Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged target-sharing

Rss Feed Group items tagged

Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

NSA Director Finally Admits Encryption Is Needed to Protect Public's Privacy - 0 views

  • NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy The new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. By Carey Wedler | AntiMedia | January 22, 2016 Share this article! https://mail.google.com/mail/?view=cm&fs=1&to&su=NSA%20Director%20Finally%20Admits%20Encryption%20Is%20Needed%20to%20Protect%20Public%E2%80%99s%20Privacy&body=http%3A%2F%2Fwww.mintpress
  • At the same hearing, Comey and Attorney General Loretta Lynch declined to comment on whether they had proof the Paris attackers used encryption. Even so, Comey recently lobbied for tech companies to do away with end-to-end encryption. However, his crusade has fallen on unsympathetic ears, both from the private companies he seeks to control — and from the NSA. Prior to Rogers’ statements in support of encryption Thursday, former NSA chief Michael Hayden said, “I disagree with Jim Comey. I actually think end-to-end encryption is good for America.” Still another former NSA chair has criticized calls for backdoor access to information. In October, Mike McConnell told a panel at an encryption summit that the United States is “better served by stronger encryption, rather than baking in weaker encryption.” Former Department of Homeland Security chief, Michael Chertoff, has also spoken out against government being able to bypass encryption.
  • Rogers cited the recent Office of Personnel Management hack of over 20 million users as a reason to increase encryption rather than scale it back. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack that compromised the personal data about 20 million people who obtained background checks. Rogers’ comments, while forward-thinking, signify an about face in his stance on encryption. In February 2015, he said he “shares [FBI] Director [James] Comey’s concern” about cell phone companies’ decision to add encryption features to their products. Comey has been one loudest critics of encryption. However, Rogers’ comments on Thursday now directly conflict with Comey’s stated position. The FBI director has publicly chastised encryption, as well as the companies that provide it. In 2014, he claimed Apple’s then-new encryption feature could lead the world to “a very dark place.” At a Department of Justice hearing in November, Comey testified that “Increasingly, the shadow that is ‘going dark’ is falling across more and more of our work.” Though he claimed, “We support encryption,” he insisted “we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, to resolve it. So, I think the conversation’s in a healthier place.”
  • ...2 more annotations...
  • Regardless of these individual defenses of encryption, the Intercept explained why these statements may be irrelevant: “Left unsaid is the fact that the FBI and NSA have the ability to circumvent encryption and get to the content too — by hacking. Hacking allows law enforcement to plant malicious code on someone’s computer in order to gain access to the photos, messages, and text before they were ever encrypted in the first place, and after they’ve been decrypted. The NSA has an entire team of advanced hackers, possibly as many as 600, camped out at Fort Meade.”
  • Rogers statements, of course, are not a full-fledged endorsement of privacy, nor can the NSA be expected to make it a priority. Even so, his new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. “So spending time arguing about ‘hey, encryption is bad and we ought to do away with it’ … that’s a waste of time to me,” Rogers said Thursday. “So what we’ve got to ask ourselves is, with that foundation, what’s the best way for us to deal with it? And how do we meet those very legitimate concerns from multiple perspectives?”
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Paul Merrell

Whether to Go to War Against Russia Is Top Issue in U.S. Presidential Race | Global Res... - 0 views

  • The United States government has already declared that in regards to what it alleges to be a Russian cyberattack against the U.S. Democratic Party, the U.S. reserves the right to go to war against Russia. NATO has accordingly changed its policy so as to assert that a cyberattack (in this case actually cyber-espionage, such as the U.S. government itself perpetrates against even its own allies such as Angela Merkel by tapping her phone) constitutes an act of war by the alleged cyberattacker, and so requires all NATO member nations to join any cyberattacked NATO nation in war against its alleged (cyber)attacker, if the cyberattacked member declares war against its alleged cyberattacker. Excuses are being sought for a war against Russia; and expanding the definition of “invasion,” to include mere espionage, is one such excuse. But it’s not the only one that the Obama Administration has cooked up. U.S. Senator Mike Lee has asserted that President Barack Obama must obtain a declaration of war against Syria — which is allied with and defended by Russia — before invading Syria. Syria has, for the past few years, already been invaded by tens of thousands of foreign jihadists (financed mainly by the royal Sauds and Qataris, and armed mainly with U.S. weaponry) who are trying to overthrow and replace the Syrian government so that pipelines can be built through Syria into Europe to transport Saudi oil and Qatari gas into the EU, the world’s biggest energy-market, which now is dominated by Russia’s oil and gas. Since Syria is already being defended by Russia (those royals’ major competitor in the oil and gas markets), America’s invasion of Syria would necessarily place U.S. and Russia into an air-war against each other (for the benefit of those royal Arabs — who finance jihadist groups, as even Hillary Clinton acknowledges): Syria would thus become a battleground in a broader war against Russia. So: declaring war against Syria would be a second excuse for World War III, and one which would especially serve the desires not only of U.S. ‘defense’ firms but of the U.S. aristocracy’s royal Arabic allies, who buy much of those ‘defense’ firms’ exports (weaponry), and also U.S. oilfield services firms such as pipelines by Halliburton. (It’s good business for them, no one else. Taxpayers and war-victims pay, but those corporations — and royal families — would profit.)
  • The U.S. government also declares that Russia ‘conquered’ Crimea in 2014 and that Russia must restore it to Ukraine. The U.S. government wants Ukraine to be accepted into NATO, so that all NATO nations will be at war against Russia if Russia doesn’t return Crimea to Ukraine, of which Crimea had only briefly (1954-2014) been a part, until Crimeans voted on 16 March 2014 to rejoin Russia. This Crimean issue is already the basis for America’s economic sanctions against Russia, and thus Russia’s continuing refusal to coerce Crimeans to accept again being part of Ukraine would be yet a third excuse for WW III.
  • Hillary Clinton says “As President, I will make it clear, that the United States will treat cyber attacks just like any other attack.” She alleges that when information was unauthorizedly made public from Democratic National Committee computers, the cyberattacker was Russia. She can be counted as a strong proponent of that excuse for WW3. She’s with Barack Obama and the other neocons on that. She has furthermore said that the U.S. should shoot down any Russian and Syrian bombers in Syria — the phrase for that proposed U.S. policy is to “establish a no-fly zone” there. She makes clear: “I am advocating the no-fly zone.” It would be war against not only Syria, but Russia. (After all: a no-fly zone in which the U.S. is shooting down the government’s planes and Russia’s planes, would be war by the U.S. against both Syria and Russia, but that’s what she wants to do.) She can thus be counted as a strong proponent of those two excuses for WW3.
  • ...4 more annotations...
  • On the matter of Crimea, she has said that “Putin invaded and annexed Crimea,” and “In the wake of Russia’s illegal annexation of Crimea in early 2014, some have argued that NATO expansion either caused or exacerbated Russia’s aggression. I disagree with that argument.” She believes that the expansion of NATO right up to Russia’s borders is good, not horrific and terrifying (as it is to Russians — just like USSR’s conquering of Mexico would have been terrifying to Americans if USSR did that during the Cold War). Furthermore, because Ukraine is the main transit-route for Russian gas-pipelines into Europe, the coup that in 2014 overthrew the neutralist democratically elected President of Ukraine and replaced him by leaders who seek NATO membership for Ukraine and who have the power to cut off those pipelines, was strongly supported by both Obama and Clinton. She can thus be counted as a strong proponent of all three excuses for WW3. U.S. President Obama has made unequivocally clear that he regards Russia as being by far the world’s most “aggressive” nation; and Clinton, too, commonly uses the term “aggression” as describing Russia (such as she did by her denial that “NATO expansion either caused or exacerbated Russia’s aggression”). To her, Russia’s opposing real aggression by the U.S. (in this case, America’s 2014 coup that overthrew the democratically elected Ukrainian President for whom 75% of Crimeans had voted), constitutes ‘Russia’s aggression’, somehow. Furthermore, as regards whether Crimea’s rejoining Russia was ‘illegal’ as she says: does she also deny the right of self-determination of peoples regarding the residents of Catalonia though the Spanish government accepts it there, and also by the residents of Scotland though the British government accepts it there? Or is she simply determined to have as many excuses to invade Russia as she can have? She has never condemned the independence movements in Scotland or Catalonia. The United States is clearly on a path toward war with Russia. Donald Trump opposes all aspects of that policy.
  • That’s the main difference between the two U.S. Presidential candidates. Trump makes ridiculous statements about the ‘need’ to increase ‘defense’ spending during this period of soaring federal debt, but he has consistently condemned the moves toward war against Russia and said that America’s real enemy is jihadists, and that Russia is on our side in this war — the real war — not an enemy of America such as Hillary Clinton and Barack Obama claim. Both candidates (Trump and Clinton) are war-hawks, but Hillary wants to go to war against both jihadists and Russia, whereas Trump wants to go to war only against jihadists. Trump’s charge that Hillary would be a catastrophic President is borne out not only by her past record in public office, but by her present positions on these issues.
  • Americans are being offered, by this nation’s aristocracy, a choice between a marginally competent and deeply evil psychopath Hillary Clinton, versus an incompetent but far less evil psychopath Donald Trump, and the nation’s press are reporting instead a choice between two candidates of whom one (the actually evil Clinton) is presented as being far preferable to the other (the actually incompetent Trump), and possibly as being someone who might improve this nation if not the world. Virtually none of America’s Establishment is willing to report the truth: that the nation’s rotting will get worse under either person as President, but that only under Trump might this nation (and the world) stand a reasonable likelihood of surviving at all (i.e., nuclear war with Russia being averted). Things won’t get better, but they definitely could get a hell of a lot worse — and this is the issue, the real one, in the present election: WW3, yes or no on that. Hillary Clinton argues that she, with her neoconservative backing (consisting of the same people who cheer-led the invasion of Russia-friendly Iraq, and who shared her joy in doing the same to Russia-friendly Libya — “We came, we saw, he died, ha ha!”), is the better person to have her finger on the nuclear button with Russia. This U.S. Presidential election will be decided upon the WW3-issue, unless the American electorate are incredibly stupid (or else terribly deceived): Is she correct to allege that she and not Trump should have control over the nuclear button against Russia? She’s even more of a neoconservative than Obama is, and this is why she has the endorsement of neoconservatives in this election. And that is the issue.
  • The real question isn’t whether America and the world will be improved by the next U.S. President; it’s whether America and the world will be destroyed by the next U.S. President. All else is mere distraction, by comparison. And the U.S. public now are extremely distracted — unfortunately, even by the candidates themselves. The pathetic Presidential candidates that the U.S. aristocracy has provided to Americans, for the public’s votes in the final round, don’t focus on this reality. Anyone who thinks that the majority of billionaires can’t possibly believe in a ‘winnable’ nuclear war and can’t possibly be wanting WW3 should read this. That was published by the Council on Foreign Relations, Wall Street’s international-affairs think tank. They mean business. And that’s the source of neoconservatism — the top U.S.-based international corporations, mainly in ‘defense’ and oil and Wall Street. (Clinton’s career is based upon precisely those three segments, whereas Trump’s is based instead upon real estate and entertainment, neither of which segments is neoconservative.) It doesn’t come from nowhere; it comes from the people who buy and sell politicians.
  •  
    A must-read
Paul Merrell

Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails "Top Secret" - 0 views

  • Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails “Top Secret” The leaking of the Clinton emails has been compared to as the next “Watergate”. By ZeroHedge.com | January 30, 2016 Share this article! targ
  • The State Department will release more emails from Clinton’s time as secretary of state later Friday. But The Associated Press has learned that 7 email chains are being withheld in full for containing “top secret” material. The 37 pages include messages recently described by a key intelligence official as concerning so-called “special access programs” — a highly restricted subset of classified material that could point to confidential sources or clandestine programs like drone strikes or government eavesdropping. Department officials wouldn’t describe the substance of the emails, or say if Clinton had sent any herself. Spokesman John Kirby tells the AP that no judgment on past classification was made. But the department is looking into that, too.
  • For those that Clinton only read, and didn’t write or forward, she still would have been required to report classification slippages that she recognized. Possible responses for classification infractions include counseling, warnings or other action, State Department officials said, though they declined to say if these applied to Clinton or senior aides who’ve since left the department. The officials weren’t authorized to speak on the matter and spoke on condition of anonymity. However, as we previously noted, the implications are tough for The DoJ – if they indict they crush their own candidate’s chances of the Presidency, if they do not – someone will leak the details and the FBI will revolt… The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days.
  • ...1 more annotation...
  • I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, which she will not be able to survive as an attorney general,” he said. “The intelligence community will not stand for that. They will fight for indictment and they are already in the process of gearing themselves to basically revolt if she refuses to bring charges.” The FBI also is looking into Clinton’s email setup, but has said nothing about the nature of its probe. Independent experts say it is highly unlikely that Clinton will be charged with wrongdoing, based on the limited details that have surfaced up to now and the lack of indications that she intended to break any laws. “What I would hope comes out of all of this is a bit of humility” and an acknowledgement from Clinton that “I made some serious mistakes,” said Bradley Moss, a Washington lawyer who regularly handles security clearance matters. Legal questions aside, it’s the potential political costs that are probably of more immediate concern for Clinton. She has struggled in surveys measuring her perceived trustworthiness and an active federal investigation, especially one buoyed by evidence that top secret material coursed through her account, could negate one of her main selling points for becoming commander in chief: Her national security resume.
Paul Merrell

Israel Banned Renowned Doctor and Human Rights Activist Mads Gilbert from Entering Gaza... - 0 views

  • Israel has banned Norwegian doctor and human rights activist Mads Gilbert from entering Gaza for life. Gilbert, a professor at the University Hospital of North Norway, where he has worked since 1976, earned international renown for his philanthropic work in late 2008, during Israel’s Operation Cast Lead, an attack that, according to Israeli human rights organization B’Tselem, killed roughly 1,400 Gazans, including almost 800 civilians, 350 of whom were children. The aid worker, along with fellow Norwegian doctor Erik Fosse, decided to volunteer in Gaza as soon as he heard that bombing had started, on 27 December 2008. Thanks to diplomatic and economic support (in the sum of $1 million dollar of emergency funding from the Norwegian Ministry of Foreign Affairs), the two physicians managed to arrive in the strip by 30 December.
  • The Israeli government prevented all international press from entering Gaza during Cast Lead (a documentary, The War Around Us, was made about the only two foreign reporters in the strip at the time), in what Gilbert called Israel’s insidious “PR plan.” The doctor, as one of the only international aid workers in Gaza, thus devoted considerable time to speaking with local Palestinian news outlets, some of whom were reporting on behalf of foreign networks including BBC, CNN, ABC, and Al Jazeera. BBC aired an interview with Gilbert, conducted in the hospital. The questions asked, and the answers garnered, were eerily similar to those he would give just five years later, during Operation Protective Edge. The interviewer began asking him to respond to Israel’s claims that it was not targeting civilians, that it was only attacking Hamas militants. Gilbert called the claim “an absolutely stupid statement” and explained that, among the hundreds of patients he had seen at that point, only two had been fighters. The “large majority” were women, children, and men civilians. “These numbers are contradictory to everything Israel says,” he reported.
  • The doctor directed one heart-wrenching passage to President Obama, writing “Mr Obama – do you have a heart? I invite you – spend one night – just one night – with us in Shifa. I am convinced, 100 per cent, it would change history. Nobody with a heart and power could ever walk away from a night in Shifa without being determined to end the slaughter of the Palestinian people.” Israel later attacked Shifa hospital. Doctors Without Borders (MSF) “strongly condemn[ed]” the incursion, saying it “demonstrate[d] how civilians in Gaza have nowhere safe to go.” MSF director Marie-Noëlle Rodrigue stated, in an official statement, “When the Israeli army orders civilians to evacuate their houses and their neighborhoods, where is there for them to go? Gazans have no freedom of movement and cannot take refuge outside Gaza. They are effectively trapped.” Shifa was one of the over 10 medical facilities Israel bombed in its 50-day offensive.
  • ...5 more annotations...
  • Gilbert drew attention to the fact that the overflowing hospital did not have enough supplies to treat all of its patients, and censured the international community for doing nothing to assist them. Israel would not let in foreign doctors, and yet Palestinians were “dying waiting for surgery.” “This is a complete disaster,” he remarked, calling it “the worst man-made disaster” he could think of. “There are injuries you just don’t want to see in this world.” Operation Protective Edge In 2008 and 2009, Gilbert treated Palestinians who had been grievously wounded by Israel’s use of experimental and illegal chemical weapons, including white phosphorous, dense inert metal explosives (DIME) munitions, and flechette shells. In July 2014, in the midst of Israel’s most recent attack on Gaza, Gilbert spoke with Electronic Intifada, revealing that he saw indications of renewed use of DIME weapons and flechettes. While volunteering in Shifa hospital, Gaza’s principal medical facility, Gilbert penned an open letter, lamenting the unspeakable horrors the Israeli military was instigating.
  • Before Operation Protective Edge commenced in early July 2014, Gilbert toured medical and health facilities and individual homes in Gaza, researching for a United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) report on the dire state of the strip’s health sector. He wrote of “overstretched” health facilities, widespread physical and psychological trauma, “a deep financial crisis,” a lack of needed medical supplies, and a “severe energy crisis.” He also noted the “devastating results of the blockade imposed by the Government of Israel,” with rampant poverty, a 38.5% unemployment rate, food insecurity in at least 57% of households, and inadequate access to clean water. All of these already extreme ills were only exacerbated by the July-August Israeli assault on Gaza, an onslaught that left roughly 2,200 Palestinians dead, including over 1,500 civilians, more than 500 of whom were children. Gilbert is not the only one Israel has recently prevented from entering Gaza. In August, just after the end of its military assault, Israel refused to allow Amnesty International and Human Rights Watch, the world’s leading human rights organizations, from entering the strip, impeding them from conducting war crimes investigations. The organizations had been requesting access for over a month, before Israel had even begun its ground invasion of Gaza, yet were continuously prevented from doing so, Israeli journalist Amira Hass reported in Haaretz, “using various bureaucratic excuses.”
  • Other aid workers and medical professionals have faced even worse consequences for volunteering to help Palestinians. In August, Israeli occupation forces killed a social worker. In the same month, as the Israeli military engaged in a campaign to target and openly murder Palestinian civilians who spoke Hebrew, Israeli forces assassinated volunteers working with the Palestine Red Crescent, a non-profit humanitarian organization, part of the International Red Cross and Red Crescent Movement. A common myth suggests that Israel ended its occupation of Gaza with its 2005 disengagement. The state’s ability to ban, and even kill, internationally recognized human rights organizations and doctors—not to mention food,construction equipment, and medical supplies—from entering Palestinian territory, however, demonstrates that Gaza is by no means autonomous. Israel’s siege of the strip is clearly a continuation of its 47-year-long illegal military occupation. As legal scholar Noura Erakat explains
  • Despite removing 8,000 settlers and the military infrastructure that protected their illegal presence, Israel maintained effective control of the Gaza Strip and thus remains the occupying power as defined by Article 47 of the Hague Regulations. To date, Israel maintains control of the territory’s air space, territorial waters, electromagnetic sphere, population registry and the movement of all goods and people. … Palestinians have yet to experience a day of self-governance. Israel immediately imposed a siege upon the Gaza Strip when Hamas won parliamentary elections in January 2006 and tightened it severely when Hamas routed Fatah in June 2007. The siege has created a “humanitarian catastrophe” in the Gaza Strip. Inhabitants will not be able to access clean water, electricity or tend to even the most urgent medical needs. The World Health Organization explains that the Gaza Strip will be unlivable by 2020. Not only did Israel not end its occupation, it has created a situation in which Palestinians cannot survive in the long-term.
  • In a late October discussion with the Daily Targum, Gilbert encouraged Americans to do what they can to speak out against Israel’s illegal occupation and blockade of the Palestinian territories, and to pressure their government to stop its indefatigable support for Israeli crimes. At present, the US provides Israel with over 3.1$ billion of military aid per year. In the past 52 years, over $100 billion US tax dollars have been given to the country in military aid alone. “You are the change-makers,” Gilbert told American readers. “The key to the change when it comes to the occupation of Palestine lies in the United States.” “Solidarity, not pity,” he said, is the solution.
Paul Merrell

A Zombie Bill Comes Back to Life: A Look at The Senate's Cybersecurity Information Shar... - 0 views

