Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged terrorism™-history

Rss Feed Group items tagged

Paul Merrell

Netanyahu and Trump: A Shared Focus on Terrorism « LobeLog - 0 views

  • Scholars of terrorism credit a specific 1979 symposium in Jerusalem as a turning point in the U.S. and international usage of “terrorism” as we understand it today. The Jonathan Institute, founded following the death of Benjamin Netanyahu’s brother Yonatan during a raid to rescue hostages from a PLO hijacking, hosted a 1979 conference in Jerusalem— and a follow up in 1984 in Washington—on “International Terrorism.” Directed by Benjamin Netanyahu, the Jonathan Institute maintained close ties to the Israeli government. Current and former Israeli officials across the political spectrum—including Golda Meir, Menachem Begin, Yitzhak Rabin, Ezer Weizman, Moshe Dayan, and Shimon Peres—dominated its administrative committee. Lisa Stampnitsky, in her 2013 book Disciplining Terror, discusses how the Jonathan Institute helped internationalize Israel’s use of the term to describe terrorist violence as both irrational and illegitimate in both means and ends, and as primarily targeting democracies and “the West.” Previously, she notes, terrorism referred largely to rational political violence, either state or individual, and was dealt with as an issue of criminality and law. The shift helped Israel delegitimize the political aims of certain groups, such as the Palestinian resistance to its colonization and territorial occupation. One cannot be a “freedom fighter” if one’s political aims are demonized as illegitimate or irrational. Stampnitsky argues that the shift to using terrorism to describe violence outside the law also set the stage for retaliatory strikes (such as the 1986 U.S. air strikes in Libya in response to a bombing at a Berlin disco that killed an American soldier) and eventually for the doctrine of preemptive force that has characterized the post-9/11 “War on Terror.”
  • Israel’s role in the development of a specifically anti-Muslim discourse of terrorism is deeply intertwined with the foreign policies of American politicians. As Deepa Kumar and others have pointed out, American neocons and Israel’s Likud party jointly developed a shared language around Islamic terrorism. The 1979 Jonathan Institute conference was attended by prominent American officials and political figures, including future President George H.W. Bush and representatives of the American Enterprise Institute, the Center for Strategic and International Studies, and Commentary magazine who brought the ideas, and later a follow-up conference, back to the U.S. Intended to serve as an intervention into the international discourse on terrorism, the explicit aim of the Jerusalem conference was to awaken the Western world to the problem of terrorism as defined by the conference organizers. It contributed to entrenching in the minds of American conservatives what was popularized a few years later as the “clash of civilizations,” firmly situating Israel in the category of Western democracies threatened by Soviets and Palestinians. The follow-up conference in the United States in 1984 went further by emphasizing the relationship between Islam and terror. As Netanyahu himself wrote in the book that came out of the conference: “the battle against terrorism was part of a much larger struggle, one between the forces of civilization and the forces of barbarism.” Then, as now, Netanyahu presented Israel as the bulwark against terrorism, a specific kind of illegitimate political violence that threatens not just Israel but all democracies and the Western world.
  • Echoes of this framing of the debate on terrorism can be found in how Western politicians, including Netanyahu and Trump, discuss the issue. Terrorism, which has no single agreed-upon definition in U.S. or international law, now serves as a moniker applied to all violence that established states deem illegitimate. Most often these days, Western democracies use “terrorism” to describe violence committed by Muslims. As journalist Glenn Greenwald writes, “In other words, any violence by Muslims against the West is inherently ‘terrorism,’ even if targeted only at soldiers at war and/or designed to resist invasion and occupation.” The term functions not as a descriptive tool but an ideological one. It doesn’t merely identify a particular kind of violence. It justifies and even requires a particular kind of forceful response by the state. Israel today presents itself as the world’s expert on counterterrorism. It maintains a profitable security industry predicated on selling expertise and technology tested in its interactions with Palestinians. American tax dollars have been funneled into this industry through U.S. military aid, over 25% of which Israel was allowed to spend domestically (the new military aid deal signed by the Obama White House will phase out this allowance over the next 10 years, sending the rest of the $3.8 billion per year to U.S. defense contractors). The United States and Israel collaborate on counterterrorism initiatives, including joint military exercises and police exchange programs. Here tactics and skills are developed and exchanged for surveillance and violent repression of protests that primarily impact Muslims and people of color in the U.S. and Palestinians and Black Jews in Israel.
  • ...1 more annotation...
  • In this context, Trump’s framing of his anti-Muslim immigration policies as a national security priority to keep out terrorists is nothing new. What is new in this political moment is the extent to which the U.S. public is seeing straight through this discourse and rallying against discrimination and bigotry. Ahead of Trump and Netanyahu’s meeting this week, there’s an opportunity to pay attention to how these discourses have enabled Israel to justify decades of military occupation and human rights abuses with the discourse of national security and counterterrorism. As the Trump administration goes back to the drawing board to devise restrictive immigration policies that will hold up in court, Netanyahu and Israel’s example shouldn’t be far from mind.
Paul Merrell

The Stunning Hypocrisy of the U.S. Government | Washington's Blog - 0 views

  • Congress has exempted itself from the prohibition against trading on inside information … the law that got Martha Stewart and many other people thrown in jail. There are many other ways in which the hypocrisy of the politicians in D.C. is hurting our country. Washington politicians say we have to slash basic services, and yet waste hundreds of billions of dollars on counter-productive boondoggles. If the politicos just stopped throwing money at corporate welfare queens, military and security boondoggles and pork, harmful quantitative easing, unnecessary nuclear subsidies, the failed war on drugs, and other wasted and counter-productive expenses, we wouldn’t need to impose austerity on the people. The D.C. politicians said that the giant failed banks couldn’t be nationalized, because that would be socialism. Instead of temporarily nationalizing them and then spinning them off to the private sector – or breaking them up – the politicians have bailed them out to the tune of many tens of billions of dollars each year, and created a system where all of the profits are privatized, and all of the losses socialized. Obama and Congress promised help for struggling homeowners, and passed numerous bills that they claimed would rescue the little guy. But every single one of these bills actually bails out the banks … and doesn’t really help the homeowner.
  • The Federal Reserve promises to do everything possible to reduce unemployment. But its policies are actually destroying jobs. Many D.C. politicians pay lip service to helping the little guy … while pushing policies which have driven inequality to levels surpassing slave-owning societies. The D.C. regulators pretend that they are being tough on the big banks, but are actually doing everything they can to help cover up their sins. Many have pointed out Obama’s hypocrisy in slamming Bush’s spying programs … and then expanding them (millions more). And in slamming China’s cyber-warfare … while doing the same thing. And – while the Obama administration is spying on everyone in the country – it is at the same time the most secretive administration ever (background). That’s despite Obama saying he’s running the most transparent administration ever.
  • Glenn Greenwald – the Guardian reporter who broke the NSA spying revelations – has documented for many years the hypocritical use of leaks by the government to make itself look good … while throwing the book at anyone who leaks information embarrassing to the government. Greenwald notes today: Prior to Barack Obama’s inauguration, there were a grand total of three prosecutions of leakers under the Espionage Act (including the prosecution of Dan Ellsberg by the Nixon DOJ). That’s because the statute is so broad that even the US government has largely refrained from using it. But during the Obama presidency, there are now seven such prosecutions: more than double the number under all prior US presidents combined.
  • ...3 more annotations...
  • The irony is obvious: the same people who are building a ubiquitous surveillance system to spy on everyone in the world, including their own citizens, are now accusing the person who exposed it of “espionage”. It seems clear that the people who are actually bringing “injury to the United States” are those who are waging war on basic tenets of transparency and secretly constructing a mass and often illegal and unconstitutional surveillance apparatus aimed at American citizens – and those who are lying to the American people and its Congress about what they’re doing – rather than those who are devoted to informing the American people that this is being done.
  • Similarly, journalists who act as mere stenographers for the government who never criticize in more than a superficial fashion are protected and rewarded … but reporters who actually report on government misdeeds are prosecuted and harassed. Further, the biggest terrorism fearmongers themselves actually support terrorism. And see this. In the name of fighting terrorism, the U.S. has been directly supporting Al Qaeda and other terrorists and providing them arms, money and logistical support in Syria, Libya, Mali, Bosnia, Chechnya, Iran, and many other countries … both before and after 9/11. And see this. The American government has long labeled foreigners as terrorists for doing what America does. Moreover, government officials may brand Americans as potential terrorists if they peacefully protest, complain about the taste of their water, or do any number of other normal, all-American things.
  • This is especially hypocritical given that liberals like Noam Chomsky and conservatives like the director of the National Security Agency under Ronald Reagan (Lt. General William Odom) all say that the American government is the world’s largest purveyor of terrorism. As General Odom noted: Because the United States itself has a long record of supporting terrorists and using terrorist tactics, the slogans of today’s war on terrorism merely makes the United States look hypocritical to the rest of the world. These are just a couple of ways in which the D.C. politicians are hypocrites.
Paul Merrell

