil drilling rigs since the summer, some traders may be betting that an anticipated slowdown in U.S. oil production is nearer than expected.
  • Some are not convinced that the sell-off in oil is over. The rout began in June when Brent peaked at over $115 a barrel and accelerated in November after OPEC refused to cut its production. "There was a lot of short-covering before the month end from people wanting to take profit from the $40-odd lows, so it's not surprising that we rallied," said Tariq Zahir, managing member at Tyche Capital Advisors in Laurel Hollow in New York. But it will take a while for production to respond to lower drilling. "This doesn't change the fundamental outlook in oil. We are still about 2 million barrels oversupplied." Production from OPEC, or the Organization of the Petroleum Exporting Countries, rose in January to 30.37 million barrels per day (bpd), a Reuters poll showed, a sign that key members of the group were resolute about defending their market share. A Reuters poll shows oil prices may post only a mild recovery in the second half of the year, with prices still averaging less in 2015 than during the global financial crisis. (OILPOLL) Joseph Posillico, senior vice president of energy futures at Jefferies in New York, also warned of a short-term, short-covering rally that could be quickly reversed. "This is just the market being the market and we could give these all back in the next few sessions."
  •  
    More indication that the economic oil bubble is bursting. 
Paul Merrell

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
Paul Merrell

US sets new record for denying federal files under Freedom of Information Act | US news... - 0 views

  • The US has set a new record for denying and censoring federal files under the Freedom of Information Act, analysis by the Associated Press reveals. For the second consecutive year, the Obama administration more often than ever censored government files or outright denied access to them under the open-government legislation. The government took longer to turn over files when it provided any, said more regularly that it couldn’t find documents, and refused a record number of times to turn over files quickly that might be especially newsworthy.
  • It also acknowledged in nearly one in three cases that its initial decisions to withhold or censor records were improper under the law – but only when it was challenged. Its backlog of unanswered requests at year’s end grew remarkably by 55% to more than 200,000. The government’s new figures, published Tuesday, covered all requests to 100 federal agencies during fiscal 2014 under the Freedom of Information law, which is heralded globally as a model for transparent government. They showed that despite disappointments and failed promises by the White House to make meaningful improvements in the way it releases records, the law was more popular than ever. Citizens, journalists, businesses and others made a record 714,231 requests for information. The US spent a record $434m trying to keep up.
  • The government responded to 647,142 requests, a 4% decrease over the previous year. The government more than ever censored materials it turned over or fully denied access to them, in 250,581 cases or 39% of all requests. Sometimes, the government censored only a few words or an employee’s phone number, but other times it completely marked out nearly every paragraph on pages. On 215,584 other occasions, the government said it couldn’t find records, a person refused to pay for copies or the government determined the request to be unreasonable or improper. The White House touted its success under its own analysis. It routinely excludes from its assessment instances when it couldn’t find records, a person refused to pay for copies or the request was determined to be improper under the law, and said under this calculation it released all or parts of records in 91% of requests – still a record low since Barack Obama took office using the White House’s own math.
  • ...4 more annotations...
  • “We actually do have a lot to brag about,” White House spokesman Josh Earnest said. The government’s responsiveness under the open records law is an important measure of its transparency. Under the law, citizens and foreigners can compel the government to turn over copies of federal records for zero or little cost. Anyone who seeks information through the law is generally supposed to get it unless disclosure would hurt national security, violate personal privacy or expose business secrets or confidential decision-making in certain areas. It cited such exceptions a record 554,969 times last year. Under the president’s instructions, the US should not withhold or censor government files merely because they might be embarrassing, but federal employees last year regularly misapplied the law. In emails that AP obtained from the National Archives and Records Administration about who pays for Michelle Obama’s expensive dresses, the agency blacked-out a sentence under part of the law intended to shield personal, private information, such as Social Security numbers, phone numbers or home addresses. But it failed to censor the same passage on a subsequent page.
  • The sentence: “We live in constant fear of upsetting the WH [White House].” In nearly one in three cases, when someone challenged under appeal the administration’s initial decision to censor or withhold files, the government reconsidered and acknowledged it was at least partly wrong. That was the highest reversal rate in at least five years. The AP’s chief executive, Gary Pruitt, said the news organization filed hundreds of requests for government files. Records the AP obtained revealed police efforts to restrict airspace to keep away news helicopters during violent street protests in Ferguson, Missouri. In another case, the records showed Veterans Affairs doctors concluding that a gunman who later killed 12 people had no mental health issues despite serious problems and encounters with police during the same period. They also showed the FBI pressuring local police agencies to keep details secret about a telephone surveillance device called Stingray.
  • “What we discovered reaffirmed what we have seen all too frequently in recent years,” Pruitt wrote in a column published this week. “The systems created to give citizens information about their government are badly broken and getting worse all the time.” The US released its new figures during Sunshine Week, when news organizations promote open government and freedom of information. The AP earlier this month sued the State Department under the law to force the release of email correspondence and government documents from Hillary Clinton’s tenure as secretary of state. The government had failed to turn over the files under repeated requests, including one made five years ago and others pending since the summer of 2013.
  • The government said the average time it took to answer each records request ranged from one day to more than 2.5 years. More than half of federal agencies took longer to answer requests last year than the previous year. Journalists and others who need information quickly to report breaking news fared worse than ever. Under the law, the US is required to move urgent requests from journalists to the front of the line for a speedy answer if records will inform the public concerning an actual or alleged government activity. But the government now routinely denies such requests: Over six years, the number of requests granted speedy processing status fell from nearly half to fewer than one in eight. The CIA, at the center of so many headlines, has denied every such request over the last two years.
  •  
    I did a fair bit of FOIA litigation during my years as a citizen activist and later as a lawyer. The response situation never was good and it's gotten far worse. I have an outstanding FOIA request to the Dept. of Health & Human Services for copies of particular documents submitted as public comments by other agencies including the CIA in a rulemaking proceeding. I submitted electronically over a year ago, got an authresponder telling me to expect a postcard acknowledging receipt within ten working days as required by FOIA. Didn't hear back from them, so resubmitted with copies of the original request and the autoresponse and got the same autoresponse. Still haven't got either of my postcards or the records, so it looks like I'm about to come out of retirement and file a FOIA lawsuit. It's an area where the squeakiest wheel gets the grease.  The bureaucracy does not like public records requests.   
Paul Merrell