  • The Senate Intelligence Committee recently introduced the Cybersecurity Information Sharing Act of 2014. It’s the fourth time in four years that Congress has tried to pass "cybersecurity" legislation. Unfortunately, the newest Senate bill is one of the worst yet. Cybersecurity bills aim to facilitate information sharing between companies and the government, but they always seem to come with broad immunity clauses for companies, vague definitions, and aggressive spying powers. Given such calculated violence to users' privacy rights, it’s no surprise that these bills fail every year. What is a surprise is that the bills keep coming back from the dead. Last year, President Obama signed Executive Order 13636 (EO 13636) directing the Department of Homeland Security (DHS) to expand current information sharing programs that are far more privacy protective than anything seen in recent cybersecurity bills. Despite this, members of Congress like Rep. Mike Rogers and Senator Dianne Feinstein keep on introducing bills that would destroy these privacy protections and grant new spying powers to companies.
  • Aside from its redundancy, the Senate's bill grants two new authorities to companies. First, the bill authorizes companies to launch countermeasures for a "cybersecurity purpose" against a "cybersecurity threat." "Cybersecurity purpose" is so broadly defined that it means almost anything related to protecting (including physically protecting) an information system, which can be a computer or software. The same goes for a "cybersecurity threat," which includes anything that "may result" in an unauthorized effort to impact the availability of the information system. Combined, the two definitions could be read by companies to permit attacks on machines that unwittingly contribute to network congestion. The countermeasures clause will increasingly militarize the Internet—a prospect that may appeal to some "active defense" (aka offensive) cybersecurity companies, but does not favor the everyday user. Second, the bill adds a new authority for companies to monitor information systems to protect an entity's rights or property. Here again, the broad definitions could be used in conjunction with the monitoring clause to spy on users engaged in potentially innocuous activity. Once collected, companies can then share the information, which is also called “cyber threat indicators,” freely with government agencies like the NSA.
  • Such sharing will occur because under this bill, DHS would no longer be the lead agency making decisions about the cybersecurity information received, retained, or shared to companies or within the government. Its new role in the bill mandates DHS send information to agencies like the NSA—"in real-time and simultaneous[ly]." DHS is even barred from "delay[ing]" or "interfer[ing]" with the information, which ensures that DHS's current privacy protections won’t be applied to the information. The provision is ripe for improper and over-expansive information sharing. This leads to a question: What stops your sensitive personal information from being shared by companies to the government? Almost nothing. Companies must only remove personally identifiable information if the information is known to be US person information and not directly related to the threat. Such a willful blindness approach is inappropriate. Further, the bill does not even impose this weak minimization requirement on information shared by, and within, the government (including federal, state, local, and tribal governments) thereby allowing the government to share information containing personally identifiable information. The bill should require deletion of all information not directly related to a threat.
  • ...2 more annotations...
  • Once the information is sent to a government agency, it can use the information for reasons other than for cybersecurity purposes. One clause even allows the information to be used to prosecute violations of the Espionage Act—a World War I era law that was meant to prosecute spies but has been used in recent years primarily to go after journalists’ sources. The provisions grant the government far too much leeway in how to use the information for non-cybersecurity purposes. The public won’t even know what information is being collected, shared, or used because the bill will exempt all of it from disclosure under the Freedom of Information Act.
  • The bill also retains near-blanket immunity for companies to monitor information systems, to share information, and to use countermeasures. The high bar immunizes an incredible amount of activity, including negligent damage to property and may deprive private entities of legal recourse if a computer security contractor is at fault for destruction of property. Existing private rights of action for violations of the Wiretap Act, Stored Communications Act, and the Computer Fraud and Abuse Act would be precluded or at least sharply restricted by the clause. It remains to be seen why such immunity is needed when just a few months ago, the FTC and DOJ noted they would not prosecute companies for sharing such information. It's also unclear because we continue to see companies freely share information among each other and with the government both publicly via published reports and privately.
Paul Merrell

Big Pharma Accused Of Illegal Price-Fixing, What You're Not Being Told - 0 views

  • A lawsuit filed Thursday in the U.S. District Court for the District of Connecticut alleges Heritage Pharmaceuticals, EpiPen-maker Mylan NV, and others conspired to manipulate U.S. drug prices. The suit was filed on behalf of the states of Connecticut, Delaware, Florida, Hawaii, Idaho, Iowa, Kansas, and at least 12 others. Naming Heritage Pharmaceuticals Inc. as the “ringleader” of the alleged conspiracy, the suit claims the prices of doxycycline hyclate, an antibiotic, and glyburide, a treatment drug for diabetics, were kept artificially high due to a scheme involving Mylan, Mayne Pharma, Aurobindo Pharma, Teva Pharmaceuticals, and Citron Pharma LLC. Federal prosecutors claim the price-fixing scheme was orchestrated by executives who have left Heritage. The suit is part of an ongoing, two-year long antitrust investigation conducted by the U.S. Department of Justice. According to the New York Attorney General’s Office, former Heritage executives Jeffrey Glazer and Jason Malek conspired with others to avoid competition by “[entering] into numerous illegal conspiracies in order to unreasonably restrain trade, artificially inflate and manipulate prices and reduce competition.” By resorting to price-fixing, companies involved may have believed they would secure their market shares without presenting a major risk to one another. This alleged scheme, the suit argues, has caused “significant, lasting and ultimately harmful rippling effect in the United States healthcare system.” The 20 states named as plaintiffs in the suit claim the companies were aware of the legal ramifications of their actions and took steps to hide their intent and actions as soon as the investigation was launched.
  • Recently, Mylan was chastised for inflating the price of the EpiPen, a device used to combat life-threatening allergic reactions. As Anti-Media reported in August, news organizations “had a field day” when reports showed the price of the autoinjector had gone from $57 each in 2007 to $600 for a double package in 2016. During a hearing before Congress over the EpiPen scandal, Mylan CEO Heather Bresch called the outraged reactions to the price hike “overblown.” Adding that the price of the autoinjectors wouldn’t change anytime soon, Bresch defended the company’s decision, claiming “[Mylan]’s profit on its $609 EpiPen two-packs is about $50 per pen.” When examining Mylan’s involvement in politics since Bresch was named the company’s executive, it becomes apparent that Mylan may have had the opportunity to approach regulators from a privileged position due to the fact Sen. Joe Manchin (D-WV) is the CEO’s father. By 2010, the Food and Drug Administration (FDA) had changed federal guidelines associated with epinephrine prescriptions, allowing Mylan to change its EpiPen labels. By shifting packaging and selling twin-packs instead of single pens while marketing the devices to “anyone at risk,” Mylan widened the EpiPen market. In 2013, a congressional bill pressuring states to have stocks of EpiPens on hand was signed into law. It was conceived after a local seven-year-old died due to an allergic reaction to peanuts.
  • Mylan lobbied heavily for this bill and spent over $1 million that year alone in lobbying efforts. Due to this legislative success, up to 47 states now “require or encourage schools to stock the devices.” But as the company led the fight to introduce the EpiPen to a larger audience, it also led a legal battle to bring its competitors to their knees by influencing regulation that artificially raises costs of doing business for other companies. From our August report: “In 2009, Pfizer Inc., the world’s biggest drugmaker, and Mylan sued Teva Pharmaceutical Industries Ltd. over a patent infringement. At the time, the Israeli company was accused of using Mylan’s design without permission. But in 2012, both parties reached an agreement, and Teva was allowed to seek approval from the FDA for its epinephrine injecting device. “According to Gizmodo, Teva has failed to obtain approval from the FDA to develop affordable generic versions of the EpiPen. The company says it won’t try to go through the same process again until 2017. “The only other device that was closer to competing with Mylan’s EpiPen was Auvi-Q, and it was also driven out of the market. In 2015, the company launched a recall campaign claiming the devices could be delivering faulty dosages.”
  • ...1 more annotation...
  • What this story shows us is that if companies conspire among themselves to keep competitors at bay, the federal government will accuse them of breaking antitrust laws. But when Congress approves increased regulation, effectively barring smaller companies from competing while creating monopolies, price-fixing is perfectly acceptable. Instead of a lawsuit against Heritage and Mylan, how about the People v. United States Congress? After all, if it weren’t for their relentless pursuit of special interest protections, companies wouldn’t have turned into the conglomerates they have become.
Paul Merrell

Cybersecurity Information Sharing: A Legal Morass, Says CRS - 0 views

  • Several pending bills would promote increased sharing of cybersecurity-related information — such as threat intelligence and system vulnerabilities — in order to combat the perceived rise in the frequency and intensity of cyber attacks against private and government entities. But such information sharing is easier said than done, according to a new report from the Congressional Research Service, because it involves a thicket of conflicting and perhaps incompatible laws and policy objectives. “The legal issues surrounding cybersecurity information sharing… are complex and have few certain resolutions.” A copy of the CRS report was obtained by Secrecy News. See Cybersecurity and Information Sharing: Legal Challenges and Solutions, March 16, 2015. Cyber information sharing takes at least three different forms: the release of cyber intelligence from government to the private sector, information sharing among private entities, and the transfer of threat information from private entities to government agencies.
  • “While collectively these three variants on the concept of cyber-information sharing have some commonalities, each also raises separate legal challenges that may impede cyber-intelligence dissemination more generally,” said the CRS report, which examines the legal ramifications of each category in turn. Among the concerns at issue are: the potential for liability associate with disclosure of cybersecurity information, inappropriate release of private information through open government laws, loss of intellectual property, and potential compromise of personal privacy rights. All of these create a legal morass that may be unreconcilable. “A fundamental question lawmakers may need to contemplate is how restrictions that require close government scrutiny and control over shared cyber-information can be squared with other goals of cyber-information sharing legislation, like requirements that received information be disseminated in an almost instantaneous fashion,” the CRS report said.
  • “Ultimately, because the goals of cyber-information legislation are often diametrically opposed, it may simply be impossible for information sharing legislation to simultaneously promote the rapid and robust collection and dissemination of cyber-intelligence by the federal government, while also ensuring that the government respects the property and privacy interests implicated by such information sharing,” the report said. Other new or newly updated CRS reports that Congress has withheld from public distribution include the following. Cybersecurity: Authoritative Reports and Resources, by Topic, March 13, 2015
  • ...1 more annotation...
  • U.S. Strategic Nuclear Forces: Background, Developments, and Issues, March 18, 2015
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

Your Computer May Already be Hacked - NSA Inside? | Steve Blank - 1 views

  • But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”  Say what??  They can see the plaintext on my computer before I encrypt it? That defeats any/all encryption methods. How could they do that? Bypass Encryption While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
  • The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT. Today every desktop and laptop computer has another way for the NSA to get inside. Intel Inside It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn’t crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip. After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing it’s microprocessors to load fixes automatically when your computer starts.
  • Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer’s BIOS.). Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update. Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that 3rd parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it is impossible to know whether anyone is loading a backdoor into your computer.
  • ...3 more annotations...
  • A few months ago these kind of discussions would have been theory at best, if not paranoia.
  • Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security conscious sites can discover rootkits by tools that check kernel code and data for changes. But what if you could use the configuration and state of microprocessor hardware in order to hide? You’d be invisible to all rootkit detection techniques that checks the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA’s biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.) Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys  giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.) That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.
  • The Prism disclosures prove otherwise – the National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven’t implemented a microcode backdoor. The downside is that 1) backdoors can be hijacked by others with even worse intent. So if NSA has a microcode backdoor – who else is using it? and 2) What other pieces of our infrastructure, (routers, smartphones, military computers, satellites, etc) use processors with uploadable microcode? —— And that may be why the Russian president is now using a typewriter rather than a personal computer.
Paul Merrell

