Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged target-sharing

Rss Feed Group items tagged

Paul Merrell

US military denied treatment to soldiers exposed to chemical weapons in Iraq (+video) -... - 0 views

  • The New York Times's C.J. Chivers has dropped a bombshell of a scoop that details 17 US troops and seven Iraqi policemen who were exposed to old chemical weapons in Iraq, some of whom were declined appropriate medical care and service awards on the grounds of secrecy.If Mr. Chivers' reporting holds up – and there's little reason to doubt his deeply-reported piece – this is a scandal that eclipses long waits and poor funding at VA hospitals in the US. Sure, far fewer people were affected by exposure to mustard agents or sarin in Iraq, but these allegations represent enormous callousness and a direct breach of trust with soldiers.
  • Jarrod L. Taylor, a former Army sergeant on hand for the destruction of mustard shells that burned two soldiers in his infantry company, joked of “wounds that never happened” from “that stuff that didn’t exist.” The public, he said, was misled for a decade. “I love it when I hear, ‘Oh there weren’t any chemical weapons in Iraq,’” he said. “There were plenty.” That chemical weapons from before the first Gulf War remained in Iraq was an operating assumption at the time the US invaded the country in 2003 and was established fact by the end of that year. But, while the US made the search for evidence of ongoing chemical, nuclear, and biological weapons programs a priority (it failed to find any), disposing of whatever they did find apparently was not.
  • The American government withheld word about its discoveries even from troops it sent into harm’s way and from military doctors. The government’s secrecy, victims and participants said, prevented troops in some of the war’s most dangerous jobs from receiving proper medical care and official recognition of their wounds. “I felt more like a guinea pig than a wounded soldier,” said a former Army sergeant who suffered mustard burns in 2007 and was denied hospital treatment and medical evacuation to the United States despite requests from his commander. Congress, too, was only partly informed, while troops and officers were instructed to be silent or give deceptive accounts of what they had found. “ 'Nothing of significance’ is what I was ordered to say,” said Jarrod Lampier, a recently retired Army major who was present for the largest chemical weapons discovery of the war: more than 2,400 nerve-agent rockets unearthed in 2006 at a former Republican Guard compound.
  • ...3 more annotations...
  • That's the central issue in Chivers' piece, which is hard to read in full without mounting anger. But the following four graphs contain the nut of the scandal here, as I see it (emphasis mine): 
  • In the first year of the US-led war, the military didn't have the manpower to secure all of the hundreds of conventional weapons bunkers that littered the country. The shells, RPGs, and rifles that were looted from these bunkers were put to use by the then-growing Iraqi insurgency to attack both foreign soldiers and the new government in Baghdad.Chivers' story details how as late as 2008, US soldiers were involved in the secret destruction of chemical weapons in ways that violate the protocols set out in the United Nations's Convention on Chemical Weapons. The lax US approach appears to have led to the exposure of the soldiers – and it left behind an unknown quantity of old chemical weapons, some possibly in the hands of anti-government insurgents like the so-called Islamic State. The US knew it was leaving old chemical weapons behind when soldiers withdrew from the country at the end of 2011. Neither the Bush nor the Obama administrations had ever made their destruction a priority. 
  • Much of the reaction to the story has missed the central point, distracted by partisan finger pointing. Fox News predictably frames the story as "There were chemical weapons in Iraq after all." No. This is not news – and the possible existence of old sarin and mustard agent shells inside the country was not the reason that the Bush administration presented for going to war. Folks on the left have focused on the fact that these old chemical weapons were US "designed." That isn't really news either (nor that the US was notably silent about Saddam Hussein's use of chemical weapons during the Iran-Iraq war).The story is an enormous breach of trust between the US and its own soldiers. It starts with the officers and the members of the Bush administration involved, whose names the story doesn't give.
Paul Merrell

CIA Apparently 'Impersonated' Senate Staffers To Gain Access To Documents On Shared Dri... - 0 views

  • No, the most interesting part of the latest Torture Report details almost falls off the end of the page over at The Huffington Post. It's more hints of CIA spying, ones that go a bit further than previously covered. According to sources familiar with the CIA inspector general report that details the alleged abuses by agency officials, CIA agents impersonated Senate staffers in order to gain access to Senate communications and drafts of the Intelligence Committee investigation. These sources requested anonymity because the details of the agency's inspector general report remain classified. "If people knew the details of what they actually did to hack into the Senate computers to go search for the torture document, jaws would drop. It's straight out of a movie," said one Senate source familiar with the document. Impersonating staff to gain access to Senate Torture Report work material would be straight-up espionage. Before we get to the response that mitigates the severity of this allegation, let's look at what we do know.
  • The CIA accessed the Senate's private network to (presumably) gain access to works-in-progress. This was denied (badly) by CIA director John Brennan. The CIA also claimed Senate staffers had improperly accessed classified documents and reported them to the DOJ, even though they knew the charges were false. Then, after Brennan told his agency to stop spying on the Senate, agents took it upon themselves to improperly access Senate email accounts. This is all gleaned from a few public statements and a one-page summary of an Inspector General's report -- the same unreleased report EPIC is currently suing the agency over. Now, there's this: accusations that the CIA impersonated Senate staffers in hopes of accessing Torture Report documents. Certainly a believable accusation, considering the tactics it's deployed in the very recent past. This is being denied -- or, at least, talked around.
  • A person familiar with the events surrounding the dispute between the CIA and Intelligence Committee said the suggestion that the agency posed as staff to access drafts of the study is untrue. “CIA simply attempted to determine if its side of the firewall could have been accessed through the Google search tool. CIA did not use administrator access to examine [Intelligence Committee] work product,” the source said. So, it was a just an innocuous firewall test. And according to this explanation, it wasn't done to examine the Senate's in-progress Torture Report. But this narrative meshes with previous accusations, including those detailed in the Inspector General's report. Logging on to the shared drives with Senate credentials would allow agents to check the firewall for holes. But it also would allow them to see other Senate documents, presumably only accessible from that "side" of the firewall. While there's been no mention of "impersonation" up to this point, the first violation highlighted by the IG's report seems to be the most likely explanation of what happened here.
  • ...1 more annotation...
  • Five Agency employees, two attorneys and three information technology (IT) staff members, improperly accessed or caused access to the SSCI Majority staff shared drives on the RDINet Accessing another part of the shared network/drive by using someone else's credentials is low-level hackery, but not the first thing that springs to mind when someone says "impersonation." A supposed firewall test would be the perfect cover for sniffing around previously off-limits areas. Much of what has come to light about the agency's actions hints at low-level espionage. There's still more buried in the IG report that the agency is actively trying to keep from being made public. Just because these activities didn't specifically "target" Senate work material, it was all there and able to accessed. It doesn't really matter what the CIA says it was looking for. The fact that it was done at all, and done with such carefree audacity, is the problem. There are presumably ways to perform these checks that don't involve Inspector Generals, damning reports and multiple hacking accusations.
  •  
    So it takes three technical staff and two CIA lawyers to check a firewall? Lawyers? So if I want to check my firewall, I need to hire three technical staff and two lawyers? 
Paul Merrell

Top War Crimes Diplomat Stepping Down | Foreign Policy - 0 views

  • destruction, and U.S. counterterrorism strategy. Lynch's enterprise reporting has explored the underside of international diplomacy. His investigations have uncovered a U.S. spying operation in Iraq, Dick Cheney's former company's financial links to Saddam Hussein, and documented numerous sexual misconduct and corruption scandals. Lynch has appeared frequently on the Lehrer News Hour, MSNBC, NPR radio, and the BBC. He has also moderated public discussions on foreign policy, including interviews with Susan E. Rice, the U.S. National Security Advisor, Gerard Araud, France's U.N. ambassador, and other senior diplomatic leaders. Born in Los Angeles, California, Lynch received a bachelor's degree from the University of California, Berkeley, in 1985 and a master's degree from Columbia University's Graduate School of Journalism in 1987. He previously worked for the Boston Globe. January 15, 2015 colum.lynch @columlynch Stephen J. Rapp, the U.S. ambassador at large for war crimes, is stepping down after five and a half years as the Obama administration’s point man for global prosecutions of the world’s most notorious war criminals
  •  
    I'll add some comments here later. This is a very important event. Rapp resigned the day after this article. See https://news.yahoo.com/u-s--war-crimes-ambassador-stepping-down-in--frustration--194011155.html
Paul Merrell

Push for New Sanctions on Iran Stalls Amid Growing Resistance | The Nation - 0 views

