Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged target-shift

Rss Feed Group items tagged

Paul Merrell

Inside TAO: The NSA's Shadow Network - SPIEGEL ONLINE - 0 views

  • The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of "covert" routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with "implants" that then allow the government hackers to control the computers remotely. (Click here to read a related article on the NSA's "implants".) In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person's computer. Of course, a cookie doesn't automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint.
  • Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID. This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer. The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: "Wait for client to initiate new connection," "Shoot!" and "Hope to beat server-to-client response." Like any competition, at times the covert network's surveillance tools are "too slow to win the race." Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document.
  • At the same time, it is in no way true to say that the NSA has its sights set exclusively on select individuals. Of even greater interest are entire networks and network providers, such as the fiber optic cables that direct a large share of global Internet traffic along the world's ocean floors. One document labeled "top secret" and "not for foreigners" describes the NSA's success in spying on the "SEA-ME-WE-4" cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle. The document proudly announces that, on Feb. 13, 2013, TAO "successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4)." With the help of a "website masquerade operation," the agency was able to "gain access to the consortium's management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network."
  • ...3 more annotations...
  • It appears the government hackers succeeded here once again using the QUANTUMINSERT method. The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure. But that was only the first step. "More operations are planned in the future to collect more information about this and other cable systems," it continues. But numerous internal announcements of successful attacks like the one against the undersea cable operator aren't the exclusive factors that make TAO stand out at the NSA. In contrast to most NSA operations, TAO's ventures often require physical access to their targets. After all, you might have to directly access a mobile network transmission station before you can begin tapping the digital information it provides.
  • To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour's work.
  • Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors. Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer. These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world."
  •  
    From page 3 of a 3-page article. The entire article is well worth reading. I chose this page to bookmark because of its disclosure that NSA is intercepting new computers before they are delivered and installing hardware and software backdoors, then reshipping them to their intended recipients. Although not mentioned, this implies the complicity of package shipment companies and conceivably government mail systems and original equipment manufacturers ("OEMs").  
Paul Merrell

NSA uses Google cookies to pinpoint targets for hacking - 0 views

  • The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using "cookies" and location data to pinpoint targets for government hacking and to bolster surveillance. The agency's internal presentation slides, provided by former NSA contractor Edward Snowden, show that when companies follow consumers on the Internet to better serve them advertising, the technique opens the door for similar tracking by the government. The slides also suggest that the agency is using these tracking techniques to help identify targets for offensive hacking operations. For years, privacy advocates have raised concerns about the use of commercial tracking tools to identify and target consumers with advertisements. The online ad industry has said its practices are innocuous and benefit consumers by serving them ads that are more likely to be of interest to them. The revelation that the NSA is piggybacking on these commercial technologies could shift that debate, handing privacy advocates a new argument for reining in commercial surveillance.
  • According to the documents, the NSA and its British counterpart, GCHQ, are using the small tracking files or "cookies" that advertising networks place on computers to identify people browsing the Internet. The intelligence agencies have found particular use for a part of a Google-specific tracking mechanism known as the “PREF” cookie. These cookies typically don't contain personal information, such as someone's name or e-mail address, but they do contain numeric codes that enable Web sites to uniquely identify a person's browser. In addition to tracking Web visits, this cookie allows NSA to single out an individual's communications among the sea of Internet data in order to send out software that can hack that person's computer. The slides say the cookies are used to "enable remote exploitation," although the specific attacks used by the NSA against targets are not addressed in these documents.
  • These specific slides do not indicate how the NSA obtains Google PREF cookies or whether the company cooperates in these programs, but other documents reviewed by the Post indicate that cookie information is among the data NSA can obtain with a Foreign Intelligence Surveillance Act order. If the NSA gets the data that way, the companies know and are legally compelled to assist.
Paul Merrell

Israel Carries Out Two Strikes Against Assad Regime, Hezbollah Targets in Syria | FDD's... - 0 views

  • In the wake of threats by Israeli Defense Minister Avigdor Liberman, the Israel Air Force (IAF) carried out two strikes against Assad regime and Hezbollah targets in Syria on Sunday and early Monday morning. These latest airstrikes come only two days after an IAF raid on Hezbollah weapons shipments in Palmyra, and seemingly as a response to an attempt by the Syrian Air Defense Forces (SADF) to shoot down the attacking Israeli jets. At approximately 3 PM local time, pro-regime news sources reported that the SADF’s Golan Regiment was engaging an Israeli UAV over the town of Khan Arnabeh, in the Syrian Golan’s Quneitra Governorate. Shortly after, Syrian army reports emerged claiming the Israelis targeted a vehicle traveling from the town on the road to Damascus, destroying the car and killing its driver, Yasser Hussein al-Sayyed, a SADF Golan Regiment commander. The second air strike reportedly occurred past midnight on Monday morning, with local sources claiming the Israelis targeted Hezbollah and SADF targets in the Qalamoun mountains, near the Syrian-Lebanese border. However, pro-regime sources were quick to deny that the strikes had occurred. The strikes came mere hours after Liberman threatened to destroy Syria’s air defenses “without any hesitation” the next time they fired on Israeli planes. He stressed that Israel was “neither for nor against [Syrian president Bashar] al-Assad,” and had no desire for friction with the Russians in Syria. Israel’s “main problem” he said, “is the transfer of game-changing weapons from Syria to Lebanon,” which would reach Hezbollah. “Therefore, every time we identify a such a transfer, we will act to destroy these equilibrium-breaking weapons. There will be no compromise.” Liberman’s comments were echoed by IDF Chief of Staff Lt. Gen. Gadi Eizenkot, with similar threats against the government of Lebanon.
  • Liberman’s threats, reinforced by the two strikes, were a response to the outcomes of the IAF’s Friday attack on Palmyra. The SADF’s attempt to down Israeli jets was an unprecedented escalation by the Assad regime. For Israel, this was an unacceptable interference with its now-routine attempts to deny the transfer of advanced weapons to Hezbollah, threatening to change the rules of the game between Jerusalem and Damascus. The Russian Foreign Ministry demanding an explanation of the strike from Israel’s ambassador also indicated a possible shift in Moscow’s policies on Israeli offensives in Syria. These developments likely left Hezbollah and its Iranian patrons confident that their weapons transfers would now be safe from Israeli strikes, as indicated by Hassan Nasrallah’s subsequent belligerent speech and Tehran’s threats against continued IAF assaults in Syria. Israel’s red lines in Syria were blurred by these changes, and Jerusalem felt they needed to be forcefully redrawn.
  •  
    Israel's airstrikes in Syria are beyond question war crimes.
Paul Merrell

Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data | World news ... - 0 views

  • The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents.The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect
  • Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes.Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools – such as cable taps, or from international mobile networks – rather than solely from hacking into individual mobile handsets. Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies' collection efforts.
  • Depending on what profile information a user had supplied, the documents suggested, the agency would be able to collect almost every key detail of a user's life: including home country, current location (through geolocation), age, gender, zip code, marital status – options included "single", "married", "divorced", "swinger" and more – income, ethnicity, sexual orientation, education level, and number of children.The agencies also made use of their mobile interception capabilities to collect location information in bulk, from Google and other mapping apps. One basic effort by GCHQ and the NSA was to build a database geolocating every mobile phone mast in the world – meaning that just by taking tower ID from a handset, location information could be gleaned.A more sophisticated effort, though, relied on intercepting Google Maps queries made on smartphones, and using them to collect large volumes of location information.So successful was this effort that one 2008 document noted that "[i]t effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system."
  • ...3 more annotations...
  • One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled "Golden Nugget!" – sets out the agency's "perfect scenario": "Target uploading photo to a social media site taken with a mobile device. What can we get?"The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a "possible image", email selector, phone, buddy lists, and "a host of other social working data as well as location".
  • The latest disclosures could also add to mounting public concern about how the technology sector collects and uses information, especially for those outside the US, who enjoy fewer privacy protections than Americans. A January poll for the Washington Post showed 69% of US adults were already concerned about how tech companies such as Google used and stored their information.The documents do not make it clear how much of the information that can be taken from apps is routinely collected, stored or searched, nor how many users may be affected. The NSA says it does not target Americans and its capabilities are deployed only against "valid foreign intelligence targets".The documents do set out in great detail exactly how much information can be collected from widely popular apps. One document held on GCHQ's internal Wikipedia-style guide for staff details what can be collected from different apps. Though it uses Android apps for most of its examples, it suggests much of the same data could be taken from equivalent apps on iPhone or other platforms.The GCHQ documents set out examples of what information can be extracted from different ad platforms, using perhaps the most popular mobile phone game of all time, Angry Birds – which has reportedly been downloaded more than 1.7bn times – as a case study.
  • Other apps choose to transmit much more data, meaning the agency could potentially net far more. One mobile ad platform, Millennial Media, appeared to offer particularly rich information. Millennial Media's website states it has partnered with Rovio on a special edition of Angry Birds; with Farmville maker Zynga; with Call of Duty developer Activision, and many other major franchises.
  •  
    Don't miss the linked companion articles at New York Times and ProPublica. 
Gary Edwards