A Distorted Lens Justifying An Illegitimate Ukrainian Government - 0 views

  • Support it or oppose it, a coup d’état took place in Kiev after an EU-brokered agreement was signed by the Ukrainian government and the mainstream opposition on Feb. 21. The agreement called for power sharing between both sides through the formation of a national unity government and for an end to the opposition-led street protests in Kiev. President Viktor Yanukovych ordered the Ukrainian police and security forces to withdraw from their positions, and even earlier, he had made multiple concessions to the opposition leadership. Instead of keeping its end of the bargain, the Ukrainian mainstream opposition executed a coup through the use of violence by organized ultra-nationalist gangs, which some analysts have compared to stay-behinds or secretive militias that were created by NATO during the Cold War. These armed ultra-nationalist groups took over administrative bodies in Ukraine and fought until they managed to oust the Ukrainian government and opened the path for opposition leaders to take power on Feb. 25. The Ukrainian mainstream opposition used the EU-brokered agreement, which the Brussels-based European Commission deliberately refused to enforce, as a means of justifying the formation of a coup-imposed government.
  • In the absence of almost half the Ukrainian Verkhovna Rada, or Ukrainian Parliament, the opposition parties began to arbitrarily pass unconstitutional laws. They also unconstitutionally selected Oleksandr/Aleksandr Valentynovych Turchynov as the acting president of Ukraine before President Viktor Yanukovych was even impeached. Intimidation and violence were additionally used to secure the cooperation of any disagreeing parliamentarians or state officials in Kiev. Saying that the ultra-nationalists and fascists are marginal elements, the mainstream media networks in North America and the European Union have simply dismissed the armed ultra-nationalist groups involved in the coup that are presently integrated into the putsch regime running Kiev. The militant ultra-nationalists, however, are very influential and amassing power under the illegal premiership of Arseniy Yatsenyuk.  Yatsenyuk, himself, is from Yulia Tymoshenko’s notoriously corrupt All-Ukrainian Union Fatherland Party (Batkivshchyna) and essentially a U.S. and EU appointee. There is even a pre-coup leaked telephone interception, likely either recorded by the intelligence services of Russia or Ukraine, in which U.S. Assistant Secretary of State Victory Nuland says that Yatsenyuk will be appointed as the prime minister of the Ukrainian government that the U.S. is putting together.
  • It is unlikely that Yatsenyuk and the loosely-knit alliance of the governing parties that ran Ukraine under the Yushchenko-Tymoshenko governments, foreign-based Ukrainians, and the forces behind the Orange Revolution that form the Orangist camp which he belongs to could have gotten back into power in Ukraine without pressure, the use of force and foreign backing. Yatsenyuk was even threatened and booed by the Ukrainians gathered at Independence Square when it was announced that he would be appointed as the prime minister of the post-coup government. A vast segment of the protesters made it clear that Tymoshenko, Yatsenyuk’s party leader, was no alternative to the ousted President Viktor Yanukovych in their eyes, either, when it was announced that she wanted to run for prime minister. The Orangists do not have the support of a majority of the population, nor did they form the parliamentary majority in the Verkhovna Rada. Their Orangist president, Viktor Yushchenko, only got 5 percent of the vote in January 2010, in a show of no-confidence, whereas Viktor Yanukovych won the first and second rounds of the presidential elections in 2010. According to Victoria Nuland, the U.S. has also poured $5 billion into “democracy promotion” inside Ukraine. This is U.S. State Department doublespeak for politicized funding that Washington has sent to Ukraine to organize the Orange Revolution and its Euromaidan sequel or what can frankly be described as regime change.
  • ...10 more annotations...
  • To rule Ukraine once more, the Orangists and their foreign backers have used and manipulated the ultra-nationalist elements of the population — some of which are openly anti-European Union — as their foot soldiers in an application of force against their democratically-elected opponents. Despite their views, the ultra-nationalists are actually more honest than the Orangist liberal figures like Arseniy Yatsenyuk. Unlike the misleading and utterly corrupt Orangist leaders, the ultra-nationalists do not hide their agendas and platforms.
  • The ultra-nationalists have inconsolably anti-Russian attitudes. Many of them also dislike a vast spectrum of other groups, including Jews, Armenians, Roma, Poles, Tatars, supporters of the Party of Regions and communists. In this context, it should come as no surprise that one of the first decisions that the post-coup regime in Kiev made was to remove the legal status of the Russian language as the regional language of half of Ukraine. Right Sector is, itself, a coalition of militant ultra-nationalists. These militants were instrumental in fighting government forces and taking over both government buildings in Kiev and regional governments in the western portion of Ukraine. Despite the protests of First Deputy Defense Minister Oleynik, Deputy Defense Minister Mozharovskiy and Defense Minister Babenk, Arseniy Yatsenyuk’s post-coup government has even given the ultra-nationalist opposition militias official status within the Ukrainian military and security forces. Yatsenyuk and the Orangists also dismissed all the officials that protested that the move would fracture the country and make the political divide in Ukraine irreversible.
  • Several members of Svoboda have been given key cabinet and government posts. One of the two junior deputy prime ministers, or assistant deputy prime ministers, is Oleksandr Sych. The ministry of agriculture and food has been given for management to Ihor Shvaika. The environment and natural resources ministry has been assigned to Andry/Andriy Mokhnyk. The defense minister is Ihor Tenyukh, a former admiral in the Ukrainian Navy who obstructed Russian naval movements in Sevastopol during the Russo-Georgian War over South Ossetia and who was later dismissed by the Ukrainian government for insubordination. Oleh Makhnitsky, another member of Svoboda, has been assigned as the new prosecutor-general of Ukraine by the coup government. Andry Parubiy, one of the founders of Svoboda, is now the post-coup secretary of the National Security and Defense Council of Ukraine (RNBO). He was the man controlling the so-called “Euromaidan security forces” that fought government forces in Kiev. His job as secretary is to represent the president and act on his behalf in coordinating and implementing the RNBO’s decisions. As a figure, Parubiy clearly illustrates how the mainstream opposition in Ukraine is integrated with the ultra-nationalists. Parubiy is an Orangist and was a leader in the Orange Revolution. He has changed parties several times. After founding Svoboda, he joined Viktor Yushchenko’s Our Ukraine before joining Yulia Tymoshenko’s Fatherland Party and being elected as one of the Fatherland Party’s deputies, or members of parliament.
  • While the mainstream media in North America and the EU look the other way about the ultra-nationalists in the coup government in Kiev, the facts speak for themselves. Both the EU and the U.S. governments have rubbed their elbows with the ultra-nationalists. Oleh Tyahnybok, the leader of Svoboda (formerly the Social Nationalist Party of Ukraine), was even part of the opposition triumvirate that all the U.S. and EU officials visiting Kiev met with while performing their political pilgrimages to Ukraine to encourage the protesters to continue with their demonstrations and riots demanding Euro-Atlantic integration. Svoboda has popularly been described as a neo-Nazi grouping. The World Jewish Congress has demanded that Svoboda be banned. The ultra-nationalist party was even condemned by the EU’s own European Parliament, which passed a motion on Dec. 13, 2012 categorically condemning Svoboda.
  • The ultra-nationalists are such an integral part of the mainstream opposition that the U.S.-supported Orangist president of Ukraine, Viktor Yushchenko, posthumously awarded the infamous Nazi collaborator Stepan Bandera the title and decoration of the “Hero of Ukraine” in 2010. Foreign audiences, however, would not know that if they relied on reportage from the likes of the U.S. state-run Radio Free Europe, which tried to protect Yushchenko because he wanted to reorient Ukraine toward the U.S. and EU. Parubiy also lobbied the European Parliament not to oppose Yushchenko’s decision. Other smaller ultra-nationalists parties were also given government posts, and several of the independent cabinet members are also aligned to these parties. Dmytro Yarosh from Right Sector (Pravyi Sektor) is the deputy secretary of the RNBO, and the Trizub Party was given the education ministry. Trizub had Sergey Kvit appointed to the post of education minister.
  • The role of the ultra-nationalists in executing the coup has been essentially ignored by the mainstream media in North America and the EU. The roots of the bloodshed in Kiev have been ignored, too. The shootings of protesters by snipers have simply been presented as the vile actions of the Ukrainian government, never taking into consideration the agitation of the armed ultra-nationalist gangs and the mainstream opposition leaders for a conflict. According to a leaked telephone conversation on Feb. 26 between Estonian Foreign Minister Urmas Paet and European Union Commissionaire Catherine Ashton, which was leaked by the Security Service of Ukraine (SBU) , the snipers who shot at protesters and police in Kiev were allegedly hired by Ukrainian opposition leaders. Estonian Foreign Minister Paet made the statements on the basis of details he was given by one of the head doctors of the medical team of the anti-government protests, Olga Bogomolets, an opponent of Viktor Yanukovych’s government who wanted it removed from power. Paet tells Ashton the following first: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” This is also corroborated by the fact that Yanukovych actually had ordered the Ukrainian riot police and security forces not to use lethal force.
  • The Estonian official then mentions that it was verified to him that the same snipers were killing people on both sides. He tells Ashton the following: “And second, what was quite disturbing, this same Olga [Bogomolets] told as well that all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides.” Another important point that Paet makes to Ashton is the following: “[Dr. Olga Bogomolets] then also showed me some photos she said that as a medical doctor she can say that it is the same handwriting, the same type of bullets, and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Past reports that the mainstream media were hostile to the ousted Ukrainian government also raise serious questions that corroborate what has been said about the snipers intentionally killing protesters to instigate regime change.
  • The Telegraph reported on Feb. 20 that “[a]t least three of the bodies displayed single bullet wounds to the heads,” and “were shot in the head, the neck or the heart. None were shot anywhere else like in the legs.” This means that the snipers were making kill shots by design, which seems like the last thing that the Ukrainian government would want to do when it was trying to appease the protesters and bring calm to Kiev. The Ukrainian journalist Alexey Yaroshevsky’s account of the sniper shootings is also worth noting, and it is backed up by footage taken by his Russian crew in Kiev.  Their footage shows armed opposition members running away from the scene of the shooting of anti-government protesters. What comes across as unusual is that the armed members of the opposition were constantly agitating to start firefights at every opportunity that they could get.
  • The commandant of the SSU, Major-General Oleksandr Yakimenko, has testified that his counter-intelligence forces were monitoring the CIA in Ukraine during the protests. According to the SSU, the CIA was active on the ground in Kiev and collaborating with a small circle of opposition figures. Yakimenko has also said that it was not the police or government forces that fired on the protesters, but snipers from the Philharmonic Building that was controlled by the opposition leader Andriy Parubiy, which he asserts was interacting with the CIA. Speaking to the Russian media, Yakimenko said that 20 men wearing “special combat clothes” and carrying “sniper rifle cases, as well as AKMs with scopes” ran out of the opposition-controlled Philharmonic Building and split into two groups of 10 people, with one taking position at the Ukraine Hotel. The anti-government protesters even saw this and asked Ukrainian police to pursue them, and even figures from Right Sector and Svoboda asked Yakimenko’s SSU to investigate and apprehend them, but Parubiy prevented it. Major-General Yakimenko has categorically stated that opposition leaders were behind the shootings. Following the release of the conversation between Paet and Ashton, the Estonian Foreign Ministry confirmed that the leak was authentic, whereas the European Commission kept silent. The mainstream media in North America and the EU either ignored it or said very little. The Telegraph even claimed that Dr. Bogomolets told it that she had not treated any government forces even though she contradicts this directly in an interview with CNN where says she treated military personnel.
  • CNN, on the other hand, quickly glossed over the story, giving it only enough attention to create the impression that the network is fairly covering the news. Opting not to give the story the airtime that it deserved, CNN instead posted it on its webpage. The conversation is immediately discredited, undermined and dismissed in the first sentence of the article, which is attributed to Foreign Minister Paet: “Don’t read too much into the conversation.” The article was deliberately structured by CNN to undermine the important information that would challenge the narrative that the U.S. mainstream media have been painting. The title, sub-titles and opening sentences of most texts act as microcosms or summaries of the articles, and in many cases, readers evaluate or decide to read the articles on the basis of what these texts communicate. Moreover, the first sentence of the article sets the tempo for readers and and influences their opinion, too. Although anyone who listens to the conversation between Paet and Ashton and considers the evidence that is being discussed would realize just how important the news was, the message being set forth by CNN was a dismissive one.
Gary Edwards