57 Years Ago: U.S. and Britain Approved Use of Islamic Extremists to Topple Syrian Gove... - 0 views

  • BBC reports that – in 1957 – the British and American leaders approved the use of Islamic extremists and false flag attacks to topple the Syrian government: Nearly 50 years before the war in Iraq, Britain and America sought a secretive “regime change” in another Arab country… by planning the invasion of Syria and the assassination of leading figures.   Newly discovered documents show how in 1957 [former Prime Minister of the United Kingdom] Harold Macmillan and President Dwight Eisenhower approved a CIA-MI6 plan to stage fake border incidents as an excuse for an invasion by Syria’s pro-western neighbours, and then to “eliminate” the most influential triumvirate in Damascus.   ***   Although historians know that intelligence services had sought to topple the Syrian regime in the autumn of 1957, this is the first time any document has been found showing that the assassination of three leading figures was at the heart of the scheme. In the document drawn up by a top secret and high-level working group that met in Washington in September 1957, Mr Macmillan and President Eisenhower were left in no doubt about the need to assassinate the top men in Damascus.
  • Kermit Roosevelt had a proven track record in this sort of thing.  According to the New York Times, he was the leader of the CIA’s coup in Iran in 1953, which – as subsequently admitted by the CIA - used false flag terror to topple the democratically elected leader or Iran. BBC continues: More importantly, Syria also had control of one of the main oil arteries of the Middle East, the pipeline which connected pro-western Iraq’s oilfields to Turkey.   ***   The report said that once the necessary degree of fear had been created, frontier incidents and border clashes would be staged to provide a pretext for Iraqi and Jordanian military intervention. Syria had to be “made to appear as the sponsor of plots, sabotage and violence directed against neighbouring governments,” the report says. “CIA and SIS should use their capabilities in both the psychological and action fields to augment tension.”   ***   The plan called for funding of a “Free Syria Committee” [hmmm ... sounds vaguely familiar], and the arming of “political factions with paramilitary or other actionist capabilities” within Syria. The CIA and MI6 would instigate internal uprisings, for instance by the Druze [a Shia Muslim sect] in the south, help to free political prisoners held in the Mezze prison, and stir up the Muslim Brotherhood in Damascus.
  • In 1982, a prominent Israeli journalist formerly attached to the Israeli Foreign Ministry allegedly wrote a book expressly calling for the break up of Syria: All the Arab states should be broken down, by Israel, into small units ….   Dissolution of Syria and Iraq later on into ethnically or religiously unique areas such as in Lebanon, is Israel’s primary target on the Eastern front in the long run. In any event, it is well-documented that – in 1996 – U.S. and Israeli Neocons advocated: Weakening, containing, and even rolling back Syria ….
  • ...2 more annotations...
  • [Background:  Governments from Around the World – Including Western, Islamic, Asian and African Nations – ADMIT They Carry Out False Flag Terror] Is it purely coincidence that the U.S. has heavily armed Al Qaeda Muslim extremists in Syria (and see this), and trained the jihadis who later became ISIS? Regime change in Syria was not a once-off plan.   Neoconservatives also planned regime change in Syria more than 20 years ago … in 1991. The West Has Been Arbitrarily Breaking Up Middle Eastern Countries for 100 Years The Western powers agreed 100 years ago to arbitrarily divvy up the Middle East, without regard for historical boundries. Neooconservatives in the U.S. and Israel have long advocated for the balkanization of Syria into smaller regions based on ethnicity and religion. The goal was to break up the country, and to do away with the sovereignty of Syria as a separate nation. (The same goal has long applied to Iraq and other Arab states as well.)
  • In summary, we don’t have conclusive proof that the U.S., Israeli or their allies have intentionally broken up Syria. But in light of such claims – and the 57-year old American-British plan to stir up Muslim Brotherhood and other religious extremists  in Syria – maps showing the Islamic jihadi group ISIS’ carving up of Syria (and Iraq) into “the Islamic State” are interesting, indeed:
Paul Merrell