  • A bid to slap Iran with a new round of economic sanctions appears to have stalled in the Senate, after leading Democrats amplified concern about the threat such a move poses to a fragile diplomatic process. Early in the week, reports that a bill introduced by Republican Mark Kirk and Democrat Robert Menendez was within striking distance of a veto-proof majority cast a shadow over news that negotiators had finalized a temporary agreement to freeze Iran’s nuclear program, beginning Monday. New sanctions would likely kill negotiations for a final deal, the White House warned lawmakers, and increase the chances of an armed conflict with Iran. But Senate majority leader Harry Reid has given no indication that he will bring the bill up for a vote, and the pressure to do so is falling now that top Democrats have intensified opposition to the proposed legislation. The Kirk-Menendez bill gained no new endorsements this week, and even one supportive senator admitted Wednesday to a break in momentum.
  • The gorilla in the room is the American Israeli Public Affairs Committee, which has been calling for new sanctions for months. Of the 16 Democrats who have endorsed the Kirk-Menendez legislation, several are up for re-election in closely contested states; Senator Kirk himself suggested Tuesday that a vote for new sanctions would be an opportunity for lawmakers to shore up support from the powerful lobby. “The great thing, since we represent a nationwide community — the pro-Israel community is going to be heavily present in most states — this is a chance for senators to go back and tell them, ‘I’m with you,’” Kirk said. Other Democrats pushing for the bill have close ties with the group, particularly Chuck Schumer and Cory Booker. Tellingly, the Kirk-Menendez bill states that if Israel takes "military action in legitimate self-defense against Iran's nuclear weapons program,” the US "should stand with Israel and provide…diplomatic, military, and economic support to the Government of Israel in its defense of its territory, people, and existence." The language is nonbinding, but it raises flags about whose interests the legislation would truly serve.
  • Dianne Feinstein addressed this point more directly than perhaps any other politician so far. “While I recognize and share Israel’s concern, we cannot let Israel determine when and where the US goes to war,” she said. “By stating that the US should provide military support to Israel should it attack Iran, I fear that is exactly what this bill will do.” Such outspokenness about the relationship between US policymaking in the Middle East and Israeli interests is remarkable. But other lawmakers are signalling that they too are shrugging off the lobby: Democratic Representative Debbie Wasserman-Shultz, normally a high-profile ally for AIPAC, reportedly argued against the Kirk-Menendez bill at a White House meeting attended by several dozen of her colleagues on Wednesday night. How things play out in the next week, and in the duration of the talks with Iran, will be a good test of AIPAC’s influence, which seemed diminished when Congress considered military strikes in Syria last year. Progressives claimed a victory when diplomacy prevailed then; as Peter Beinart points out, the current debate presents a real opportunity for the anti-war left to reassert itself, not only to punish lawmakers who start wars, but to set new expectations for a diplomacy-first approach.
  • ...1 more annotation...
  • Read Next: Robert Scheer on the 1953 CIA-supported coup in Iran.
  •  
    More signs that the power of the Israel Lobby in Congress is on the wane and that it is now a fit topic for open discussion. Might we yet again see the day when members of the Israel Lobby will be required to register as agents of a foreign power, as required by law?  (That bit about "Progressives claimed a victory when diplomacy prevailed then" is in my opinion off the wall. There are exceedingly few true "progressives" in Congress; they can be counted on the fingers of one hand. The statement ignores that members of Congress in both parties came out in opposition to war on Syria, as did the Pentagon. The precipitating sarin gas attack was quickly exposed as a false flag  attack cooperatively mounted by the Saudis and U.S. government officials to justify the planned U.S missile strikes. Public opinion was overwhelmingly against war on Syria and Russian diplomats offered Obama a face-saving path of retreat. Oh, yeah. Mid-term elections are coming up this year, and no Congressman up for reelection relished the thought of facing voter wrath on this issue.     it was public opinion against war with Syria, Russia capitalizing on John Kerry's hoof-in-mouth disease, 
Paul Merrell

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
Paul Merrell

Latest FBI Claim of Disrupted Terror Plot Deserves Much Scrutiny and Skepticism - The I... - 0 views

  • The Justice Department on Wednesday issued a press release trumpeting its latest success in disrupting a domestic terrorism plot, announcing that “the Joint Terrorism Task Force has arrested a Cincinnati-area man for a plot to attack the U.S. Capitol and kill government officials.” The alleged would-be terrorist is 20-year-old Christopher Cornell (above), who is unemployed, lives at home, spends most of his time playing video games in his bedroom, still addresses his mother as “Mommy” and regards his cat as his best friend; he was described as “a typical student” and “quiet but not overly reserved” by the principal of the local high school he graduated in 2012.
  • The DOJ’s press release predictably generated an avalanche of scary media headlines hailing the FBI. CNN: “FBI says plot to attack U.S. Capitol was ready to go.” MSNBC: “US terror plot foiled by FBI arrest of Ohio man.” Wall St. Journal: “Ohio Man Charged With Plotting ISIS-Inspired Attack on U.S. Capitol.”
  • Just as predictably, political officials instantly exploited the news to justify their powers of domestic surveillance. House Speaker John Boehner claimed yesterday that “the National Security Agency’s snooping powers helped stop a plot to attack the Capitol and that his colleagues need to keep that in mind as they debate whether to renew the law that allows the government to collect bulk information from its citizens.” He warned: “We live in a dangerous country, and we get reminded every week of the dangers that are out there.”  The known facts from this latest case seem to fit well within a now-familiar FBI pattern whereby the agency does not disrupt planned domestic terror attacks but rather creates them, then publicly praises itself for stopping its own plots.
  • ...2 more annotations...
  • First, they target a Muslim: not due to any evidence of intent or capability to engage in terrorism, but rather for the “radical” political views he expresses. In most cases, the Muslim targeted by the FBI is a very young (late teens, early 20s), adrift, unemployed loner who has shown no signs of mastering basic life functions, let alone carrying out a serious terror attack, and has no known involvement with actual terrorist groups. They then find another Muslim who is highly motivated to help disrupt a “terror plot”: either because they’re being paid substantial sums of money by the FBI or because (as appears to be the case here) they are charged with some unrelated crime and are desperate to please the FBI in exchange for leniency (or both). The FBI then gives the informant a detailed attack plan, and sometimes even the money and other instruments to carry it out, and the informant then shares all of that with the target. Typically, the informant also induces, lures, cajoles, and persuades the target to agree to carry out the FBI-designed plot. In some instances where the target refuses to go along, they have their informant offer huge cash inducements to the impoverished target. Once they finally get the target to agree, the FBI swoops in at the last minute, arrests the target, issues a press release praising themselves for disrupting a dangerous attack (which it conceived of, funded, and recruited the operatives for), and the DOJ and federal judges send their target to prison for years or even decades (where they are kept in special GITMO-like units). Subservient U.S. courts uphold the charges by applying such a broad and permissive interpretation of “entrapment” that it could almost never be successfully invoked. As AP noted last night, “defense arguments have repeatedly failed with judges, and the stings have led to many convictions.”
  • There are countless similar cases where the FBI triumphantly disrupts its own plots, causing people to be imprisoned as terrorists who would not and could not have acted on their own. Trevor Aaronson has comprehensively covered what amounts to the FBI’s own domestic terror network, and has reported that “nearly half [of all DOJ terrorism] prosecutions involved the use of informants, many of them incentivized by money (operatives can be paid as much as $100,000 per assignment) or the need to work off criminal or immigration violation.” He documents “49 [terrorism] defendants [who] participated in plots led by an agent provocateur—an FBI operative instigating terrorist action.” In 2012, Petra Bartosiewicz in The Nation reviewed the post-9/11 body of terrorism cases and concluded: Nearly every major post-9/11 terrorism-related prosecution has involved a sting operation, at the center of which is a government informant. In these cases, the informants — who work for money or are seeking leniency on criminal charges of their own — have crossed the line from merely observing potential criminal behavior to encouraging and assisting people to participate in plots that are largely scripted by the FBI itself. Under the FBI’s guiding hand, the informants provide the weapons, suggest the targets and even initiate the inflammatory political rhetoric that later elevates the charges to the level of terrorism.
Paul Merrell

IGs form front line of war on waste and fraud, but weak links remain | WashingtonExamin... - 0 views

