Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged targets

Rss Feed Group items tagged

Paul Merrell

Syria: US Success Would Only Be the End of the Beginning | nsnbc international - 0 views

  • An October 7, 2015 hearing before the US Senate Committee on Armed Forces (SASC) titled, “Iranian Influence in Iraq and the Case of Camp Liberty,” served as a reaffirmation of America’s commitment to back the terrorist organization Mujahedeen e-Khalq (MEK) and specifically 2,400 members of the organization being harbored on a former US military base in Iraq.
  • Providing testimony was former US Senator Joseph I. Lieberman, former US Marine Corps Commandant and former Supreme Allied Commander Europe General James Jones, USMC (Ret.), and Colonel Wesley Martin, US Army (Ret.). All three witnesses made passionate pleas before a room full of nodding senators for America to continue backing not only MEK terrorists currently harbored on a former US military base in Iraq, but to back groups like MEK inside of Iran itself to threaten the very survival of the government in Tehran. In the opening remarks by Lieberman, he stated: It was not only right and just that we took them off the foreign terrorist organization list, but the truth is now that we ought to be supportive of them and others in opposition to the government in Iran more than we have been.
  • MEK is described by Council on Foreign Relations Senior Fellow Ray Takeyh as a “cult-like organization” with “totalitarian tendencies.” While Takeyh fails to expand on what he meant by “cult-like” and “totalitarian,” an interview with US State Department-run Radio Free Europe-Radio Liberty reported that a MEK Camp Ashraf escapee claimed the terrorist organization bans marriage, using radios, the Internet, and holds many members against their will with the threat of death if ever they are caught attempting to escape. Not once is any of this backstory mentioned in the testimony of any of the witnesses before the senate hearing, defiling the memories of those who have been murdered and otherwise victimized by this terrorist organization. The de-listing of MEK in 2012 as a foreign terrorist organization by the US State Department is another indictment of the utter lack of principles the US clearly hides behind rather than in any way upholds as a matter of executing foreign policy.
  • ...6 more annotations...
  • MEK has carried out decades of brutal terrorist attacks, assassinations, and espionage against the Iranian government and its people, as well as targeting Americans including the attempted kidnapping of US Ambassador Douglas MacArthur II, the attempted assassination of USAF Brigadier General Harold Price, the successful assassination of Lieutenant Colonel Louis Lee Hawkins, the double assassinations of Colonel Paul Shaffer and Lieutenant Colonel Jack Turner, and the successful ambush and killing of American Rockwell International employees William Cottrell, Donald Smith, and Robert Krongard. Admissions to the deaths of the Rockwell International employees can be found within a report written by former US State Department and Department of Defense official Lincoln Bloomfield Jr. on behalf of the lobbying firm Akin Gump in an attempt to dismiss concerns over MEK’s violent past and how it connects to its current campaign of armed terror – a testament to the depths of depravity from which Washington and London lobbyists operate. To this day MEK terrorists have been carrying out attacks inside of Iran killing political opponents, attacking civilian targets, as well as carrying out the US-Israeli program of targeting and assassinating Iranian scientists. MEK terrorists are also suspected of handling patsies in recent false flag operations carried out in India, Georgia, and Thailand, which have been ham-handedly blamed on the Iranian government.
  • Lieberman would also state (emphasis added): Here’s my point Mr. Chairman, we ought to compartmentalize that agreement also, that nuclear agreement. We ought to put it over there, and not let it stop us from confronting what they’re doing in Syria. Continuing the sanctions for human rights violations in Iran in support of terrorism. And here’s the point I want to make about the National Council of Resistance of Iran and other democratic opposition groups that are Iranian – we ought to be supporting them.  This regime in Tehran is hopeless. It’s not going to change. There’s no evidence … every piece of evidence says the contrary. So I hope we can find a way, we used to do this not so long ago, supporting opposition groups in Iran. They deserve our support, and actually they would constitute a form of pressure on the government in Tehran that would unsettle them as much as anything else we could do because it would threaten the survival of the regime which from every objective indicator I can see is a very unpopular regime in Iran.  The United States, unrepentant regarding the arc of chaos, mass murder, terrorism, civilizational destruction it has created stretching from Libya to Syria, now seeks openly to extend it further into Iran using precisely the same tactics – the use of terrorist proxies – to dismantle and destroy Iranian society.
  • MEK has already afforded the US the ability to wage a low-intensity conflict with Iran. MEK’s role in doing so was eagerly discussed in 2009, several years before it was even de-listed as a terrorist organization by the US State Department in the Brooking Institution’s policy paper “Which Path to Persia? Options for a New American Strategy Toward Iran” (PDF). The report stated (emphasis added): Perhaps the most prominent (and certainly the most controversial) opposition group that has attracted attention as a potential U.S. proxy is the NCRI (National Council of Resistance of Iran), the political movement established by the MEK (Mujahedin-e Khalq). Critics believe the group to be undemocratic and unpopular, and indeed anti-American.
  • In contrast, the group’s champions contend that the movement’s long-standing opposition to the Iranian regime and record of successful attacks on and intelligence-gathering operations against the regime make it worthy of U.S. support. They also argue that the group is no longer anti-American and question the merit of earlier accusations. Raymond Tanter, one of the group’s supporters in the United States, contends that the MEK and the NCRI are allies for regime change in Tehran and also act as a useful proxy for gathering intelligence. The MEK’s greatest intelligence coup was the provision of intelligence in 2002 that led to the discovery of a secret site in Iran for enriching uranium.   Despite its defenders’ claims, the MEK remains on the U.S. government list of foreign terrorist organizations. In the 1970s, the group killed three U.S. officers and three civilian contractors in Iran. During the 1979-1980 hostage crisis, the group praised the decision to take America hostages and Elaine Sciolino reported that while group leaders publicly condemned the 9/11 attacks, within the group celebrations were widespread. Undeniably, the group has conducted terrorist attacks—often excused by the MEK’s advocates because they are directed against the Iranian government. For example, in 1981, the group bombed the headquarters of the Islamic Republic Party, which was then the clerical leadership’s main political organization, killing an estimated 70 senior officials. More recently, the group has claimed credit for over a dozen mortar attacks, assassinations, and other assaults on Iranian civilian and military targets between 1998 and 2001. At the very least, to work more closely with the group (at least in an overt manner), Washington would need to remove it from the list of foreign terrorist organizations.
  • Proof that Brookings’ policy paper was more than a mere theoretical exercise, in 2012 MEK would indeed be de-listed by the US State Department with support for the terrorist organization expanded. The fact that former senators and retired generals representing well-funded corporate think tanks even just this week are plotting to use MEK to overthrow the Iranian government should raise alarms that other criminality conspired within the pages of this policy paper may still well be in play. Lieberman himself suggests that proxy war and regime-change should proceed regardless of the so-called “nuclear deal” – with the 2009 Brookings report itself having stated that (emphasis added): …any military operation against Iran will likely be very unpopular around the world and require the proper international context—both to ensure the logistical support the operation would require and to minimize the blowback from it. The best way to minimize international opprobrium and maximize support (however, grudging or covert) is to strike only when there is a widespread conviction that the Iranians were given but then rejected a superb offer—one so good that only a regime determined to acquire nuclear weapons and acquire them for the wrong reasons would turn it down. Under those circumstances, the United States (or Israel) could portray its operations as taken in sorrow, not anger, and at least some in the international community would conclude that the Iranians “brought it on themselves” by refusing a very good deal.  Clearly, both Brookings in 2009, and Lieberman this week have conspired to use the so-called “Iranian Nuclear Deal” as cover for betrayal and regime change.
  • For those wondering why Russia has intervened in Syria in the matter that it has, it should be plainly obvious. The US has no intention to stop in Syria. With Iraq, Afghanistan, and Libya behind it, and Syria within its clutches, it is clear that Iran is next, and inevitably this global blitzkrieg will not stop until it reaches Moscow and Beijing. Even as the US adamantly denies the obvious – that is has intentionally created and is currently perpetuating Al Qaeda, the so-called “Islamic State,” and other terrorist groups in Syria, it is openly conspiring to use another army of terrorists against neighboring Iran, live before a US Senate hearing. Should the US succeed in Syria, it would not be the end of the conflict, but only the end of the beginning of a much wider world war.
Paul Merrell

Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails "Top Secret" - 0 views

  • Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails “Top Secret” The leaking of the Clinton emails has been compared to as the next “Watergate”. By ZeroHedge.com | January 30, 2016 Share this article! targ
  • The State Department will release more emails from Clinton’s time as secretary of state later Friday. But The Associated Press has learned that 7 email chains are being withheld in full for containing “top secret” material. The 37 pages include messages recently described by a key intelligence official as concerning so-called “special access programs” — a highly restricted subset of classified material that could point to confidential sources or clandestine programs like drone strikes or government eavesdropping. Department officials wouldn’t describe the substance of the emails, or say if Clinton had sent any herself. Spokesman John Kirby tells the AP that no judgment on past classification was made. But the department is looking into that, too.
  • For those that Clinton only read, and didn’t write or forward, she still would have been required to report classification slippages that she recognized. Possible responses for classification infractions include counseling, warnings or other action, State Department officials said, though they declined to say if these applied to Clinton or senior aides who’ve since left the department. The officials weren’t authorized to speak on the matter and spoke on condition of anonymity. However, as we previously noted, the implications are tough for The DoJ – if they indict they crush their own candidate’s chances of the Presidency, if they do not – someone will leak the details and the FBI will revolt… The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days.
  • ...1 more annotation...
  • I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, which she will not be able to survive as an attorney general,” he said. “The intelligence community will not stand for that. They will fight for indictment and they are already in the process of gearing themselves to basically revolt if she refuses to bring charges.” The FBI also is looking into Clinton’s email setup, but has said nothing about the nature of its probe. Independent experts say it is highly unlikely that Clinton will be charged with wrongdoing, based on the limited details that have surfaced up to now and the lack of indications that she intended to break any laws. “What I would hope comes out of all of this is a bit of humility” and an acknowledgement from Clinton that “I made some serious mistakes,” said Bradley Moss, a Washington lawyer who regularly handles security clearance matters. Legal questions aside, it’s the potential political costs that are probably of more immediate concern for Clinton. She has struggled in surveys measuring her perceived trustworthiness and an active federal investigation, especially one buoyed by evidence that top secret material coursed through her account, could negate one of her main selling points for becoming commander in chief: Her national security resume.
Paul Merrell