New Saudi King Tied to Al Qaeda, Bin Laden and Islamic Terrorism Washington's Blog - 0 views

  • We’ve long noted that Saudi Arabia is a huge supporter of terrorism. But the new Saudi king is particularly bad. Investors Business Daily notes: King Salman has a history of funding al-Qaida, and his son has been accused of knowing in advance about the 9/11 attacks. *** Salman once ran a Saudi charity tied to al-Qaida and has been named a defendant in two lawsuits accusing the Saudi royal family of helping the 9/11 terrorists, one of which the U.S. Supreme Court recently let move forward after years of being blocked by the State Department and the well-funded Saudi lobby. Plaintiffs have provided an enormous amount of material to source their accusations against Salman. Here’s why his ascension to the throne is not good news, especially as the terrorism threat grows: • Salman once headed the Saudi High Commission for Relief to Bosnia and Herzegovina, which served as a key charitable front for al-Qaida in the Balkans. • According to a United Nations-sponsored investigation, Salman in the 1990s transferred more than $120 million from commission accounts under his control — as well as his own personal accounts — to the Third World Relief Agency, another al-Qaida front and the main pipeline for illegal weapons shipments to al-Qaida fighters in the Balkans.
  • • A U.N. audit found that the money was transferred following meetings with Salman, transfers that had no legitimate “humanitarian” purpose. • Former CIA officer Robert Baer has reported that an international raid of Saudi High Commission offices found evidence of terrorist plots against America. • Baer also revealed that Salman “personally approved” distribution of funds from the International Islamic Relief Organization, which also has provided material support to al-Qaida. • A recent Gulf Institute report says Salman and former Saudi intelligence chief Prince Turki al-Faisal knowingly aided and abetted al-Qaida in the run-up to 9/11. • Salman works closely with Saudi clerics Saleh al-Moghamsy, a radical anti-Semite, and Safar Hawali, a one-time mentor of Osama bin Laden, according to the Washington Free Beacon. • In “Why America Slept,” author Gerald Posner claimed that Salman’s son Ahmed bin Salman also had ties to al-Qaida and even advance knowledge of the Sept. 11, 2001 attacks.
  • David Andrew Weinberg provides a superb round-up of Salman’s ties to terrorism and extremism: As former CIA official Bruce Riedel astutely pointed out, Salman was the regime’s lead fundraiser for mujahideen, or Islamic holy warriors, in Afghanistan in the 1980s, as well as for Bosnian Muslims during the Balkan struggles of the 1990s. In essence, he served as Saudi Arabia’s financial point man for bolstering fundamentalist proxies in war zones abroad. As longtime governor of Riyadh, Salman was often charged with maintaining order and consensus among members of his family. Salman’s half brother King Khalid (who ruled from 1975 to 1982) therefore looked to him early on in the Afghan conflict to use these family contacts for international objectives, appointing Salman to run the fundraising committee that gathered support from the royal family and other Saudis to support the mujahideen against the Soviets. Riedel writes that in this capacity, Salman “work[ed] very closely with the kingdom’s Wahhabi clerical establishment.” Another CIA officer who was stationed in Pakistan in the late 1980s estimates that private Saudi donations during that period reached between $20 million and $25 million every month. And as Rachel Bronson details in her book, Thicker Than Oil: America’s Uneasy Partnership With Saudi Arabia, Salman also helped recruit fighters for Abdul Rasul Sayyaf, an Afghan Salafist fighter who served as a mentor to both Osama bin Laden and 9/11 mastermind Khalid Sheikh Mohammed.
  • ...7 more annotations...
  • Reprising this role in Bosnia, Salman was appointed by his full brother and close political ally King Fahd to direct the Saudi High Commission for Relief of Bosnia and Herzegovina (SHC) upon its founding in 1992. Through the SHC, Salman gathered donations from the royal family for Balkan relief, supervising the commission until its until its recent closure in 2011. By 2001, the organization had collected around $600 million — nominally for relief and religious purposes, but money that allegedly also went to facilitating arms shipments, despite a U.N. arms embargo on Bosnia and other Yugoslav successor states from 1991 to 1996. And what kind of supervision did Salman exercise over this international commission? In 2001, NATO forces raided the SHC’s Sarajevo offices, discovering a treasure trove of terrorist materials: before-and-after photographs of al Qaeda attacks, instructions on how to fake U.S. State Department badges, and maps marked to highlight government buildings across Washington. The Sarajevo raid was not the first piece of evidence that the SHC’s work went far beyond humanitarian aid. Between 1992 and 1995, European officials tracked roughly $120 million in donations from Salman’s personal bank accounts and from the SHC to a Vienna-based Bosnian aid organization named the Third World Relief Agency (TWRA). Although the organization claimed to be focused on providing humanitarian relief, Western intelligence agencies estimated that the TWRA actually spent a majority of its funds arming fighters aligned with the Bosnian government.
  • A defector from al Qaeda called to testify before the United Nations, and who gave a deposition for lawyers representing the families of 9/11 victims, alleged that both Salman’s SHC and the TWRA provided essential support to al Qaeda in Bosnia, including to his 107-man combat unit. In a deposition related to the 9/11 case, he stated that the SHC “participated extensively in supporting al Qaida operations in Bosnia” and that the TWRA “financed, and otherwise supported” the terrorist group’s fighters. The SHC’s connection to terrorist groups has long been scrutinized by U.S. intelligence officials as well. The U.S. government’s Joint Task Force Guantanamo once included the Saudi High Commission on its list of suspected “terrorist and terrorist support entities.” The Defense Intelligence Agency also once accused the Saudi High Commission of shipping both aid and weapons to Mohamed Farrah Aidid, the al Qaeda-linked Somali warlord depicted as a villain in the movie Black Hawk Down. Somalia was subject to a United Nations arms embargo starting in January 1992. *** The board of trustees for the Prince Salman Youth Center, which Salman himself chairs, today includes Saleh Abdullah Kamel, a Saudi billionaire whose name showed up on a purported list of al Qaeda’s earliest supporters known as the “golden chain.” (The Wall Street Journal reported that Kamel “denies supporting terror.”) But as the United States sought to shut down Saudi charities with ties to terrorism in the aftermath of the 9/11 attacks, Kamel and Salman both condemned the effort as an anti-Islamic witch hunt.
  • In November 2002, Prince Salman patronized a fundraising gala for three Saudi charities under investigation by Washington: the International Islamic Relief Organization, al-Haramain Foundation, and the World Assembly of Muslim Youth. Since 9/11, all three organizations have had branches shuttered or sanctioned over allegations of financially supporting terrorism. That same month, Salman cited his experience on the boards of charitable societies, asserting that “it is not the responsibility of the kingdom” if others exploit Saudi donations for terrorism. *** The new king has also embraced Saudi cleric Saleh al-Maghamsi, an Islamic supremacist who declared in 2012 that Osama bin Laden had more “sanctity and honor in the eyes of Allah,” simply for being a Muslim, than “Jews, Christians, Zoroastrians, apostates, and atheists,” whom he described by nature as “infidels.” That didn’t put an end to Salman’s ties to Maghamsi, however. The new Saudi king recently served as head of the supervisory board for a Medina research center directed by Maghamsi. A year after Maghamsi’s offensive comments, Salman sponsored and attended a large cultural festival organized by the preacher. Maghamsi also advises two of Salman’s sons ….
  • History Commons adds important details: By 1994, if not earlier, the NSA is collecting electronic intercepts of conversations between Saudi Arabian royal family members. Journalist Seymour Hersh will later write, “according to an official with knowledge of their contents, the intercepts show that the Saudi government, working through Prince Salman [bin Abdul Aziz], contributed millions to charities that, in turn, relayed the money to fundamentalists. ‘We knew that Salman was supporting all of the causes,’ the official told me.” By July 1996 or soon after, US intelligence “had more than enough raw intelligence to conclude… bin Laden [was] receiving money from prominent Saudis.” [Hersh, 2004, pp. 324, 329-330] One such alleged charity front linked to Salman is the Saudi High Commission in Bosnia (see 1996 and After). Prince Salman has long been the governor of Riyadh province. At the time, he is considered to be about fourth in line to be king of Saudi Arabia. His son Prince Ahmed bin Salman will later be accused of having connections with al-Qaeda leader Abu Zubaida (see Early April 2002). [PBS, 10/4/2004] It appears this surveillance of Saudi royals will come to an end in early 2001 (see (February-March 2001)).
  • Author Roland Jacquard will later claim that in 1996, al-Qaeda revives its militant network in Bosnia in the wake of the Bosnian war and uses the Saudi High Commission (SHC) as its main charity front to do so. [Jacquard, 2002, pp. 69] This charity was founded in 1993 by Saudi Prince Salman bin Abdul-Aziz and is so closely linked to and funded by the Saudi government that a US judge will later render it immune to a 9/11-related lawsuit after concluding that it is an organ of the Saudi government. [New York Law Journal, 9/28/2005] In 1994, British aid worker Paul Goodall is killed in Bosnia execution-style by multiple shots to the back of the head. A SHC employee, Abdul Hadi al-Gahtani, is arrested for the murder and admits the gun used was his, but the Bosnian government lets him go without a trial. Al-Gahtani will later be killed fighting with al-Qaeda and the Taliban in Afghanistan. [Schindler, 2007, pp. 143-144; Schindler is a professor at the U.S. Army War College] In 1995, the Bosnian Ministry of Finance raids SHC’s offices and discovers documents that show SHC is “clearly a front for radical and terrorism-related activities.” [Burr and Collins, 2006, pp. 145]
  • In 1995, US aid worker William Jefferson is killed in Bosnia. One of the likely suspects, Ahmed Zuhair Handala, is linked to the SHC. He also is let go, despite evidence linking him to massacres of civilians in Bosnia. [Schindler, 2007, pp. 263-264] In 1997, a Croatian apartment building is bombed, and Handala and two other SHC employees are suspected of the bombing. They escape, but Handala will be captured after 9/11 and sent to Guantanamo prison. [Schindler, 2007, pp. 266] In 1997, SHC employee Saber Lahmar is arrested for plotting to blow up the US embassy in Saravejo. He is convicted, but pardoned and released by the Bosnian government two years later. He will be arrested again in 2002 for involvement in an al-Qaeda plot in Bosnia and sent to Guantanamo prison (see January 18, 2002). By 1996, NSA wiretaps reveal that Prince Salman is funding Islamic militants using charity fronts (Between 1994 and July 1996).
  • A 1996 CIA report mentions, “We continue to have evidence that even high ranking members of the collecting or monitoring agencies in Saudi Arabia, Kuwait, and Pakistan – such as the Saudi High Commission – are involved in illicit activities, including support for terrorists” (see January 1996). Jacquard claims that most of the leadership of the SHC supports bin Laden. The SHC, while participating in some legitimate charitable functions, uses its cover to ship illicit goods, drugs, and weapons in and out of Bosnia. In May 1997, a French military report concludes: ”(T)he Saudi High Commission, under cover of humanitarian aid, is helping to foster the lasting Islamization of Bosnia by acting on the youth of the country. The successful conclusion of this plan would provide Islamic fundamentalism with a perfectly positioned platform in Europe and would provide cover for members of the bin Laden organization.” [Jacquard, 2002, pp. 69-71] However, the US will take no action until shortly after 9/11, when it will lead a raid on the SHC’s Bosnia offices. Incriminating documents will be found, including information on how to counterfeit US State Department ID badges, and handwritten notes about meetings with bin Laden. Evidence of a planned attack using crop duster planes is found as well. [Schindler, 2007, pp. 129, 284]
  •  
    So the U.S. invades Afghanistan and Iraq instead of Saudi Arabia? 
Paul Merrell