Use Tor or 'EXTREMIST' Tails Linux? Congrats, you're on the NSA's list * The Register - 0 views

  • Alleged leaked documents about the NSA's XKeyscore snooping software appear to show the paranoid agency is targeting Tor and Tails users, Linux Journal readers – and anyone else interested in online privacy.Apparently, this configuration file for XKeyscore is in the divulged data, which was obtained and studied by members of the Tor project and security specialists for German broadcasters NDR and WDR. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> In their analysis of the alleged top-secret documents, they claim the NSA is, among other things:Specifically targeting Tor directory servers Reading email contents for mentions of Tor bridges Logging IP addresses used to search for privacy-focused websites and software And possibly breaking international law in doing so. We already know from leaked Snowden documents that Western intelligence agents hate Tor for its anonymizing abilities. But what the aforementioned leaked source code, written in a rather strange custom language, shows is that not only is the NSA targeting the anonymizing network Tor specifically, it is also taking digital fingerprints of any netizens who are remotely interested in privacy.
  • These include readers of the Linux Journal site, anyone visiting the website for the Tor-powered Linux operating system Tails – described by the NSA as "a comsec mechanism advocated by extremists on extremist forums" – and anyone looking into combining Tails with the encryption tool Truecrypt.If something as innocuous as Linux Journal is on the NSA's hit list, it's a distinct possibility that El Reg is too, particularly in light of our recent exclusive report on GCHQ – which led to a Ministry of Defence advisor coming round our London office for a chat.
  • If you take even the slightest interest in online privacy or have Googled a Linux Journal article about a broken package, you are earmarked in an NSA database for further surveillance, according to these latest leaks.This is assuming the leaked file is genuine, of course.Other monitored sites, we're told, include HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion. The IP address of computer users even looking at these sites is recorded and stored on the NSA's servers for further analysis, and it's up to the agency how long it keeps that data.The XKeyscore code, we're told, includes microplugins that target Tor servers in Germany, at MIT in the United States, in Sweden, in Austria, and in the Netherlands. In doing so it may not only fall foul of German law but also the US's Fourth Amendment.
  • ...2 more annotations...
  • The nine Tor directory servers receive especially close monitoring from the NSA's spying software, which states the "goal is to find potential Tor clients connecting to the Tor directory servers." Tor clients linking into the directory servers are also logged."This shows that Tor is working well enough that Tor has become a target for the intelligence services," said Sebastian Hahn, who runs one of the key Tor servers. "For me this means that I will definitely go ahead with the project.”
  • While the German reporting team has published part of the XKeyscore scripting code, it doesn't say where it comes from. NSA whistleblower Edward Snowden would be a logical pick, but security experts are not so sure."I do not believe that this came from the Snowden documents," said security guru Bruce Schneier. "I also don't believe the TAO catalog came from the Snowden documents. I think there's a second leaker out there."If so, the NSA is in for much more scrutiny than it ever expected.
Paul Merrell

NSA targets the privacy-conscious (Seite 1)| Das Erste - Panorama - Meldungen - 0 views

  • The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Three authors of this investigation have personal and professional ties to the Tor Project, an American company mentioned within the following investigation.
  • Teil 1: NSA targets the privacy-conscious Teil 2: The Tor Project - anathema to the NSA Teil 3: Servers in Germany targeted Teil 4: Simple web searches are suspicious Teil 5: NSA: In strict accordance with the rule of law
  • ...3 more annotations...
  • von J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Downloads XKeyscore rules Read/download the XKeyscore rules here  | download
  • Yet despite these efforts, one of the servers is targeted by the NSA. The IP address 212.212.245.170 is explicitly specified in the rules of the powerful and invasive spy software program XKeyscore. The code is published here exclusively for the first time. After a year of NSA revelations based on documents that focus on program names and high-level Powerpoint presentations, NDR and WDR are revealing NSA source code that shows how these programs function and how they are implemented in Germany and around the world. Months of investigation by the German public television broadcasters NDR and WDR, drawing on exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government reveal that not only is the server in Nuremberg under observation by the NSA, but so is virtually anyone who has taken an interest in several well-known privacy software systems.
Paul Merrell