Israeli Comptroller Report Reveals 2014 Gaza Massacre Was A War Of Choice - 0 views

  • Palestinians from the Gaza Strip have criticized an Israeli report on the country’s 2014 military operation against the besieged coastal enclave. The report was released by Israeli state comptroller Yosef Shapira on Tuesday. “I understand from the report that Gaza was merely the setting for an Israeli war game, with no objective but to destroy and murder indiscriminately,” said Basman Alashi, executive director of the El-Wafa Medical Rehabilitation and Specialized Surgery Hospital. The hospital, formerly located in the Shujaya neighborhood by the separation barrier with Israel east of Gaza City, was repeatedly shelled by Israeli forces during the 51-day offensive before it was evacuated under fire on July 17, 2014.
  • “The overall impression it leaves is this: ‘Netanyahu, You didn’t do a good job of destroying Gaza, do it better next time,’” Alashi said of the report. Others said the document contained useful information about Israel’s behavior during the offensive, even if its conclusions remained incomplete. “The report shows that Israel follows a systematic policy of humiliating Palestinians, especially through careless targeting of civilians,” said Ramy Abdu, founder and chairman of the Euro-Mediterranean Human Rights Monitor. Abdu’s Geneva-based agency has conducted investigations of Israel’s military conduct, including an Oct. 30, 2014 report stating that its forces had “deliberately targeted locations with concentrations of civilians” during operations earlier that year. “What the report has failed to cover is to cite careless targeting of civilians as a consistent failure of the Israeli forces, with almost no serious actions to do something about it,” Abdu said in regard to the Israeli comptroller’s findings.
  • It also claimed the cabinet had not only failed to consider diplomatic alternatives to military action, but also to set any clear strategy concerning Gaza. Once the operation began, it said, Israeli forces largely failed to meet their objective of thwarting tunnels dug by Palestinian resistance groups, destroying only half of them over weeks of a bloody ground invasion that produced many casualties. The comptroller did not appear to consider the goals of an earlier military operation, launched by Israel in the West Bank on June 13, 2014. These goals were to weaken Hamas, obstruct an agreement by Hamas and Fatah to form a unity government across the West Bank and Gaza Strip and recover three young settlers captured by Palestinians.
  • ...2 more annotations...
  • The resulting deaths, along with the demands of an impoverished population and weeks of Israeli strikes on the Gaza Strip, ultimately spurred Palestinian resistance groups into action and forced their armed wings to respond. By the time its guns fell silent on Aug. 26, Israel had achieved the first two of its three goals for its West Bank operation. The third had always been questionable, as Netanyahu knew from the outset that the three settlers were likely dead. Along with the weakness of Israel’s strategy in the Gaza Strip, where its forces quickly found themselves unprepared to face the threat of resistance tunnels, the mixed results raise questions about which objectives were the real ones. Military operations in Gaza and the West Bank made 2014 the most lethal year for Palestinians under occupation since 1967, when Israeli forces seized Palestinian enclaves over six days of war with neighboring Arab states. As the report shows, even senior figures in Israel’s security establishment now acknowledge their government’s responsibility for the loss of life. After its release, Isaac Herzog, chairman of the Israeli Labor Party head of the opposition Zionist Union, called for Netanyahu to resign over its charges, saying “Netanyahu must draw his conclusions and hand in the keys.”
  • But Netanyahu’s re-election, along with the seating of an even more right-wing governing coalition only seven months after the Gaza offensive, shows that Palestinian bloodshed is not a liability in Israeli politics, even at the cost of Israeli lives. Israel’s continued tightening of its Gaza closure, even as the country’s comptroller finds it to have been a key cause of the 2014 carnage, demonstrates that while its government may not seek immediate conflict with the Strip, it does not prioritize its avoidance.
  •  
    This report is causing a political firestorm in Israel. This article does an excellent job of tying all the major Israeli press reports together. The report will obviously be handed off quickly to the International Criminal Court by Palestinians because it clearly establishes intent to commit war crimes.
Paul Merrell

55% Of Americans Want Independent To Run Against Trump, Clinton - 1 views

  • It’s happening! According to a new poll, Americans have finally maxed out their tolerance for “lesser evils” in presidential politics. The survey, published by independent research firm, Data Targeting, found a majority of Americans now want an independent candidate to take on Hillary Clinton and Donald Trump — two of the most disliked candidates in recent history. Researchers for the poll, conducted among 997 registered voters via both home and mobile phones this month, reported that “58% of respondents are dissatisfied with the current group of Republican and Democratic candidates for President” — and that 55 percent believe there should be an independent ticket (it is unclear why 3 percent apparently dislike the current candidates but puzzlingly do not think there should be another option). In perhaps the most extreme finding of the analysis, “a shocking 91% of voters under the age of 29 favor having an independent candidate on the ballot.” Considering younger generations’ lack of party allegiance and disillusionment with the status quo, their disapproval of Clinton and Trump seems predictable — but 91 percent constitutes near-total rejection. Tellingly, over 68 percent of participants in the poll were over the age of 50. Older generations are more likely to be attached to party identity, making their acceptance of other options a telling indicator of the populace’s distaste for their current options.
  • The United States has notoriously clung to the narrow two-party duopoly for most of its history — even as the crafters of the Constitution, for all their staggering shortcomings, cautioned of the dangers of such myopic political representation and party allegiance. But considering the unpopularity of Trump and Clinton — the former has a 55 percent unfavorability liking, the latter 56 percent — Americans appear to be turning a corner on their perception of who deserves power in politics. In fact, 65 percent of poll respondents said they would be “at least somewhat, pretty or very willing to support a candidate for President who is not Donald Trump or Hillary Clinton” — a stark difference from 2012, when Americans resisted deviation from the norm. A Gallup poll from that year highlighted the nation’s two-party rigidity. “U.S. registered voters show limited support for third-party candidates…with the vast majority preferring Barack Obama or Mitt Romney,” analysts reported just a few months before the 2012 general election. They concluded about 5% of Americans would vote for a third-party candidate that year. Just four years later, however, that figure has exploded. As the Data Testing report explains: “In a ballot test against Clinton and Trump, a truly independent candidate starts off with 21% of the vote,” already far greater than 2012’s 5%. “But this number increases to 29% in the ‘Big Sky’ region, 30% in ‘New England’ and 28% in the ‘West’ region.”
  • Independents were even more willing to break away from the options they’ve been given. “Among voters with an unfavorable opinion of both Trump and Clinton, the independent actually wins the ballot test,” researchers reported, noting that of the three options, 7 percent of respondents chose Clinton, 11 percent chose Trump, and a staggering 56 percent chose the unspecified third-party candidate. Though these ballot test findings are lower than the statistic that 65 percent would be open to breaking away from Clinton and Trump, the increase of third-party interest from 2012 remains palpably significant. It should be noted that Data Targeting is a GOP-affiliated political research firm, however, the results indicate little room for bias. In fact, they are paramount in an election where, as the analysis notes, Clinton and Trump provoke more animosity than enthusiasm. Perhaps highlighting lingering attachments to two-party thinking, Clinton’s highest unfavorability rating (78 percent) came from Republicans, while Trump’s highest unfavorability rating (71 percent) came from Democrats. Regardless, it is undeniable Americans are fed up with the system at large. According to another recent poll, just over half believe elections are rigged. Interest in third-party options, like the Libertarian and Green parties, is also steadily growing. As Ron Paul, the outspoken former presidential candidate, whose 2012 campaign wasundermined by the media and Republican establishment, recently said, “I’ve never bought into this idea that the lesser of two evils is a good idea” — and Americans increasingly agree. According to a Gallup poll released last year, 43 percent of Americans identify as independent — the highest number in the history of the poll.
  • ...1 more annotation...
  • Meanwhile, faith in mainstream media is also dwindling — and it tends to dip even lower in election years, as Americans observe the perpetual circus acts performed by corporate outlets. With contentious power struggles raging both within the major parties and between them, Americans appear to be sobering up to the realities of party dominance and loyalty as they evolve beyond their crumbling political past.
  •  
    Of course the 55% would never agree on a single candidate, so let's not get our hopes up.
Paul Merrell

Your Computer May Already be Hacked - NSA Inside? | Steve Blank - 1 views

  • But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”  Say what??  They can see the plaintext on my computer before I encrypt it? That defeats any/all encryption methods. How could they do that? Bypass Encryption While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
  • The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT. Today every desktop and laptop computer has another way for the NSA to get inside. Intel Inside It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn’t crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip. After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing it’s microprocessors to load fixes automatically when your computer starts.
  • Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer’s BIOS.). Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update. Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that 3rd parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it is impossible to know whether anyone is loading a backdoor into your computer.
  • ...3 more annotations...
  • Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security conscious sites can discover rootkits by tools that check kernel code and data for changes. But what if you could use the configuration and state of microprocessor hardware in order to hide? You’d be invisible to all rootkit detection techniques that checks the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA’s biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.) Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys  giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.) That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.
  • A few months ago these kind of discussions would have been theory at best, if not paranoia.
  • The Prism disclosures prove otherwise – the National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven’t implemented a microcode backdoor. The downside is that 1) backdoors can be hijacked by others with even worse intent. So if NSA has a microcode backdoor – who else is using it? and 2) What other pieces of our infrastructure, (routers, smartphones, military computers, satellites, etc) use processors with uploadable microcode? —— And that may be why the Russian president is now using a typewriter rather than a personal computer.
Paul Merrell