Judge Rules: Obama Social Security Card Fraud May Finally Get Answers | - 1 views

  • The reason for the judge’s amendment seems to be a procedural one. Taitz filed suit with the court prior to receiving word back from her Freedom of Information Act request, which she did receive on July 29, 2013 from Dawn S. Wiggins, a Fredom of Information Officer. Wiggins replied to Taitz: I have enclosed a copy of the SS-5s for Mr. Tsarnaev and Ms. Dunham. . . . We were unable to find any information for Mr. Bounel based on the information you provided to us. Mr. Bounel may not have applied for a Social Security number (SSN) or may have given different information on the application for a number.
  • The controversy over Barack Hussein Obama and his past, along with fraudulent documents continues to make headlines. Yet, the items needed to actually verify who Obama is continue to be kept from the public eye. Well, that all may be about to change. Attorney Orly Taitz may have just found a chink in the federal government’s armor in protecting Barack Obama from scrutiny, following a judge’s ruling over her Freedom of Information Act request from the Social Security Administration. Taitz has claimed that Obama uses the Social Security number of Harry Bounel and has submitted several Freedom of Information Act requests for the information from the Social Security Administration. Each time, she has been met with stonewalling by the Social Security Administration. However, Judge Ellen Lipton Hollander has ruled to give Taitz “an opportunity to file a second amended complaint and add allegations of SSA not doing a proper search and withholding records.”
  • Additionally, there is an increased tampering with the web site of Orly Taitz and with her ability to send mass -emails. It seems her private server is somehow affected and Taitz is unable to send mass e-mails on two different programs.
  • ...4 more annotations...
  • From Taitz’s Press Release: Judge Hollander in Maryland gives Attorney Orly Taitz 21 days to file a second amended complaint and add allegations in regards to an improper withholding by the Social Security Administration of records of Harry Bounel, whose Social security number is being illegally used by Barack Obama. When Taitz filed the complaint, SSA did not respond at all. After the law suit was filed, SSA responded by fraudulently claiming that the records were not found. Taitz responded that this is a fraudulent assertion, since the records were found before and denied to another petitioner due to privacy concerns, however Social Security has no right to claim privacy as according to their own 120 year rule they have a duty to release the records. The judge stated that the plaintiff Taitz might be correct, however at this time she cannot rule in her favor as her original complaint was filed before SSA responded, so the judge gave Taitz an opportunity to refile a second amended complaint and add new allegations, stating the SSA responded but improperly hidden the records . This is a great development. This all but assures that the judge will order the SSA to release the SS-5, Social Security application of resident of CT, Harrison (Harry) Bounel, whose CT SSN 042-68-4425 was stolen by Obama and used in Obama’s 2009 tax returns, which initially were posted on WhiteHouse.gov without proper redaction, without flattening of the file. Taitz will be very careful not to be Breitbarted or Fuddied in the next 21 days.
  • It’s interesting that Taitz points out that she will be “careful not to be Breitbarted or Fuddied,” indicating that she believes that both Andrew Breitbart and Andrew Breitbart and Loretta Fuddy were targeted by Obama for assassination.” Breitbart died on the very day that he said he would begin vetting Obama for the 2012 elections, which raised suspicions. Fuddy, best remembered as being instrumental in issuing the Hawaii long-form birth certificate, was the only person to die aboard a small plane that crashed off the coast of Hawaii last week. Already, there are questions surrounding the narrative of her death.
  • Taitz alleged that Mr. Bounel was born in 1890, and therefore, under the “’120 Year Rule’ implemented by the SSA in 2010,” pertaining to “‘extremely aged individuals,’” Bounel’s “Social Security applications have to be released under FOIA without proof of [his] death . . . .”
  • It appears that once the amendment is submitted, this may force the Social Security Administration to explain exactly what is going on with Barack Obama’s Social Security number. We should know something about the case by the second week in January 2014.
  •  
    @ One passage in the article: "It appears that once the amendment is submitted, this may force the Social Security Administration to explain exactly what is going on with Barack Obama's Social Security number." That's far too optimistic, probably reflecting a lack of understanding of Freedom of Information Act and the processing of a FOIA complaint in federal court. I read the judge's opinion. After the amended complaint is filed, the government gets another shot at summary judgment, submitting a new affidavit about the scope of the search that meets the judge's criticism. (The judge did not rule that the search was inadequate, merely that it was inadequately described and might have been inadequate.) That shifts the burden to the plaintiff to prove that the search was inadequate. If she meets that burden, which isn't easy, the government has to do a new search, file a new motion for summary judgment with a new affidavit, rinse, lather, and repeat. So long as someone is willing to sign an affidavit describing the search and stating that nothing was found, the plaintiff will eventually be unable to prove that the search was inadequate and will lose the case. On the other hand, a new search may find the requested record and result in disclosure. But I'm not confident that this case will go very far. From the description of the complaint that the judge ruled on, it was fatally defective anyway, suggesting that the plaintiff doesn't know much about FOIA litigation. The complaint sought an order that the government be required to respond to her FOIA request letter. But once a FOIA request goes unanswered for 20 business days, the request is deemed denied and the plaintiff can file suit to compel disclosure of the records. The FOIA does not provide for lawsuits to compel the agency to answer a FOIA request. So the plaintiff apparenttly obviously does not understand the FOIA, probably making her easy pickings for an Assistant U.S. District Attorney whose specialty
Paul Merrell