FBI Celebrates Duping Another Mentally Ill Man Into Fake Terror Plot - 0 views

  • Following a series of similar widely ridiculed so-called “sting” operations, the Federal Bureau of Investigation announced last week that it had foiled yet another “terror plot” that, like virtually every supposed “terrorist” case in recent years, was created and managed from start to finish by the FBI itself. This time, the dupe was a 28-year-old California man, Matthew Aaron Llaneza, with a documented history of mental illness, who apparently believed his government handlers were helping him wage “jihad.” Critics, however, say the whole scheme smacks of entrapment and a waste of taxpayer money. Llaneza was arrested by federal agents on February 7 in Oakland after he supposedly tried to blow up a bogus bomb the FBI helped him create. According to authorities, the mentally ill San Jose suspect planned to detonate the fake explosives outside a Bank of America branch. The alleged plan, officials said, was to start a “civil war” by making it appear as if the attack had been carried out by “anti-government militias,” sparking a crackdown by the government on right-of-center dissidents.       “Unbeknownst to Llaneza, the explosive device that he allegedly attempted to use had been rendered inoperable by law enforcement and posed no threat to the public,” the FBI admitted in a press release celebrating the arrest of its mentally unstable stooge. The man was charged in a criminal complaint with “attempted use of a weapon of mass destruction against property used in an activity that affects interstate or foreign commerce.” If convicted, he could face life in prison.
  • According to the government’s court filings, the mentally ill man met with an undercover FBI agent late last year under mysterious circumstances. The federal official somehow managed to convince the naïve dupe that he was connected to the “Taliban and the mujahidin in Afghanistan” — Islamist forces that were originally armed and trained by the U.S. government before becoming official enemies. From there, federal handlers worked with the man to develop the half-baked plot and the fake bomb to blow something up.  
  •  
    The trend continues. Still no Terrorist™ criminal charges brought against anyone by the FBI other than alleged 9/11 participants that the FBI did not incite to commit an act of Terrorism™; i.e., no real Terrorist™ threat resulting in criminal charges. Hard to justify continuation of all that funding the FBI gets for chasing domestic Terrorists™ if there aren't any, so the FBI continues to manufacture them in sting operations. Not to mention that the whole War on Terror™ government propaganda campaign would fall apart and the TSA would have to stop forcing air passengers to choose between being groped or viewed naked in those nifty body scanners. Heaven forbid that we might begin restoring civil rights and spending those trillions of dollars on the War on Terror™. No! No! We must maintain Cold War military spending as a percentage of GDP or we'd be flooded with unemployed military veterans and former government contractor workers. We only start wars to defend the U.S., not to enrich military contractors, seize natural resources from those that own or control them, enable the banksters to siphon more from a bigger bucket, or  expand the Globalist Empire. We are America! We are the good guys. Our motives for waging the War on Terror™ are entirely altruistic. Ditto for our professional politicians.   Not.     
Paul Merrell