  • The ambassador to Belgium, a big campaign bundler for President Obama, was accused of soliciting sex in a park near the U.S. Embassy in Brussels. Members of then-Secretary of State Hillary Clinton’s security detail were accused of hiring prostitutes, and a State Department security official in Beirut “engaged in sexual assaults” on foreign nationals, according to the complaints. The Diplomatic Security Service, a law enforcement branch of the State Department, tried to investigate the underlying charges but was blocked by top agency managers including Kennedy and Cheryl Mills, chief of staff to Hillary Clinton, according to whistleblower allegations that surfaced later.
  • DSS agents reported the interference to the inspector general’s office, which confirmed the pressure from the top. A draft IG report written in November 2012 described the underlying cases of misconduct and the strong-arm tactics used by top managers to block the DSS investigations. But that draft report was not made public. Instead, it was shown to top State Department officials who wanted it scrubbed of damaging information. “This is going to kill us,” one top agency official reportedly said upon seeing the draft report, according to CBS News. When the final IG report was issued in February 2013, it made no mention of the individual cases or of management pressure to kill the DSS probes. Instead, the IG report blandly stated that DSS “lacks a firewall” to prevent management interference with DSS investigations.
  • The more candid draft report was leaked by an investigator inside the IG’s office to the House Oversight and Government Reform Committee and to CBS News. Rep. Ed Royce, the California Republican who is chairman of the House Foreign Affairs Committee, demanded copies of the draft report and details about the specific cases of misconduct. The IG’s office refused to provide the information. “There is every indication that critical information was missing from the IG report submitted to Congress,” Royce told the Washington Examiner in a recent interview. “And whether it was State’s pressure to remove it or Geisel’s unwillingness to include it, the result is the same. We are not, as required by law, kept fully and currently informed. The bottom line is when federal agencies lack a Senate-confirmed, independent inspector general, the potential for malfeasance really abounds,” he said.
  • ...1 more annotation...
  • Under pressure from Congress, and in the wake of revelations that agency management influenced the IG’s final report, Obama appointed Linick as the State Department’s permanent IG in June 2013, less than a month after CBS broke the news about the IG cover-up. Congress confirmed him three months later. Linick launched a new investigation, and in October 2014 the IG confirmed that at least three DSS investigations were blocked by top State Department officials, including the probe involving the ambassador. While the new IG’s report was critical of management’s efforts to block the DSS investigations, it was silent on whether its own office bowed to the pressure.
Paul Merrell

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
Paul Merrell

Reported US-Syrian Accord on Air Strikes | Consortiumnews - 1 views

  • Exclusive: A problem with President Obama’s plan to expand the war against ISIS into Syria was always the risk that Syrian air defenses might fire on U.S. warplanes, but now a source says Syria’s President Assad has quietly agreed to permit strikes in some parts of Syria, reports Robert Parry.
  • The Obama administration, working through the Russian government, has secured an agreement from the Syrian regime of Bashar al-Assad to permit U.S. airstrikes against Islamic State targets in parts of Syria, according to a source briefed on the secret arrangements. The reported agreement would clear away one of the chief obstacles to President Barack Obama’s plan to authorize U.S. warplanes to cross into Syria to attack Islamic State forces – the concern that entering Syrian territory might prompt anti-aircraft fire from the Syrian government’s missile batteries.
  • In essence, that appears to be what is happening behind the scenes in Syria despite the hostility between the Obama administration and the Assad government. Obama has called for the removal of Assad but the two leaders find themselves on the same side in the fight against the Islamic State terrorists who have battled Assad’s forces while also attacking the U.S.-supported Iraqi government and beheading two American journalists.
  • ...13 more annotations...
  • The usual protocol for the U.S. military – when operating in territory without a government’s permission – is to destroy the air defenses prior to conducting airstrikes so as to protect American pilots and aircraft, as was done with Libya in 2011. However, in other cases, U.S. intelligence agencies have arranged for secret permission from governments for such attacks, creating a public ambiguity usually for the benefit of the foreign leaders while gaining the necessary U.S. military assurances.
  • Just last month, Obama himself termed the strategy of arming supposedly “moderate” Syrian rebels “a fantasy.” He told the New York Times’ Thomas L. Friedman: “This idea that we could provide some light arms or even more sophisticated arms to what was essentially an opposition made up of former doctors, farmers, pharmacists and so forth, and that they were going to be able to battle not only a well-armed state but also a well-armed state backed by Russia, backed by Iran, a battle-hardened Hezbollah, that was never in the cards.” Obama’s point would seem to apply at least as much to having the “moderate” rebels face down the ruthless Islamic State jihadists who engage in suicide bombings and slaughter their captives without mercy. But this “fantasy” of the “moderate” rebels has a big following in Congress and on the major U.S. op-ed pages, so Obama has included the $500 million in his war plan despite the risk it poses to Assad’s acquiescence to American air attacks.
  • In a national address last week, Obama vowed to order U.S. air attacks across Syria’s border without any coordination with the Syrian government, a proposition that Damascus denounced as a violation of its sovereignty. So, in this case, Syria’s behind-the-scenes acquiescence also might provide some politically useful ambiguity for Obama as well as Assad. Yet, this secret collaboration may go even further and include Syrian government assistance in the targeting of the U.S. attacks, according to the source who spoke on condition of anonymity. That is another feature of U.S. military protocol in conducting air strikes – to have some on-the-ground help in pinpointing the attacks. As part of its public pronouncements about the future Syrian attacks, the Obama administration sought $500 million to train “vetted” Syrian rebels to handle the targeting tasks inside Syria as well as to carry out military ground attacks. But that approach – while popular on Capitol Hill – could delay any U.S. airstrikes into Syria for months and could possibly negate Assad’s quiet acceptance of the U.S. attacks, since the U.S.-backed rebels share one key goal of the Islamic State, the overthrow of Assad’s relatively secular regime.
  • Without Assad’s consent, the U.S. airstrikes might require a much wider U.S. bombing campaign to first target Syrian government defenses, a development long sought by Official Washington’s influential neoconservatives who have kept “regime change” in Syria near the top of their international wish list. For the past several years, the Israeli government also has sought the overthrow of Assad, even at the risk of Islamic extremists gaining power. The Israeli thinking had been that Assad, as an ally of Iran, represented a greater threat to Israel because his government was at the center of the so-called Shiite crescent reaching from Tehran through Damascus to Beirut and southern Lebanon, the base for Hezbollah.
  • The thinking was that if Assad’s government could be pulled down, Iran and Hezbollah – two of Israel’s principal “enemies” – would be badly damaged. A year ago, then-Israeli Ambassador to the United States Michael Oren articulated this geopolitical position in an interview with the Jerusalem Post. “The greatest danger to Israel is by the strategic arc that extends from Tehran, to Damascus to Beirut. And we saw the Assad regime as the keystone in that arc,” Oren said. “We always wanted Bashar Assad to go, we always preferred the bad guys who weren’t backed by Iran to the bad guys who were backed by Iran.” He said this was the case even if the other “bad guys” were affiliated with al-Qaeda. More recently, however, with the al-Qaeda-connected Nusra Front having seized Syrian territory adjacent to the Israeli-occupied Golan Heights – forcing the withdrawal of UN peacekeepers – the balance of Israeli interests may be tipping in favor of preferring Assad to having Islamic extremists possibly penetrating directly into Israeli territory.
  • In the longer term, by working together to create political solutions to various Mideast crises, the Obama-Putin cooperation threatened to destroy the neocons’ preferred strategy of escalating U.S. military involvement in the region. There was the prospect, too, that the U.S.-Russian tag team might strong-arm Israel into a peace agreement with the Palestinians. So, starting last September – almost immediately after Putin helped avert a U.S. air war against Syria – key neocons began taking aim at Ukraine as a potential sore point for Putin. A leading neocon, Carl Gershman, president of the U.S.-government-funded National Endowment for Democracy, took to the op-ed pages of the neocon Washington Post to identify Ukraine as “the biggest prize” and explaining how its targeting could undermine Putin’s political standing inside Russia. “Ukraine’s choice to join Europe will accelerate the demise of the ideology of Russian imperialism that Putin represents,” Gershman wrote. “Russians, too, face a choice, and Putin may find himself on the losing end not just in the near abroad but within Russia itself.” At the time, Gershman’s NED was funding scores of political and media projects inside Ukraine.
  • The Russian Hand Besides the tactical significance of U.S. intelligence agencies arranging Assad’s tacit acceptance of U.S. airstrikes over Syrian territory, the reported arrangement is also significant because of the role of Russian intelligence serving as the intermediary. That suggests that despite the U.S.-Russian estrangement over the Ukraine crisis, the cooperation between President Obama and Russian President Vladimir Putin has not been extinguished; it has instead just gone further underground. Last year, this growing behind-the-scenes collaboration between Obama and Putin represented a potential tectonic geopolitical shift in the Middle East. In the short term, their teamwork produced agreements that averted a U.S. military strike against Syria last September (by getting Assad to surrender his chemical weapons arsenal) and struck a tentative deal with Iran to constrain but not eliminate its nuclear program.
  • Direct attacks on Israel would be a temptation to al-Nusra Front, which is competing for the allegiance of young jihadists with the Islamic State. While the Islamic State, known by the acronyms ISIS or ISIL, has captured the imaginations of many youthful extremists by declaring the creation of a “caliphate” with the goal of driving Western interests from the Middle East, al-Nusra could trump that appeal by actually going on the offensive against one of the jihadists’ principal targets, Israel. Yet, despite Israel’s apparent rethinking of its priorities, America’s neocons appear focused still on their long-held strategy of using violent “regime change” in the Middle East to eliminate governments that have been major supporters of Lebanon’s Hezbollah and Palestine’s Hamas, i.e. Syria and Iran. One reason why Obama may have opted for a secretive overture to the Assad regime, using intelligence channels with the Russians as the middlemen, is that otherwise the U.S. neocons and their “liberal interventionist” allies would have howled in protest.
  • By early 2014, American neocons and their “liberal interventionist” pals were conspiring “to midwife” a coup to overthrow Ukraine’s elected President Viktor Yanukovych, according to a phrase used by U.S. Ambassador Geoffrey Pyatt in an intercepted phone conversation with Assistant Secretary of State for European Affairs Victoria Nuland, who was busy handpicking leaders to replace Yanukovych. A neocon holdover from George W. Bush’s administration, Nuland had been a top aide to Vice President Dick Cheney and is married to prominent neocon Robert Kagan, a co-founder of the Project for a New American Century which prepared the blueprint for the neocon strategy of “regime change” starting with the 2003 U.S.-led invasion of Iraq.
  • The U.S.-backed coup ousted Yanukovych on Feb. 22 and sparked a bloody civil war, leaving thousands dead, mostly ethnic Russians in eastern Ukraine. But the Gershman-Nuland strategy also drove a deep wedge between Obama and Putin, seeming to destroy the possibility that their peace-seeking collaboration would continue in the Middle East. [See Consortiumnews.com’s “Neocons’ Ukraine-Syria-Iran Gambit.”] New Hope for ‘Regime Change’ The surprise success of Islamic State terrorists in striking deep inside Iraq during the summer revived neocon hopes that their “regime change” strategy in Syria might also be resurrected. By baiting Obama to react with military force not only in Iraq but across the border in Syria, neocons like Sens. John McCain and Lindsey Graham put the ouster of Assad back in play.
  • In a New York Times op-ed on Aug. 29, McCain and Graham used vague language about resolving the Syrian civil war, but clearly implied that Assad must go. They wrote that thwarting ISIS “requires an end to the [civil] conflict in Syria, and a political transition there, because the regime of President Bashar al-Assad will never be a reliable partner against ISIS; in fact, it has abetted the rise of ISIS, just as it facilitated the terrorism of ISIS’ predecessor, Al Qaeda in Iraq.” Though the McCain-Graham depiction of Assad’s relationship to ISIS and al-Qaeda was a distortion at best – in fact, Assad’s army has been the most effective force in pushing back against the Sunni terrorist groups that have come to dominate the Western-backed rebel movement – the op-ed’s underlying point is obvious: a necessary step in the U.S. military operation against ISIS must be “regime change” in Damascus.
  • That would get the neocons back on their original track of forcing “regime change” in countries seen as hostile to Israel. The first target was Iraq with Syria and Iran always meant to follow. The idea was to deprive Israel’s close-in enemies, Lebanon’s Hezbollah and Palestine’s Hamas, of crucial support. But the neocon vision got knocked off track when Bush’s Iraq War derailed and the American people balked at extending the conflict to Syria and Iran. Still, the neocons retained their vision even after Bush and Cheney departed. They also remained influential by holding onto key positions inside Official Washington – at think tanks, within major news outlets and even inside the Obama administration. They also built a crucial alliance with “liberal interventionists” who had Obama’s ear. [See Consortiumnews.com’s “The Dangerous Neocon-R2P Alliance.”]
  • The neocons’ new hope arrived with the public outrage over ISIS’s atrocities. Yet, while pushing to get this new war going, the neocons have downplayed their “regime change” agenda, getting Obama to agree only to extend his anti-ISIS bombing campaign from Iraq into Syria. But it was hard to envision expanding the war into Syria without ousting Assad. Now, however, if the source’s account is correct regarding Assad’s quiet assent to U.S. airstrikes, Obama may have devised a way around the need to bomb Assad’s military, an maneuver that might again frustrate the neocons’ beloved goal of “regime change.”
  •  
    Robert Parry lands another major scoop. But beware of government officials who leak government plans because they do not invariably speak the truth.  I am particularly wary of this report because Obama's planned arming and training of the "moderate Syrian opposition" was such a patent lie. The "moderate Syrian opposition" disappeared over two years ago as peaceful protesters were replaced by Saudi, Qatari, Turkish, and American-backed Salafist mercenaries took their place. Up until this article, there has been every appearance that the U.S. was about to become ISIL's Air Force in Syria. In other words, there has been a steady gushing of lies from the White House on fundamental issues of war and peace. In that light, I do not plan to accept this article as truth before I see much more confirmation that ISIL rather than the Assad government is the American target in Syria. We have a serial liar in the White House.
Paul Merrell