Israel Spied on Iran Nuclear Talks With U.S. - WSJ - 0 views

  • Soon after the U.S. and other major powers entered negotiations last year to curtail Iran’s nuclear program, senior White House officials learned Israel was spying on the closed-door talks. The spying operation was part of a broader campaign by Israeli Prime Minister Benjamin Netanyahu’s government to penetrate the negotiations and then help build a case against the emerging terms of the deal, current and former U.S. officials said. In addition to eavesdropping, Israel acquired information from confidential U.S. briefings, informants and diplomatic contacts in Europe, the officials said.
  • The espionage didn’t upset the White House as much as Israel’s sharing of inside information with U.S. lawmakers and others to drain support from a high-stakes deal intended to limit Iran’s nuclear program, current and former officials said. “It is one thing for the U.S. and Israel to spy on each other. It is another thing for Israel to steal U.S. secrets and play them back to U.S. legislators to undermine U.S. diplomacy,” said a senior U.S. official briefed on the matter.
  • The U.S. and Israel, longtime allies who routinely swap information on security threats, sometimes operate behind the scenes like spy-versus-spy rivals. The White House has largely tolerated Israeli snooping on U.S. policy makers—a posture Israel takes when the tables are turned. The White House discovered the operation, in fact, when U.S. intelligence agencies spying on Israel intercepted communications among Israeli officials that carried details the U.S. believed could have come only from access to the confidential talks, officials briefed on the matter said. Israeli officials denied spying directly on U.S. negotiators and said they received their information through other means, including close surveillance of Iranian leaders receiving the latest U.S. and European offers. European officials, particularly the French, also have been more transparent with Israel about the closed-door discussions than the Americans, Israeli and U.S. officials said.
  • ...11 more annotations...
  • Mr. Netanyahu and Israeli Ambassador Ron Dermer early this year saw a rapidly closing window to increase pressure on Mr. Obama before a key deadline at the end of March, Israeli officials said. Using levers of political influence unique to Israel, Messrs. Netanyahu and Dermer calculated that a lobbying campaign in Congress before an announcement was made would improve the chances of killing or reshaping any deal. They knew the intervention would damage relations with the White House, Israeli officials said, but decided that was an acceptable cost. The campaign may not have worked as well as hoped, Israeli officials now say, because it ended up alienating many congressional Democrats whose support Israel was counting on to block a deal. Obama administration officials, departing from their usual description of the unbreakable bond between the U.S. and Israel, have voiced sharp criticism of Messrs. Netanyahu and Dermer to describe how the relationship has changed.
  • “People feel personally sold out,” a senior administration official said. “That’s where the Israelis really better be careful because a lot of these people will not only be around for this administration but possibly the next one as well.” This account of the Israeli campaign is based on interviews with more than a dozen current and former U.S. and Israeli diplomats, intelligence officials, policy makers and lawmakers. Weakened ties Distrust between Mr. Netanyahu and Mr. Obama had been growing for years but worsened when Mr. Obama launched secret talks with Iran in 2012. The president didn’t tell Mr. Netanyahu because of concerns about leaks, helping set the stage for the current standoff, according to current and former U.S. and Israeli officials. U.S. officials said Israel has long topped the list of countries that aggressively spy on the U.S., along with China, Russia and France. The U.S. expends more counterintelligence resources fending off Israeli spy operations than any other close ally, U.S. officials said.
  • A senior official in the prime minister’s office said Monday: “These allegations are utterly false. The state of Israel does not conduct espionage against the United States or Israel’s other allies. The false allegations are clearly intended to undermine the strong ties between the United States and Israel and the security and intelligence relationship we share.” Current and former Israeli officials said their intelligence agencies scaled back their targeting of U.S. officials after the jailing nearly 30 years ago of American Jonathan Pollard for passing secrets to Israel. While U.S. officials may not be direct targets, current and former officials said, Israeli intelligence agencies sweep up communications between U.S. officials and parties targeted by the Israelis, including Iran. Americans shouldn’t be surprised, said a person familiar with the Israeli practice, since U.S. intelligence agencies helped the Israelis build a system to listen in on high-level Iranian communications.
  • As secret talks with Iran progressed into 2013, U.S. intelligence agencies monitored Israel’s communications to see if the country knew of the negotiations. Mr. Obama didn’t tell Mr. Netanyahu until September 2013. Israeli officials, who said they had already learned about the talks through their own channels, told their U.S. counterparts they were upset about being excluded. “ ‘Did the administration really believe we wouldn’t find out?’ ” Israeli officials said, according to a former U.S. official.
  • The episode cemented Mr. Netanyahu’s concern that Mr. Obama was bent on clinching a deal with Iran whether or not it served Israel’s best interests, Israeli officials said. Obama administration officials said the president was committed to preventing Iran from developing nuclear weapons. Mr. Dermer started lobbying U.S. lawmakers just before the U.S. and other powers signed an interim agreement with Iran in November 2013. Mr. Netanyahu and Mr. Dermer went to Congress after seeing they had little influence on the White House. Before the interim deal was made public, Mr. Dermer gave lawmakers Israel’s analysis: The U.S. offer would dramatically undermine economic sanctions on Iran, according to congressional officials who took part. After learning about the briefings, the White House dispatched senior officials to counter Mr. Dermer. The officials told lawmakers that Israel’s analysis exaggerated the sanctions relief by as much as 10 times, meeting participants said.
  • When the next round of negotiations with Iran started in Switzerland last year, U.S. counterintelligence agents told members of the U.S. negotiating team that Israel would likely try to penetrate their communications, a senior Obama administration official said. The U.S. routinely shares information with its European counterparts and others to coordinate negotiating positions. While U.S. intelligence officials believe secured U.S. communications are relatively safe from the Israelis, they say European communications are vulnerable. Mr. Netanyahu and his top advisers received confidential updates on the Geneva talks from Undersecretary of State for Political Affairs Wendy Sherman and other U.S. officials, who knew at the time that Israeli intelligence was working to fill in any gaps. The White House eventually curtailed the briefings, U.S. officials said, withholding sensitive information for fear of leaks. Current and former Israeli officials said their intelligence agencies can get much of the information they seek by targeting Iranians and others in the region who are communicating with countries in the talks. In November, the Israelis learned the contents of a proposed deal offered by the U.S. but ultimately rejected by Iran, U.S. and Israeli officials said. Israeli officials told their U.S. counterparts the terms offered insufficient protections.
  • U.S. officials urged the Israelis to give the negotiations a chance. But Mr. Netanyahu’s top advisers concluded the emerging deal was unacceptable. The White House was making too many concessions, Israeli officials said, while the Iranians were holding firm. Obama administration officials reject that view, saying Israel was making impossible demands that Iran would never accept. “The president has made clear time and again that no deal is better than a bad deal,” a senior administration official said. In January, Mr. Netanyahu told the White House his government intended to oppose the Iran deal but didn’t explain how, U.S. and Israeli officials said. On Jan. 21, House Speaker John Boehner (R., Ohio) announced Mr. Netanyahu would address a joint meeting of Congress. That same day, Mr. Dermer and other Israeli officials visited Capitol Hill to brief lawmakers and aides, seeking a bipartisan coalition large enough to block or amend any deal. Most Republicans were already prepared to challenge the White House on the negotiations, so Mr. Dermer focused on Democrats. “This deal is bad,” he said in one briefing, according to participants.
  • A spokesman for the Israeli embassy in Washington, Aaron Sagui, said Mr. Dermer didn’t launch a special campaign on Jan 21. Mr. Dermer, the spokesperson said, has “consistently briefed both Republican and Democrats, senators and congressmen, on Israel’s concerns regarding the Iran negotiations for over a year.” Mr. Dermer and other Israeli officials over the following weeks gave lawmakers and their aides information the White House was trying to keep secret, including how the emerging deal could allow Iran to operate around 6,500 centrifuges, devices used to process nuclear material, said congressional officials who attended the briefings. The Israeli officials told lawmakers that Iran would also be permitted to deploy advanced IR-4 centrifuges that could process fuel on a larger scale, meeting participants and administration officials said. Israeli officials said such fuel, which under the emerging deal would be intended for energy plants, could be used to one day build nuclear bombs. The information in the briefings, Israeli officials said, was widely known among the countries participating in the negotiations. When asked in February during one briefing where Israel got its inside information, the Israeli officials said their sources included the French and British governments, as well as their own intelligence, according to people there.
  • “Ambassador Dermer never shared confidential intelligence information with members of Congress,” Mr. Sagui said. “His briefings did not include specific details from the negotiations, including the length of the agreement or the number of centrifuges Iran would be able to keep.” Current and former U.S. officials confirmed that the number and type of centrifuges cited in the briefings were part of the discussions. But they said the briefings were misleading because Israeli officials didn’t disclose concessions asked of Iran. Those included giving up stockpiles of nuclear material, as well as modifying the advanced centrifuges to slow output, these officials said. The administration didn’t brief lawmakers on the centrifuge numbers and other details at the time because the information was classified and the details were still in flux, current and former U.S. officials said. Unexpected reaction The congressional briefings and Mr. Netanyahu’s decision to address a joint meeting of Congress on the emerging deal sparked a backlash among many Democratic lawmakers, congressional aides said.
  • On Feb. 3, Mr. Dermer huddled with Sen. Joe Manchin, a West Virginia Democrat, who said he told Mr. Dermer it was a breach of protocol for Mr. Netanyahu to accept an invitation from Mr. Boehner without going through the White House. Mr. Manchin said he told Mr. Dermer he would attend the prime minister’s speech to Congress, but he was noncommittal about supporting any move by Congress to block a deal. Mr. Dermer spent the following day doing damage control with Sen. Kirsten Gillibrand, a New York Democrat, congressional aides said. Two days later, Mr. Dermer met with Sen. Dianne Feinstein of California, the top Democrat on the SenateIntelligence Committee, at her Washington, D.C., home. He pressed for her support because he knew that she, too, was angry about Mr. Netanyahu’s planned appearance. Ms. Feinstein said afterward she would oppose legislation allowing Congress to vote down an agreement.
  • Congressional aides and Israeli officials now say Israel’s coalition in Congress is short the votes needed to pass legislation that could overcome a presidential veto, although that could change. In response, Israeli officials said, Mr. Netanyahu was pursuing other ways to pressure the White House. This week, Mr. Netanyahu sent a delegation to France, which has been more closely aligned with Israel on the nuclear talks and which could throw obstacles in Mr. Obama’s way before a deal is signed. The Obama administration, meanwhile, is stepping up its outreach to Paris to blunt the Israeli push. “If you’re wondering whether something serious has shifted here, the answer is yes,” a senior U.S. official said. “These things leave scars.”
  •  
    Obama is moving preemptively to blunt Israel's influence in Congress on the Iran negotiation.
Paul Merrell

Turkey Turns to Russia for Air Support in Syria, Fighting Continues Despite Ceasefire, ... - 0 views