Tomgram: Michael Klare, Superpower in Distress | TomDispatch - 0 views

  • In response, the Obama administration dispatched thousands of new advisers and trainers and began shipping in piles of new weaponry to re-equip the Iraqi army.  It also filled Iraqi skies with U.S. planes armed with their own munitions to destroy, among other things, some of that captured U.S. weaponry.  Then it set to work standing up a smaller version of the Iraqi army.  Now, skip nearly a year ahead and on a somewhat lesser scale the whole process has just happened again.  Less than two weeks ago, Islamic State militants took Ramadi, the capital of Anbar Province.  Iraqi army units, including the elite American-trained Golden Division, broke and fled, leaving behind -- you’ll undoubtedly be shocked to hear -- yet another huge cache of weaponry and equipment, including tanks, more than 100 Humvees and other vehicles, artillery, and so on. The Obama administration reacted in a thoroughly novel way: it immediately began shipping in new stocks of weaponry, starting with 1,000 antitank weapons, so that the reconstituted Iraqi military could take out future “massive suicide vehicle bombs” (some of which, assumedly, will be those captured vehicles from Ramadi).  Meanwhile, American planes began roaming the skies over that city, trying to destroy some of the equipment IS militants had captured.
  • Notice anything repetitive in all this -- other than another a bonanza for U.S. weapons makers?  Logically, it would prove less expensive for the Obama administration to simply arm the Islamic State directly before sending in the air strikes
  • In any case, what a microcosm of U.S. imperial hubris and folly in the twenty-first century all this training and equipping of the Iraqi military has proved to be.  Start with the post-invasion decision of the Bush administration to totally disband Saddam’s army and instantly eject hundreds of thousands of unemployed Sunni military men and a full officer corps into the chaos of the “new” Iraq and you have an instant formula for creating a Sunni resistance movement.  Then, add in a little extra “training” at Camp Bucca, a U.S. military prison in Iraq, for key unemployed officers, and -- Voilà! -- you’ve helped set up the petri dish in which the leadership of the Islamic State movement will grow.  Multiply such stunning tactical finesse many times over globally and, as TomDispatch regular Michael Klare makes clear today, you have what might be called the folly of the “sole superpower” writ large. Tom
  • ...9 more annotations...
  • Delusionary Thinking in Washington The Desperate Plight of a Declining Superpower By Michael T. Klare
  • Take a look around the world and it’s hard not to conclude that the United States is a superpower in decline. Whether in Europe, Asia, or the Middle East, aspiring powers are flexing their muscles, ignoring Washington’s dictates, or actively combating them. Russia refuses to curtail its support for armed separatists in Ukraine; China refuses to abandon its base-building endeavors in the South China Sea; Saudi Arabia refuses to endorse the U.S.-brokered nuclear deal with Iran; the Islamic State movement (ISIS) refuses to capitulate in the face of U.S. airpower. What is a declining superpower supposed to do in the face of such defiance? This is no small matter. For decades, being a superpower has been the defining characteristic of American identity. The embrace of global supremacy began after World War II when the United States assumed responsibility for resisting Soviet expansionism around the world; it persisted through the Cold War era and only grew after the implosion of the Soviet Union, when the U.S. assumed sole responsibility for combating a whole new array of international threats. As General Colin Powell famously exclaimed in the final days of the Soviet era, “We have to put a shingle outside our door saying, ‘Superpower Lives Here,’ no matter what the Soviets do, even if they evacuate from Eastern Europe.”
  • The problem, as many mainstream observers now acknowledge, is that such a strategy aimed at perpetuating U.S. global supremacy at all costs was always destined to result in what Yale historian Paul Kennedy, in his classic book The Rise and Fall of the Great Powers, unforgettably termed “imperial overstretch.” As he presciently wrote in that 1987 study, it would arise from a situation in which “the sum total of the United States’ global interests and obligations is… far larger than the country’s power to defend all of them simultaneously.”
  • The first of two approaches to this conundrum in Washington might be thought of as a high-wire circus act.  It involves the constant juggling of America’s capabilities and commitments, with its limited resources (largely of a military nature) being rushed relatively fruitlessly from one place to another in response to unfolding crises, even as attempts are made to avoid yet more and deeper entanglements. This, in practice, has been the strategy pursued by the current administration.  Call it the Obama Doctrine.
  • In other words, whoever enters the Oval Office in January 2017 will be expected to wield a far bigger stick on a significantly less stable planet. As a result, despite the last decade and a half of interventionary disasters, we’re likely to see an even more interventionist foreign policy with an even greater impulse to use military force.
  • The first step in any 12-step imperial-overstretch recovery program would involve accepting the fact that American power is limited and global rule an impossible fantasy.
  • Accepted as well would have to be this obvious reality: like it or not, the U.S. shares the planet with a coterie of other major powers -- none as strong as we are, but none so weak as to be intimidated by the threat of U.S. military intervention.
  • Having absorbed a more realistic assessment of American power, Washington would then have to focus on how exactly to cohabit with such powers -- Russia, China, and Iran among them -- and manage its differences with them without igniting yet more disastrous regional firestorms. 
  • fewer military entanglements abroad, a diminishing urge to garrison the planet, reduced military spending, greater reliance on allies, more funds to use at home in rebuilding the crumbling infrastructure of a divided society, and a diminished military footprint in the Middle East.
  •  
    Thanks Marbux! "Think of this as a little imperial folly update -- and here's the backstory.  In the years after invading Iraq and disbanding Saddam Hussein's military, the U.S. sunk about $25 billion into "standing up" a new Iraqi army.  By June 2014, however, that army, filled with at least 50,000 "ghost soldiers," was only standing in the imaginations of its generals and perhaps Washington.  When relatively small numbers of Islamic State (IS) militants swept into northern Iraq, it collapsed, abandoning four cities -- including Mosul, the country's second largest -- and leaving behind enormous stores of U.S. weaponry, ranging from tanks and Humvees to artillery and rifles.  In essence, the U.S. was now standing up its future enemy in a style to which it was unaccustomed and, unlike the imploded Iraqi military, the forces of the Islamic State proved quite capable of using that weaponry without a foreign trainer or adviser in sight."
Paul Merrell

Top Stories - U.S. has Military Bases in at least 38 Countries and Sent Weapons to 94 C... - 0 views

  • The old recruiting slogan was “Join the Navy and See the World.” Those advertisements were prescient; the U.S. military has a presence of some kind in 171 nations and jurisdictions in addition to the United States and its possessions. Many times the presence is one officer as a military attaché or similar post or even a military dependent. But some countries host significant numbers of members of the U.S. armed forces. The two countries hosting the most members of the U.S. military are the two the U.S. conquered in World War II. There were 49,503 members of the military in Japan as of the end of last year, according to the Department of Defense. Germany was next with 38,826 members of the U.S. armed forces stationed there. Although it’s difficult to nail down the exact worldwide number of U.S. military sites, the most recent Department of Defense report lists buildings in 38 foreign nations and territories. The U.S. has 179 bases in Germany and 109 installations in Japan.
  • Other countries have much smaller U.S. contingents. Greenland is the home of 142 lucky Air Force personnel. Fourteen members of different military branches are now stationed in Vietnam, 40 years after U.S. troops abandoned the ill-fated war there. And there’s likely a very short line at the PX in Mongolia; only four U.S. military personnel are stationed in that land-locked Asian nation. Indeed, U.S. bases can come in a variety of shapes and sizes, according to David Vine, author of Base Nation: How US Military Bases Abroad Harm America and the World. They include “small radar facilities in Peru and Puerto Rico….Even military resorts and recreation areas in places like Tuscany and Seoul are bases of a kind; worldwide, the military runs more than 170 golf courses.” Even where the U.S. doesn’t send military personnel, the U.S. does send weapons. The United States is the world largest arms exporter. From 2010 to 2014, Americans sent weapons to at least 94 countries, according to a report (pdf) by the Stockholm International Peace Research Institute (SIPRI). The country that got the largest share of the weaponry was South Korea, at 9%, followed by the United Arab Emirates at 8% and Australia at 8%. The United States accounts for 31% of the world’s arms exports, followed by Russia at 27% and China at 5%.
  • These Are All the Countries Where the U.S. Has a Military Presence (by Annalisa Merelli, Quartz) Base Structure Report: Fiscal Year 2014 Baseline (Department of Defense) (pdf) Trends in International Arms Transfers, 2014 (by Pieter D. Wezeman and Siemon T. Wezeman, SIPRI) (pdf) U.S. Will Close 15 Military Bases in Europe, but Keep Troop Levels the Same (by Steve Straehley, AllGov) U.S. Dominates Weapons Export Market as Profits Grow with Sales to the Middle East (by Noel Brinkerhoff, AllGov)
Paul Merrell