The Legend of the Phoenix - 0 views

  • It would seem the CIA has gone back into their archives, blown the dust off the Phoenix Program, and put it into play again as the “Drone War.” The similarities with the Drone War are readily evident to anyone old enough to know of the Phoenix Program. For those who aren’t old enough or who have forgotten, the Phoenix Program is usually referred to as an assassination program and was the subject of investigation by the Senate’s “Church Committee.” Indisputably, thousands of South Vietnamese civilians were killed under this CIA directed program.
  • Phoenix was far more than a mere assassination program , however. It was a Counter-Insurgency, COIN, program, using the tactic of counter-terrorism, including assassination, against the insurgent’s so-called infrastructure. This was the Vietnamese civilian population in which the insurgent, the Viet Cong guerilla, operated and from some of whom they drew their support. To the U.S., these civilians were the Viet Cong Infrastructure, the VCI. And the VCI was the target to be terrorized by any means necessary in the hope that they would turn against the Viet Cong. The VCI would have included the families, close and extended kinship groups, of alleged active Viet Cong combatants, fellow villagers, and other Vietnamese civilians who were not actively opposed to the Viet Cong. Some of this “support” was voluntary and some coerced. As the Phoenix Program went on, with its assassinations, torture practices, and “disappearances,” more support became voluntary as Vietnamese peasants turned against the U.S. and the South Vietnamese government as a result of the program. An error in identification of a victim was irrelevant to those in control of the program, the CIA, as it still served the purpose of terrorizing the civilian population, which was the true purpose of the program.
  • For the Viet Cong, this was a classic example of achieving the guerilla’s goal of having a civilian population turn against a government by a government’s own harsh over-reaction to the guerilla threat. Today, a guerilla and the people whom they are amongst are deemed “terrorists” if they find themselves on the wrong side of a domestic conflict that the U.S. has taken a side in, such as Yemen. As we saw in Libya, and see in Syria, these guerillas can become instant U.S. allies who must be supported, if, or when, the U.S. makes policy changes. But unless those U.S. policy changes occur, these groups remain part of the global terrorist network of “associated forces” with al Qaeda, in the eyes of CIA and military officials, and targeted with drones. From the relatively large number of civilian victims of drone attacks as claimed by residents of Pakistan’s Federally Administered Tribal Areas (FATA) and the political party, Pakistan Tehreek Insaf (PTI), this Drone Program has all the hallmarks of the Phoenix Program.
  • ...1 more annotation...
  • Without more transparency by the government, no other conclusion can be drawn that the reason we see so many civilians killed by drones, while denying it as John Brennan did, is because we are targeting civilians as the “infrastructure.” While Anwar al-Awlaki was declared to be an “operational leader,” with the extremely elastic category of “infrastructure” as used in Vietnam, his “operational” activity may have only been “spreading antigovernment propaganda and rumors,” as the Rand Corporation put it, which led to his extrajudicial execution. How many other American citizens might that reach?
  •  
    Spot on analysis by a retired Navy lawyer who knows his U.S. military history.The striking parallels he points to between contemporary U.S. drone terrorism and the notorious Viet Nam War Phoenix Program terrorism are no accident. Among the super-hawks of the War Party, there has been a persistent meme that the U.S. military suffered no defeat in Viet Nam, that the vaunted "counter-insurgency" strategy and tactics were working, and that the war was lost by politicians and the American public who lost the nerve to continue the war.  If you put your blinders on firmly enough to pretend that the North and South Vietnamese were separate people, there's an element of truth to that myth. The South Vietnamese Viet Cong guerrillas were decimated by 1970. But the North and South Vietnamese were in fact one people of a single nation, who had united to defeat and evict the French military force. The division into two nations was to have been only a one-year thing, prelude to national election of a government for a reunited Viet Nam. It was the U.S. puppet government of the South that, realizing they could not win the election, reneged on allowing it in the South.  Long before the Viet Cong became a shadow of its former force, the Vietnamese from the North had responded to the betrayal of the treaty by sending North Vietnamese regular army troops ("NVA") to the South, spearheaded by the same battle-hardened men who had defeated the French. And the U.S. military was well and truly overwhelmed by the NVA's strategy and tactics, forced to retreat into strongholds from which they ventured only in force. The NVA's Tet Offensive in 1968 failed to succeed in the effort to capture multiple Vietnamese cities concurrently. But the number, weaponry, and power of their force caused Lyndon Johnson to realize that the U.S. generals had been lying to him, that the U.S. was not on the brink of victory, and that there was a very long slog ahead with an unknown outcome if the U.S. continu
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
Paul Merrell

Tomgram: Engelhardt, The Ten Commandments for a Better American World | TomDispatch - 0 views

  • My War on Terror Letter to an Unknown American Patriot By Tom Engelhardt Dear American Patriot, I wish I knew your name. I’ve been thinking about you, about all of us actually and our country, and meaning to write for a while to explain myself.  Let me start this way: you should feel free to call me an American nationalist.  It may sound ugly as hell, but it’s one way I do think of myself. True, we Americans usually reserve the more kindly word “patriot” for ourselves and use “nationalist” to diss other people who exhibit special feeling for their country.  In the extreme, it’s “superpatriot” for us and “ultranationalist” for them. In any case, here’s how my particular form of nationalism manifests itself. I feel a responsibility for the acts of this country that I don’t feel for those of other states or groups.  When, for instance, a wedding party blows up thanks to a Taliban roadside bomb, or the Islamic State cuts some poor captive’s head off, or Bashar al-Assad’s air force drops barrel bombs on civilians, or the Russians jail a political activist, or some other group or state commits some similar set of crimes, I’m not surprised.  Human barbarity, as well as the arbitrary cruelty of state power, are unending facts of history. They should be opposed, but am I shocked? No.
  • Still -- and I accept the irrationality of this -- when my country wipes out wedding parties in other lands or organizes torture regimes and offshore prison systems where anything goes, or tries to jail yet another whistleblower, when it acts cruelly, arbitrarily, or barbarically, I feel shock and wonder why more Americans don’t have the same reaction. Don’t misunderstand me.  I don’t blame myself for the commission of such acts, but as an American, I do feel a special responsibility to do something about them, or at least to speak out against them -- as it should be the responsibility of others in their localities to deal with their particular sets of barbarians. So think of my last 12 years running TomDispatch.com as my own modest war on terror -- American terror.  We don’t, of course, like to think of ourselves as barbaric, and terror is, almost by definition, a set of un-American acts that others are eager to commit against us.  “They” want to take us out in our malls and backyards.  We would never commit such acts, not knowingly, not with malice aforethought.  It matters little here that, from wedding parties to funerals, women to children, we have, in fact, continued to take “them” out in their backyards quite regularly. Most Americans would admit that this country makes mistakes. Despite our best efforts, we do sometimes produce what we like to call “collateral damage” as we go after the evildoers, but a terror regime? Not us. Never.
  • And this is part of the reason I’m writing you. I keep wondering how, in these years, it’s been possible to hold onto such fictions so successfully. I wonder why, at least some of the time, you aren’t jumping out of your skin over what we do, rather than what they’ve done or might prospectively do to us. Let’s start with an uncomfortable fact of our world that few here care to mention: in one way or another, Washington has been complicit in the creation or strengthening of just about every extreme terror outfit across the Greater Middle East. If we weren’t their parents, in crucial cases we were at least their midwives or foster parents.
  • ...1 more annotation...
  • Start in the 1980s with the urge of President Ronald Reagan and his fundamentalist Catholic spymaster, CIA Director William Casey, to make allies of fundamentalist Islamic movements at a time when their extreme (and extremist) piety seemed attractively anticommunist.  In that decade, in Afghanistan in particular, Reagan and Casey put money, arms, and training where their hearts and mouths were and promoted the most extreme Islamists who were ready to give the Soviet Union a bloody nose, a Vietnam in reverse.
  •  
    Highly recommended reading. But note that, while I've never had occasion to correct Tom Engelhardt before, he errs in attributing the beginning of U.S. involvement with what we now call Al-Qaeda to the Reagan era. In fact, that honor belongs to the Carter Administration, specifically to then National Security Advisor and arch-anti-Communist Zbigniew K. Brzezinski, who wanted to give the Soviet Union its own "Viet Nam moment."  
Paul Merrell