  • Russia conducted airstrikes in support of Turkish military operations in Syria earlier this month, according to new reporting from the New York Times. The strikes are the latest indicator of deepening ties between Ankara and Moscow, which have also included coordinating negotiations with rebel groups—those talks, after months of deadlock, led to a nationwide ceasefire agreement that went into effect last month. Starting in late December, Russian forces began dropping unguided bombs on Islamic State areas near al-Bab, where Turkish forces and Syrian rebels participating in Operation Euphrates Shield have been bogged down since November. Turkish officials have publicly expressed their frustration with the U.S. military’s lack of support for operations near al-Bab. As the Russians were bombing the area last week, a spokesman for Turkish President Recep Tayyip Erdogan said that “In the past month-and-a-half, we have seen and understood that this [U.S.] support was not given at the sufficient level and effectiveness,” referring to operations near al-Bab. The spokesman also said that the Turkish government could reconsider allowing U.S. forces to operate from Incirlik airbase if the United States does not step up in support of Turkish operations near al-Bab. The New York Times reports that after some initial reticence to participate on the part of the United States—which was not informed about the Turkish offensive before it was launched in November—U.S. forces are conducting reconnaissance to prepare for strikes and have flown “show of force” sorties in the area. Though the United States may still get involved in the fight for al-Bab, it’s clear that Turkey is willing to look elsewhere for support, including to Moscow as part of its ongoing foreign policy pivot. As Turkey has turned its focus inward, it has prioritized protecting its southern border and preventing the independent statehood of the Syrian Kurdish rebels that have been the United States’ most reliable ally against the Islamic State.
  •  
    Perhaps a measure of how far U.S. plans for Syria have gone awry?
Paul Merrell

US looks at ways to prevent spying on its spying - 0 views

  • (AP) — The U.S. government is looking at ways to prevent anyone from spying on its own surveillance of Americans' phone records. As the Obama administration considers shifting the collection of those records from the National Security Agency to requiring that they be stored at phone companies or elsewhere, it's quietly funding research to prevent phone company employees or eavesdroppers from seeing whom the U.S. is spying on, The Associated Press has learned. The Office of the Director of National Intelligence has paid at least five research teams across the country to develop a system for high-volume, encrypted searches of electronic records kept outside the government's possession. The project is among several ideas that would allow the government to discontinue storing Americans' phone records, but still search them as needed.
  • Under the research, U.S. data mining would be shielded by secret coding that could conceal identifying details from outsiders and even the owners of the targeted databases, according to public documents obtained by The Associated Press and AP interviews with researchers, corporate executives and government officials.
  • Internal documents describing the Security and Privacy Assurance Research project do not cite the NSA or its phone surveillance program. But if the project were to prove successful, its encrypted search technology could pave the way for the government to shift storage of the records from NSA computers to either phone companies or a third-party organization. A DNI spokesman, Michael Birmingham, confirmed that the research was relevant to the NSA's phone records program. He cited "interest throughout the intelligence community" but cautioned that it may be some time before the technology is used. The intelligence director's office is by law exempt from disclosing detailed budget figures, so it's unclear how much money the government has spent on the SPAR project, which is overseen by the DNI's Intelligence Advanced Research Projects Activity office. Birmingham said the research is aimed for use in a "situation where a large sensitive data set is held by one party which another seeks to query, preserving privacy and enforcing access policies."
  • ...3 more annotations...
  • A Columbia University computer sciences expert who heads one of the DNI-funded teams, Steven M. Bellovin, estimates the government could start conducting encrypted searches within the next year or two. "If the NSA wanted to deploy something like this it would take one to two years to get the hardware and software in place to start collecting data this way either from phone companies or whatever other entity they decide on," said Bellovin, who is also a former chief technologist for the Federal Trade Commission.
  • An encrypted search system would permit the NSA to shift storage of phone records to either phone providers or a third party, and conduct secure searches remotely through their databases. The coding could shield both the extracted metadata and identities of those conducting the searches, Bellovin said. The government could use encrypted searches to ensure its analysts were not leaking information or abusing anyone's privacy during their data searches. And the technique could also be used by the NSA to securely search out and retrieve Internet metadata, such as emails and other electronic records. Some computer science experts are less sanguine about the prospects for encrypted search techniques. Searches could bog down because of the encryption computations needed, said Daniel Weitzner, principal research scientist at MIT's Computer Science and Artificial Intelligence Laboratory and former deputy U.S. chief technology officer for the Obama administration. "There's no silver bullet that guarantees the intelligence community will only have access to the records they're supposed to have access to," Weitzner said. "We also need oversight of the actual use of the data."
  • The encrypted search techniques could make it more difficult for hackers to access the phone records and could prevent phone companies from knowing which records the government was searching. "It would remove one of the big objections to having the phone companies hold the data," Bellovin said. Similar research is underway by researchers at University of California at Irvine; a group from the University of Wisconsin-Madison and the University of Texas at Austin; another group from MIT, Yale and Rensselaer Polytechnic Institute; and a fourth from Stealth Software Technologies, a Los Angeles-based technology company.
Paul Merrell

Ukrainian military acknowledges it may have shot down flight MH17 - Fort Russ - 0 views

  • An anonymous source in one of Ukraine's security agencies said that the Malaysian Boeing was shot down as a result of an unauthorized Ukrainian Buk-M1 launch. RIA Novosti reports citing a source in a Ukrainian security agency that the MH17 catastrophe may have been the result of an unanticipated situation during the training of one of Ukraine's air defense units. The anonymous source states the following: "On July 17 2014, the commander of the 156th Anti-Aircraft Missile Regiment was instructed to conduct missile crew training on providing coverage for Ukrainian ground forces in the suburbs of Donetsk, which entailed deploying the battalions, training target acquisition and tracking procedures, and carry out a simulated destruction of an aerial target using Buk-M1 missiles." He said that battery commanders were issued launch keys, however, there were no plans to launch an actual 9M38M1 missile. The training exercise involved two Su-25 aircraft, their task was to conduct aerial reconnaissance and designated training targets in the vicinity of Ukrainian troop concentration to the West of Donetsk.
  • The source: "After one of the aircraft entered Buk detection zone, it began to be tracked by a missile crew located near Zaroshchenskoye. In all likelihood, due to a tragic coincidence the flight paths of the Malaysian Boeing and the Su-25 coincided and, in spite of the altitude difference, were indicated on the Buk radar as a single target which proved fatal for the Boeing. If two targets are located on the same azimuth from the launch vehicle, the tracking system automatically shifts to the one which represents the largest radar target."SBU is trying to establish why the unauthorized launch took place. The source does not possess information about the course of that investigation. We should note that the scenario described above is consistent with the results of the recent investigation conducted by Almaz-Antey. According to Russian experts, the Boeing was shot down by a 9M38M1 missile launched by a Buk-M1 system located near the village of Zaroshchenskoye which was under Ukrainian control.
Paul Merrell

British Lawmakers Condemn 2011 Intervention in Libya - The New York Times - 0 views

  • A committee of British lawmakers issued a damning assessment on Wednesday of the 2011 intervention in Libya led by Britain and France, concluding that the military action had lacked a coherent strategy, had been based on poor intelligence and had led to a political collapse that aided the rise of the Islamic State in North Africa.
  • The report from the foreign affairs committee of the House of Commons directly blamed the former prime minister, David Cameron, saying he “was ultimately responsible for the failure to develop a coherent Libya strategy.”In echoing many criticisms from another inquiry, published this year, into Britain’s role in the Iraq war under one of Mr. Cameron’s predecessors, Tony Blair, the report suggested that lessons from that conflict had not been learned.Fearing civilian deaths, an international coalition assembled by Britain and France launched air and missile strikes in March 2011, after Col. Muammar el-Qaddafi’s forces threatened to attack the rebel-held city of Benghazi.Libya descended into chaos, and a power vacuum ensued after the Qaddafi government collapsed, allowing fighters for the Islamic State, also known as ISIS or ISIL, to gain a significant foothold in the country, and the report suggested that Britain had lost interest in the country after Colonel Qaddafi lost power. Advertisement Continue reading the main story The mission represented a significant shift from the Iraq war, with Britain and France assuming the main leadership role — Mr. Cameron had pressed for military action alongside the French president at the time, Nicolas Sarkozy — and the United States taking an active, but less visible, role.
  • In many ways, the report mirrored the assessment of President Obama, who offered a candid appraisal of the intervention in an interview published in The Atlantic this year. “It didn’t work,” Mr. Obama said, citing what he described as his misplaced faith that “the Europeans” in general would be invested in the follow-up. He also said that Mr. Cameron had soon become “distracted by other things” and that Mr. Sarkozy had been voted out of office the next year.The report by the 11-person committee, which included six lawmakers from Mr. Cameron’s Conservative Party, criticized the British strategy as flawed from its inception, concluding that it “was founded on erroneous assumptions and an incomplete understanding of the evidence.”
  • ...1 more annotation...
  • There had been, they said, no thorough assessment of the nature of the rebellion in Libya or of the real threat to civilians. Nor, they added, had there been any attempt at political engagement with the government, leaving military intervention as the sole focus. Today’s Headlines Wake up each morning to the day’s top news, analysis and opinion delivered to your inbox. Please verify you're not a robot by clicking the box. Invalid email address. Please re-enter. Sign Up Receive occasional updates and special offers for The New York Times's products and services. Thank you for subscribing to Today’s Headlines. An error has occurred. Please try again later. You are already subscribed to this email. View all New York Times newsletters. See Sample Manage Email Preferences Not you? Privacy Policy “By the summer of 2011, the limited intervention to protect civilians had drifted into an opportunist policy of regime change,” the lawmakers said.The consequence of the military action was “political and economic collapse, intermilitia and intertribal warfare, humanitarian and migrant crises, widespread human rights violations, the spread of Qaddafi regime weapons across the region and the growth of ISIL in North Africa,” the lawmakers said.
Paul Merrell