Former Israeli Opposition Leader Puts Bibi-Boehner Ploy Bluntly « LobeLog - 0 views

  • Yossi Sarid, the former head of Israel’s Meretz Party and leader of the opposition in the Knesset from 2001 to 2003, has just written a very blunt—far too blunt for “acceptable” political discourse in Washington, DC—op-ed published Sunday by Haaretz. Unfortunately, it’s behind a pay wall, so the most I can do is extract a few excerpts. The title is straightforward: “Beware: Republican Jews on the Warpath,” and Sarid, who also served as minister of education under Ehud Barak, doesn’t pull any punches about what Boehner’s fraudulent invitation to Israeli Prime Minister Benjamin Netanyahu is really all about. Now it’s no longer a “crisis in the relationship” that they try to paper over; now it’s no longer just “tensions with the White House” that they’re making every effort to reduce in between meetings; now, it’s an open war with the United States. It’s Sheldon Adelson versus Barack Obama, and Israel is caught in the cross-fire. After Vice President Joe Biden, our greatest friend over there, announced an unspecified trip abroad that will prevent him from being in Congress at the fateful hour, Republican Jewish organizations launched a campaign of intimidation against those lawmakers who had already announced their intent to skip the joint session: Their political fate will be bitter.
  • …Ambassador to Washington Ron Dermer, in the service of his master, is rallying his troops and launching a combined assault on Capitol Hill. Benjamin Netanyahu is determined to show the president once and for all who really rules in Washington, who is the landlord both here and there. … One Matthew Brooks – the executive director of the Republican Jewish Coalition, who does the will of its financial backers – explained over the weekend, “We will commit whatever resources we need to make sure that people are aware of the facts, that given the choice to stand with Israel and Prime Minister Netanyahu in opposition to a nuclear Iran, they chose partisan interests and to stand with President Obama.” Mort Klein, president of the Zionist Organization of America, added unambiguously, “We will, of course, be publicly condemning any Democrats who don’t show up for the speech — unless they have a doctor’s note.” Doctor, this man is sick and urgently needs tranquilizers.
  • … Israel, which until now was a cornerstone of bipartisanship, has become loathsome to its traditional supporters. Benjamin Nitay Netanyahu, the Israeli-American, has made it into something that reeks, even among its longtime supporters. In these very moments, the protocols are being rewritten. Rich Jews are writing them in their own handwriting. They, in their wealth, are confirming with their own signatures what anti-Semites used to slander them with in days gone by: We, the elders of Zion, pull the strings of Congress, and the congressmen are nothing but marionettes who do our will. If they don’t understand our words, they’ll understand our threats. And if in the past, we ran the show from behind the scenes, now we’re doing it openly, from center stage. And if you forget our donations, the wellspring will run dry.
  • ...1 more annotation...
  • You’ll remember that Obama, during an off-the-record meeting with Democratic senators three weeks ago, reportedly appealed to them to resist “donors and others” who opposed a deal with Iran and were pushing for new sanctions legislation that risked sabotaging the nuclear-focused talks with Iran and an eventual deal. Sen. Robert Menendez, who has been pushing for such legislation for more than a year, reportedly replied that he took “personal offense” at Obama’s remarks about donors, apparently interpreting Obama’s comments as suggesting that Menendez’s position was motivated by his desire and need for campaign cash. The New York Times helpfully noted in a profile of Menendez that the New Jersey senator had received $341,170 from hard-line pro-Israel groups over the past seven years, “more than any other Democrat in the Senate.” (In fact, he received more money than any other Senate candidate—Democratic or Republican—in the 2012 elections, while his Republican comrade-in-arms and co-sponsor for sanctions legislation, Illinois Sen. Mark Kirk, has received more campaign cash from pro-Israel political actions committees (PACs) associated with the American Israel Public Affairs Committee (AIPAC) than any other member of Congress over the past decade. And that doesn’t necessarily include all the much-harder-to-track money provided by donors like Adelson, who chairs Brooks’s RJC, through super PACS and other vehicles.)  Indeed, there’s no doubt that Obama’s reference to “donors” touched a very sensitive nerve with Menendez. Sarid, whose op-ed is most unlikely to appear in any mainstream U.S. publication, has now pounded it with a sledgehammer.
  •  
    There it is, finally out in the open. 
« First ‹ Previous 141 - 160 of 1128 Next › Last »
Showing 20 items per page