Mastermind of The Bamako Terror Attack Mokhtar Belmokhtar: A CIA Sponsored "Intelligenc... - 0 views

  • In response to the tragic Paris events of November 13, Central Intelligence Agency director  John Brennan  warned that “ISIL is planning additional attacks… It is clear to me that ISIL has an external agenda, that they are determined to carry out these types of attacks.” (Quoted in Daily Telegraph, November 16, 2015) Five days later following the CIA Chief’s  premonition, the Bamako Radisson Hotel Blu in Mali’s capital was the object of a terrorist attack, resulting in  21 people dead. Following the attack and the taking of hostages by the terrorists, French and Malian special forces raided the hotel. US. Africa Command (AFRICOM) also confirmed that US special forces were involved.
  • The Bamako terror operation was allegedly coordinated by Mokhtar Belmokhtar (aka Khaled Abu al-Abbas), leader of an affiliate of Al Qaeda in the Islamic Maghreb (AQIM), the Islamist al-Mulathameen (Masked) Brigade, or “Those who Sign with Blood.” Belmokhtar’s group was created in 2012 in the wake of the war on Libya. His organization has also allegedly been involved in the drug trade, smuggling as well kidnapping operations of foreigners in North Africa.  While his whereabouts are said to be known, French intelligence has dubbed Belmokhtar “the uncatchable”. In June he was reported dead  as a result in a U.S. air strike in Libya. His death was subsequently denied. Based on shaky evidence, The New York Times report below (November 20) concludes that Belmokhtar’s group (together with AQIM) is unequivocally behind the Bamako attacks:
  • A member of Al Qaeda in Africa confirmed Saturday that the attack Friday on a hotel in Bamako, Mali, had been carried out by a jihadist group loyal to Mokhtar Belmokhtar, an Algerian operative for Al Qaeda. The Qaeda member, who spoke via an online chat, said that an audio message and a similar written statement in which the group claimed responsibility for the attack were authentic. The SITE Intelligence Group, which monitors jihadist groups, also confirmed the authenticity of the statement. The Qaeda member, who refused to be named for his protection, said that Mr. Belmokhtar’s men had collaborated with the Saharan Emirate of Al Qaeda in the Islamic Maghreb, … In the audio recording, the group, known as Al Mourabitoun, says it carried out the operation in conjunction with Al Qaeda’s branch in the Islamic Maghreb. The recording was released to the Al Jazeera network and simultaneously to Al Akhbar, … The recording states: “We, in the group of the Mourabitoun [Arabic Rebel Group], in cooperation with our brothers in Al Qaeda in Islamic Maghreb, the great desert area, claim responsibility for the hostage-taking operation in the Radisson hotel in Bamako.” (emphasis added)
  • ...7 more annotations...
  • In turn, the French Minister of Defense acknowledged –prior to the conduct of a police investigation– that the authors of the attack were “most likely” led by Mokhtar Belmokhtar’s group in association with Al Qaeda in the Islamic Maghreb (AQIM). What Defense Minister Jean-Yves Le Drain failed to mention was that both Belmokhtar and AQIM have longstanding links to the CIA, which in turn has a working relationship with France’s  General Directorate for External Security, Direction générale de la sécurité extérieure (DGSE).  Casually ignored by the Western media, the leaders of Al Qaeda in the Islamic Maghreb (AQIM) including Belmokhtar were trained and recruited by the CIA in Afghanistan. Acknowledged by the Washington based Council on Foreign Relations (CFR): Most of AQIM’s major leaders are believed to have trained in Afghanistan during the 1979-1989 war against the Soviets as part of a group of North African volunteers known as “Afghan Arabs” that returned to the region and radicalized Islamist movements in the years that followed. The group is divided into “katibas” or brigades, which are clustered into different and often independent cells. The group’s top leader, or emir, since 2004 has been  Abdelmalek Droukdel, also known as Abou Mossab Abdelwadoud, a trained engineer and explosives expert who has fought in Afghanistan and has roots with the GIA in Algeria. (Council on Foreign Relations, Al Qaeda in the Islamic Maghreb, cfr.org, undated)
  • Mokhtar Belmokhtar: Post Cold War CIA intelligence asset?  The Council on Foreign Relations erroneously describes “Mokhtar Belmokhtar as the one-eyed veteran of the anti-Soviet Afghan insurgency.” (CFR, op cit, emphasis added). Belmokhtar (born in 1972) did not fight in the Soviet-Afghan war (1979-1989). He was recruited in 1991 at the age of 19 in the immediate wake of the Cold War. CIA recruitment continued in the wake of the Cold War. It was in large part directed against the Russian Federation and the former Soviet Republics as well as the Middle East. The purpose of this later CIA recruitment was to establish a network of “intelligence assets” to be used in the CIA’s post-cold war insurgencies. Leaders of the Chechen Islamist insurgencies were also trained in CIA camps in Afghanistan and Pakistan, including the notorious leader of the Chechen insurrection Ibn al-Khattab (a citizen of Saudi Arabia).
  • Following his training and recruitment and a two year stint in Afghanistan (1991-1993), Mokhtar Belmokhtar was sent back to Algeria in 1993 at age 21 where he joined the  Salafist Group for Preaching and Combat (GSPC) (emblem left). The latter was initially part of the so-called Armed Islamic Group  (Groupe islamique armé (GIA)) in Algeria which sought to overthrow the secular Algerian Government with a view to installing a theocratic Islamic State. Supported covertly by the CIA, Belmokhtar fought in Southern Algeria in the civil war opposing Islamist forces and the secular government. He was also  instrumental in the integration and merging of “jihadist” forces. In January 2007,  the Armed islamic Group (GIA) which had been prominent in the 1990s, officially changed its name to the Al-Qaeda Organization in the Islamic Maghreb (AQIM). In turn, as of 2007, the newly formed AQIM established a close relationship with the Libya Islamic Fighting Group (LIFG), which was directly supported by NATO during the 2011 war on Libya, “providing weapons, training, special forces and even aircraft to support them in the overthrow of Libya’s government.” (Tony Cartalucci, The Geopolitical Reordering of Africa: US Covert Support to Al Qaeda in Northern Mali, France “Comes to the Rescue”, Global Research, January 2013). British SAS Special Forces had also been brought into Libya prior to the onset of the insurrection, acting as military advisers to the LIFG. In fact, what has unfolded since the war on Libya is the merging of LIFG and AQIM forces. In turn, many of the LIFG operatives have been dispatched to Syria to fight within the ranks of Al Nusrah and the ISIS.
  • It is worth noting that the 2007  restructuring  of jihadist forces in Algeria and the Maghreb coincided with  the appointment of Robert Stephen Ford as US ambassador to Algeria in August 2006. Ford had been reassigned by the State Department from Baghdad to Algiers. From 2004 to 2006, he worked closely with Ambassador John Negroponte at the US embassy in Baghdad in supporting the creation of  both Shia and Sunni death squads in Iraq. This project consisted in recruiting and training terrorists modelled on the so-called “Salvador Option” which had been applied by the CIA in Central America. Negroponte as we recall played a central role in supporting the Contras terrorists in Nicaragua as ambassador to Honduras from 1981-1985. For further details see Michel Chossudovsky, “The Salvador Option For Syria”: US-NATO Sponsored Death Squads Integrate “Opposition Forces”, Global Research,  May 28, 2012) The 2006 appointment of Robert Stephen Ford to head the US Embassy in Algeria was timely. It coincided with the consolidation of jihadist groups within Algeria and the Maghreb. It preceded the 2011 US-NATO sponsored insurrections in Libya and Syria. In 2010, Ford was approved by the US Congress as US Ambassador to Syria. He presented his credentials to president Bashar al Assad in January 2011, barely two months prior to the onslaught of the terrorist insurrection in the border city of Daraa in mid-March 2011. Ford played a central role in assisting the channelling of US and allied support to Syrian “opposition” groups including Al Nusrah and the ISIS.
  • Belmokhtar’s history and involvement in Afghanistan confirms that from the very outset he was an instrument of US intelligence. While, he operates with a certain degree of independence and autonomy in relation to his intelligence sponsors, he and his organization are bona fide CIA “intelligence assets”, which can be used by the CIA as part of a covert agenda. There are various definitions of  an “intelligence asset”. From the standpoint of US intelligence, “assets” linked up to terrorist organizations must not be aware that they are supported and monitored by Western intelligence. With regard to Al Qaeda, from the outset in 1979, the CIA chose to operate through various front organizations as well as indirectly through its Saudi, Qatari and Pakistani intelligence partners. CIA’s Milton Beardman who played a central role in the Soviet Afghan war confirms that members of Al Qaeda including Osama bin Laden were not aware of the role they were playing on behalf of Washington. In the words of bin Laden (quoted by Beardman): “neither I, nor my brothers saw evidence of American help”(Michel Chossudovsky, Who is Osama bin Laden, Global Research, September 12, 2001): Motivated by nationalism and religious fervor, the Islamic warriors were unaware that they were fighting the Soviet Army on behalf of Uncle Sam. While there were contacts at the upper levels of the intelligence hierarchy, Islamic rebel leaders in theatre had no contacts with Washington or the CIA.  (Ibid) Amply documented, Al Qaeda in the Islamic Maghreb (AQIM)and its affiliated groups including the Libya Islamic Fighting Group (LIFG) was serving the interests of the Western military alliance. Confirmed by the Washington Post, June 29, 2011 (See below), France was supplying weapons to the LIFG at the height of NATO’s bombing raids.
  • AQIM in turn was receiving weapons from the LIFG, which was supported by NATO. Moreover, LIFG mercenaries had integrated AQIM brigades. According to alleged Terror Mastermind Mokhtar Belmokhtar, who also coordinated the 2013 In Amenas Mali kidnapping operation: “We have been one of the main beneficiaries of the revolutions in the Arab world. As for our benefiting from the (Libyan) weapons, this is a natural thing in these kinds of circumstances.” http://www.hanford.gov/c.cfm/oci/ci_terrorist.cfm?dossier=174 Al Qaeda in the Islamic Maghreb (AQIM) is indelibly tied into a Western intelligence agenda. While it is described  as  ”one of the region’s wealthiest, best-armed militant groups”, financed covertly by Saudi Arabia and Qatar. France’s  Canard enchaîné revealed (June 2012) that Qatar (a staunch ally of the United States) has been funding various terrorist entities in Mali: The original report cites a French military intelligence report as indicating that Qatar has provided financial support to all three of the main armed groups in northern Mali: Iyad Ag Ghali’s Ansar Ed-Dine, al-Qa’ida in the Islamic Maghreb (AQIM) and the Movement for Unity and Jihad in West Africa (MUJWA). The amount of funding given to each of the groups is not mentioned but it mentions that repeated reports from the French DGSE to the Defense Ministry have mentioned Qatar’s support for ‘terrorism’ in northern Mali. (quoted by Jeune Afrique June 2012)
  • Qatar is a proxy state, a de facto Persian Gulf territory largely controlled by Washington. It hosts  a number of Western military and intelligence facilities. The Emir of Qatar does not finance terrorism without the consent of the CIA. And with regard to Mali, the CIA coordinates its activities in liaison with its French intelligence partners and counterparts, including la Direction du renseignement militaire (DRM) and the Direction générale de la sécurité extérieure (DGSE). The implications are obvious and should be carefully understood by Western public opinion. Inasmuch as Belmokhtar and AQIM are “intelligence assets”, both US and French intelligence are (indirectly) behind the Bamako attacks. Both US and French intelligence are complicit in the State sponsorship of terrorism.
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