US Boycotts Pakistan's Push For Greater Transparency On Drone Strikes - 0 views

  • The United States is refusing to participate in UN Human Rights Council talks about greater accountability for human rights violations in covert drone wars. Foreign Policy reporter Colum Lynch, who broke the story Wednesday, says the U.S. is opting out of discussions about a draft Pakistani resolution aimed at the U.S. drone strikes. Lynch explains: The Pakistani draft, which was obtained by Foreign Policy, urges states to “ensure transparency” in record-keeping on drone strikes and to “conduct prompt, independent and impartial investigations whenever there are indications of any violations to human rights caused by their use.” It also calls for the convening of “an interactive panel discussion” on the use of drones. During the third round of talks on Wednesday about the resolution, the United States was notably absent. The boycott marks a shift from President Obama’s decision in 2009 to join the Human Rights Council after years of U.S. boycott at the behest of former President George W. Bush.
  • Yet, the move is in keeping with the Obama administration’s diligent refusal to share public information about those U.S. drone wars and those killed in the attacks. A “modest” initiative in the U.S. Senate that would have forced the U.S. government to publicly report and identify those killed by U.S. drone strikes overseas failed last November. While the Obama administration has repeatedly claimed that civilian deaths in drone strikes are minimal, the Bureau of Investigative Journalism documents alarming rates of civilian deaths by covert U.S. attacks in Yemen, Pakistan, and Somalia. Furthermore, in a 21-page report released earlier this month, UN special rapporteur on human rights Ben Emmerson identifies drone strikes in Afghanistan, Pakistan, Yemen, Somalia, and Gaza in which civilians were killed, injured, or threatened in drone attacks by the U.S. and close ally Israel. The U.S. still has not answered for numerous high-profile attacks, including a December 2013 U.S. drone strike on a recent wedding procession in Yemen near the city of Rad’a that left 12 people dead and at least 15 wounded. The boycott of the talks comes as the U.S. escalates its covert drone war in Yemen, with at least seven suspected strikes in the first two weeks of March.
Paul Merrell

Russia Sending Advanced Anti-aircraft Missiles to Syria - World - Haaretz - 0 views

  • Moscow is sending an advanced anti-aircraft missile system to Syria, two Western officials and a Russian source said, as part of what the West believes is stepped-up military support for embattled President Bashar Assad. The Western officials said the SA-22 system would be operated by Russian troops, rather than Syrians. It was on its way to Syria but had not yet arrived.  "This system is the advanced version used by Russia and it's meant to be operated by Russians in Syria," said one of the sources, a Western diplomat who is regularly briefed on U.S., Israeli and other intelligence assessments.  A U.S. official separately confirmed the information.  The Russian source, who is close to the Russian navy, said the delivery would not be the first time Moscow had sent the SA-22 system, known as Pantsir-S1 in Russian, to Syria. It had been sent in 2013, the source said. 
  • "There are plans now to send a new set," the source said, without detailing how far along the process was. However, the Western diplomat said the version of the SA-22 on its way to Syria was newer than previous missile systems deployed there. Syrian officials could not be reached for comment.  The United States has been leading a campaign of air strikes in Syrian air space for a year, joined by aircraft from European and regional allies including Britain, France, Jordan and Turkey. U.S. forces operating in the area are concerned about the potential introduction of the weapon, the diplomat said. U.S. officials say they believe Moscow has been sending troops and equipment to Syria, although they say Russia's intentions are not clear.
  • Lebanese sources have told Reuters that Russian troops have begun participating in combat operations on behalf of the Assad government. Moscow has not commented on those reports. Speaking at a news conference in Moscow, Russian Foreign Minister Sergei Lavrov said Russia was sending military equipment to Syria to help the Assad government combat Islamic State fighters, and had sent experts to help train the Syrian army to use it.  However, the dispatch of advanced anti-aircraft missiles would appear to undermine that justification, since neither Islamic State nor any other Syrian rebel group possesses any aircraft. Lavrov also said coordination was needed between Russia's military and the Pentagon to avoid "unintended incidents" around Syria. Russia was conducting pre-planned naval drills in the eastern Mediterranean, he said.
  • ...2 more annotations...
  • This year has seen momentum shift against Assad's government in Syria's 4-year-old civil war, which has killed 250,000 people and driven around half of Syria's 23 million people from their homes. An ally of Damascus since the Cold War, Moscow maintains its only Mediterranean naval base at Tartous on the Syrian coast, and protecting it would be a strategic objective. Recent months have also seen talk of a new role for outside forces in Syria, with NATO-member Turkey proposing the creation of a "safe zone" free from both Islamic State and government forces near its Syrian border. Even if Russians operated the missiles and kept them out of the hands of the Syrian army, the arrival of such an advanced anti-aircraft system could also unsettle Israel, which in the past has bombed sophisticated arms it suspected were being handed to Assad's Lebanese guerrilla allies, Hezbollah. 
  • "In the Middle East you never know what will happen. If the Russians end up handing it (SA-22) over to the Syrian military I don't think the Israelis would intervene but they would go bananas if they see it heading towards Hezbollah in Lebanon," the diplomatic source said. An Israeli military spokesman declined to comment on the missile system. A senior Israeli defense official briefing reporters on Thursday said Israel was in contact with Moscow and would continue its policy of stopping advanced weapons reaching Hezbollah. "We have open relations with the Russians who have come to save Assad in the civil war. Along with this, we will not allow our sovereignty to be compromised or the transfer of advanced or chemical weapons (to Hezbollah). We are following the developments and keeping open channels with Moscow." 
  •  
    There is debate over the truthfulness of reports that Russia is stepping up its military defense of the Assad government. If this report is true, the only conceivable targets for the missiles are aircraft of the U.S. coalition and their role is likely to be protection of Russia's naval base and deterrence from those aircraft flying air support for anti-assad government forces. 
Paul Merrell

Case of Navy nurse who refused to force-feed could put Guantánamo hunger stri... - 0 views

  • No decision has been made on whether the U.S. Navy will court-martial a nurse who refused to force-feed hunger strikers at Guantánamo during the summer, the nurse’s commander says.But those who are watching the case say a military trial could put a spotlight on both Guantánamo’s hunger-strike policy and how the military manages medical-ethics issues. Retired Navy Capt. Albert J. Shimkus Jr., who teaches at the U.S. Navy War College in Newport, R.I., calls it “an important time, not only for this individual but also an important time for military medicine and how we interact with our patient and the process by which these decisions are made.”
  • The nurse, who has been identified as a Navy lieutenant, reportedly turned conscientious objector after handling months of feedings. He was sent home early to the Naval Health Clinic New England in Newport, R.I., this month after serving with the 139-member Navy medical staff assigned to care for Guantánamo’s 149 detainees.
  • At Guantánamo, “there was an investigation done and currently it’s under review. The process has started.”
  • ...2 more annotations...
  • As the lieutenant’s commander, it would be up to Pennington to decide what, if any, disciplinary action to pursue. Typically that starts with what is called a 15-6 investigation: a description of what happened and a recommendation of whether to order a court-martial. The captain would not say whether that was the investigation she had received. Whatever the outcome, two former senior military medical officers said the case would serve as a significant precedent in this, the 13th year of the detention center at the U.S. enclave in southeast Cuba, where an undisclosed number of the 149 captives were on a hunger strike Thursday.
  • The case is also likely to drive a review of “the process of how to recuse oneself” when a health provider in uniform navigates the “dual loyalty question” of obligation to the nation versus the obligation to the patient. Retired Army Brig Gen. Stephen Xenakis, a psychiatrist who has examined Guantánamo captives, also says a court-martial could end up putting Guantánamo hunger-strike policy on trial.During the 1980s, he notes, military doctors were allowed not only to refuse to perform abortions but also to proclaim their opposition to doing them, “and we didn’t prosecute them.” But something about medical autonomy changed during the war on terror. “The issue is that, with this war, there has been a shift in what has been the professional autonomy of clinicians. They’ve been subordinated to the combat arms, to the war-fighters,” says Xenakis.
  •  
    The case may well put the Gitmo hunger-strike policy on trial. All U.S. military officers are under a general order to disobey unlawful commands. Therefore, it is conceivable to me that the nurse's best defense may well be that the order to force-feed the prisoners was unlawful.
Paul Merrell