A Distorted Lens Justifying An Illegitimate Ukrainian Government - 0 views

  • Support it or oppose it, a coup d’état took place in Kiev after an EU-brokered agreement was signed by the Ukrainian government and the mainstream opposition on Feb. 21. The agreement called for power sharing between both sides through the formation of a national unity government and for an end to the opposition-led street protests in Kiev. President Viktor Yanukovych ordered the Ukrainian police and security forces to withdraw from their positions, and even earlier, he had made multiple concessions to the opposition leadership. Instead of keeping its end of the bargain, the Ukrainian mainstream opposition executed a coup through the use of violence by organized ultra-nationalist gangs, which some analysts have compared to stay-behinds or secretive militias that were created by NATO during the Cold War. These armed ultra-nationalist groups took over administrative bodies in Ukraine and fought until they managed to oust the Ukrainian government and opened the path for opposition leaders to take power on Feb. 25. The Ukrainian mainstream opposition used the EU-brokered agreement, which the Brussels-based European Commission deliberately refused to enforce, as a means of justifying the formation of a coup-imposed government.
  • In the absence of almost half the Ukrainian Verkhovna Rada, or Ukrainian Parliament, the opposition parties began to arbitrarily pass unconstitutional laws. They also unconstitutionally selected Oleksandr/Aleksandr Valentynovych Turchynov as the acting president of Ukraine before President Viktor Yanukovych was even impeached. Intimidation and violence were additionally used to secure the cooperation of any disagreeing parliamentarians or state officials in Kiev. Saying that the ultra-nationalists and fascists are marginal elements, the mainstream media networks in North America and the European Union have simply dismissed the armed ultra-nationalist groups involved in the coup that are presently integrated into the putsch regime running Kiev. The militant ultra-nationalists, however, are very influential and amassing power under the illegal premiership of Arseniy Yatsenyuk.  Yatsenyuk, himself, is from Yulia Tymoshenko’s notoriously corrupt All-Ukrainian Union Fatherland Party (Batkivshchyna) and essentially a U.S. and EU appointee. There is even a pre-coup leaked telephone interception, likely either recorded by the intelligence services of Russia or Ukraine, in which U.S. Assistant Secretary of State Victory Nuland says that Yatsenyuk will be appointed as the prime minister of the Ukrainian government that the U.S. is putting together.
  • It is unlikely that Yatsenyuk and the loosely-knit alliance of the governing parties that ran Ukraine under the Yushchenko-Tymoshenko governments, foreign-based Ukrainians, and the forces behind the Orange Revolution that form the Orangist camp which he belongs to could have gotten back into power in Ukraine without pressure, the use of force and foreign backing. Yatsenyuk was even threatened and booed by the Ukrainians gathered at Independence Square when it was announced that he would be appointed as the prime minister of the post-coup government. A vast segment of the protesters made it clear that Tymoshenko, Yatsenyuk’s party leader, was no alternative to the ousted President Viktor Yanukovych in their eyes, either, when it was announced that she wanted to run for prime minister. The Orangists do not have the support of a majority of the population, nor did they form the parliamentary majority in the Verkhovna Rada. Their Orangist president, Viktor Yushchenko, only got 5 percent of the vote in January 2010, in a show of no-confidence, whereas Viktor Yanukovych won the first and second rounds of the presidential elections in 2010. According to Victoria Nuland, the U.S. has also poured $5 billion into “democracy promotion” inside Ukraine. This is U.S. State Department doublespeak for politicized funding that Washington has sent to Ukraine to organize the Orange Revolution and its Euromaidan sequel or what can frankly be described as regime change.
  • ...10 more annotations...
  • To rule Ukraine once more, the Orangists and their foreign backers have used and manipulated the ultra-nationalist elements of the population — some of which are openly anti-European Union — as their foot soldiers in an application of force against their democratically-elected opponents. Despite their views, the ultra-nationalists are actually more honest than the Orangist liberal figures like Arseniy Yatsenyuk. Unlike the misleading and utterly corrupt Orangist leaders, the ultra-nationalists do not hide their agendas and platforms.
  • The ultra-nationalists have inconsolably anti-Russian attitudes. Many of them also dislike a vast spectrum of other groups, including Jews, Armenians, Roma, Poles, Tatars, supporters of the Party of Regions and communists. In this context, it should come as no surprise that one of the first decisions that the post-coup regime in Kiev made was to remove the legal status of the Russian language as the regional language of half of Ukraine. Right Sector is, itself, a coalition of militant ultra-nationalists. These militants were instrumental in fighting government forces and taking over both government buildings in Kiev and regional governments in the western portion of Ukraine. Despite the protests of First Deputy Defense Minister Oleynik, Deputy Defense Minister Mozharovskiy and Defense Minister Babenk, Arseniy Yatsenyuk’s post-coup government has even given the ultra-nationalist opposition militias official status within the Ukrainian military and security forces. Yatsenyuk and the Orangists also dismissed all the officials that protested that the move would fracture the country and make the political divide in Ukraine irreversible.
  • Several members of Svoboda have been given key cabinet and government posts. One of the two junior deputy prime ministers, or assistant deputy prime ministers, is Oleksandr Sych. The ministry of agriculture and food has been given for management to Ihor Shvaika. The environment and natural resources ministry has been assigned to Andry/Andriy Mokhnyk. The defense minister is Ihor Tenyukh, a former admiral in the Ukrainian Navy who obstructed Russian naval movements in Sevastopol during the Russo-Georgian War over South Ossetia and who was later dismissed by the Ukrainian government for insubordination. Oleh Makhnitsky, another member of Svoboda, has been assigned as the new prosecutor-general of Ukraine by the coup government. Andry Parubiy, one of the founders of Svoboda, is now the post-coup secretary of the National Security and Defense Council of Ukraine (RNBO). He was the man controlling the so-called “Euromaidan security forces” that fought government forces in Kiev. His job as secretary is to represent the president and act on his behalf in coordinating and implementing the RNBO’s decisions. As a figure, Parubiy clearly illustrates how the mainstream opposition in Ukraine is integrated with the ultra-nationalists. Parubiy is an Orangist and was a leader in the Orange Revolution. He has changed parties several times. After founding Svoboda, he joined Viktor Yushchenko’s Our Ukraine before joining Yulia Tymoshenko’s Fatherland Party and being elected as one of the Fatherland Party’s deputies, or members of parliament.
  • While the mainstream media in North America and the EU look the other way about the ultra-nationalists in the coup government in Kiev, the facts speak for themselves. Both the EU and the U.S. governments have rubbed their elbows with the ultra-nationalists. Oleh Tyahnybok, the leader of Svoboda (formerly the Social Nationalist Party of Ukraine), was even part of the opposition triumvirate that all the U.S. and EU officials visiting Kiev met with while performing their political pilgrimages to Ukraine to encourage the protesters to continue with their demonstrations and riots demanding Euro-Atlantic integration. Svoboda has popularly been described as a neo-Nazi grouping. The World Jewish Congress has demanded that Svoboda be banned. The ultra-nationalist party was even condemned by the EU’s own European Parliament, which passed a motion on Dec. 13, 2012 categorically condemning Svoboda.
  • The ultra-nationalists are such an integral part of the mainstream opposition that the U.S.-supported Orangist president of Ukraine, Viktor Yushchenko, posthumously awarded the infamous Nazi collaborator Stepan Bandera the title and decoration of the “Hero of Ukraine” in 2010. Foreign audiences, however, would not know that if they relied on reportage from the likes of the U.S. state-run Radio Free Europe, which tried to protect Yushchenko because he wanted to reorient Ukraine toward the U.S. and EU. Parubiy also lobbied the European Parliament not to oppose Yushchenko’s decision. Other smaller ultra-nationalists parties were also given government posts, and several of the independent cabinet members are also aligned to these parties. Dmytro Yarosh from Right Sector (Pravyi Sektor) is the deputy secretary of the RNBO, and the Trizub Party was given the education ministry. Trizub had Sergey Kvit appointed to the post of education minister.
  • The role of the ultra-nationalists in executing the coup has been essentially ignored by the mainstream media in North America and the EU. The roots of the bloodshed in Kiev have been ignored, too. The shootings of protesters by snipers have simply been presented as the vile actions of the Ukrainian government, never taking into consideration the agitation of the armed ultra-nationalist gangs and the mainstream opposition leaders for a conflict. According to a leaked telephone conversation on Feb. 26 between Estonian Foreign Minister Urmas Paet and European Union Commissionaire Catherine Ashton, which was leaked by the Security Service of Ukraine (SBU) , the snipers who shot at protesters and police in Kiev were allegedly hired by Ukrainian opposition leaders. Estonian Foreign Minister Paet made the statements on the basis of details he was given by one of the head doctors of the medical team of the anti-government protests, Olga Bogomolets, an opponent of Viktor Yanukovych’s government who wanted it removed from power. Paet tells Ashton the following first: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” This is also corroborated by the fact that Yanukovych actually had ordered the Ukrainian riot police and security forces not to use lethal force.
  • The Estonian official then mentions that it was verified to him that the same snipers were killing people on both sides. He tells Ashton the following: “And second, what was quite disturbing, this same Olga [Bogomolets] told as well that all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides.” Another important point that Paet makes to Ashton is the following: “[Dr. Olga Bogomolets] then also showed me some photos she said that as a medical doctor she can say that it is the same handwriting, the same type of bullets, and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Past reports that the mainstream media were hostile to the ousted Ukrainian government also raise serious questions that corroborate what has been said about the snipers intentionally killing protesters to instigate regime change.
  • The Telegraph reported on Feb. 20 that “[a]t least three of the bodies displayed single bullet wounds to the heads,” and “were shot in the head, the neck or the heart. None were shot anywhere else like in the legs.” This means that the snipers were making kill shots by design, which seems like the last thing that the Ukrainian government would want to do when it was trying to appease the protesters and bring calm to Kiev. The Ukrainian journalist Alexey Yaroshevsky’s account of the sniper shootings is also worth noting, and it is backed up by footage taken by his Russian crew in Kiev.  Their footage shows armed opposition members running away from the scene of the shooting of anti-government protesters. What comes across as unusual is that the armed members of the opposition were constantly agitating to start firefights at every opportunity that they could get.
  • The commandant of the SSU, Major-General Oleksandr Yakimenko, has testified that his counter-intelligence forces were monitoring the CIA in Ukraine during the protests. According to the SSU, the CIA was active on the ground in Kiev and collaborating with a small circle of opposition figures. Yakimenko has also said that it was not the police or government forces that fired on the protesters, but snipers from the Philharmonic Building that was controlled by the opposition leader Andriy Parubiy, which he asserts was interacting with the CIA. Speaking to the Russian media, Yakimenko said that 20 men wearing “special combat clothes” and carrying “sniper rifle cases, as well as AKMs with scopes” ran out of the opposition-controlled Philharmonic Building and split into two groups of 10 people, with one taking position at the Ukraine Hotel. The anti-government protesters even saw this and asked Ukrainian police to pursue them, and even figures from Right Sector and Svoboda asked Yakimenko’s SSU to investigate and apprehend them, but Parubiy prevented it. Major-General Yakimenko has categorically stated that opposition leaders were behind the shootings. Following the release of the conversation between Paet and Ashton, the Estonian Foreign Ministry confirmed that the leak was authentic, whereas the European Commission kept silent. The mainstream media in North America and the EU either ignored it or said very little. The Telegraph even claimed that Dr. Bogomolets told it that she had not treated any government forces even though she contradicts this directly in an interview with CNN where says she treated military personnel.
  • CNN, on the other hand, quickly glossed over the story, giving it only enough attention to create the impression that the network is fairly covering the news. Opting not to give the story the airtime that it deserved, CNN instead posted it on its webpage. The conversation is immediately discredited, undermined and dismissed in the first sentence of the article, which is attributed to Foreign Minister Paet: “Don’t read too much into the conversation.” The article was deliberately structured by CNN to undermine the important information that would challenge the narrative that the U.S. mainstream media have been painting. The title, sub-titles and opening sentences of most texts act as microcosms or summaries of the articles, and in many cases, readers evaluate or decide to read the articles on the basis of what these texts communicate. Moreover, the first sentence of the article sets the tempo for readers and and influences their opinion, too. Although anyone who listens to the conversation between Paet and Ashton and considers the evidence that is being discussed would realize just how important the news was, the message being set forth by CNN was a dismissive one.
Paul Merrell