U.S. Embassy in Ankara Headquarter for ISIS War on Iraq - Hariri Insider | nsnbc intern... - 0 views

  • The green light for the use of ISIS brigades to carve up Iraq, widen the Syria conflict into a greater Middle East war and to throw Iran off-balance was given behind closed doors at the Atlantic Council meeting in Turkey, in November 2013, told a source close to Saudi – Lebanese billionaire Saad Hariri, adding that the U.S. Embassy in Ankara is the operation’s headquarter.
  • A “trusted source” close to the Saudi – Lebanese multi-billionaire and former Lebanese P.M. Saad Hariri told on condition of anonymity, that the final green light for the war on Iraq with ISIS or ISIL brigades was given behind closed doors, at the sidelines of the Atlantic Council’s Energy Summit in Istanbul, Turkey, on November 22 – 23, 2013. The Atlantic Council is one of the most influential U.S. think tanks with regard to U.S. and NATO foreign policy and geopolitics.
  • “Had Baghdad been more cooperative about the Syrian oil fields at Deir-Ez-Zor in early 2013 and about autonomy for the North [Iraq’s northern, predominantly Kurdish region] they would possibly not have turned against al-Maliki; Or he would have been given more time”, said the Hariri insider during the almost two-hour-long conversation.
  • ...6 more annotations...
  • In March 2013, U.S. Secretary of State John Kerry demanded that Iraq “stops the arms flow to Syria”, while U.S. weapons were flowing to ISIS via Saudi Arabia into Iraq and Jordan. On Monday, April 22, 2013, 27 of the 28 E.U. foreign ministers agreed to lift the ban on the import of Syrian oil from opposition-held territories to allow the “opposition” to finance part of its campaign. “ISIS that was supposed to control [the region around] Deir Ez-Zor. [Turkish Energy Minister Taner] Yildiz and [Kurdish] Energy Minister Ashti] Hawrami were to make sure the oil could flow via the Kirkuk – Ceyhan [pipeline];… Ankara put al-Maliki under a lot of pressure about the Kurdish autonomy and oil, too much pressure, too early, if you’d ask me”, the source said. He added that the pressure backfired.
  • Previous reports confirmed that Baghdad started intercepting weapons and insurgents along the Saudi – Iraqi border, cutting off important supply lines for ISIS brigades around Deir Ez-Zor, and that Al-Maliki began complaining about a Saudi – Qatari-backed attempt to subvert the Iraqi State since late 2012. Noting my remark he replied: “That is right, but the heavy increase in attacks came in May – June 2013, after al-Maliki ordered the military to al-Anbar “. A previous article in nsnbc explains how Baghdad’s blockade caused problems in Jordan, because many of the transports of weapons, fighters and munitions had to be rerouted via Jordan. The Hariri insider added that the oil fields should have been under ISIS control by August 2013, but that the plan failed for two reasons. The UK withdrew its support for the bombing of Syria. That in turn enabled the Syrian army to dislodge both ISIS and Jabhat al-Nusrah from Deir Ez-Zor in August.
  • “The situation was a disaster because in June Hariri, Yidiz, Hawrami, Scowcroft, and everybody was ready to talk about how to share the oil between the U.S., Turkey and E.U.. The Summit in November should have dealt with a fait accompli”, the Hariri source stressed, adding that Washington put a gun to al-Maliki’s head when he was invited to the White House.
  • “Certain circles in Washington put a hell of a lot of pressure on Obama to put a gun to al-Maliki’s head”, said the Hariri source, adding that “time was running out and Obama was hesitant”. Asked what he meant with “time was running out” and if he could specify who it was that pushed Obama, he said: “Barzani was losing his grip in the North (Kurdish Iraq); the election [in September] was a setback. All plans for distributing Iraqi oil via Turkey and for sidelining Baghdad were set between Kirkuk and Ankara in early November… “Who exactly pressured Obama? I don’t know who delivered the message to Obama. I suspect Kerry had a word. It’s more important from where the message came, Kissinger, Scowcroft, Nuland and the Keagan clan, Stavridis, Petreaus, Riccardione, and the neo-con crowd at the [Atlantic] Council. … As far as I know ´someone` told Obama that he’d better pressure al-Maliki to go along with Kurdish autonomy by November or else. Who exactly ´advised` Obama is not as important as the fact that those people let him know that they would go ahead, with, or without him”.
  • Asked whether he knew details, how the final green light for the ISIS campaign was given, he said: ” Behind closed doors, in the presence of both Scowcroft, Hariri, and a couple of other people”. To my question “if he could be more specific” he replied “I could; I want to stay alive you know; Riccardione was tasked with the operation that day”. Noting that a prominent member of Saudi Arabia’s royal family, Prince Abdul Rachman al-Faisal has been named as the one being “in command” of the ISIS brigades, and if he could either confirm or deny, he nodded, adding that “the Prince” is responsible for financing the operation and for part of the command structure, but that the operations headquarter is the U.S. Embassy in Ankara Turkey. “As far as I know, nothing moves without Ambassador Riccardione”, he added.
  • The green light for the use of ISIS brigades to carve up Iraq, widen the Syria conflict into a greater Middle East war and to throw Iran off-balance was given behind closed doors at the Atlantic Council meeting in Turkey, in November 2013, told a source close to Saudi – Lebanese billionaire Saad Hariri, adding that the U.S. Embassy in Ankara is the operation’s headquarter.
  •  
    From June 2014, an important one I forgot to bookmark before. 
Paul Merrell