Has Israel's Air Force Joined Obama's Air Campaign against Syria? Israeli Jets Strike D... - 0 views

  • According to a report by Algemeiner (November 11, 2015), Israel’s Air Force was involved in bombing inside Syria, hitting targets close to Damascus airport.  According to reports in Syrian media outlets affiliated with President Bashar Assad, Israel Air Force jets hit targets near the Damascus airport, Israel’s Channel 2 reported Wednesday evening. The report, a breaking story that interrupted the nightly news, was neither confirmed nor denied by Israeli authorities. Channel 2 military correspondent Roni Daniel said that Israel has made it clear it would not allow the transfer of weapons from Iran, via Damascus, to Hezbollah in Lebanon. This is not the first time that air strikes in Syria have been attributed to Israel without confirmation from officials in the Jewish state. But this comes on the heels of meetings between Prime Minister Benjamin Netanyahu and Russian President Vladimir Putin reportedly held to coordinate operations in Syria — and ensure that there are no unwitting collisions between planes from their respective air forces. During a visit to the US this week, Netanyahu gave insight into Israel’s Syria policy. He told an audience at a gala for the American Enterprise Institute that he laid out Israel’s red lines in Syria to Putin in September.
  • “We will not allow Iran to set up a second front in the Golan, and we will act forcefully — and have acted forcefully — to prevent that. We will not allow the use of Syrian territory from which we’d be attacked by the Syrian army or anyone else and we have acted forcefully against that. And third, we will not allow the use of Syrian territory for the transfer of game-changing weapons into Lebanon into Hezbollah’s hands, and we have acted forcefully on that. I made it clear that we will continue to act like that,” he said. (Ruth Blum, Algemeiner, November 12, 2015) This report begs the question as to the ultimate objective of Netanyahu’s visit to Washington. The Israeli delegation to Washington was also integrated by military and intelligence officials who no doubt had meetings with their counterparts at the Pentagon and Langley, not to mention the US Congress. A week prior to the Obama-Nentayahu “summit”,  Netanyahu dispatched his defense chief, Moshe “Bogie” Ya’alon, to Washington, “to help smooth the way for his own visit”. Was there an understanding that Israel would henceforth play a more active role in the war against Syria? In an earlier statement, Defense Secretary Ashton Carter intimated:
  • “It is a reasonable expectation that the defense relationship [with Israel] will be one of stability and endurance, …” (quoted by Defense One, November 3, 2015) Ya’alon was hosted in Washington  by Defense Secretary Ashton Carter who is credited for having stabilized the US-Israel relationship.  Were these talks between Carter and Ya’alon behind closed doors indicative of a shift in US-Israel military relations,  specifically with regard to Syria. Quoting Syrian opposition sources, the Israeli media dismissed the reports that the IDF was behind the air strikes: Syrian opposition activist Ahmed Yabrudi said: “Israeli warplanes entered from south Lebanon, arrived at Qalamoun and flew above the international airport in Damascus where they struck nearby military outposts.” He added that “the Israeli planes remained in Syria’s skies for a half hour, and there is no information about the outposts that were hit – except that they belonged to Hezbollah.” Official Syrian media failed to report on the air strikes attributed to Israel. [According to Algemeiner, it was announced on Syrian TV] Israeli defense officials also declined to comment on the foreign media reports. However, Israel did previously announce a strict-policy of intolerance towards threats to the state, such as weapons transfers to Hezbollah in Lebanon. (Jerusalem Post, November 12, 2015)
Paul Merrell

Trump Prepares to Takeover Fed - 0 views

  • In Donald Trump’s first four years as president, he will not only choose three judges for the Supreme Court, he’ll also pick five of the seven members on the Fed Board of Governors. It would be impossible to overstate the effect this is going to have on the nation’s economic future. With both houses of Congress firmly in the GOP’s grip, we could see the most powerful central bank in the world transformed into a purely political institution that follows the diktats of one man. Critics may think that is a vast improvement over the present situation in which the Fed conceals its allegiance to the giant Wall Street investment banks behind a public relations cloud of “independence”, but the idea of one man controlling the price of the world’s reserve currency and, thus, the price of financial assets and commodities across the globe, is equally disturbing. Already we have seen how the Fed’s determination to enrich its constituents has resulted in one titanic asset-price bubble after the other. Imagine if that power was entrusted to just one individual who could be tempted to use that authority to shape economic events in a way that enhanced and perpetuated his own political power. Even so, after seven years of a policy-induced Depression that has increased inequality to levels not seen since the Gilded Age, we think it is high-time that the president use his power to choose the members who will bring the bank back under government control.
  • So, how will Trump’s populism shape his views on who should or should not be a member of the Fed? We don’t know, but we do know that monetary policy is going to change dramatically from the last eight years of unproductive experimentation because Trump has surrounded himself with industry leaders who ascribe to an entirely different philosophy than the one currently in practice. Check this out from monetary analyst Tommy Behnke: “Some of today’s most reasonable mainstream economic voices are included in (Trump’s) inner circle. These names include David Malpass of Encima Global, who co-signed a letter with Jim Grant opposing the Fed’s “inflationary” and “distortive” quantitative easing program; John Paulson of Paulson & Co., who made billions from shorting the housing market before the Great Recession; Andy Beal, a self-described “libertarian kind of guy” who blames the Fed for the credit crisis; and the Heritage Foundation’s Stephen Moore, who told CSIN in 2012 that he is a “very severe critic” of the Fed’s “incredibly easy-money policies of the past decade.” While none of Trump’s economic advisers are by any means Austrians, they are far more hawkish than most of Presidents Bush and Obama’s past economic advisers.” (Why President Trump Will Fumigate the Fed, Mises Institute)
  • Trump, who is no fan of the Fed’s bond buying program called QE, has admitted he thinks stocks are in a bubble suggesting that he will probably take a more conservative approach to monetary policy. Even so, that doesn’t change the fact he’s going to have to opportunity to personally select the FOMC’s ruling majority, which means that he’ll be in a position to demand their loyalty as a condition of their hiring. Does anyone seriously doubt that Trump would rather control the Fed himself than keep it in the clutches of the cutthroat Wall Street banks? There’s no doubt that the distributional effects of the Fed’s policies helped catapult Trump into the White House. Millions of working class Americans who are sick of the monetary “trickle down” policies and the job-eviscerating trade agreements found a way to express their frustration in the candidacy of Donald Trump. Their collective rage suddenly exploded at the ballotbox on November 8 pushing the real estate tycoon to a victory over opponent Clinton in what many are calling the political upset of the century. Trump tapped into that wellspring of anger and frustration by denouncing the “failed and corrupt political establishment” in which both Hillary Clinton and the Fed feature prominently. Now he’s going to take it to the next level by launching a surprise attack on the Fed which will leave Wall Street stripped of its power-agency and left to fend for itself. This is a blurb from the New York Times: “A core view of many Trump advisers is that the extended period of emergency policy settings has promoted a bubble in the stock market, depressed the incomes of savers, scared the public and encouraged capital misallocation,” said Ian Shepherdson, chief economist at Pantheon Macroeconomics. “Right now, these are minority views on the F.O.M.C., but Trump appointees are likely to shift the needle.” (With Trump in Power, the Fed Gets Ready for a Reckoning, New York Times)
  • ...1 more annotation...
  • They’re going to “shift the needle” alright, then they’re going to drive it through the serpent’s heart. The Fed has had every opportunity to show where its loyalties lie and it has sided with Wall Street every single time. There’s a reason why 95 percent of all income gains in the last eight years have gone to the one percent, while working people have struggled just to put food on the table. Just like there’s a reason why stocks have tripled in value in the last eight years while wages and incomes have stagnated and the economy has slowed to a crawl. It’s the policy, stupid. The Fed has created the conditions for a permanent Depression so it can provide infinite cheap money to its crooked reprobate friends on Wall Street. Now their little party is coming to an end. Boo fucking hoo.
Paul Merrell