After almost 13 years, it's time to end Congress' blanket authorization of force | Wash... - 0 views

  • t may sound hard to believe, but Senate Majority Leader Harry Reid, D-Nev., isn't always wrong -- at least when he states the obvious: “9/11 is a long time ago,” he said Wednesday, “and it's something that needs to be looked at again.” The “it” is the post-9/11 Authorization for Use of Military Force resolution, or AUMF, adopted three days after the terror attacks, and now going on its lucky 13th year. It's been in effect nearly twice as long as the Gulf of Tonkin resolution authorizing Vietnam, what was “America's Longest War” -- until the 21st century, that is.
  • On Sept. 14, 2001, Congress authorized the president to use “all necessary and appropriate force” against the perpetrators of the 9/11 attacks and those who “harbored” them. Two successive administrations have since turned the 60 words of the AUMF's operative clause into what journalist Gregory Johnsen calls “the most dangerous sentence in U.S. history” -- a writ for a war without temporal or spatial limits. The last time the Senate held hearings on the AUMF, Sen. Lindsey Graham, R-S.C., asked the Pentagon's civilian special operations chief, Michael Sheehan, “does [the president] have the authority to put boots on the ground in the Congo?” Answer: “Yes, sir, he does.” Predictably, the hawkish Graham was totally okay with that. “The battlefield is wherever the enemy chooses to make it,” right? Right, said Sheehan: “from Boston to the [Federally Administered Tribal Areas of Pakistan]."
  • Asked how much longer the war on terrorism will last, Sheehan replied, “at least 10 to 20 years.” So presumably the AUMF can serve as the basis for Chelsea Clinton's “kill list” in 2033, after she trounces George P. Bush. Lyndon Johnson once compared the Gulf of Tonkin resolution to “Grandma’s nightshirt” because “it covers everything.” Even LBJ might have marveled at how the last two administrations have stretched the post-9/11 AUMF. Under the theory that “the United States is a battlefield in the war on terror,” the Bush administration invoked it to justify warrantless wiretapping and military detention of American citizens on American soil. The Obama administration cites it as legal authority for the extrajudicial killing of Americans via remote-control.
  • ...2 more annotations...
  • The Senate Foreign Relations Committee will be taking another look at the AUMF this week. The hearing's title, “Authorization For Use Of Military Force After Iraq And Afghanistan,” hints at a preordained conclusion: that an updated authorization is needed. Ranking Republican Sen. Bob Corker of Tennessee wants to be sure the executive branch has “all the tools and capabilities” it needs to address “threats that did not exist in 2001.” Rep. Barbara Lee, D-Calif., the sole member of Congress to vote “no” on the original AUMF, has a better idea: end it, don't mend it. Joined by libertarian-leaning, antiwar Republicans like Reps. Justin Amash and Walter Jones, she's introduced legislation to repeal the AUMF. Two imperial presidents in a row have treated that authorization like a permanent delegation of congressional war power to the president. Their successors would no doubt do the same with any new “tools and capabilities” they’re given.
  • Without the AUMF, presidents still retain the constitutional power to “repel sudden attacks,” as James Madison put it. And if they think groups like al-Shabaab or Boko Haram demand a more sustained military response, they'll be free to make that case to Congress. But delegating new authorities in advance might permanently change our constitutional default setting from peace to war. Madison also said that “No nation could preserve its freedom in the midst of continual warfare.” We're now into our second decade running that experiment; how much longer do we want to risk proving him right?
  •  
    I looked at Barbara Lee's bill. It requires a report from the Executive on all actions currently undertaken pursuant to the AUMF and requires that each action identified be terminated 60 days after the report unless Congress reauthorizes the action. It also repeals the AUMF. It's a good approach, but should require a sunset provision for each re-authorization so the Executive is blocked from maintaining us in a perpetual state of war as it has done with the AUMF itself. We're a long way from 9/11 and we are now fighting multiple wars in multiple nations against organizations that had nothing to do with 9/112, ostensibly to retaliate against those responsible for 9/11. No more open ended authorizations for war. 
Paul Merrell

Britain has passed the 'most extreme surveillance law ever passed in a democracy' | ZDNet - 0 views

  • It's 2016 going on 1984. The UK has just passed a massive expansion in surveillance powers, which critics have called "terrifying" and "dangerous".
  • The new law, dubbed the "snoopers' charter", was introduced by then-home secretary Theresa May in 2012, and took two attempts to get passed into law following breakdowns in the previous coalition government. Four years and a general election later -- May is now prime minister -- the bill was finalized and passed on Wednesday by both parliamentary houses. But civil liberties groups have long criticized the bill, with some arguing that the law will let the UK government "document everything we do online". It's no wonder, because it basically does. The law will force internet providers to record every internet customer's top-level web history in real-time for up to a year, which can be accessed by numerous government departments; force companies to decrypt data on demand -- though the government has never been that clear on exactly how it forces foreign firms to do that that; and even disclose any new security features in products before they launch.
  • Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens (known as equipment interference), although some protected professions -- such as journalists and medical staff -- are layered with marginally better protections. In other words, it's the "most extreme surveillance law ever passed in a democracy," according to Jim Killock, director of the Open Rights Group. The bill was opposed by representatives of the United Nations, all major UK and many leading global privacy and rights groups, and a host of Silicon Valley tech companies alike. Even the parliamentary committee tasked with scrutinizing the bill called some of its provisions "vague".
  • ...1 more annotation...
  • And that doesn't even account for the three-quarters of people who think privacy, which this law almost entirely erodes, is a human right. There are some safeguards, however, such as a "double lock" system so that the secretary of state and an independent judicial commissioner must agree on a decision to carry out search warrants (though one member of the House of Lords disputed that claim). A new investigatory powers commissioner will also oversee the use of the powers. Despite the uproar, the government's opposition failed to scrutinize any significant amendments and abstained from the final vote. Killock said recently that the opposition Labour party spent its time "simply failing to hold the government to account". But the government has downplayed much of the controversy surrounding the bill. The government has consistently argued that the bill isn't drastically new, but instead reworks the old and outdated Regulation of Investigatory Powers Act (RIPA). This was brought into law in 2000, to "legitimize" new powers that were conducted or ruled on in secret, like collecting data in bulk and hacking into networks, which was revealed during the Edward Snowden affair. Much of those activities were only possible thanks to litigation by one advocacy group, Privacy International, which helped push these secret practices into the public domain while forcing the government to scramble to explain why these practices were legal. The law will be ratified by royal assent in the coming weeks.
Gary Edwards

IRS Lawyer Carter Hull Confirms Tea Party Targeting Ordered By Washington - Investors.com - 0 views

  • Hull has confirmed the premeditated targeting of Tea Party groups went even higher than him or Lerner.
  • Apparently not only Tea Party groups were targeted but actual candidates as well. On March 9, 2010, the day Tea Party candidate Christine O'Donnell revealed her plan to run for Vice President Joe Biden's former Delaware Senate seat , an IRS tax lien was placed on a house purported to be hers, an action that was quickly publicized by those who did not wish her well.
  • Earlier this year, Dennis Martel, special agent with the Department of Treasury in Baltimore, left a message on O'Donnell's cell phone telling her that an official in Delaware state government had improperly accessed her records on that very same day. The problem was that the house was not hers in the first place and the IRS eventually blamed the lien on a computer glitch and withdrew it.
  • ...1 more annotation...
  • To us it is inconceivable that one of only two political appointees was directly involved in targeting of Tea Party groups without White House knowledge and consent. It is said the fish rots from the head, and this one is really beginning to stink.
  •  
    This has gone way too far.  The 2012 elections must be nullified and rescheduled.  Tens of millions of American citizens have been systematically targeted, their civil and Constitutional rights destroyed, and their voices and votes politically eliminated by a massive government conspiracy.  The 2012 election is a fraud.  And nothing short of complete nullification and recall, and the termination of the IRS will do the great Republic justice. excerpt: Scandal: A retiring IRS lawyer implicates the IRS chief counsel's office, headed by an Obama appointee, as well as the head of the IRS' exempt organizations office. The targeting included a Tea Party Senate candidate. In Thursday's hearing before the House Oversight Committee, 72-year-old retiring IRS lawyer Carter Hull implicated the IRS chief counsel's office headed by William J. Wilkins, who attended at least nine White House meetings, and Lois Lerner, head of the exempt-organizations office, in the IRS scandal. In so doing, he made clear the targeting of Tea Party groups started in Washington and was directed from Washington. A tax-law specialist with 48 years of IRS experience, Hull testified that Lerner, the former head of the exempt organizations division, demanded that he send some of the reviews of Tea Party groups to the IRS chief counsel's office in Washington. The chief counsel is one of two political appointees in the IRS. According to Hull's testimony, Lerner, who famously pleaded her Fifth Amendment rights before the same committee, gave an atypical instruction that the Tea Party applications undergo special scrutiny that included an uncommon multilayer review that involved a top adviser to Lerner as well as the chief counsel's office. Hull's name came up earlier in the testimony of Holly Paz, a D.C.-based supervisor in the IRS's tax-exempt status division, who reported to Lerner. It was on May 22, the day after Paz was interviewed by investigators, that Lerner refused to answer questions from
Paul Merrell