Belgium sues Facebook over illegal Privacy Violations of Users and Non-Users | nsnbc in... - 0 views

  • The Belgian government will be suing Facebook. The Commission for the Protection of Privacy states that Facebook violates Belgian and EU law by tracking systems that target both Facebook users as well as non-Facebook users. Facebook is known for cooperating with the U.S.’ National Security Agency. 
  • The Belgian privacy watchdog’s case against the internet giant Facebook will be heard at a court in Brussels on Thursday. The Commission has repeatedly requested that Facebook should comply with Belgian and EU law. Facebook failed to comply, and the Commission has no power to enforce the law; hence the decision to sue Facebook to attain a a court ruling. The President of the Commission for the Protection of Privacy, Willem Debeuckelaere, told the press that: “Facebook treats its users’ private lives without respect and that needs tackling. It’s not because we want to start a lawsuit over this, but we cannot continue to negotiate through other means. .. We want a judge to impose our recommendations. These recommendations are chiefly aimed at protecting internet users who are not Facebook members.”
  • The Belgian privacy watchdog alleges that Facebook tracks the web browsing of all visitors, including those who have specifically turned the tracking function off; This gathering of private information allegedly also includes those who do not have a Facebook account. Moreover, the Commission claims that Facebook has the capability to surveil computers without consent, even when users are logged out; and Facebook can monitor every PC of users that use websites with Facebook plugins. The capability to monitor both Facebook users and non-Facebook users allegedly functions via Cookies that store information about user’s internet activities, including preferential settings of websites and which websites internet users have visited. The Commission claims that Facebook installs these Cookies on all computers that visit websites that for example have a Facebook plugin to share internet content. That includes the computers of persons who do not make use of Facebook’s “share” or “like” button.
  • ...1 more annotation...
  • In other words, Facebook has the capacity to monitor your browser settings as well as which websites you have visited if you have read this article or any other article on any website that contains a Facebook “share” button, whether you “like” it or not. The Commissions lawsuit against Facebook is or particular importance due to the fact that the corporation is known for its cooperation with the United States’ National Security Agency (NSA). While the lawsuit is of particular interest for Belgian and EU citizens, it also sheds light on Facebook’s monitoring of U.S. citizens.
Paul Merrell

WA State Bill Proposes Criminalizing Help to NSA, Turning Off Resources to Yakima Facil... - 0 views

  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • Lawmakers in Oklahoma, California and Indiana have already introduced similar legislation, and a senator in Arizona has committed to running it there, but Washington counts as the first state with an actual NSA facility within its borders to consider the Fourth Amendment Protection Act. The NSA operates a listening center on the Army’s Yakima Training Center (YTC). The NSA facility is in Taylor’s district, and he said he cannot sit idly by while a secretive facility in his own backyard violate the rights of people everywhere. “We’re running the bill to provide protection against the ever increasing surveillance into the daily lives of our citizens,” he said. “Our Founding Fathers established a series of checks and balances in the Constitution. Given the federal government’s utter failure to address the people’s concerns, it’s up to the states to stand for our citizens’ constitutional rights.”
  • ...3 more annotations...
  • According to documents made public by the US Military, as of 2008, a company called PacifiCorp serves as the primary supplier of electric power, and Cascade Natural Gas Corporation supplies natural gas to YTC. The Kittitas Public Utility District, a function of the state of Washington, provides electric power for the MPRC and the Doris site, but no documentation has yet proven that it also provides electricity used directly by the NSA facility on site. And while YTC does provide a bulk of its own water, documents also show that some of it gets there by first passing through upstream dams owned and operated by the State. The Army report states, “YTC lies within three WAUs whose boundaries coincide with WRIAs, as defined by the State of Washington natural resource agencies.” WAU’s are Washington State Water Administration Units. WRIAs are Washington State Water Resource Inventory Areas A Washington company also has a strong link to the NSA. Cray Inc. builds supercomputers for the agency.
  • If the bill passes, it would set in motion actions to stop any state support of the Yakima center as long as it remains in the state, and could make Cray ineligible for any contracts with the state or its political subdivisions. Three public universities in Washington join 166 schools nationwide partnering with the NSA. Taylor’s bill would address these schools’ status as NSA “Centers of Academic Excellence,” and would bar any new partnerships with other state colleges or universities. Tenth Amendment Center national communications director Mike Maharrey says the bills prohibition against using unconstitutionally gathered data in state court would probably have the most immediate impact. In fact, lawmakers in Kansas and Missouri will consider bills simply addressing this kind of data sharing.
  • “We know the NSA shares data with state and local law enforcement. We know from a Reuters report that most of this shared data has absolutely nothing to do with national security issues. This bill would make that information inadmissible in state court,” he said. “This data sharing shoves a dagger into the heart of the Fourth Amendment. This bill would stop that from happening. This is a no-brainer. Every state should do it.” Maharrey said he expects at least three more states to introduce the act within the next few weeks. “This idea is catching fire,” he said. “And why wouldn’t it? We have an out of control agency spying on virtually everybody in the world. We have a president and a Congress that appears poised to maybe put a band aid on it. Americans are realizing if we are going to slow down the NSA, we are going to have to take a different approach. This is it.”
Paul Merrell

Snowden document shows Canada set up spy posts for NSA - Politics - CBC News - 0 views

  • A top secret document retrieved by American whistleblower Edward Snowden reveals Canada has set up covert spying posts around the world and conducted espionage against trading partners at the request of the U.S. National Security Agency. The leaked NSA document being reported exclusively by CBC News reveals Canada is involved with the huge American intelligence agency in clandestine surveillance activities in “approximately 20 high-priority countries."
  • Sections of the document with the highest classification make it clear in some instances why American spymasters are particularly keen about enlisting their Canadian counterparts, the Communications Security Establishment Canada. "CSEC shares with the NSA their unique geographic access to areas unavailable to the U.S," the document says. The briefing paper describes a "close co-operative relationship" between the NSA and its Canadian counterpart, the Communications Security Establishment Canada, or CSEC — a relationship "both sides would like to see expanded and strengthened. "The intelligence exchange with CSEC covers worldwide national and transnational targets."
  • The briefing notes make it clear that Canada plays a very robust role in intelligence-gathering around the world in a way that has won respect from its American equivalents.
  • ...5 more annotations...
  • The intimate Canada-U.S. electronic intelligence relationship dates back more than 60 years. Most recently, another Snowden document reported by CBC News showed the two agencies co-operated to allow the NSA to spy on the G20 summit of international leaders in Toronto in 2010. But what the latest secret document reveals for the first time is just how expansive Canada's international espionage activities have become.
  • The NSA document depicts CSEC as a sophisticated, capable and highly respected intelligence partner involved in all manner of joint spying missions, including setting up listening posts at the request of the Americans. "CSEC offers resources for advanced collection, processing and analysis, and has opened covert sites at the request of NSA," the document states.
  • Aside from compromising the actual intelligence operation, Wark says, an exposed spy mission can imperil Canada's other diplomatic operations — "the political contacts, the trade contacts, the generation of goodwill between the countries and any sense of co-operation." Wark says if a country feels targeted by a Canadian embassy, it can put everyone working there under a cloud of suspicion: “Are they really diplomats or are they spies?” As a result of those risks, Wark says, approval for CSEC to establish a covert spying post at the request of the NSA would have to come from the ministerial level of the Canadian government — or even from the prime minister himself.
  • Canada and the U.S. have long shared security intelligence with sister agencies in the U.K., Australia and New Zealand – the so-called "Five Eyes" partnership. But the latest secret Snowden missive shows CSEC and the NSA becoming physically intertwined. "Co-operative efforts include the exchange of liaison officers and integrees," the document reveals, a reference to CSEC operatives working inside the NSA, and vice-versa. It notes the NSA also supplies much of the computer hardware and software CSEC uses for encryption, decoding and other state-of-the-art essentials of electronic spying needed for "collection, processing and analytic efforts."
  • CSEC employs about 2,000 people, has an annual budget of roughly $450 million and will soon move into an architecturally spectacular new Ottawa headquarters costing Canadian taxpayers almost $1.2 billion. By comparison, the NSA employs an estimated 40,000 people plus thousands of private contractors, and spends over $40 billion a year NSA whistleblower Drake says the problem is that both CSEC and the NSA lack proper oversight, and without it, they have morphed into runaway surveillance. "There is a clear and compelling danger to democracy in Canada by virtue of how far these secret surveillance operations have gone."
  •  
    "'Co-operative efforts include the exchange of liaison officers and integrees,'the document reveals, a reference to CSEC operatives working inside the NSA, and vice-versa." And that fact raises potential U.S. Privacy Act issues. Under the Privacy Act, all U.S. agencies are prohibited from sharing information containing personal identifiers of U.S. citizens with any foreign government and requires that agencies make full disclosure to all persons  whose rights are thus violated. The Act also creates a cause of action for redress by the federal courts, with a minimum $1,500 damages plus attorney's fees and litigation expenses. Note that the other NSA documents show that NSA is sharing U.S. citizens' information that includes personal identifiers with Israeli intelligence. The NSA has been by another statute excused from compliance with some portions of the Privacy Act but not those discussed above.
Paul Merrell

Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data | World news ... - 0 views

  • The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents.The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect
  • Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes.Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools – such as cable taps, or from international mobile networks – rather than solely from hacking into individual mobile handsets. Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies' collection efforts.
  • Depending on what profile information a user had supplied, the documents suggested, the agency would be able to collect almost every key detail of a user's life: including home country, current location (through geolocation), age, gender, zip code, marital status – options included "single", "married", "divorced", "swinger" and more – income, ethnicity, sexual orientation, education level, and number of children.The agencies also made use of their mobile interception capabilities to collect location information in bulk, from Google and other mapping apps. One basic effort by GCHQ and the NSA was to build a database geolocating every mobile phone mast in the world – meaning that just by taking tower ID from a handset, location information could be gleaned.A more sophisticated effort, though, relied on intercepting Google Maps queries made on smartphones, and using them to collect large volumes of location information.So successful was this effort that one 2008 document noted that "[i]t effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system."
  • ...3 more annotations...
  • One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled "Golden Nugget!" – sets out the agency's "perfect scenario": "Target uploading photo to a social media site taken with a mobile device. What can we get?"The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a "possible image", email selector, phone, buddy lists, and "a host of other social working data as well as location".
  • The latest disclosures could also add to mounting public concern about how the technology sector collects and uses information, especially for those outside the US, who enjoy fewer privacy protections than Americans. A January poll for the Washington Post showed 69% of US adults were already concerned about how tech companies such as Google used and stored their information.The documents do not make it clear how much of the information that can be taken from apps is routinely collected, stored or searched, nor how many users may be affected. The NSA says it does not target Americans and its capabilities are deployed only against "valid foreign intelligence targets".The documents do set out in great detail exactly how much information can be collected from widely popular apps. One document held on GCHQ's internal Wikipedia-style guide for staff details what can be collected from different apps. Though it uses Android apps for most of its examples, it suggests much of the same data could be taken from equivalent apps on iPhone or other platforms.The GCHQ documents set out examples of what information can be extracted from different ad platforms, using perhaps the most popular mobile phone game of all time, Angry Birds – which has reportedly been downloaded more than 1.7bn times – as a case study.
  • Other apps choose to transmit much more data, meaning the agency could potentially net far more. One mobile ad platform, Millennial Media, appeared to offer particularly rich information. Millennial Media's website states it has partnered with Rovio on a special edition of Angry Birds; with Farmville maker Zynga; with Call of Duty developer Activision, and many other major franchises.
  •  
    Don't miss the linked companion articles at New York Times and ProPublica. 
Paul Merrell

House Intelligence Bill Fumbled Transparency - Federation Of American Scientists - 0 views

  • Intelligence community whistleblowers would have been able to submit their complaints to the Privacy and Civil Liberties Oversight Board (PCLOB) under a proposed amendment to the intelligence authorization act that was offered last week by Rep. Tulsi Gabbard (D-HI). This could have been an elegant solution to the whistleblowing conundrum posed by Edward Snowden. It made little sense for Snowden to bring his concerns about bulk collection of American phone records to the congressional intelligence committees, considering that they had already secretly embraced the practice. The PCLOB, by contrast, has staked out a position as an independent critical voice on intelligence policy. (And it has an unblemished record for protecting classified information.) The Board’s January 2014 report argued cogently and at length that the Section 215 bulk collection program was likely unlawful as well as ineffective. In short, the PCLOB seemed like a perfect fit for any potential whistleblower who might have concerns about the legality or propriety of current intelligence programs from a privacy or civil liberties perspective.
  • But when Rep. Gabbard offered her amendment to the intelligence authorization act last week, it was not voted down– it was blocked. The House Rules Committee declared that the amendment was “out of order” and could not be brought to a vote on the House floor. Several other amendments on transparency issues met a similar fate. These included a measure proposed by Rep. Adam Schiff to require reporting on casualties resulting from targeted killing operations, a proposal to disclose intelligence spending at the individual agency level, and another to require disclosure of the number of U.S. persons whose communications had been collected under FISA, among others. In dismay at this outcome, Rep. Rush Holt (D-NJ) and I lamented the “staggering failure of oversight” in a May 30 op-ed. See The House Committee on Intelligence Needs Oversight of Its Own, MSNBC.
  • The House did approve an amendment offered by Rep. John Carney (D-DE) to require the Director of National Intelligence “to issue a report to Congress on how to improve the declassification process across the intelligence community.” While the DNI’s views on the subject may indeed be of interest, the amendment failed to specify the problem it intended to address (erroneous classification standards? excessive backlogs? something else?), and so it is unclear exactly what is to be improved.
  • ...1 more annotation...
  • However, a more focused classification reform program may be in the works. Rep. Bennie Thompson (D-MS), the ranking member of the House Homeland Security Committee, said that he would introduce “a comprehensive security clearance reform bill” that would also address the need to shrink the national security classification system. The Thompson bill, which is to be introduced “in the coming weeks,” would “greatly expand the resources and responsibilities of the Public Interest Declassification Board,” Rep. Thompson said during the House floor debate on the intelligence bill on May 30. “A well-resourced and robust Board is essential to increasing accountability of the intelligence community,” he said.
  •  
    I don't agree that whistleblowers need a secret system for their complaints. Secrecy is the problem, not the solution.In a supposedly democratic republic, every bit of government secrecy runs directly contrary to the citizen's right to be know what their government is up to.  All of the NSA reform measures in Congress share a fundamental flaw: they focus on what the NSA is allowed to do in secret. Any sane legislative approach would begin by identifying and clarifying what digital privacy rights citizens have and the obligation of government agencies and the private sector to report violations to their victims. Then one can proceed to examine how intelligence agencies might function within those parameters.  But the approach in Congress has been a catfight over "NSA reform" with secrecy accepted as the norm and without consideration of citizens' privacy rights, not even their Constitutional rights. But it is our privacy laws and their enforcement that needs attention, not directions to the Dark Government that is still allowed to remain in the dark. In other words, it is the public that should be informed of whistleblowers' revelations, not selected members of Congress, not secret courts, not some Privacy and Civil Liberties Oversight Board whose public reports are only summaries with all data they examine hid from view.  Bring that Dark Government into the sunlight and then real reform can happen but not before.
  •  
    +1 The Constitutional and Natural rights of citizens come first. The legality of the NSA activities as well as other gov ops follows. This is an excellent point you make Paul! I hope others take up the cross and realize what an important point you are making in your comment.
Paul Merrell

The Debt To GDP Ratio For The Entire World: 286 Percent Washington's Blog - 0 views