U.S. Military Operations Are Biggest Motivation for Homegrown Terrorists, FBI Study Finds - 0 views

  • A secret FBI study found that anger over U.S. military operations abroad was the most commonly cited motivation for individuals involved in cases of “homegrown” terrorism. The report also identified no coherent pattern to “radicalization,” concluding that it remained near impossible to predict future violent acts. The study, reviewed by The Intercept, was conducted in 2012 by a unit in the FBI’s counterterrorism division and surveyed intelligence analysts and FBI special agents across the United States who were responsible for nearly 200 cases, both open and closed, involving “homegrown violent extremists.” The survey responses reinforced the FBI’s conclusion that such individuals “frequently believe the U.S. military is committing atrocities in Muslim countries, thereby justifying their violent aspirations.” Online relationships and exposure to English-language militant propaganda and “ideologues” like Anwar al-Awlaki are also cited as “key factors” driving extremism. But grievances over U.S. military action ranked far above any other factor, turning up in 18 percent of all cases, with additional cases citing a “perceived war against Islam,” “perceived discrimination,” or other more specific incidents. The report notes that between 2009 and 2012, 10 out of 16 attempted or successful terrorist attacks in the United States targeted military facilities or personnel.
  • The report is titled “Homegrown Violent Extremists: Survey Confirms Key Assessments, Reveals New Insights about Radicalization.” It is dated December 20, 2012. An FBI unit called the “Americas Fusion Cell” surveyed agents responsible for 198 “current and disrupted [homegrown violent extremists],” which the report says represented a fraction of all “pending, U.S.-based Sunni extremist cases” at the time. The survey seems designed to look only at Muslim violent extremism. (The FBI declined to comment.) Agents were asked over 100 questions about their subjects in order to “identify what role, if any,” particular factors played in their radicalization — listed as “known radicalizers,” extremist propaganda, participation in web forums, family members, “affiliation with religious, student, or social organization(s) where extremist views are expressed,” overseas travel, prison or military experience, and “significant life events and/or grievances.” Among the factors that did not “significantly contribute” to radicalization, the study found, were prison time, military service, and international travel. Although, the report notes, “the FBI historically has been concerned about the potential for prison radicalization,” in fact, “survey results indicate incarceration was rarely influential.” The report ends with recommendations that agents focus their attention on web forums, social media, and other online interactions, and step up surveillance of “known radicalizers” and those who contact them.
  • The study echoes previous findings, including a 2011 FBI intelligence assessment, recently released to MuckRock through a public records request, which concluded that “a broadening U.S. military presence overseas” was a motivating factor for a rise in plotted attacks, specifically the wars in Iraq and Afghanistan. That study also found “no demographic patterns” among the plotters. “Insofar as there is an identifiable motivation in most of these cases it has to do with outrage over what is happening overseas,” says John Mueller, a senior research scientist with the Mershon Center for International Security Studies at Ohio State University and co-author of “Chasing Ghosts: The Policing of Terrorism.” “People read news reports about atrocities and become angry,” Mueller said, adding that such reports are often perceived as an attack on one’s own in-group, religion, or cultural heritage. “It doesn’t have to be information from a jihadist website that angers someone, it could be a New York Times report about a drone strike that kills a bunch of civilians in Afghanistan.”
  • ...2 more annotations...
  • Perpetrators of more recent attacks have latched onto U.S. foreign policy to justify violence. The journals of Ahmad Rahami, accused of bombings in Manhattan and New Jersey last month, cited wars in Iraq, Syria, and Afghanistan. In a 911 call, Omar Mateen, who killed 49 people in an Orlando nightclub earlier this year, claimed he acted in retaliation for a U.S. airstrike on an ISIS fighter. Dzhokhar Tsarnaev told investigators that the wars in Iraq and Afghanistan motivated his and his brother’s attack on the Boston Marathon. In many of these cases, pundits and politicians focus on the role of religion, something Marc Sageman, a former CIA officer and author of “Leaderless Jihad: Terror Networks in the Twenty-First Century,” describes as a “red herring,” citing a history of shifting ideologies used to justify terrorist acts.
  • The U.S. government has announced plans to spend millions of dollars on “Countering Violent Extremism” initiatives, which are supposed to involve community members in spotting and stopping would-be extremists. These initiatives have been criticized as discriminatory, because they have focused almost exclusively on Muslim communities while ignoring political motivations behind radicalization. “Politicians try very hard not to talk about foreign policy or military action being a major contributor to homegrown terrorism,” Sageman says, adding that government reticence to share raw data from terrorism cases with academia has hindered analysis of the subject.
Paul Merrell