NSA shares raw intelligence including Americans' data with Israel | World news | The Gu... - 0 views

  • The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process "minimization", but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
  • The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content."According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. "NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection", it says.
  • In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy."Any US person information that is acquired as a result of NSA's surveillance activities is handled under procedures that are designed to protect privacy rights," the spokesperson said.The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
  • ...3 more annotations...
  • While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel."Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge," states the report, titled 'History of the US – Israel Sigint Relationship, Post-1992'. "In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA's only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner."
  • In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. "On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems," the official says. "A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US."Later in the document, the official is quoted as saying: "One of NSA's biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended."
  • The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.In its statement, the NSA said: "We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations."NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information."
Paul Merrell

American Democracy is Owned by the Rich | Al Jazeera America - 1 views

  • Two new studies by political scientists offer compelling evidence that the rich use their wealth to control the political system and that the U.S. is a democratic republic in name only. In a study of Senate voting patterns, Michael Jay Barber found that “senators’ preferences reflect the preferences of the average donor better than any other group.” In a similar study of the House of Representatives, Jesse H. Rhodes and Brian F. Schaffner found that, “millionaires receive about twice as much representation when they comprise about 5 percent of the district’s population than the poorest wealth group does when it makes up 50 percent of the district.” In fact, the increasing influence of the rich over Congress is the leading driver of polarization in modern politics, with the rich using the political system to entrench wealth by pushing for tax breaks and blocking redistributive policies.
  • At the turn of the decade, political scientists Larry Bartels, Jacob Hacker and Martin Gilens wrote several incredibly influential important books arguing, persuasively, that the preferences of the rich were better represented in Congress than the poor. After the books were published, there was a flurry of research arguing that they had overstated their case. Critics alleged two key defects in Bartels’ and Gilens’ arguments. First, because polling data on the super-wealthy were sparse, it was difficult to prove that there were large differences in opinion. Political scientists often rely on composite measures of policy liberalism, but since the poor tend to be more economically liberal but socially conservative, the differences between the poor and moderately rich can often be obscured. Second, there was no way to show that influence of the wealthy was caused directly by the influence of money. It might well be that the rich are simply opinion leaders or are more likely to vote.
  • Recent research offers compelling answers to these criticisms. The new evidence adds credence to the Bartels-Gilens-Hacker view that money is corrupting American politics. By using a massive database of ideology that includes the super wealthy, Schaffner and Rhodes found that “members of Congress are much more responsive to the wealthy than to their poor constituents.” However, this difference is not equal between both parties; rather, Democrats are far more responsive to the poor than Republicans. (This is not surprising; other research supports this claim.) They find that both parties strongly favor the upper-middle class, those with $100,000 to $300,000 in wealth. But Republicans are not only more responsive to the rich, but particularly to rich donors. Schaffner and Rhodes argue that, “campaign donations, but not voter registration or participation in primary or general election, may help explain the disproportionate influence of the wealthy among Republican representatives.” Barber’s study is the first to directly examine the policy preferences of the donor class. Barber sent 20,500 letters to people who contributed to 22 Senate elections in 2012 and asked about various policy questions. This allowed Barber to examine the differences in representation between donors and non-donors. His finding: Donors’ preferences tend to be far better represented than non-donors’. The chart below measures the ideological differences between various groups, with 0 indicating a perfect fit. The data show that Senators are almost perfectly aligned with their donors, but rather distant from voters.
  • ...5 more annotations...
  • In fact, politicians are almost perfectly aligned with donors, but less aligned with partisans (people who voted for the Senator and share party affiliation), supporters (people who voted for the Senator) and voters in general. He Barber also finds that donors tend to be far more extreme in their views (see chart below). For instance, while about sixty percent of non-donor Republicans oppose the Affordable Care Act, opposition among donors is “almost unanimous.” Barber also notes that donors tend to be far more extreme than non-donors (see chart). (This is supported by other studies).
  • Such data could explain the rising polarization of Congress, as politicians increasingly respond to their donors, rather than to voters. Political scientists Walter J. Stone and Elizabeth N. Simas have found that challengers raise more money when they take extreme positions, which helps explain why incumbent representatives tend to be more partisan than departing representatives. It certainly explains the intransigence of the last two Congresses: Republicans, who are responding to their rich donor base, are incentivized to oppose any action, particularly those supporting Obama, lest they lose funding. Since Senators have to raise approximately $3,300 a day every year for six years to remain viable, they will inevitably have to succumb to the power of money if they wish to be reelected. This research raises the disturbing thought that our political system is no longer representative. As Barber notes, about half of all donors are from out of state, meaning that politicians are no longer responsive to their voters (though they are slightly more during election years). Given that only .22 percent of Americans made a donation of more than $200 (the level Barber studies) in 2014, we have power evidence that America is now a government of the one percent — indeed, of the one-fifth of one percent.
  • This disturbing trend affects politics at all levels. At the state level, political scientists Gerald Wright and Elizabeth Rigby found that state party platforms are far more influenced by the rich than the poor. Elsewhere, Barber found evidence that presidents are more responsive to donors than non-donors. Recently Griffin and Newman found representation gaps between whites and people of color as well as low-income voters. This finding is supported by Christopher Ellis, who found that donors were better represented than non-donors (although using a less comprehensive method than Barber). In a frank moment, U.S. Sen. Chris Murphy (D – Conn.) said, “I talked a lot more about carried interest inside of that call room than I did in the supermarket.” He’s correct: Donors tending to be far richer and wealthier than non-donors (see chart).
  • There are still unanswered questions. It is possible that politicians cast ideological votes to appease donors and partisans (for instance, the vain attempt to repeal the Affordable Care Act dozens of times), while also working to benefit the poor and middle class through less visible means. This might explain why political journalists, who often focus on major legislation, miss the distributional impacts of political appointments and regulatory action. It may be that politicians work to maximize votes, and then political donations follow (though there is strong evidence this isn’t the case). Either way, the most up-to-date evidence strongly suggests that money is distorting our system, and that evidence appears to be growing stronger by the day.
  • The solution, as a recent Demos report suggests, is to help reformist candidates gather donations with a public matching system. Since voters who are non-donors are less ideological, the solution is to balance out the political distortions from the donor class by turning these non-donors into donors. Citizens United has only increased the stranglehold of moneyed interests on our political system, and is daily choking the life of our democracy. Only by restoring influence to all voters will our republic be restored.
Paul Merrell

Russia Reports Discovery of Rebel-Held Chemical Weapons at Site of Idlib Gas Attack - 0 views

  • In the aftermath of yesterday’s chemical gas attack in Syria’s Idlib Province, numerous governments – including those that have funded and armed rebels in an attempt to overthrow the Syrian government – have accused the Syrian army of being primarily responsible for the attack, despite no independent confirmation of their claim and no investigation into who was truly responsible for the tragedy. As MintPress recently reported, the only information available regarding the attack so far has come from only two sources: the White Helmets and the Syrian Observatory for Human Rights. Both groups have strong ties to pro-interventionist governments that have armed and funded rebel groups and even have ties to al-Qaeda.
  • However, pro-interventionist elements in foreign governments and within the Syrian opposition seem disinterested in obtaining valid information, jumping on initial accusations from dubious sources to support long-standing efforts to destabilize and overthrow the Syrian government. Wednesday morning, while media outlets throughout the West ran headlines calling for foreign intervention in Syria with headlines like “We Must Not Look Away,” the Russian Defense Ministry announced a surprising discovery in Khan Sheikhoun the very township where the gas attack took place. Maj. Gen. Igor Konashenkov publicly stated Wednesday morning that a warehouse in the vicinity of Khan Sheikhoun had been destroyed as part of a Syrian Air Force airstrike conducted midday Tuesday, several hours after the gas attack. According to Konashenkov, the facility produced and stored shells that contained toxic gas, many of which had been delivered to Iraq and repeatedly used there by Daesh militants and other extremists. He also pointed out that the same weapons had been used by foreign-funded rebels in Aleppo in 2016 – a conclusion derived by the analysis of samples taken by Russian military experts. He also stated that the victims of yesterday’s gas attack displayed identical symptoms to those shown by victims of the Aleppo attack. Rebels operating in the area – all of which are allied with the al-Nusra Front and Ahrar al-Sham, both al-Qaeda affiliates – have rejected Konashenkov’s claims. Hasan Haj Ali, commander of the al-Nusra affiliate Free Idlib Army rebel group, told Reuters: “all the civilians in the area know that there are no military positions there, or places for the manufacture [of weapons]. The various factions of the opposition are not capable of producing these substances.”
  • However, it was proven back in 2013 that not only were the rebels capable of producing chemical weapons, but they had used them repeatedly in both Syria and Iraq. For instance, UN officials have confirmed that anti-Assad rebels were responsible for the 2013 sarin gas attack in Ghouta, another attack that was prematurely blamed on the Assad regime. In addition, Pulitzer Prize-winning journalist Seymour Hersh established in his 2014 piece “The Red Line and the Rat Line” that rebels have long had the capacity to carry out chemical weapon attacks and that countries such as Turkey and Saudi Arabia have supplied them with such weapons. Sria’s government, by contrast, no longer has chemical weapons, a fact established by the Organization for the Prohibition of Chemical Weapons (OPCW). The organization confirmed in 2016 that all Syrian government chemical weapons had been destroyed under their supervision per Assad’s affirmation of the International Chemical Weapons Convention three years prior. OPCW’s fact-finding mission, a joint effort with the United Nations, is still active within Syria and has yet to report its findings regarding Tuesday’s attack, according to a statement released Wednesday. In addition, questions have been raised regarding the information that has come from opposition sources regarding the gas attack in Idlib, particularly the now widely-shared images purporting to show victims of yesterday’s attack.
  • ...1 more annotation...
  • As Paul Antonopoulos of Al-Masdar News wrote: […] in the above picture, the White Helmets are handling the corpses of people without sufficient safety gear, most particularly with masks mostly used, as well as no gloves. […] Within seconds of exposure to sarin, the affects [sic] of the gas begin to target the muscle and nervous system. There is an almost immediate release of the bowels and the bladder, and vomiting is induced. When sarin is used in a concentrated area, it has the likelihood of killing thousands of people. Yet, such a dangerous gas, and the White Helmets are treating bodies with little concern to their exposed skin. This has to raise questions.” While Western governments and the corporate media have already assured themselves of Assad’s guilt, this latest discovery – along with other notable evidence – suggests that the basis for this assumption is faulty at best. The warehouse was discovered less than a day prior to a UN Security Council emergency meeting over Tuesday’s gas attack, leading many pro-interventionist governments to suggest that Russia is merely trying to protect its ally from international criticism and retaliation. Though the timing could be construed as suspect, Assad – on the verge of reclaiming nearly all Syrian cities from the opposition – stands little to gain from using internationally banned weapons, while the increasingly desperate NATO-armed and funded rebels are the greatest beneficiaries from the renewed calls for foreign intervention in Syria following Tuesday’s attack. At the very least, this latest discovery of a chemical weapons warehouse demands that world leaders, pro-intervention and otherwise, must wait for a complete investigation of the incident before taking drastic action. As Antonopoulos noted: “Before the war cries begin and the denouncement of the government from high officials in power positions begin, time must be given so that all evidence can emerge.”
  •  
    As the U.S. prepares to go to war against Syria for its alleged gas attack in Idlib province ...
Paul Merrell