  • Did you know that there is more than $28,000 of debt for every man, woman and child on the entire planet?  And since close to 3 billion of those people survive on less than 2 dollars a day, your share of that debt is going to be much larger than that.  If we took everything that the global economy produced this year and everything that the global economy produced next year and used it to pay all of this debt, it still would not be enough.  According to a recent report put out by the McKinsey Global Institute entitled “Debt and (not much) deleveraging“, the total amount of debt on our planet has grown from 142 trillion dollars at the end of 2007 to 199 trillion dollars today.  This is the largest mountain of debt in the history of the world, and those numbers mean that we are in substantially worse condition than we were just prior to the last financial crisis.
  • When it comes to debt, a lot of fingers get pointed at the United States, and rightly so.  Just prior to the last recession, the U.S. national debt was sitting at about 9 trillion dollars.  Today, it has crossed the 18 trillion dollar mark.  But of course the U.S. is not the only one that is guilty.  In fact, the McKinsey Global Institute says that debt levels have grown in all major economies since 2007.  The following is an excerpt from the report… Seven years after the bursting of a global credit bubble resulted in the worst financial crisis since the Great Depression, debt continues to grow. In fact, rather than reducing indebtedness, or deleveraging, all major economies today have higher levels of borrowing relative to GDP than they did in 2007. Global debt in these years has grown by $57 trillion, raising the ratio of debt to GDP by 17 percentage points (Exhibit 1). That poses new risks to financial stability and may undermine global economic growth. What is surprising is that debt has actually grown the most in China.  If you can believe it, total Chinese debt has grown from 7 trillion dollars in 2007 to 28 trillion dollars today.  Needless to say, that is absolutely insane…
  • What all of this means is that our long-term global economic problems have gotten much, much worse.  This short-lived period of relative stability that we have been enjoying has been fueled by unprecedented amounts of debt and voracious money printing.  Anyone with half a brain should be able to see that this is a giant financial bubble, and in the end it is going to unwind very, very painfully.  The following comes from a Canadian news source… At the beginning of 2008, government accounted for a smaller portion of the debt pie than corporate, household or financial debt. It now exceeds each of those other categories. “The current situation is much worse than in 2000 or 2007, and with interest rates near or at zero, the central banks have already used up their ammunition. Plus, the total indebtedness, especially the indebtedness of governments, is much higher than ever before,” said Claus Vogt, a Berlin-based analyst and co-author of a 2011 book titled The Global Debt Trap.
  • ...3 more annotations...
  • “Every speculative bubble rests on some kind of a fairy tale, a story the bubble participants believe in and use as rationalization to buy extremely overvalued stocks or bonds or real estate,” Mr. Vogt argued. “And now it is the faith in the central-planning capabilities of global central bankers. When the loss of confidence in the Fed, the ECB etc. begins, the stampede out of stocks and bonds will start. I think we are very close to this pivotal moment in financial history.” But for the moment, the ridiculous stock market bubble continues.
  • Internet companies that didn’t even exist a decade ago are now supposedly worth billions upon billions of dollars even though some of them don’t make any money at all.  There is even a name for this phenomenon.  Internet companies that have gigantic valuations without gigantic revenue streams are being called “unicorns”… A dizzying mix of bold ideas and lavish investments has catapulted dozens of privately held start-ups to unicorn status, defined as having market valuations of at least $1 billion often without soaring revenues to match. Social-sharing site Pinterest has soared to $11 billion. Ride-hailing company Uber is now worth a staggering $50 billion. How long can the party last?
  • Sadly, the truth is that Wall Street is headed for a very painful awakening. What we are experiencing right now is the greatest financial bubble of all time. What comes after that is going to be the greatest financial crash of all time. 199,000,000,000,000 dollars of debt is about to come crashing down, and the pain of this disaster will be felt by every man, woman and child on the entire planet.
Paul Merrell

Leaked Emails ot Save the Children confirms Pakistan full of CIA agents!! - 0 views

  • Here are the emails. An article written by Umar Cheema is also on the Web, will post link once I am on my laptop. http://cirp.pk/e-mail.htm (edit: although some names have been blacked out, you can still view them by taking mouse over the links! e.g. First email is by Hassan Noor.. to Mike Novell, tkrift (??), Amanullah Khan.. CC is Afnan Aleem) These basically proves that everyone in the Abbotabad commission (except Mr Ashraf Qazi), including a very senior judge and general, were working under the influence of Save The Children NGO Retired General Nadeem was directly working under them! Afridi was NOT tortured by ISI. He did give ISI some false statements which the ISI didn't dig deeper because it suited them! (Example he was working for CIA since 2008, not 2009 as ISI was led to believe) Edit: Here is the article: http://www.thenews.com.pk/Todays-Ne...s-Abbottabad-Commission-was-penetrated-by-CIA -- All these NGOs should be banned and thrashed! ISI should publically hang foreign agents! (Even if they are Generals)
  • The NGO has neither denied the email record and the contents it carried (when shown by The News for seeking version) nor offered specific comments but that: “Our assistance to the Abbottabad Commission and its members including Gen Nadeem was within the legal parameters and Abbottabad Commission mandate to find facts.” Nadeem was not available for comments, however, his close aide termed the allegations as utterly “rubbish and non-sense” when comments were sought after showing the email record A transcript of internal wrangling: Muhammad Hassan Noor Saadi, deputy country director of Save the Children, met Gen (R) Nadeem on November 20, 2012 that followed his email to four senior colleagues. The report was primarily compiled by ‘our friend’, his email reads, and was endorsed by the Chairman but one of the members, Ashraf Qazi, was not in agreement with them. He wrote a dissenting note criticising Chairman Justice (R) Javed Iqbal and Gen (R) Nadeem ‘for being soft on certain institutions (including Save the Children).’
  • Another member, Abbas Khan, was neither willing to sign the report in its current shape, discloses email record, nor wanted to put a dissenting note hence decided to prolong his stay in the US where he went on the ‘pretext of medical ground’. More alarmingly, the NGO was granted access to the Commission’s report well before it was sent to the prime minister. Save the Children had uninterrupted access to the four drafts prepared in June 2012 by the members including the chairman, email record available with The News indicates. All favours granted to Save the Children on behalf of the Commission were in clear breach of public trust raising question marks about the integrity of the members. The chairman of the NGO, Save the Children, was contacted by The News. He initially agreed to meet but later stopped taking calls and did not respond to messages sent to him.Nadeem also felt confident, the email record shows, that he would be able to convince the panel with the answers given by the NGO and urge his colleagues to go by the facts presented by Save the Children instead of believing on the contents of Afridi’s statement. Gen (R) Nadeem also advised the NGO, an email of the country director reads, to fight the expulsion of our expatriate as otherwise the ISI would move quickly to close down the country programme before the Commission report comes out.
  • ...3 more annotations...
  • Record shows Abbottabad Commission was penetrated by CIA​ Umar Cheema Friday, August 02, 2013 From Print Edition ISLAMABAD: A mind-blowing detail has emerged from the internal correspondence of NGO Save the Children disclosing its infiltration into the Abbottabad Commission to save its skin following allegations of the CIA’s penetration into the NGO in a hunt for Osama bin Laden through Dr Shakil Afridi, now under arrest in Peshawar. “Some of us suspected that the khakis had access to the record and receive daily updates but never realised an NGO had infiltrated too,” said an official privy to the Commission’s working. The leaked communication indicates that Lt Gen (retd) Nadeem Ahmed, an unofficial representative of the Army and ISI in the Commission, was allegedly cultivated by Save the Children who would offer him ‘how-to-do’ bailout advice, even sharing details about the internal politics of the Commission and classified record, something in radical contradiction to his reputation as a thorough professional and a man of integrity. He briefed the deputy country director of Save the Children, according to the email, about the views of different members, staunch opposition from a panel colleague, Ashraf Jehangir Qazi, resulting in his dissenting note on the NGO and other institutions, and Gen (retd) Nadeem’s plan to effectively counter this note in collaboration with Justice (R) Javed Iqbal, the Chairman.
  • The Commission could not issue the report with that note and therefore now they are working on developing counter arguments on the note, read the email. The Commission needs to have a lot of comments removed from the note before it is in a shape that allows the report to be shared, the email continues, otherwise it can jeopardize the integrity of the members of the Commission. Justice (R) Javed Iqbal and Gen (R) Nadeem ‘have to work extra hard to factually prove a lot of things wrong that this third member is referring to,’ read the email of deputy country director. The email then explained the position of the fourth member, Abbas Ali Khan, absent from discussion. He is not willing to sign the report in the current shape, reads Hassan’s email, but also does not want to put in a note of dissent and therefore continues to prolong his stay in the US where he went on the pretext of treatment. As a way forward, the email continues, the two members will work with the third member (Ashraf Qazi) and try to come to a point where the note is significantly reduced and numbers of comments are taken out of the report. Gen (R) Nadeem’s advisory role of the NGO: The email also brings to light his role as adviser to the NGO. To a question that what Save the Children should do, Nadeem advised the deputy country director to build relationship and confidence with the Ministry of Interior and Economic Affairs Division. “It would take few months for you to be back to complete normalcy,” Gen (R) Nadeem advised.
  • In another email generated on August 29, 2012, David Wright, the country director, wrote that ‘on my instructions Hassan asked Gen (R) Nadeem to give an honest assessment as to what he thinks our chances are of surviving this.’ Gen (R) Nadeem replied that he felt confident regarding the answers we (NGO) will give to the questions proposed, ‘he could convince the other commission members to go with the fact rather than the content of Afridi’s statement.’ Gen (R) Nadeem also advised to fight the expulsion of our expatriates, Wrights email continued. “He felt if we did not do this and the expats left, the ISI would then move quickly to close down the country programme before the Commission report comes out.” Report draft shared with the NGO: Wright’s another email indicates that the draft was shared more than once with the NGO. Referring to a meeting of two senior officers of Save the Children with Gen (R) Nadeem, the country director said they were shown the report written by the Chairman of the Commission. The email said there were four versions of the report in June 2012 and these were reduced to two in August that year. However, they have reservations about the latest version shared in August as ‘the report which was originally thought to be our saviour, will be the tool for this expulsion.’ We will do our best, the email reads, to work ‘with our friends and try and get our responses in before the report is finalised.’ SOURCE: THE NEWS Record shows Abbottabad Commission was penetrated by CIA - thenews.com.pk
Paul Merrell