12 Banks Reveal 'Living Wills' That Hint Toward a Future Bail-in | nsnbc international - 0 views

  • Twelve major banks have made their living wills open to the public in response to US regulators pushing for more “convincing plans” for self-dismantling should their operations fail.
  • The purpose of living wills is a way “to give bankers and regulators a clearer understanding of a bank’s operations and its assets and liabilities [and] map out the steps the banks would take to distribute large losses among stakeholders.” The Federal Reserve Bank (FRB) and the Federal Deposit Insurance Corp (FDIC) are overseeing the bank’s contingency plans, ensuring that no bank is “too big to fail”. This includes financial institutions with more than $50 billion in assets; as well as non-financial firms that are considered systemically important as understood by the US Department of Treasury (USDT) Financial Stability Oversight Council (FSOC). The banks participating in this exercise include:
  • • JPMorgan Chase & Co • Morgan Stanley • Bank of America • Credit Suisse Group AG • Goldman Sachs Group • Wells Fargo & Co • State Street Corp • Bank of New York Mellon Corp • UBS Group AG • Deutsche Bank AG • Barclays Plc Should another financial crisis rear its head again, these revelations provide investors and traders a better sense of the standing of banks.
  • ...4 more annotations...
  • Collectively, the banks divulged that they have “stockpiled long-term debt” within holding companies (or the parent company that owns the bank) to make their portfolios appear to be “less complex”. In other words, banks have placed their derivatives (or stockpiled long-term debt) within the main corporation that owns their subsidiaries. The only problem is that if the parent fails, so do its “children”. The bank’s assets could be placed into receivership with the intention of being split up and auctioned off; however some corporations abuse receivership and bankruptcy to make investors and creditors think they are dead in the water only to pull out at the last minute and enjoy large primary debt write-offs. This is a sort of corporate version of playing possum.
  • This classic con tactic would provide the unique advantage of not having to go to the Senate and demand a taxpayer bailout. The banks could simply file for bankruptcy and exert social pressure via public outcry, protests and demands of the people that Congress consider another bailout. In this scenario, the parent company gets saved and not the subsidiaries. This tactic is a reserve version of what happened after the crash in 2008. Regarding the bank’s contingency plans, JPMorgan’s “hypothetical death”would see the bank downsize by a 3rd and provide a resolve for the bank “without systemic disruption or taxpayer support”. Citigroup has proposed shrinking by selling off $300 billion in corporate assets and “cut US retail banking to about $200 billion”; as well as get rid of broker-dealers.
  • Mark Costigilo, spokesperson for Citigroup, explained that should Citigroup go into bankruptcy, their living will “demonstrates that we can do so without the use of taxpayer funds and without adverse systemic impact.” And Bank of America (BoA) stated that their rise out of bankruptcy would involve the unloading of $1.2 trillion in assets; as well as “shedding most of … non-bank operations”. Last year, the major banks were told to revise previously submitted living wills because their plans did not provide a “credible or clear path through bankruptcy that doesn’t require unrealistic assumptions and direct or indirect public support.” All of this adds up to a bail-in, as predicted by economic analyst Jim Sinclair who said: “Bail-ins are coming to North America without any doubt, and will be remembered as the ‘Great Leveling,’ of the ‘great Flushing’ (of Lehman Brothers). Not only can it happen here, but it will happen here. It stands on legal grounds by legal precedent both in the U.S., Canada and the U.K.”
  • Sinclair pointed out: “Bail-ins do not require a crisis to occur and can surface one bank at a time, spread out over years. The major situation is deposits above insurance levels in banks too big to fail. Those deposits are directly in harm’s way.”
Gary Edwards

Tomgram: Michael Klare, Superpower in Distress | TomDispatch - 0 views

  • In response, the Obama administration dispatched thousands of new advisers and trainers and began shipping in piles of new weaponry to re-equip the Iraqi army.  It also filled Iraqi skies with U.S. planes armed with their own munitions to destroy, among other things, some of that captured U.S. weaponry.  Then it set to work standing up a smaller version of the Iraqi army.  Now, skip nearly a year ahead and on a somewhat lesser scale the whole process has just happened again.  Less than two weeks ago, Islamic State militants took Ramadi, the capital of Anbar Province.  Iraqi army units, including the elite American-trained Golden Division, broke and fled, leaving behind -- you’ll undoubtedly be shocked to hear -- yet another huge cache of weaponry and equipment, including tanks, more than 100 Humvees and other vehicles, artillery, and so on. The Obama administration reacted in a thoroughly novel way: it immediately began shipping in new stocks of weaponry, starting with 1,000 antitank weapons, so that the reconstituted Iraqi military could take out future “massive suicide vehicle bombs” (some of which, assumedly, will be those captured vehicles from Ramadi).  Meanwhile, American planes began roaming the skies over that city, trying to destroy some of the equipment IS militants had captured.
  • Notice anything repetitive in all this -- other than another a bonanza for U.S. weapons makers?  Logically, it would prove less expensive for the Obama administration to simply arm the Islamic State directly before sending in the air strikes
  • In any case, what a microcosm of U.S. imperial hubris and folly in the twenty-first century all this training and equipping of the Iraqi military has proved to be.  Start with the post-invasion decision of the Bush administration to totally disband Saddam’s army and instantly eject hundreds of thousands of unemployed Sunni military men and a full officer corps into the chaos of the “new” Iraq and you have an instant formula for creating a Sunni resistance movement.  Then, add in a little extra “training” at Camp Bucca, a U.S. military prison in Iraq, for key unemployed officers, and -- Voilà! -- you’ve helped set up the petri dish in which the leadership of the Islamic State movement will grow.  Multiply such stunning tactical finesse many times over globally and, as TomDispatch regular Michael Klare makes clear today, you have what might be called the folly of the “sole superpower” writ large. Tom
  • ...9 more annotations...
  • Delusionary Thinking in Washington The Desperate Plight of a Declining Superpower By Michael T. Klare
  • Take a look around the world and it’s hard not to conclude that the United States is a superpower in decline. Whether in Europe, Asia, or the Middle East, aspiring powers are flexing their muscles, ignoring Washington’s dictates, or actively combating them. Russia refuses to curtail its support for armed separatists in Ukraine; China refuses to abandon its base-building endeavors in the South China Sea; Saudi Arabia refuses to endorse the U.S.-brokered nuclear deal with Iran; the Islamic State movement (ISIS) refuses to capitulate in the face of U.S. airpower. What is a declining superpower supposed to do in the face of such defiance? This is no small matter. For decades, being a superpower has been the defining characteristic of American identity. The embrace of global supremacy began after World War II when the United States assumed responsibility for resisting Soviet expansionism around the world; it persisted through the Cold War era and only grew after the implosion of the Soviet Union, when the U.S. assumed sole responsibility for combating a whole new array of international threats. As General Colin Powell famously exclaimed in the final days of the Soviet era, “We have to put a shingle outside our door saying, ‘Superpower Lives Here,’ no matter what the Soviets do, even if they evacuate from Eastern Europe.”
  • The problem, as many mainstream observers now acknowledge, is that such a strategy aimed at perpetuating U.S. global supremacy at all costs was always destined to result in what Yale historian Paul Kennedy, in his classic book The Rise and Fall of the Great Powers, unforgettably termed “imperial overstretch.” As he presciently wrote in that 1987 study, it would arise from a situation in which “the sum total of the United States’ global interests and obligations is… far larger than the country’s power to defend all of them simultaneously.”
  • The first of two approaches to this conundrum in Washington might be thought of as a high-wire circus act.  It involves the constant juggling of America’s capabilities and commitments, with its limited resources (largely of a military nature) being rushed relatively fruitlessly from one place to another in response to unfolding crises, even as attempts are made to avoid yet more and deeper entanglements. This, in practice, has been the strategy pursued by the current administration.  Call it the Obama Doctrine.
  • In other words, whoever enters the Oval Office in January 2017 will be expected to wield a far bigger stick on a significantly less stable planet. As a result, despite the last decade and a half of interventionary disasters, we’re likely to see an even more interventionist foreign policy with an even greater impulse to use military force.
  • The first step in any 12-step imperial-overstretch recovery program would involve accepting the fact that American power is limited and global rule an impossible fantasy.
  • Accepted as well would have to be this obvious reality: like it or not, the U.S. shares the planet with a coterie of other major powers -- none as strong as we are, but none so weak as to be intimidated by the threat of U.S. military intervention.
  • Having absorbed a more realistic assessment of American power, Washington would then have to focus on how exactly to cohabit with such powers -- Russia, China, and Iran among them -- and manage its differences with them without igniting yet more disastrous regional firestorms. 
  • fewer military entanglements abroad, a diminishing urge to garrison the planet, reduced military spending, greater reliance on allies, more funds to use at home in rebuilding the crumbling infrastructure of a divided society, and a diminished military footprint in the Middle East.
  •  
    Thanks Marbux! "Think of this as a little imperial folly update -- and here's the backstory.  In the years after invading Iraq and disbanding Saddam Hussein's military, the U.S. sunk about $25 billion into "standing up" a new Iraqi army.  By June 2014, however, that army, filled with at least 50,000 "ghost soldiers," was only standing in the imaginations of its generals and perhaps Washington.  When relatively small numbers of Islamic State (IS) militants swept into northern Iraq, it collapsed, abandoning four cities -- including Mosul, the country's second largest -- and leaving behind enormous stores of U.S. weaponry, ranging from tanks and Humvees to artillery and rifles.  In essence, the U.S. was now standing up its future enemy in a style to which it was unaccustomed and, unlike the imploded Iraqi military, the forces of the Islamic State proved quite capable of using that weaponry without a foreign trainer or adviser in sight."
Paul Merrell