How US Propaganda Plays in Syrian War - Consortiumnews - 0 views

  • U.S. foreign policymakers have experimented at planting propaganda in social media and then citing it as evidence to support their goals, a process now playing out in the Syrian “regime change,” as Rick Sterling explains.
  • The major achievement of The Syria Campaign has been the branding and promotion of the “White Helmets,” also known as “Syria Civil Defense,” which began with a British military contractor, James LeMesurier, giving some rescue training to Syrians in Turkey with funding provided by the U.S. and U.K. The group stole this name from the REAL Syria Civil Defense as documented in this recent report from Aleppo. The “White Helmets” are marketed in the West as civilian volunteers doing rescue work. On Sept. 22, it was announced that the Right Livelihood Award , the so-called “Alternative Nobel Prize,” is being given to the U.S./U.K.-created White Helmets “for their outstanding bravery, compassion and humanitarian engagement in rescuing civilians from the destruction of the Syrian civil war.”  But the White Helmets are largely a propaganda tool promoting Western intervention against Syria. Unlike a legitimate rescue organization such as the Red Cross or Red Crescent, the “White Helmets” only work in areas controlled by the armed opposition. As shown in this video, the White Helmets pick up the bodies of individuals executed by the terrorists; they claim to be unarmed but are not; and they falsely claim to be neutral.
  • Many of the videos from Al Qaeda/terrorist-dominated areas of Syria have the “White Helmets” logo because the White Helmets work in alliance with these extremist groups as primarily a media marketing tool to raise public support for continuing the support to the armed opposition as well as the demonization of the Syrian government.  The Rights Livelihood press release said the White Helmets “remain outspoken in calling for an end to hostilities in the country.” But that is false, too. The White Helmets actively call for U.S./NATO military intervention through a “No Fly Zone,” which would begin with attacks upon and destruction of government anti-aircraft positions and aircraft. A Major Act of War Taking over the skies above another country is an act of war that would require a major U.S. military operation, according to senior American generals.
  • ...6 more annotations...
  • The New York Times reported that in 2012 General Martin E. Dempsey, chairman of the Joint Chiefs of Staff, told the White House that imposing a no-fly zone in Syria would require up to 70,000 American servicemen to destroy Syria’s antiaircraft system and then impose round-the-clock control over Syrian airspace. General Carter Ham, former commander of the U.S. Africa Command who oversaw the aerial attacks on Libya in 2011, said on CBS News that “I worry sometimes that, when people say ‘impose a no-fly zone,’ there is this almost antiseptic view that this is an easily accomplished military task. It’s extraordinarily difficult. … “It first entails — we should make no bones about it. It first entails killing a lot of people and destroying the Syrian air defenses and those people who are manning those systems. And then it entails destroying the Syrian air force, preferably on the ground, in the air if necessary. This is a violent combat action that results in lots of casualties and increased risk to our own personnel.”
  • In other words, an appeal for a “no-fly zone” is not a call for a non-violent solution. It is seeking a bloody act of war by the United States against Syria, a nation that poses no threat to America. It also would almost surely be carried out in violation of international law since a United Nations Security Council resolution would face vetoes from Russia and probably China. Also, the White Helmets have never criticized or called for the end of funding to extremist organizations including Nusra Front, Al Qaeda’s Syrian affiliate. On the contrary, White Helmets are generally embedded with this organization which is defined as “terrorist” by even the U.S., which is likely why the head of the White Helmets, Raed Saleh, was denied entry to the U.S. The foreign and marketing company origins of the White Helmets were exposed over 1½ years ago – and since then, writer Vanessa Beeley has revealed the organization in more depth in articles such as “Who Are the White Helmets?” and “War by Way of Deception.”  Despite these exposés, understanding of the White Helmets is limited, with many liberal and progressive people uncritically accepting the propaganda and misinformation about Syria. Much of the progressive media has effectively blocked or censored critical examinations amid a flood of propaganda about “barrel bombs” dropped by the “brutal dictator” and his “regime.” 
  • In the last week, Netflix started showing a 40-minute documentary movie about the “White Helmets” that amounts to a promotional video. A substantial portion of it takes place in Turkey where we see trainees in hotel rooms making impassioned phone calls to inquire about their families in Syria.  The “family values” theme is evident throughout, a good marketing angle. The political message of the video is also clear: after a bombing attack, “It’s the Russians …. they say they are fighting ISIS but they are targeting civilians.” The movie includes video previously promoted by the White Helmets such as the “Miracle Baby” rescue, an incident that may or may not have been staged. The video includes self-promoting proclamations such as “You are real heroes.” While no doubt there are some real rescues in the midst of war, many of the videos purporting to show the heroes at work have an unrealistic and contrived look to them as revealed here.
  • “Alternative media” in the West has echoed mainstream media regarding the Syria conflict. The result is that many progressive individuals and groups are confused or worse. For example, the activist group CodePink recently issued a media release promoting the Netflix White Helmets propaganda video. 
  • The White Helmets video is produced by Grain Media and Violet Films/Ultra-Violet Consulting, which advertises itself as a marketing corporation specializing in social media management, grant writing, crowd building and campaign implementation. The only question is who paid them to produce this video.  There is growing resistance to this manipulation and deception. In response to a petition to give the Nobel Peace Prize to the White Helmets, there is a counter petition at Change.org. Following the Right Livelihood Awards’ announcement, there will soon be a petition demanding retraction of the award to the White Helmets. The story of the White Helmets is principally a “feel good” hoax to manipulate public perception about the conflict in Syria and continue the drive for “regime change.” That’s why big money was paid to “Purpose” to “incubate” The Syria Campaign to brand and promote the White Helmets using Facebook, Twitter, etc. That’s why more big money was paid to create a self-promotional documentary. 
  • The judges at Rights Livelihood were probably influenced by the documentary since critical examination of facts around Syria is so rare. It’s a sad commentary on the media. As veteran war correspondent Stephen Kinzer recently wrote, “Coverage of the Syrian war will be remembered as one of the most shameful episodes in the history of the American press.”
Paul Merrell