Freedom for Saif al-Islam Gaddafi! Freedom for Libya! - nsnbc international | nsnbc int... - 0 views

  • The news that Saif al-Islam Gaddafi, the son of the assassinated leader of the Libyan Arab Jamahiriya Muammar Gaddafi, has been released from captivity is one of the most significant developments in Libya in some time. For while the Western corporate media would like people to believe that the Gaddafi name is dead and buried, the fact remains that Saif al-Islam Gaddafi, and the surviving members of the Gaddafi family, are seen as heroes by many in Libya. Moreover, Saif’s release has the potential to transform the political situation in the country.
  • Although details are few and far between, what we do know is that according to his lawyer at the International Criminal Court (ICC), Saif Gaddafi “was given his liberty on April 12, 2016.” Indeed official documents (which remain unverified) seem to support the assertion that Saif has, in fact, been released. Considering the statements from his attorneys that Saif is “well and safe and in Libya,” the political ramifications of this development should not be underestimated. Not only is Saif Gaddafi the second eldest and most prominent of Col. Gaddafi’s sons, he is also the one seen as the inheritor of his father’s legacy of independent peaceful development and the maintenance of the Libyan Arab Jamahiriya. This last point is of critical importance as his release is a clear signal to many Libyans that the resistance to the NATO-imposed chaos and war is alive and well. And while there have been isolated upsurges of pro-Gaddafi sentiments at various times in the last five years, they mostly remained underground. Perhaps it might soon be time for the resistance to once again become united as it moves to drive out the terrorists and opportunists who have torn the jewel of Africa apart these last five years.
  • It is against this dizzying political backdrop that one must examine the significance of a potential return for Saif al-Islam Gaddafi. Saif remains a hero to many Libyans who see in him the inheritor of the independent spirit of his father, a man whose education and erudition, and most importantly wartime experience, make him a natural leader. It should be remembered that Saif was the main advocate of the rapprochement between Libya and the West in the early 2000s, spearheading the campaign for Libya’s disarmament of its nuclear and long-range ballistic missiles program. However, by 2011 and the US-NATO illegal war on Libya, Saif had changed his tune, regretting terribly his having taken western leaders at their word. In a now infamous interview with RT conducted in the midst of the NATO war, Saif stated: “Many countries, Iran and North Korea are among them, told us it was our mistake to give up, to have stopped developing long-range missiles and to become friendly with the West. Our example means one should never trust the West and should always be on alert – for them it is fine to change their mind overnight and start bombing Libya…One of our biggest mistakes was that we delayed buying new weapons, especially from Russia, and delayed building a strong army. We thought Europeans were our friends; our mistake was to be tolerant with our enemies.”
  • ...2 more annotations...
  • And today, nearly five years later, Saif remains the chosen son of the Libyan Arab Jamahiriya – a man who has endured five years of confinement at the hands of his one-time enemies, who has remained defiant of the US and of its puppet institutions such as the International Criminal Court. His is the man who for so many represents the promise of a better future by symbolizing a better past. And this is why factions inside Libya, and their backers in the US and Europe, are terrified of Saif al-Islam Gaddafi; they understand perfectly what he represents. They know that Saif commands the loyalty and respect of the majority of Libyans, far more than any other single faction. They know that Saif is backed by the most influential tribes in the country, as well as what remains of the Green Resistance which has emerged at key moments in the last few years, including the brief takeover of a critical air base in the southern city of Sabha in January 2014. They know that Saif is the only individual leader left in Libya who can unite the disparate political formations into a single force prepared to finally defeat the jihadist elements backed by the US-NATO. But the fear of Saif runs even deeper than just the theoretical leadership that he represents. Rather, the powers that be fear the political force he already is. When Saif’s death sentence was handed down by a kangaroo court in Tripoli, supporters of Gaddafi (Qadafi – Qaddafi edt) ) and the Jamhiriya took to the streets in Benghazi, Sirte, Bani Walid, and a number of other cities across the country, despite ISIS and Al Qaeda terrorists in control of much of those cities. At the risk of their own lives, these Libyans carried portraits of the assassinated Col. Gaddafi and Saif al-Islam, chanting their names and calling for a restoration of the socialist government. Consider the devotion necessary for followers to risk life and limb in a show of political support. Now imagine what would happen with Saif free.
  • Sources in Libya, and among those who have fled to neighboring countries, as well as Europe, have noted that elements of the former Gaddafi government have been working closely with the Sisi government in Egypt. While it is difficult to confirm independently, such a move is entirely plausible considering the common jihadi enemy both face in Libya which shares a long, porous border with Egypt. Assuming that the collaboration is true, it presents yet another reason why the US and its proxies, to say nothing of the terror groups inside Libya, would greatly fear Saif’s freedom. With the backing of an assertive Egypt, the all-important tribal councils, and elements of the disparate factions on the ground, Saif would instantly become the single most powerful man in Libya. And for those in the West, it is incumbent on everyone to vigorously and publicly defend Saif al-Islam Gaddafi, and to redouble efforts to back him. Saif represents a chance for Libya to be rebuilt, for the country to be pulled from the morass of chaos manufactured by the US and its NATO partners. Saif is the hope of the Libyan people who have suffered unspeakable horrors these last five years. Even those who have no love lost for Gaddafi understand the importance of reconstituting a single, united Libya under a single, united government. Only Saif al-Islam Gaddafi can do that now. And that’s why freedom for Saif might one day mean freedom for Libya.
Paul Merrell

Making America Mediocre Again « LobeLog - 0 views

  • The first signs of decline are physical. Citizens don’t grow as tall. They don’t live as long. They start killing each other in large numbers. Sounds like the post-mortem for a society that disappeared long ago, a conclusion that archaeologists deliver after sifting through bone fragments and pottery shards. Why, the puzzled scholars ask, did such a vibrant society, which produced beautiful art and remarkable scientific advances, fall apart so rapidly and leave so little behind in the unforgiving rainforest? This time, however, the diagnosis is being provided in real time. And the society in decline is the most powerful country in the world. According to the most recent global health surveys, the United States is witnessing a decline in life expectancy for the first time in nearly a quarter century. America is also the first high-income country to see its adults, on average, no longer growing taller. Writes Lenny Bernstein in The Washington Post: The reasons for the United States’ lag are well known. It has the highest infant and maternal mortality rates of any of the countries in the study, and the highest obesity rate. It is the only one without universal health insurance coverage and has the “largest share of unmet health-care needs due to financial costs,” the researchers wrote. I’d like to pin this one on Donald Trump. But U.S. decline has been ongoing for some time.
  • For instance, the United States ranked 16th in the 2014 Social Progress Index developed by Michael Porter at the Harvard Business School. Two years later, the United States slipped to 19th place, with particularly mediocre scores in environmental quality (#36), nutrition and basic medical care (#37), and access to basic knowledge (#40). Let’s compare that to Canada, which sat near the top of the rankings at number two in the SPI. Canada was a little better on environmental quality (#32), quite a bit better on basic medical care (#26), and a whole lot better on access to basic knowledge (#2). Even though Trump can’t be blamed for these mediocre social indicators, his party’s steadfast opposition to spending on social welfare and the environment certainly contributed to the problem. And Trump’s promise to “replace” Obamacare, cut social spending even further, and roll back regulatory oversight — all while boosting the Pentagon budget by an extraordinary 10 percent — will send the United States into free fall. The violent crime rate, which dropped nearly in half over the last 20 years despite what Trump claims, may well start to edge up as our pro-gun president makes firearms even more widely available and the economy takes a turn for the worse.
  • Predictions of the eclipse of American power have been around since Donald Trump was a 30-something playboy. It’s not just the overall health of the population and the toxicity of the environment. The United States has been hobbled by an enormous federal debt, an overextended global military presence, our failing infrastructure, and a paralyzed political system. It’s no wonder that so many Americans were sufficiently fed up in November to vote for anyone who promised to shake up the status quo.
« First ‹ Previous 41 - 60 of 251 Next › Last »
Showing 20 items per page