18 Signs That The Global Economic Crisis Is Accelerating As We Enter The Last Half Of 2014 - 0 views

  • #1 The Bank for International Settlements has issued a new report which warns that "dangerous new asset bubbles" are forming which could potentially lead to another major financial crisis.  Do the central bankers know something that we don't, or are they just trying to place the blame on someone else for the giant mess that they have created? #2 Argentina has missed a $539 million debt payment and is on the verge of its second major debt default in 13 years. #3 Bulgaria is desperately trying to calm down a massive run on the banks that threatens of spiral out of control. #4 Last month, household loans in the eurozone declined at the fastest rate ever recorded.  Why are European banks holding on to their money so tightly right now? #5 The number of unemployed jobseekers in France has just soared to another brand new record high.
  • #6 Economies all over Europe are either showing no growth or are shrinking.  Just check out what a recent Forbes article had to say about the matter... Italy’s economy shrank by 0.1% in the first three months of 2014, matching the average of the three previous quarters. After expanding 0.6% in Q2 2013, France recorded zero growth. Portugal shrank 0.7%, following positive numbers in the preceding nine months. While figures weren’t available for Greece and Ireland in Q1, neither country is showing progress. Greek GDP dropped 2.5% in the final three months of last year, and Ireland limped ahead at 0.2%. #7 A few days ago it was reported that consumer prices in Japan are rising at the fastest pace in 32 years.
  • #8 Household expenditures in Japan are down 8 percent compared to one year ago. #9 U.S. companies are drowning in massive amounts of debt, but the corporate debt bubble in China is so bad that the amount of corporate debt in China has actually now surpassed the amount of corporate debt in the United States. #10 One Chinese auditor is warning that up to 80 billion dollars worth of loans in China are backed by falsified gold transactions.  What will that do to the price of gold and the stability of Chinese financial markets as that mess unwinds? #11 The unemployment rate in Greece is currently sitting at 26.7 percent and the youth unemployment rate is 56.8 percent.
  • ...2 more annotations...
  • #12 67.5 percent of the people that are unemployed in Greece have been unemployed for over a year. #13 The unemployment rate in the eurozone as a whole is 11.8 percent - just a little bit shy of the all-time record of 12.0 percent. #14 The European Central Bank is so desperate to get money moving through the system that it has actually introduced negative interest rates. #15 The IMF is projecting that there is a 25 percent chance that the eurozone will slip into deflation by the end of next year. #16 The World Bank is warning that "now is the time to prepare" for the next crisis. #17 The economic conflict between the United States and Russia continues to deepen.  This has caused Russia to make a series of moves away from the U.S. dollar and toward other major currencies.  This will have serious ramifications for the global financial system as time rolls along.
  • #18 Of course the U.S. economy is struggling right now as well.  It shrank at a 2.9 percent annual rate during the first quarter of 2014, which was much worse than anyone had anticipated.
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

Top Stories - U.S. has Military Bases in at least 38 Countries and Sent Weapons to 94 C... - 0 views

  • The old recruiting slogan was “Join the Navy and See the World.” Those advertisements were prescient; the U.S. military has a presence of some kind in 171 nations and jurisdictions in addition to the United States and its possessions. Many times the presence is one officer as a military attaché or similar post or even a military dependent. But some countries host significant numbers of members of the U.S. armed forces. The two countries hosting the most members of the U.S. military are the two the U.S. conquered in World War II. There were 49,503 members of the military in Japan as of the end of last year, according to the Department of Defense. Germany was next with 38,826 members of the U.S. armed forces stationed there. Although it’s difficult to nail down the exact worldwide number of U.S. military sites, the most recent Department of Defense report lists buildings in 38 foreign nations and territories. The U.S. has 179 bases in Germany and 109 installations in Japan.
  • Other countries have much smaller U.S. contingents. Greenland is the home of 142 lucky Air Force personnel. Fourteen members of different military branches are now stationed in Vietnam, 40 years after U.S. troops abandoned the ill-fated war there. And there’s likely a very short line at the PX in Mongolia; only four U.S. military personnel are stationed in that land-locked Asian nation. Indeed, U.S. bases can come in a variety of shapes and sizes, according to David Vine, author of Base Nation: How US Military Bases Abroad Harm America and the World. They include “small radar facilities in Peru and Puerto Rico….Even military resorts and recreation areas in places like Tuscany and Seoul are bases of a kind; worldwide, the military runs more than 170 golf courses.” Even where the U.S. doesn’t send military personnel, the U.S. does send weapons. The United States is the world largest arms exporter. From 2010 to 2014, Americans sent weapons to at least 94 countries, according to a report (pdf) by the Stockholm International Peace Research Institute (SIPRI). The country that got the largest share of the weaponry was South Korea, at 9%, followed by the United Arab Emirates at 8% and Australia at 8%. The United States accounts for 31% of the world’s arms exports, followed by Russia at 27% and China at 5%.
  • These Are All the Countries Where the U.S. Has a Military Presence (by Annalisa Merelli, Quartz) Base Structure Report: Fiscal Year 2014 Baseline (Department of Defense) (pdf) Trends in International Arms Transfers, 2014 (by Pieter D. Wezeman and Siemon T. Wezeman, SIPRI) (pdf) U.S. Will Close 15 Military Bases in Europe, but Keep Troop Levels the Same (by Steve Straehley, AllGov) U.S. Dominates Weapons Export Market as Profits Grow with Sales to the Middle East (by Noel Brinkerhoff, AllGov)
Paul Merrell

Corp Fueling Fentanyl Overdose Epidemic Lobbying to Keep Weed Illegal - 0 views

  • In 2016, cannabis is still illegal in many parts of the country, and pharmaceutical giant Insys Therapeutics Inc., a manufacturer of fentanyl, just demonstrated much of the reason why. Arizona is currently gearing up to vote on legalizing recreational cannabis. Ahead of that vote, Insys just contributed $500,000 in the fight against Proposition 205, U.S. News and other outlets report. The Arizona-based pharmaceutical company recently gave the funds to Arizonans for Responsible Drug Policy, an anti-legalization campaign group actively fighting to defeat the ballot measure. Insys’s contributions are particularly unsettling considering the company currently markets only one product — a spray version of fentanyl, a powerful opiate. Fentanyl has become one of the country’s most dangerous prescription drugs. It is more potent than traditional addictive opiates, which already claim thousands of lives every year and drive addicts to graduate to heroin use. Fentanyl is 50 times stronger than heroin and has been linked to a growing number of deaths in the United States. It isparticularly dangerous when sold on the street and cut with other drugs. Fentanyl has been blamed for worsening the sharp rise in heroin overdoses as dealers across the country have begun adding it to heroin to make it stronger.
  • Colorado has lower rates of teen cannabis consumption than the national average, and studies have shown driving while under the influence of the plant is far less dangerous than alcohol, a legal drug. Colorado has seen a spike intourism, business, and tax revenues as a result of legalization. Interestingly, a study by Johns Hopkins university last year found states with medical marijuana had lower rates of overdose from opiates. In spite of Arizonans for Responsible Drug Policy’s claims they care about communities, it is completely comfortable taking half a million dollars from a company that produces one of the most toxic and addictive drugs on the market. Unsurprisingly, Insys previously sold a synthetic cannabis product and has already gained approval from the FDA to launch a similar one in the near future. These business ventures provide an even deeper understanding of why they oppose legalization.
  • Insys’s donation is the largest any group associated with Proposition 205 has received. Around the country, the pharmaceutical fight against legalization is joined by the tobacco lobby, the alcohol lobby, the private prison lobby, and law enforcement.
  •  
    Interesting to watch the various marijuana legalization measures in different states. The lobby money to oppose it has overwhelmingly come from organizations whose financial oxen would be gored, the pharmaceutical lobby, tobacco lobby, alcohol lobby, private prison lobby, and law enforcement lobby. On the latter, state and local law enforcement get huge federal subsidies for drug law enforcement, plus forfeiture of properties in drug cases are a huge source of revenue for law enforcement.
Paul Merrell

Forget Metadata ... The NSA Is Spying On EVERYTHING Washington's Blog - 0 views

  • The NSA’s spying on everyone’s metadata can tell them just about everything about us … and it violates our Constitutional right to freedom of association. But people are getting distracted from the big picture by focusing on metadata. As security expert Bruce Schneier wrote yesterday: What frustrates me about all of this — [the Privacy and Civil Liberties Oversight Board] report, the president’s speech, and so many other things — is that they focus on the bulk collection of cell phone call records. There’s so much more bulk collection going on — phone calls, e-mails, address books, buddy lists, text messages, cell phone location data, financial documents, calendars, [smartphone apps] etc. — and we really need legislation and court opinions on it all. But because cell phone call records were the first disclosure, they’re what gets the attention. Indeed, Schneier confirmed last October what we’ve been saying for years … don’t get too distracted by the details, because the government is spying on everything:
  • Honestly, I think the details matter less and less. We have to assume that the NSA has EVERYONE who uses electronic communications under CONSTANT surveillance. New details about hows and whys will continue to emerge …but the big picture will remain the same. He’s right. As just one example, there is substantial evidence from top NSA and FBI whistleblowers that the government is recording the content of our calls and emails … word-for-word. So what should we make of the government’s denials that it records content? Given that the government has been caught lying about spying again and again, I’m not sure how much weight we should give to such denials. NSA whistleblower Russ Tice notes: They’re collecting content … word-for-word. *** You can’t trust these people. They lie, and they lie a lot.
  •  
    Personally, I don't think the focus is on metadata because it was the first target exposed. I see it more as a propaganda weapon to divert attention from the other NSA targets.  In any event, this page offers a very comprehensive list of the types of data the NSA is collecting, with links to further information on each type.
Paul Merrell

Libya Coming Full Circle. When A Deemed "Conspiracy Theory" Becomes Reality | Global Re... - 0 views