Martin Shkreli Arrested on Securities Fraud Charges - 0 views

  • Martin Shkreli, a boastful pharmaceutical executive who came under withering criticism for price gouging vital drugs, denied securities fraud charges on Thursday following an early morning arrest, and was freed on a $5 million bond. While the 32-year-old has earned a rare level of infamy for his brazenness in business and his personal life, what he was charged with had nothing to do with skyrocketing drug prices. He is accused of repeatedly losing money for investors and lying to them about it, illegally taking assets from one of his companies to pay off debtors in another. “Shkreli essentially ran his company like a Ponzi scheme where he used each subsequent company to pay off defrauded investors from the prior company,” Brooklyn U.S. Attorney Robert Capers said at a press conference.
  • Evan Greebel, a New York lawyer, who is alleged in the federal indictment to have helped Shkreli in his schemes, was also arrested and charged. Like Shkreli, he pleaded not guilty, and he was freed on a $1 million bond. Both men and their lawyers declined to comment after their court appearance.
  • Read the full text of the indictment here In the federal indictment and a complaint by the Securities and Exchange Commission, authorities say Shkreli began losing money and lying to investors from the time he began managing money. In his mid-20s, he got nine investors to place $3 million with him and at one point he had only $331. Securities fraud is hardly unheard of on Wall Streeet and the amounts involved here are nowhere near on the scale of Bernie Madoff. But Shkreli’s case has drawn such attention because of his defiant price-gouging and his own up-by-the-bootstraps history. The son of immigrants from Albania and Croatia who did janitorial work and raised him and his brothers in working-class Brooklyn, Shkreli seemed at first to embody the American dream and then to mock it. After dropping out of an elite Manhattan high school, he worked as an intern for Jim Cramer’s hedge fund as a 17-year-old and quickly impressed with his ability to call stocks. He created hedge funds, taught himself biology and, after earning a BA at Baruch College in New York City, began hedge funds investing in biotech.
  • ...9 more annotations...
  • He became famous within a certain world but entered public consciousness after he raised the price more than 55-fold for Daraprim in September from $13.50 per pill to $750. It is the preferred treatment for a parasitic condition known as toxoplasmosis, which can be deadly for unborn babies and patients with compromised immune systems including those with HIV or cancer. His company, Turing Pharmaceuticals AG, bought the drug, moved it to a closed distribution system and instantly drove the price into the stratosphere. He drew shocked rebukes from Congress, doctors and presidential candidates, and brought public attention to the rising prices of older drugs. Donald Trump called Shkreli a “spoiled brat,” and the BBC dubbed him the “most hated man in America.” Bernie Sanders, the Democratic presidential candidate, rejected a $2,700 campaign donation from him, directing it to an HIV clinic. A spokesman said the campaign would not keep money “from this poster boy for drug company greed.” All the criticism seemed at first to have some impact and Shkreli said he would lower the price. Then he reneged. When Hillary Clinton tried one more time last month to get him to cut the cost, he dismissed her with the tweet “lol.” At a Forbes summit in New York this month, wearing a hooded sweatshirt, he said if he could have done it over, “I probably would have raised the price higher,” adding, “My investors expect me to maximize profits.”
  • Shkreli did further damage to his public image with other acts and boasts. He spent millions on the only copy of a Wu-Tang Clan album that music fans are desperate to hear and then told Bloomberg Businessweek that he had no immediate plans to listen to it. He takes often to Twitter and message boards, bragging about his business strategies, musical tastes and politics; he live-streams from his office for long stretches. The SEC complaint and federal indictment lay out a series of schemes and cover-ups carried out by Shkreli. Capers said authorities began investigating him as early as 2014.
  • Barely 23, he was managing hedge fund Elea Capital in New York and lost it all in 2007. Around then, a trade with Lehman Brothers ended with a $2.3 million judgment against him, prosecutors said. In 2010, he lost his clients’ $3 million investment in his new fund, MSMB Capital. In 2011, he bet that shares of Orexigen Therapeutics Inc. would fall and wound up owing $7 million to his broker, Merrill Lynch, authorities said. He couldn’t pay, and he, an unnamed accomplice and MSMB Capital eventually extinguished the debt with a $1.35 million settlement, they said. Part of that money came from his next firm, authorities said. After the collapse of MSMB Capital, Shkreli launched MSMB Healthcare with about $5 million from 13 investors. He paid himself “far in excess” of the agreed-upon 1 percent management fee and 20 percent profit incentive, according to the SEC.
  • Shkreli then used cash from MSMB Healthcare to invest in Retrophin, the pharmaceutical company he founded in 2011, even though it “had no products or assets,” prosecutors said. Later, he used the assets of Retrophin to repay angry investors in his hedge funds, prosecutors said. Shkreli is confident that he will be cleared of the charges, according to a statement on his behalf. Shkreli is particularly disappointed that his litigation with Retrophin has become a government enforcement matter, according to the statement. He also denied the charges regarding the MSMB entities, which he said involve complex accounting matters that prosecutors and the SEC fail to understand, according to the statement. “It is no coincidence that these charges, the result of investigations which have been languishing for considerable time, have been filed at the same time of Shkreli’s high-profile, controversial and yet unrelated activities,” according to the statement. “The government suggested that Mr. Shkreli was involved in a Ponzi scheme. Ponzi victims do not make money, yet Mr. Shkreli’s investors enjoyed strong results.”
  • As Shkreli’s losses mounted, so did his lies. He fabricated portfolio statements and, with his lawyer’s help, deceived the SEC and outside accountants. He backdated records, manufactured a phony loan agreement between Retrophin and a hedge fund, and created sham consulting agreements with Retrophin as a way to route the company’s cash to his earlier investors. Greebel, the arrested lawyer, made sure Retrophin’s outside accountants were unaware of Shkreli’s financial maneuvers and helped him concoct the consulting agreements used to repay the hedge fund investors, the U.S. said. The cases mirror a lawsuit brought by Retrophin. Shkreli blithely dismissed his old company’s claims, saying, “The $65 million Retrophin wants from me would not dent me. I feel great. I’m licking my chops over the suits I’m going to file against them.” Earlier, he had denied wrongdoing in a post on InvestorsHub after Retrophin disclosed it had received a subpoena from federal prosecutors and the preliminary findings from its own investigation of Shkreli. He called the company’s allegations “completely false, untrue at best and defamatory at worst.”
  • “Every transaction I’ve ever made at Retrophin was done with outside counsel’s blessing,” he said on the investment blog in February, without identifying the lawyers. When Shkreli was working for Cramer’s firm, he was still a teenager. After recommending successful trades, Shkreli eventually set up his own hedge fund, quickly developing a reputation for trashing biotechnology stocks in online chatrooms and shorting them, to enormous profit. Widely admired for his intellect and sharp eye, he set up Retrophin to develop drugs and acquire older pharmaceuticals that could be sold for higher profits. Turing, which is less than a year old and has raised $90 million in financing, has followed a similar strategy with the purchase of drugs, including Daraprim. Shkreli recently bought a majority stake in KaloBios Pharmaceuticals Inc. after Turing received a warning from the New York attorney general that the distribution network for Daraprim may violate antitrust laws. State officials made their concerns known to Turing and Shkreli in an Oct. 12 letter obtained by Bloomberg.
  • KaloBios recently acquired the license for benznidazole, a standard treatment for Chagas, a deadly parasitic infection most common in South and Central America. The firm announced plans to increase the cost from a couple hundred dollars for two months to a pricing structure like that for hepatitis-C drugs, which can run to nearly $100,000 for 12 weeks.
  • With the federal charges and regulatory actions, Shkreli could be banned from running a public company, which could put the future of KaloBios into question. Trading in KaloBios shares was halted after the stock fell 53 percent. It’s less clear what the impact could be on Turing, which is closely held.
  • Federal authorities will have to ask a judge to impose an asset freeze if they want to guarantee Shkreli doesn’t dispose of ill-gotten gains. The charges suggest that a small group of health-care firms—ones that acquire the rights to drugs and significantly increase their prices—is drawing the scrutiny of regulators and prosecutors, with a possible chilling effect on aggressive drug-pricing strategies. Legislators are already paying attention. A hearing of the Senate Special Committee on Aging on Dec. 9 scrutinized such tactics. Before Shkreli started Turing, Retrophin raised the price of Thiola, used to treat a rare condition causing debilitating recurrences of kidney stones, from $1.50 a pill to $30. “Some of these companies seem to act more like hedge funds than traditional pharmaceutical companies,” said Senator Susan Collins, a Maine Republican who ran the recent hearing. George Scangos, CEO of biotechnology giant Biogen Inc., went further, saying in an interview, “Turing is to a research-based company like a loan shark is to a legitimate bank.”
  •  
    Couldn't happen to a nicer guy.
Paul Merrell

Risking World War III in Syria | Consortiumnews - 0 views

  • Risking World War III in Syria February 6, 2016 Exclusive: After Saudi-backed Syrian rebels balked at peace talks and the Russian-backed Syrian army cut off Turkish supply lines to jihadists and other Syrian rebels, the U.S. and its Mideast Sunni “allies” appear poised to invade Syria and force “regime change” even at the risk of fighting Russia, a gamble with nuclear war, writes Joe Lauria.By Joe LauriaDefense Secretary Ashton Carter last October said in a little noticed comment that the United States was ready to take “direct action on the ground” in Syria. Vice President Joe Biden said in Istanbul last month that if peace talks in Geneva failed, the United States was prepared for a “military solution” in that country.The peace talks collapsed on Wednesday even before they began. A day later Saudi Arabia said it is ready to invade Syria while Turkey is building up forces at its Syrian border.
  • The U.N. aims to restart the talks on Feb. 25 but there is little hope they can begin in earnest as the Saudi-run opposition has set numerous conditions. The most important is that Russia stop its military operation in support of the Syrian government, which has been making serious gains on the ground.A day after the talks collapsed, it was revealed that Turkey has begun preparations for an invasion of Syria, according to the Russian Defense Ministry. On Thursday, ministry spokesman Igor Konashenkov said: “We have good reasons to believe that Turkey is actively preparing for a military invasion of a sovereign state – the Syrian Arab Republic. We’re detecting more and more signs of Turkish armed forces being engaged in covert preparations for direct military actions in Syria.” The U.N. and the State Department had no comment. But this intelligence was supported by a sound of alarm from Turkey’s main opposition party, the Republican People’s Party (CHP).
  • Turkey, which has restarted its war against Kurdish PKK guerillas inside Turkey, is determined to crush the emergence of an independent Kurdish state inside Syria as well. Turkish strongman Recep Tayyip Erdogan stopped the Syrian Kurds from attending the aborted Geneva talks.A Turkish invasion would appear poised to attack the Syrian Kurdish PYD party, which is allied with the PKK. The Syrian (and Iraqi) Kurds, with the Syrian army, are the main ground forces fighting the Islamic State. Turkey is pretending to fight ISIS, all the while actually supporting its quest to overthrow Assad, also a Turkish goal.Saudi Arabia then said on Thursday it was prepared to send its ground forces into Syria if asked. Carter welcomed it. Of course Biden, Erdogan, Carter and the Saudis are all saying a ground invasion would fight ISIS. But their war against ISIS has been half-hearted at best and they share ISIS’ same enemy: Syrian President Bashar al-Assad. If the U.S. were serious about fighting ISIS it would have at least considered a proposal by Russia to join a coalition as the U.S. did against the Nazis.
  • ...4 more annotations...
  • The excuse of the Geneva collapse is a ruse. There was little optimism the talks would succeed. The real reason for the coming showdown in Syria is the success of Russia’s military intervention in defense of the Syrian government against the Islamic State and other extremist groups. Many of these groups are supported by Saudi Arabia, Turkey and the United States in pursuit of overthrowing Assad.These three nations are all apparently poised for a ground invasion of Syria just as, by no coincidence, the Syrian Arab Army with Russian air cover is pushing to liberate perhaps the greatest prize in the Syrian civil war — Aleppo, the country’s commercial capital. The Russians and Syrians have already cut off Turkey’s supply lines to rebels in the city.On Saturday, Bahrain and the United Arab Emirates joined the Saudis in saying they would intervene only as part of a U.S.-led ground invasion. The Obama administration has maintained that it would not send U.S. ground forces into Syria, beyond a few hundred special forces. But these U.S. allies, driven by fierce regional ambitions, appear to be putting immense pressure on the Obama administration to decide if it is prepared to lose Syria. Though Carter said he welcomed the Saudi declaration he made no commitment about U.S. ground forces. But Saudi Brigadier General Ahmed Asseri told al-Arabiya TV that a decision could be made to intervene at a NATO summit in Brussels next week. Carter said the matter would be on the agenda.
  • The U.S. cannot likely stand by and watch Russia win in Syria. At the very least it wants to be on the ground to meet them at a modern-day Elbe and influence the outcome.But things could go wrong in a war in which the U.S. and Russia are not allies, as they were in World War II. Despite this, the U.S. and its allies see Syria as important enough to risk confrontation with Russia, with all that implies. It is not at all clear though what the U.S. interests are in Syria to take such a risk.
  • As a fertile crossroad between Asia and Africa backed by desert, Syrian territory has been fought over for centuries. Pharaoh Ramses II defeated the Hittites at the Battle of Kadesh near Lake Homs in 1247 BCE. The Persians conquered Syria in 538 BCE. Alexander the Great took it 200 years later and the Romans grabbed Syria in 64 BCE.Islam defeated the Byzantine Empire there at the Battle of Yarmuk in 636. In one of the first Shia-Sunni battles, Ali failed to defeat Muawiyah in 657 at Siffin along the Euphrates near the Iraq-Syria border. Damascus became the seat of the Caliphate until a coup in 750 moved it to Baghdad.Waves of Crusaders next invaded Syria beginning in 1098. Egyptian Mamluks took the country in 1250 and the Ottoman Empire began in 1516 at its victory at Marj Dabik, 44 kilometers north of Aleppo — about where Turkish supplies are now being cut off. France double-crossed the Arabs and gained control of Syria in 1922 after the Ottoman collapse. The Nazis were pushed out in the momentous 1941 Battle of Damascus.We may be now looking at an epic war with similar historical significance. All these previous battles, as momentous as they were, were regional in nature.
  • What we are potentially facing is a war that goes beyond the Soviet-U.S. proxy wars of the Cold War era, and beyond the proxy war that has so far taken place in the five-year Syrian civil war. Russia is already present in Syria. The entry of the United States and its allies would risk a direct confrontation between the two largest nuclear powers on earth.
1 - 20 of 251 Next › Last »
Showing 20 items per page