US Corporations Used Personal Armies To Uproot, Terrorize Colombia - 0 views

  • Some of the numerous foreign corporations accused of serious human rights abuses in Colombia include fruit companies Dole, Del Monte, and Chiquita, agribusiness giant Cargill, and other representatives of the fossil fuel industry like Texaco (formerly Texas Petroleum Company) and Exxon Mobil. Heeding corporate orders, paramilitary groups murdered union and labor rights activists, tortured and terrorized countless indigenous and Afro-Colombian people, and devastated entire villages of subsistence farmers to make way for mining, fossil fuel extraction, or plantations that would bring massive profits to foreign corporations. The Colombian military — and, in at least one high-profile massacre, the U.S. military — sometimes lent a hand in these human rights crimes. “Every human rights person I work with in Colombia believes the peace process is a necessary precondition” to ending corporate exploitation of Colombia, Dan Kovalik, a human rights and labor rights lawyer who teaches at the University of Pittsburgh School of Law, told MintPress News.
  • In court, “Chiquita admitted to paying paramilitaries and giving them 3,000 Kalashnikov rifles between 1997 and 2004,” Kovalik said. Chiquita allied with the United Auto-Defense Forces of Colombia (AUC), one of the country’s most violent paramilitary groups, Steven Cohen noted in a report for ThinkProgress in 2014. The AUC, a group once designated as a terrorist group by the U.S. government, is responsible for thousands of deaths in Colombia. It turns out that Chiquita had been playing both sides of the conflict. Cohen reported: “By its own account, Chiquita made at least 100 payments — $1.7 million in total — to the AUC between 1997 and 2004. In the decade prior to that, the company had maintained a similar arrangement with the Revolutionary Armed Forces of Colombia (FARC), the nominally leftist rebel group chased out of the region by the combined (and coordinated) efforts of the AUC and Colombian military.”
  • “There’s been some recent reports that [Chiquita’s funding of paramilitaries] may have continued until very recently through a subsidiary,” Kovalik added. While these allegations remain unproven in court, they do suggest a staggering number of victims. Multiple lawsuits were consolidated in 2011, accusing Chiquita of being involved in the killings of as many as 4,000 Colombian nationals. While the evidence is clearest in the case of Chiquita, other international banana growers are suspect as well. “According to Salvatore Mancuso, a high-ranking paramilitarian in U.S. prison, Dole and Del Monte also worked with the paramilitaries,” Kovalik said. “All the banana companies have.” Mancuso is currently serving a 15-year sentence in a federal prison and has been spoken openly about the influence that corporations like Chiquita hold in Colombia.
  • ...6 more annotations...
  • The influence of banana growers in Colombia pre-dates the ongoing civil war. In 1928, the Colombian government brutally shut down a strike by United Fruit Company banana pickers under threat from the U.S. government. Some estimates put the death toll from the military action as high as 2,000, including workers, women and children. United Fruit was once one of the most powerful corporations in the world, manipulating the governments and economies of multiple Latin American countries. Chiquita was a trademark of United Fruit until 1990, when the company renamed itself Chiquita Brands International in an effort to rehabilitate its image. (Chiquita was purchased by two Brazilian companies in 2015, and is now headquartered in Switzerland.)
  • “It should be noted under the peace agreement, at least the one that went down in October, Coca-Cola was one of the companies named [that will be] subjected to further investigation for paramilitary ties,” Kovalik said. Coca-Cola, or at least its Colombian bottlers, have also been linked to paramilitary groups and human rights abuses. The bottlers and the company’s Atlanta headquarters have faced multiple lawsuits over attacks on union organizers. A 2010 documentary, “The Coca-Cola Case,” focused on the soda giant’s role in turning Colombia into the “trade union murder capital of the world,” June Chua wrote in a review for Rabble.ca that year.
  • Colombia is rich with resources that foreign corporations are eager to exploit, particularly in the mining, agriculture, and biofuels industries. “Mining is probably the biggest threat now to indigenous people, Afro-Colombians and peasants, and will continue to be as the peace agreement goes forward,” Kovalik added. Justin Podur, an author and global political analyst, told MintPress that Colombian human rights activists frequently say that “displacement in Colombia is not a side effect of the war, it’s really the point of the war.” Whether by design or coincidence, decades of unrest created fertile ground for profit.
  • In one of the most shocking examples of fossil fuel companies supporting the death and displacement of Colombian people, Kovalik highlighted the “the Santo Domingo massacre, in which Occidental Petroleum were part of an operation to bomb the Santo Domingo community.”
  • In a 2005 article for Z Net on the massacre, Kovalik and Luis Galvis explained: “On December 13, 1998, in what has become one of the most notorious war crimes in Colombia, the hamlet of Santo Domingo was attacked by a U.S. cluster bomb from a Colombian Air Force helicopter. Seventeen civilians, including 7 children, were killed as a result of the bombing.” In 2002, the Los Angeles Times revealed that the bombing had actually been carried out at the behest of, and with the assistance of, the Houston-based oil company which had its headquarters in Los Angeles at the time. Times staff writer T. Christian Miller wrote: “Los Angeles-based Occidental Petroleum, which runs an oil complex 30 miles north of Santo Domingo, provided crucial assistance to the operation. It supplied, directly or through contractors, troop transportation, planning facilities and fuel to Colombian military aircraft, including the helicopter crew accused of dropping the bomb.”
  • And, earlier this year, Gilberto Torres, a Colombian union activist, sued BP in London. He alleges that in 2002, he was kidnapped and tortured for 42 days by paramilitaries who were following orders from the oil giant.
Gary Edwards

Impeach Judge James Robart for violating sovereignty and Constitution - 0 views

  •  
    "It's still hard to believe we now live in a country where a district judge can demand that we bring in refugees from state sponsors of terror and failed states saturated with terrorists and no data systems during a time of war. It's almost unfathomable that a district judge, an institution created by Congress, can overturn long-standing refugee law and bar the federal government from prioritizing persecuted religious minorities for refugee resettlement. All in contravention to statute, numerous clauses of the Constitution, the social contract, the social compact, popular sovereignty, jurisdictional sovereignty, and 200 years of case law. If Obergefell redefined the building block of all civilization, Judge James Robart's ruling redefined the building block of a sovereign nation. It's hard to comprehend a judicial opinion more divorced from our Constitution, sovereignty, fundamental laws, founding values, history, and tradition. It's also hard to imagine an opinion that is of greater consequence - unless it is ignored. In the long run, Congress must strip the federal judiciary of their power grab and restore Congress' plenary power over immigration, as it was since our founding. However, in the meantime, it's time to make impeachment great again. Impeachment was a critical check on abuse of power   Before the growth of political parties killed the separation of powers, the tool of impeachment was regarded by our founders as one of the most effective ways of checking the executive and judicial branches of government. By my count, impeachment is referenced 58 times in the Federalist Papers and countless times during the Constitutional Convention. Impeachment [U.S.CONST. art. II, §4] was not only reserved for those who engage in criminal behavior. It was clearly designed to check abuse of power. As the Congressional Research Service observes, Congress has identified "improperly exceeding or abusing the powers of the office" as a criterion for
Gary Edwards