  • In the duration of the “revolutionary frenzy” that categorized western media coverage of the Libyan Civil War in 2011, public audiences were captivated with both tales of rebels aspiring for “democracy” and with complimenting stories of unabated brutality by Gaddafi forces. Without any serious mainstream criticism, an imperialist mythology centered on the interventionist doctrine of the “Responsibility to Protect” was cemented in public consciousness with even usually non-mainstream and “anti-imperialist” figures such as Juan Cole deliberately misrepresenting the situation in Libya. In Cole’s perspective, no reference to armed militants from the start of the conflict or the role of extremism and western premeditation found its way into the narrative and he predicted a simplistic narrative where the overthrow of Gaddafi would lead the region into an era of unity, prosperity and freedom. Libya Today How is Libya today? If one denied the existence of hell, they need not look further than Libya to observe a case of hell on Earth. Libya as a functioning, cohesive state has virtually ceased to exist, having been replaced by a myriad of conflicting factions divided on tribal and religious lines. While mainstream media tends to obscure the identity of these factions and their connection to western imperialists, Eric Draitser in his analysis, “Benghazi, the CIA, and the War in Libya” shows the beyond the fractious infighting, both primary factions engaging in direct combat have been beneficiaries of the NATO imperialist powers in their systematic aggression against the Libyan state.
  • “Confirmed: U.S. Armed Al Qaeda to Topple Libya’s Gaddaffi” with a very astonishing admission by “top military officers, CIA insiders and think-tankers” confirming the obvious truth that “conspiracy theorists” have been saying since 2011. The US backed Al Qaeda in Libya and that the Benghazi attack was a byproduct of this. Washington’s Blog notes that in 2012, it documented that: The U.S. supported opposition which overthrew Libya’s Gadaffi was largely comprised of Al Qaeda terrorists. According to a 2007 report by West Point’s Combating Terrorism Center’s center, the Libyan city of Benghazi was one of Al Qaeda’s main headquarters – and bases for sending Al Qaeda fighters into Iraq – prior to the overthrow of Gaddafi: The Hindustan Times reported last year: “There is no question that al Qaeda’s Libyan franchise, Libyan Islamic Fighting Group, is a part of the opposition,” Bruce Riedel, former CIA officer and a leading expert on terrorism, told Hindustan Times. It has always been Qaddafi’s biggest enemy and its stronghold is Benghazi. Al Qaeda is now largely in control of Libya.  Indeed, Al Qaeda flags were flown over the Benghazi courthouse once Gaddafi was toppled. What was once deemed conspiracy theory became confirmed reality when the Daily Mail reported as Washington’s Blog subsequently pointed out:
  • A self-selected group of former top military officers, CIA insiders and think-tankers, declared Tuesday in Washington that a seven-month review of the deadly 2012 terrorist attack has determined that it could have been prevented – if the U.S. hadn’t been helping to arm al-Qaeda militias throughout Libya a year earlier. ‘The United States switched sides in the war on terror with what we did in Libya, knowingly facilitating the provision of weapons to known al-Qaeda militias and figures,’ Clare Lopez, a member of the commission and a former CIA officer, told MailOnline. She blamed the Obama administration for failing to stop half of a $1 billion United Arab Emirates arms shipment from reaching al-Qaeda-linked militants. ‘Remember, these weapons that came into Benghazi were permitted to enter by our armed forces who were blockading the approaches from air and sea,’ Lopez claimed. ‘They were permitted to come in. … [They] knew these weapons were coming in, and that was allowed.. ‘The intelligence community was part of that, the Department of State was part of that, and certainly that means that the top leadership of the United States, our national security leadership, and potentially Congress – if they were briefed on this – also knew about this.’
  • ...4 more annotations...
  • ‘The White House and senior Congressional members,’ the group wrote in an interim report released Tuesday, ‘deliberately and knowingly pursued a policy that provided material support to terrorist organizations in order to topple a ruler [Muammar Gaddafi] who had been working closely with the West actively to suppress al-Qaeda.’ ‘Some look at it as treason,’ said Wayne Simmons, a former CIA officer who participated in the commission’s research. While Wayne Simmons’ characterization of such actions by the globalist, imperialist establishment in the United States as “treason” is correct in the sense that it was a clear violation of not only the Constitution, but the public interest of America, there is a rather disingenuous factor involved when some people, especially on the Neo-Con right, attempt to play the “treason card.”
  • Clearly the Neo-Con agenda has been coming full circle since the first Gulf War in the 1990s. The US “gun-walking” to jihadis in Syria from Libya, noted by the Washington Times and New York Times (albeit with partisan spin and distortion), was actually planned under Bush in 2007 as noted by Seymour Hersh in “The Redirection.” It has continued under Obama, influenced by Council on Foreign Relations figures throughout both administrations from Dick Cheney to Hillary Clinton. Consider the following points from “The Redirection”: To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda.
  • To dispel critics’ notions that this is passive, uncontrollable, and indirect support, consider: [Saudi Arabia's] Bandar and other Saudis have assured the White House that “they will keep a very close eye on the religious fundamentalists. Their message to us was ‘We’ve created this movement, and we can control it.’ It’s not that we don’t want the Salafis to throw bombs; it’s who they throw them at—Hezbollah, Moqtada al-Sadr, Iran, and at the Syrians, if they continue to work with Hezbollah and Iran. Neo-Conservative writer Gary Gambill would ride on this wave of terrorist aggression and pen an article for the Neo-Con “Middle East Forum” titled “Two Cheers for Syrian Islamists.” As noted in the analysis of the piece by Tony Cartalucci titled “Globalist Rag Gives ‘Two Cheers’ for Terrorism”, one can see how terrorism is a useful piece of capital of globalist imperialism that is easy to hide in the sight of inattentive masses with easy ploys of political spin and plausible deniability.
  • Libyan terrorists are invading Syria. They have been doing so since the influx of jihadis began, enabled by outside powers. These are not simply rogue networks operating independently but rather include state-sponsorship, especially of NATO-member Turkey and NATO’s criminal proxy government in Tripoli, Libya. We are told by the media that the regime in Tripoli under the auspice of the National Transitional Council, and populated with puppets like Mustapha Abdul Jalil, is a moderate regime distinct from the “marginal Islamist forces.” However, even in mainstream accounts, one can note that these “official, moderate” groups are involved with funding terrorism themselves as many geopolitical analysts have noted. Tony Cartalucci notes that, “In November 2011, the Telegraph in their article, “Leading Libyan Islamist met Free Syrian Army opposition group,” would report”: Abdulhakim Belhadj, head of the Tripoli Military Council and the former leader of the Libyan Islamic Fighting Group, “met with Free Syrian Army leaders in Istanbul and on the border with Turkey,” said a military official working with Mr Belhadj. “Mustafa Abdul Jalil (the interim Libyan president) sent him there.”
  •  
    Lots of documentation on the tawdry moves by the War Party in Libya and Benghazi, now blowing up in their faces. 
Paul Merrell

Tomgram: Nick Turse, A Secret War in 135 Countries | TomDispatch - 0 views

  • You can find them in dusty, sunbaked badlands, moist tropical forests, and the salty spray of third-world littorals. Standing in judgement, buffeted by the rotor wash of a helicopter or sweltering beneath the relentless desert sun, they instruct, yell, and cajole as skinnier men playact under their watchful eyes. In many places, more than their particular brand of camouflage, better boots, and designer gear sets them apart. Their days are scented by stale sweat and gunpowder; their nights are spent in rustic locales or third-world bars. These men -- and they are mostly men -- belong to an exclusive military fraternity that traces its heritage back to the birth of the nation. Typically, they’ve spent the better part of a decade as more conventional soldiers, sailors, marines, or airmen before making the cut. They’ve probably been deployed overseas four to 10 times. The officers are generally approaching their mid-thirties; the enlisted men, their late twenties. They’ve had more schooling than most in the military. They’re likely to be married with a couple of kids. And day after day, they carry out shadowy missions over much of the planet: sometimes covert raids, more often hush-hush training exercises from Chad to Uganda, Bahrain to Saudi Arabia, Albania to Romania, Bangladesh to Sri Lanka, Belize to Uruguay. They belong to the Special Operations forces (SOF), America’s most elite troops -- Army Green Berets and Navy SEALs, among others -- and odds are, if you throw a dart at a world map or stop a spinning globe with your index finger and don’t hit water, they’ve been there sometime in 2015.
  • This year, U.S. Special Operations forces have already deployed to 135 nations, according to Ken McGraw, a spokesman for Special Operations Command (SOCOM).  That’s roughly 70% of the countries on the planet.  Every day, in fact, America’s most elite troops are carrying out missions in 80 to 90 nations, practicing night raids or sometimes conducting them for real, engaging in sniper training or sometimes actually gunning down enemies from afar. As part of a global engagement strategy of endless hush-hush operations conducted on every continent but Antarctica, they have now eclipsed the number and range of special ops missions undertaken at the height of the conflicts in Iraq and Afghanistan.   In the waning days of the Bush administration, Special Operations forces (SOF) were reportedly deployed in only about 60 nations around the world.  By 2010, according to the Washington Post, that number had swelled to 75.  Three years later, it had jumped to 134 nations, “slipping” to 133 last year, before reaching a new record of 135 this summer.  This 80% increase over the last five years is indicative of SOCOM’s exponential expansion which first shifted into high gear following the 9/11 attacks.
  • Special Operations Command’s funding, for example, has more than tripled from about $3 billion in 2001 to nearly $10 billion in 2014 “constant dollars,” according to the Government Accountability Office (GAO).  And this doesn’t include funding from the various service branches, which SOCOM estimates at around another $8 billion annually, or other undisclosed sums that the GAO was unable to track.  The average number of Special Operations forces deployed overseas has nearly tripled during these same years, while SOCOM more than doubled its personnel from about 33,000 in 2001 to nearly 70,000 now.
Paul Merrell