Netanyahu and Trump: A Shared Focus on Terrorism « LobeLog - 0 views

  • Scholars of terrorism credit a specific 1979 symposium in Jerusalem as a turning point in the U.S. and international usage of “terrorism” as we understand it today. The Jonathan Institute, founded following the death of Benjamin Netanyahu’s brother Yonatan during a raid to rescue hostages from a PLO hijacking, hosted a 1979 conference in Jerusalem— and a follow up in 1984 in Washington—on “International Terrorism.” Directed by Benjamin Netanyahu, the Jonathan Institute maintained close ties to the Israeli government. Current and former Israeli officials across the political spectrum—including Golda Meir, Menachem Begin, Yitzhak Rabin, Ezer Weizman, Moshe Dayan, and Shimon Peres—dominated its administrative committee. Lisa Stampnitsky, in her 2013 book Disciplining Terror, discusses how the Jonathan Institute helped internationalize Israel’s use of the term to describe terrorist violence as both irrational and illegitimate in both means and ends, and as primarily targeting democracies and “the West.” Previously, she notes, terrorism referred largely to rational political violence, either state or individual, and was dealt with as an issue of criminality and law. The shift helped Israel delegitimize the political aims of certain groups, such as the Palestinian resistance to its colonization and territorial occupation. One cannot be a “freedom fighter” if one’s political aims are demonized as illegitimate or irrational. Stampnitsky argues that the shift to using terrorism to describe violence outside the law also set the stage for retaliatory strikes (such as the 1986 U.S. air strikes in Libya in response to a bombing at a Berlin disco that killed an American soldier) and eventually for the doctrine of preemptive force that has characterized the post-9/11 “War on Terror.”
  • Israel’s role in the development of a specifically anti-Muslim discourse of terrorism is deeply intertwined with the foreign policies of American politicians. As Deepa Kumar and others have pointed out, American neocons and Israel’s Likud party jointly developed a shared language around Islamic terrorism. The 1979 Jonathan Institute conference was attended by prominent American officials and political figures, including future President George H.W. Bush and representatives of the American Enterprise Institute, the Center for Strategic and International Studies, and Commentary magazine who brought the ideas, and later a follow-up conference, back to the U.S. Intended to serve as an intervention into the international discourse on terrorism, the explicit aim of the Jerusalem conference was to awaken the Western world to the problem of terrorism as defined by the conference organizers. It contributed to entrenching in the minds of American conservatives what was popularized a few years later as the “clash of civilizations,” firmly situating Israel in the category of Western democracies threatened by Soviets and Palestinians. The follow-up conference in the United States in 1984 went further by emphasizing the relationship between Islam and terror. As Netanyahu himself wrote in the book that came out of the conference: “the battle against terrorism was part of a much larger struggle, one between the forces of civilization and the forces of barbarism.” Then, as now, Netanyahu presented Israel as the bulwark against terrorism, a specific kind of illegitimate political violence that threatens not just Israel but all democracies and the Western world.
  • Echoes of this framing of the debate on terrorism can be found in how Western politicians, including Netanyahu and Trump, discuss the issue. Terrorism, which has no single agreed-upon definition in U.S. or international law, now serves as a moniker applied to all violence that established states deem illegitimate. Most often these days, Western democracies use “terrorism” to describe violence committed by Muslims. As journalist Glenn Greenwald writes, “In other words, any violence by Muslims against the West is inherently ‘terrorism,’ even if targeted only at soldiers at war and/or designed to resist invasion and occupation.” The term functions not as a descriptive tool but an ideological one. It doesn’t merely identify a particular kind of violence. It justifies and even requires a particular kind of forceful response by the state. Israel today presents itself as the world’s expert on counterterrorism. It maintains a profitable security industry predicated on selling expertise and technology tested in its interactions with Palestinians. American tax dollars have been funneled into this industry through U.S. military aid, over 25% of which Israel was allowed to spend domestically (the new military aid deal signed by the Obama White House will phase out this allowance over the next 10 years, sending the rest of the $3.8 billion per year to U.S. defense contractors). The United States and Israel collaborate on counterterrorism initiatives, including joint military exercises and police exchange programs. Here tactics and skills are developed and exchanged for surveillance and violent repression of protests that primarily impact Muslims and people of color in the U.S. and Palestinians and Black Jews in Israel.
  • ...1 more annotation...
  • In this context, Trump’s framing of his anti-Muslim immigration policies as a national security priority to keep out terrorists is nothing new. What is new in this political moment is the extent to which the U.S. public is seeing straight through this discourse and rallying against discrimination and bigotry. Ahead of Trump and Netanyahu’s meeting this week, there’s an opportunity to pay attention to how these discourses have enabled Israel to justify decades of military occupation and human rights abuses with the discourse of national security and counterterrorism. As the Trump administration goes back to the drawing board to devise restrictive immigration policies that will hold up in court, Netanyahu and Israel’s example shouldn’t be far from mind.
Paul Merrell

CIA's Ex-No. 2 Says ISIS 'Learned From Snowden' - The Daily Beast - 0 views

  • That is not a consensus view within the U.S. intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. And last year, a U.S. intelligence official with access to information about ISIS’s current tactics told The Daily Beast that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the U.S. from their time in AQI, [and] they have adapted well to avoiding detection.”
  • “Within weeks of the leaks, terrorist organizations around the world were already starting to modify their actions in light of what Snowden disclosed. Communications sources dried up, tactics were changed,” Morell writes. Among the most damaging leaks, he adds, was one that described a program that collects foreigners’ emails as they move through equipment in the United States.Terrorist groups, including ISIS, have since shifted their communications to more “secure” platforms, are using encryption, or “are avoiding electronic communications altogether.”“ISIS was one of those terrorist groups that learned from Snowden, and it is clear that his actions played a role in the rise of ISIS,” Morell writes.
  • Edward Snowden’s leaks about U.S. intelligence operations “played a role in the rise of ISIS.” That’s the explosive new allegation from the former deputy director of the CIA, Michael Morell, who was among the United States’ most senior intelligence officials when Snowden began providing highly classified documents to journalists in 2013. U.S. intelligence officials have long argued that Snowden’s disclosures provided valuable insights to terrorist groups and nation-state adversaries, including China and Russia, about how the U.S. monitors communications around the world. But in his new memoir, to be published next week, Morell raises the stakes of that debate by directly implicating Snowden in the expansion of ISIS, which broke away from al Qaeda and has conquered large swaths of territory in Iraq and Syria.
  • ...3 more annotations...
  • Edward Snowden’s leaks about U.S. intelligence operations “played a role in the rise of ISIS.” That’s the explosive new allegation from the former deputy director of the CIA, Michael Morell, who was among the United States’ most senior intelligence officials when Snowden began providing highly classified documents to journalists in 2013. U.S. intelligence officials have long argued that Snowden’s disclosures provided valuable insights to terrorist groups and nation-state adversaries, including China and Russia, about how the U.S. monitors communications around the world. But in his new memoir, to be published next week, Morell raises the stakes of that debate by directly implicating Snowden in the expansion of ISIS, which broke away from al Qaeda and has conquered large swaths of territory in Iraq and Syria. 
  • “Within weeks of the leaks, terrorist organizations around the world were already starting to modify their actions in light of what Snowden disclosed. Communications sources dried up, tactics were changed,” Morell writes. Among the most damaging leaks, he adds, was one that described a program that collects foreigners’ emails as they move through equipment in the United States.Terrorist groups, including ISIS, have since shifted their communications to more “secure” platforms, are using encryption, or “are avoiding electronic communications altogether.”“ISIS was one of those terrorist groups that learned from Snowden, and it is clear that his actions played a role in the rise of ISIS,” Morell writes.
  • That is not a consensus view within the U.S. intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. And last year, a U.S. intelligence official with access to information about ISIS’s current tactics told The Daily Beast that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the U.S. from their time in AQI, [and] they have adapted well to avoiding detection.”
  •  
    Keep in mind that ISIL is a U.S. creation. And that just about everything that CIA and NSA do violates the laws of the nation in which they act and is antithetical to our form of government.   
Gary Edwards