American Democracy is Owned by the Rich | Al Jazeera America - 1 views

  • Two new studies by political scientists offer compelling evidence that the rich use their wealth to control the political system and that the U.S. is a democratic republic in name only. In a study of Senate voting patterns, Michael Jay Barber found that “senators’ preferences reflect the preferences of the average donor better than any other group.” In a similar study of the House of Representatives, Jesse H. Rhodes and Brian F. Schaffner found that, “millionaires receive about twice as much representation when they comprise about 5 percent of the district’s population than the poorest wealth group does when it makes up 50 percent of the district.” In fact, the increasing influence of the rich over Congress is the leading driver of polarization in modern politics, with the rich using the political system to entrench wealth by pushing for tax breaks and blocking redistributive policies.
  • At the turn of the decade, political scientists Larry Bartels, Jacob Hacker and Martin Gilens wrote several incredibly influential important books arguing, persuasively, that the preferences of the rich were better represented in Congress than the poor. After the books were published, there was a flurry of research arguing that they had overstated their case. Critics alleged two key defects in Bartels’ and Gilens’ arguments. First, because polling data on the super-wealthy were sparse, it was difficult to prove that there were large differences in opinion. Political scientists often rely on composite measures of policy liberalism, but since the poor tend to be more economically liberal but socially conservative, the differences between the poor and moderately rich can often be obscured. Second, there was no way to show that influence of the wealthy was caused directly by the influence of money. It might well be that the rich are simply opinion leaders or are more likely to vote.
  • Recent research offers compelling answers to these criticisms. The new evidence adds credence to the Bartels-Gilens-Hacker view that money is corrupting American politics. By using a massive database of ideology that includes the super wealthy, Schaffner and Rhodes found that “members of Congress are much more responsive to the wealthy than to their poor constituents.” However, this difference is not equal between both parties; rather, Democrats are far more responsive to the poor than Republicans. (This is not surprising; other research supports this claim.) They find that both parties strongly favor the upper-middle class, those with $100,000 to $300,000 in wealth. But Republicans are not only more responsive to the rich, but particularly to rich donors. Schaffner and Rhodes argue that, “campaign donations, but not voter registration or participation in primary or general election, may help explain the disproportionate influence of the wealthy among Republican representatives.” Barber’s study is the first to directly examine the policy preferences of the donor class. Barber sent 20,500 letters to people who contributed to 22 Senate elections in 2012 and asked about various policy questions. This allowed Barber to examine the differences in representation between donors and non-donors. His finding: Donors’ preferences tend to be far better represented than non-donors’. The chart below measures the ideological differences between various groups, with 0 indicating a perfect fit. The data show that Senators are almost perfectly aligned with their donors, but rather distant from voters.
  • ...5 more annotations...
  • In fact, politicians are almost perfectly aligned with donors, but less aligned with partisans (people who voted for the Senator and share party affiliation), supporters (people who voted for the Senator) and voters in general. He Barber also finds that donors tend to be far more extreme in their views (see chart below). For instance, while about sixty percent of non-donor Republicans oppose the Affordable Care Act, opposition among donors is “almost unanimous.” Barber also notes that donors tend to be far more extreme than non-donors (see chart). (This is supported by other studies).
  • Such data could explain the rising polarization of Congress, as politicians increasingly respond to their donors, rather than to voters. Political scientists Walter J. Stone and Elizabeth N. Simas have found that challengers raise more money when they take extreme positions, which helps explain why incumbent representatives tend to be more partisan than departing representatives. It certainly explains the intransigence of the last two Congresses: Republicans, who are responding to their rich donor base, are incentivized to oppose any action, particularly those supporting Obama, lest they lose funding. Since Senators have to raise approximately $3,300 a day every year for six years to remain viable, they will inevitably have to succumb to the power of money if they wish to be reelected. This research raises the disturbing thought that our political system is no longer representative. As Barber notes, about half of all donors are from out of state, meaning that politicians are no longer responsive to their voters (though they are slightly more during election years). Given that only .22 percent of Americans made a donation of more than $200 (the level Barber studies) in 2014, we have power evidence that America is now a government of the one percent — indeed, of the one-fifth of one percent.
  • This disturbing trend affects politics at all levels. At the state level, political scientists Gerald Wright and Elizabeth Rigby found that state party platforms are far more influenced by the rich than the poor. Elsewhere, Barber found evidence that presidents are more responsive to donors than non-donors. Recently Griffin and Newman found representation gaps between whites and people of color as well as low-income voters. This finding is supported by Christopher Ellis, who found that donors were better represented than non-donors (although using a less comprehensive method than Barber). In a frank moment, U.S. Sen. Chris Murphy (D – Conn.) said, “I talked a lot more about carried interest inside of that call room than I did in the supermarket.” He’s correct: Donors tending to be far richer and wealthier than non-donors (see chart).
  • There are still unanswered questions. It is possible that politicians cast ideological votes to appease donors and partisans (for instance, the vain attempt to repeal the Affordable Care Act dozens of times), while also working to benefit the poor and middle class through less visible means. This might explain why political journalists, who often focus on major legislation, miss the distributional impacts of political appointments and regulatory action. It may be that politicians work to maximize votes, and then political donations follow (though there is strong evidence this isn’t the case). Either way, the most up-to-date evidence strongly suggests that money is distorting our system, and that evidence appears to be growing stronger by the day.
  • The solution, as a recent Demos report suggests, is to help reformist candidates gather donations with a public matching system. Since voters who are non-donors are less ideological, the solution is to balance out the political distortions from the donor class by turning these non-donors into donors. Citizens United has only increased the stranglehold of moneyed interests on our political system, and is daily choking the life of our democracy. Only by restoring influence to all voters will our republic be restored.
Paul Merrell

NSA surveillance may be legal - but it's unconstitutional - The Washington Post - 0 views

  • Laura K. Donohue is a professor at Georgetown University Law Center and director of Georgetown’s Center on National Security and the Law. The National Security Agency’s recently revealed surveillance programs undermine the purpose of the Foreign Intelligence Surveillance Act, which was established to prevent this kind of overreach. They violate the Fourth Amendment’s guarantee against unreasonable search and seizure. And they underscore the dangers of growing executive power.
  • Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online data including e-mails, photographs, documents and connection logs. The information that can be assembledabout any one person — much less organizations, social networks and entire communities — is staggering: What we do, think and believe.The government defends the programs’ legality, saying they comply with FISA and its amendments. It may be right, but only because FISA has ceased to provide a meaningful constraint.Under the traditional FISA, if the government wants to conduct electronic surveillance, it must make a classified application to a special court, identitying or describing the target. It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the facilities to be monitored will be used by the target.In 2008, Congress added section 702 to the statute, allowing the government to use electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court order for each target. A U.S. citizen may not intentionally be targeted.To the extent that the FISC sanctioned PRISM, it may be consistent with the law. But it is disingenuous to suggest that millions of Americans’ e-mails, photographs and documents are “incidental” to an investigation targeting foreigners overseas.
  • Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online data including e-mails, photographs, documents and connection logs. The information that can be assembledabout any one person — much less organizations, social networks and entire communities — is staggering: What we do, think and believe.The government defends the programs’ legality, saying they comply with FISA and its amendments. It may be right, but only because FISA has ceased to provide a meaningful constraint.
  • ...3 more annotations...
  • Under the traditional FISA, if the government wants to conduct electronic surveillance, it must make a classified application to a special court, identitying or describing the target. It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the facilities to be monitored will be used by the target.In 2008, Congress added section 702 to the statute, allowing the government to use electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court order for each target. A U.S. citizen may not intentionally be targeted.To the extent that the FISC sanctioned PRISM, it may be consistent with the law. But it is disingenuous to suggest that millions of Americans’ e-mails, photographs and documents are “incidental” to an investigation targeting foreigners overseas.The telephony metadata program raises similar concerns. FISA did not originally envision the government accessing records. Following the 1995 Oklahoma City bombing, Congress allowed applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further expanded FISA to give the government access to any business or personal records. Under section 215 of the Patriot Act, the government no longer has to prove that the target is a foreign power. It need only state that the records are sought as part of an investigation to protect against terrorism or clandestine intelligence.
  • The telephony metadata program raises similar concerns. FISA did not originally envision the government accessing records. Following the 1995 Oklahoma City bombing, Congress allowed applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further expanded FISA to give the government access to any business or personal records. Under section 215 of the Patriot Act, the government no longer has to prove that the target is a foreign power. It need only state that the records are sought as part of an investigation to protect against terrorism or clandestine intelligence.This means that FISA can now be used to gather records concerning individuals who are neither the target of any investigation nor an agent of a foreign power. Entire databases — such as telephony metadata — can be obtained, as long as an authorized investigation exists.Congress didn’t pass Section 215 to allow for the wholesale collection of information. As Rep. F. James Sensenbrenner Jr. (R-Wis.), who helped draft the statute, wrote in the Guardian: “Congress intended to allow the intelligence communities to access targeted information for specific investigations. How can every call that every American makes or receives be relevant to a specific investigation?”As a constitutional matter, the Supreme Court has long held that, where an individual has a reasonable expectation of privacy, search and seizure may occur only once the government has obtained a warrant, supported by probable cause and issued by a judge. The warrant must specify the places to be searched and items to be seized.
  • There are exceptions to the warrant requirement. In 1979 the court held that the use of a pen register to record numbers dialed from someone’s home was not a search. The court suggested that people who disclose their communications to others assume the risk that law enforcement may obtain the information.More than three decades later, digitization and the explosion of social-network technology have changed the calculus. In the ordinary course of life, third parties obtain massive amounts of information about us that, when analyzed, have much deeper implications for our privacy than before.As for Section 702 of FISA, the Supreme Court has held that the Fourth Amendment does not protect foreigners from searches conducted abroad. But it has never recognized a foreign intelligence exception to the warrant requirement when foreign-targeted searches result in the collection of vast stores of citizens’ communications.Americans reasonably expect that their movements, communications and decisions will not be recorded and analyzed by the government. A majority of the Supreme Court seems to agree. Last year, the court considered a case involving 28-day GPS surveillance. Justice Samuel Alito suggested that in most criminal investigations, long-term monitoring “impinges on expectations of privacy.” Justice Sonia Sotomayor recognized that following a person’s movements “reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.”The FISC is supposed to operate as a check. But it is a secret court, notorious for its low rate of denial. From 1979 to 2002, it did not reject a single application. Over the past five years, out of nearly 8,600 applications, only two have been denied.
‹ Previous 21 - 40 of 2055 Next › Last »
Showing 20 items per page