Obama's Letter to Americans: Stand Behind Efforts to Raise Debt Limit - 0 views

  •  
    excerpt: The fact that the wealthiest already pay their fair share and more is borne out by this from the IRS: Individuals earning in the top one percent paid 40 percent of all income taxes, while those in the top 10 percent paid 71 percent of all income taxes. The fact that going after the wealthiest for even more isn't going to generate significant additional revenues - certainly not enough to make a dent in the debt - isn't mentioned by the President in his letter. And if Obama is so determined to be "fair", why doesn't he simply offer to write a check to the IRS for the part of his income that he feels he doesn't deserve? He doesn't say. The President did get one thing right: The middle class is the target of any deficit-reduction plans likely to come out of Washington in the next few days: "It's just not right to ask them to pay the whole tab - especially when they're not the ones who caused this mess in the first place." He's right: The middle class didn't create the financial crisis; the Ruling Class did. Instead, the middle class, by and large, just want to be left alone to work out their own lives. Whenever possible, they resist further government intrusions into their lives - witness the growth of the Tea Party - and are waiting to see if Washington will, for the first time in memory, not listen to the siren song of entitlement protection and class warfare being sung by the President, and instead ignore him and start some serious cutting back of Leviathan. Perhaps what the President should be saying to the American people is what he said as Senator in railing against raising the debt ceiling back in March, 2006: The fact that we are here today to debate raising America 's debt limit is a sign of leadership failure. It is a sign that the US Government cannot pay its own bills. It is a sign that we now depend on ongoing financial assistance from foreign countries to finance our Government's reckless fiscal policies. In
Paul Merrell

Jeb Bush's Administration Steered Florida Pension Money to George W. Bush's Fundraisers - 0 views

  • Four years before the financial collapse, Goldman Sachs executive George Herbert Walker IV had much to be thankful for. "I've been fortunate to be a small part of teams leading U.S. restructurings, European privatizations, global pension management and now hedge fund and private equity investing,” he said in the annual report of a banking colossus that would soon be known as the “great vampire squid” of Wall Street. “The world,” said Walker, “just keeps getting more interesting." As the head of Goldman Sachs’ alternative investment unit, Walker’s ebullience was understandable. At the same time he was raising $100,000 for his cousin George W. Bush’s successful presidential re-election effort, the administration of another cousin, Florida Gov. Jeb Bush, returned the family favor, delivering $150 million of Florida pension money to an alternative investment fund run by Walker’s firm. Like other executives whose companies received Florida pension money, Walker is now renewing the cycle, reportedly attending in February a high-dollar fundraiser for Jeb Bush’s political committee.
  • Walker is not alone: He is one of 19 top fundraisers for George W. Bush -- known as “Pioneers” and “Rangers” -- whose financial firms received state business from Jeb Bush’s administration in Tallahassee. In all, an International Business Times’ review of government documents shows Jeb Bush oversaw Florida directing at least $1.7 billion of state workers’ retirement money to the financial firms of his elder brother’s major donors. As Jeb Bush oversaw the State Board of Administration (SBA) that runs Florida’s massive public pension system, the state shifted billions of dollars into higher-risk, higher-fee alternative investments, benefiting the same sector of the investment industry he would work in upon leaving office. Many of those state deals delivered returns that fell short of projections. Roughly 20 percent of that system’s 53 private investment deals during Bush’s governorship went to companies that employed his brother’s Pioneers. Those financial firms, in turn, delivered more than $5 million of campaign cash to George W. Bush, the Republican National Committee and Jeb Bush’s Republican Party of Florida. (Click here to see the full list of Bush Pioneers whose firms received Florida pension investments from Jeb Bush’s administration).
  • Ethics experts say the connection between Bush family donors and Florida pension deals raises questions about whether the investments were properly insulated from political influence. “If not an actual conflict of interest, these examples would provide fodder for apparent conflicts of interest,” said Common Cause Florida’s Peter Butzin. “Those folks who give … expect something in return. And if that something in return is not blatantly sending business their way or resulting in a particular vote, it most certainly is at least providing an opportunity for access, to get the foot in the door, so that they can make the case with that official.” Jeb Bush’s aides did not respond to questions from IBTimes, and Walker declined to comment for this story. Dennis MacKee, an SBA spokesperson, said the agency’s “elected Trustees do not now, nor did they during Governor Bush’s term, participate in the selection of individual investments.” MacKee’s statement conflicts with emails reviewed by IBTimes that show that, as governor, Jeb Bush was deeply involved in the state’s investment decisions, periodically brokering conversations between Florida officials and individual financial firms, including one whose top executive was a longtime Bush family donor.
Paul Merrell

US Invasion of Syria Begins | nsnbc international - 0 views

  • As previously warned about in June of 2015, the United States has announced that it will officially begin ground operations in Syria through the use of special forces. The Washington Post in its article, “Obama seeks to intensify operations in Syria with Special Ops troops,”would report that:
  • President Obama is sending a small number of Special Operations troops to northern Syria, marking the first full-time deployment of U.S. forces to the chaotic country.  The mission marks a major shift for Obama, whose determination to defeat the Islamic State in Iraq and Syria has been balanced by an abiding worry that U.S. troops not be pulled too deeply into the in­trac­table Syrian conflict.  The latest deployment will involve fewer than 50 Special Operations advisers, who will work with resistance forces battling the Islamic State in northern Syria but will not engage in direct combat, Obama administration officials said.
  • Unfortunately for US policymakers, it is no longer only Syria that US special forces and accompanying airpower must worry about. Russia, by invitation of Damascus, is now operating militarily across Syria, including along Turkey’s border where the US has long sought to establish its “safe zones.” The US has openly committed to the invasion and occupation of Syrian territory. It does so with the intent of carving Syria up into a series of dysfunctional, weak zones to literally “deconstruct” Syria as a functioning nation-state. It is doing this unable to cite any credible threat Syria poses to US national security and without any semblance of a mandate granted by the United Nations. It also does so with the prospect of triggering direct war with nuclear-armed Russia in a region Russia is operating legally.
  • ...3 more annotations...
  • While the US claims this move is to “defeat the Islamic State (ISIS),” it is instead clearly a move to establish long-sought “buffer zones” or “safe zones” in Syria where the Syrian government can no longer operate. US airpower will also undoubtedly be used to cover these special forces, creating a defacto no-fly-zone wherever they operate. The map accompanying the Washington Post article clearly shows ISIS territory straddling the last remaining supply corridor being used to supply the terror group as well as others including Al Qaeda’s al Nusra Front from NATO-member Turkey’s territory. US special forces will likely begin operating in these areas, and zones carved out as US operations expand. The eventual outcome, if these operations are successful, will be the division and destruction of Syria as a nation-state. This is more than mere speculation – this is a conclusion drawn by signed and dated policy papers produced by the Brookings Institution, who has called for such zones since as early as 2012, but under different contrived pretexts.
  • America’s latest actions are a desperate move sought by an increasingly hysterical political and corporate-financier establishment in Washington and on Wall Street. Recent hearings conducted by the US Senate Committee on Armed Services have struggled to produce a credible response to America’s unraveling criminal conspiracy aimed at Syria, particularly in the wake of Russia’s recent intervention. The committee and witnesses brought before it, have struggled to formulate a response – however – no-fly-zones and US troops on the ground have been discussed at length. It is a poorly calculated bluff. The presence of US special forces and US airpower operating illegally in and above Syria, meant to deny Syria access to its own territory will take time to implement. The official number of US special forces being sent into Syria is said to not exceed 50. Syria and its allies could insert an equal or larger number of forces into these same areas to essentially create a “safe zone” from “safe zones.” Bringing America’s illegal actions before the UN would also be a sound measure ahead of potential confrontations with US forces operating uninvited in Syria. The premise that ISIS must be fought and defeated by striking them in Iraq and Syria is betrayed by America’s own admission that the organization has already spread far beyond the borders of either nation. ISIS is clearly not supporting itself on the limited resources found within either country. Were the US truly interested in stopping ISIS, it would strike at its sponsors in Ankara and Riyadh. Of course, it was clear, well over a year ago, that the appearance of ISIS would be used intentionally to accomplish US geopolitical objectives in both Syria and Iraq, serving as a pretext for wider, long-sought after direct Western military intervention.
  • The myth that dividing and destroying Syria while deposing its sitting government will somehow alleviate the violence in Syria and reduce the ongoing migrant crisis Europe faces, is betrayed by the fact that a similar premise used to sell intervention in Libya has only led to greater chaos in North Africa, and the creation of the migrant crisis in the first place. If the world, including Europe, seeks to prevent the spread of ISIS and the expansion of an already growing migrant crisis, stopping the United States and its partners before they create another “Libya” in the Levant must become top priority. And while it is unlikely that Europe will show any resolve in doing so, it would be hoped that Syria and its allies realize the consequences of failing now, at this juncture, and to whom’s borders the chaos will attempt to cross over into next.
‹ Previous 21 - 40 of 91 Next › Last »
Showing 20 items per page