Articles by Mark Dice - 0 views

  •  
    Libertarian writer and researcher, Mark Dice, has provided a list of articles he has written.  Mark's literary works include: ... "The Illuminati: Facts & Fiction" ...... separates and analyzes the various claims and evidence about the Illuminati, their history, beliefs, members, organizations, and activities. This is a supplement for Mark's previous book - ..... "The Resistance Manifesto",  which focuses more on the New World Order, the 9/11 attacks, Big Brother, and how the political agendas of the elite are fulfilling Bible prophecy.   .... "The New World Order" ....   His website, markdice.com has high light summary of his work that's quite interesting: A detailed analysis of the September 11th attacks and evidence they were aided by elements within U.S. and foreign intelligence agencies to be used as a reason to jumpstart the "War on Terror" and the erosion of privacy and personal liberties outlined in the constitution. The Knights Templar, the real Holy Grail, and the role the Templars played in the formation of the Illuminati mafia. Quotes from the original writings of the Illuminati founders and how the organization drew up plans over 200 years ago to take over every major institution of power and influence in the world through deception and criminal activity. An expose on the Bohemian Grove resort including quotes from President Richard Nixon, senator John Decamp, and information from Chris Jones who worked at the club and became an informant on the activities within the compound. The secrets of Freemasonry and a history of the organization and their influence on society and quotes from the bible of Freemasonry on how the organization knowingly deceives lower level members and nonmembers as to the true secrets and goals of the fraternity. The history and meaning of the mysterious Georgia Guidestones monument and why the elite want to reduce world population to 500 million by killing billions of people through wars and plagues. A history of
Paul Merrell

The Most Expensive Wars in U.S. History - 24/7 Wall St. - 0 views

  • Declared an official holiday in 1971, Memorial Day honors those who have given their lives in service to the United States. While the human toll is always great, wars also cost treasure as well as blood. Many factors can affect the cost of waging war. Using a report from the Congressional Research Service, 24/7 Wall St. reviewed the most expensive wars in U.S. history. While the Mexican-American War cost just $2.4 billion, or 1.4% of GDP in 1847, spending on World War II accounted for nearly 36% of GDP in 1945, or $4.1 trillion. These are the most expensive wars in U.S. history. Click here to see the most expensive wars in U.S. history. Many early wars in U.S. history resulted in the acquisition of land. The Mexican-American War in the 1840s yielded much of the territory that makes up the present-day Southwest. Similarly, the Spanish-American War prior to the start of the 20th Century ended with U.S. control of Guam, Puerto Rico, and the Philippines.
  • In every conflict before World War II, nearly all of the country’s defense budget was spent on direct conflict — classified as wartime spending. For example, the U.S. spent 1.1% of GDP in 1899 to fight the Spanish-American War, and just 1.5% of GDP was spent on total defense spending. That trend largely changed at the start of the Cold War. The persistent threat of military conflict ensured that the U.S. would be ready for war at any time, as the Space Race and nuclear armament became national priorities in both the U.S. and the Soviet Union. As a result, wartime spending and defense spending began to diverge. During the Korean War, for example, war costs accounted for just 4.2% of GDP in 1952, while total defense spending represented more than 13% of GDP in the same year. Comparing war costs over a 235-year period can be difficult. While the report attempted to correct for inflation by calculating each war’s cost in fiscal year 2011 dollars, inflation adjustments do not account for advances in technology. It is entirely possible that wars also became more expensive over time as the sophistication and cost of technology increased.
  • To determine the most expensive wars in U.S. history, 24/7 Wall St. used a 2010 report from the Congressional Research Service entitled “Costs of Major U.S. Wars”. The report does not include veterans’ benefits, interest on loans used to finance the war, and assistance to allies. Additionally, the report attempts to capture the increase in military expenditures during wartime and does not include the costs of maintaining a standing army in peacetime. The report also presents both military costs and defense spending as percentages of GDP in the year of peak war spending. War cost figures for the War on Terror were updated to reflect expenditure after 2010. These are the most expensive wars in U.S. history. Next »
Gary Edwards

Comey has Long History of Cases Ending Favorable to Clintons - Tea Party News - 0 views

  • Messages found stored on Clinton’s private email server show that Berger – a convicted thief of classified documents – had been advising Clinton while she served as secretary of state and had access to emails containing classified information. For example, in an email dated Sept. 22, 2009, Berger advised Clinton advised how she could leverage information to make Israeli Prime Minister Benjamin Netanyahu more cooperative in discussions with the Obama administration over a settlement freeze.
  • Law firm ties Berger, Lynch, Mills Berger worked as a partner in the Washington law firm Hogan & Hartson from 1973 to 1977, before taking a position as the deputy director of policy planning at the State Department in the Carter administration. When Carter lost his re-election bid, Berger returned to Hogan & Hartson, where he worked until he took leave in 1988 to act as foreign policy adviser in Gov. Michael Dukakis’ presidential campaign. When Dukakis was defeated, Berger returned to Hogan & Hartson until he became foreign policy adviser for Bill Clinton’s presidential campaign in 1992. On March 28, WND reported Lynch was a litigation partner for eight years at Hogan & Hartson, from March 2002 through April 2010. Mills also worked at Hogan & Hartson, for two years, starting in 1990, before she joined then President-elect Bill Clinton’s transition team, on her way to securing a position as White House deputy counsel in the Clinton administration. According to documents Hillary Clinton’s first presidential campaign made public in 2008, Hogan & Hartson’s New York-based partner Howard Topaz was the tax lawyer who filed income tax returns for Bill and Hillary Clinton beginning in 2004. In addition, Hogan & Hartson in Virginia filed a patent trademark request on May 19, 2004, for Denver-based MX Logic Inc., the computer software firm that developed the email encryption system used to manage Clinton’s private email server beginning in July 2013. A tech expert has observed that employees of MX Logic could have had access to all the emails that went through her account.
  • In 1999, President Bill Clinton nominated Lynch for the first of her two terms as U.S. attorney for the Eastern District of New York, a position she held until she joined Hogan & Hartson in March 2002 to become a partner in the firm’s Litigation Practice Group. She left Hogan & Hartson in 2010, after being nominated by President Obama for her second term as U.S. attorney for the Eastern District of New York, a position she held until Obama nominated her to serve in her current position as attorney general. A report published April 8, 2008, by The American Lawyer noted Hogan & Hartson was among Hillary Clinton’s biggest financial supporters in the legal industry during her first presidential campaign. “Firm lawyers and staff have donated nearly $123,400 to her campaign so far, according to campaign contribution data from the Center for Responsive Politics,” Nate Raymond observed in The American Lawyer article. “Christine Varney, a partner in Hogan’s Washington, D.C., office, served as chief counsel to the Clinton-Gore Campaign in 1992.” While there is no evidence that Lynch played a direct role either in the tax work done by the firm for the Clintons or in linking Hillary’s private email server to MX Logic, the ethics of the legal profession hold all partners jointly liable for the actions of other partners in a business. “If Hogan and Hartson previously represented the Clintons on tax matters, it is incumbent upon U.S. Attorney General Loretta Lynch to [disclose] what, if any, role she had in such tax matters,” said Tom Fitton, president of Washington-based Judicial Watch.
  • ...4 more annotations...
  • HSBC link When Lynch’s nomination as attorney general was considered by the Senate one year ago, as WND reported, the Senate Judiciary Committee examined her role in the Obama administration’s decision not to prosecute the banking giant HSBC for laundering funds for Mexican drug cartels and Middle Eastern terrorists. WND was first to report in a series of articles beginning in 2012 money-laundering charges brought by John Cruz, a former HSBC vice president and relationship manager, based on his more than 1,000 pages of evidence and secret audio recordings. The staff of the Senate Judiciary Committee focused on Cruz’s allegations that Lynch, acting then in her capacity as the U.S. attorney for the Eastern District of New York, engaged in a Department of Justice cover-up. Obama’s attorney general nominee allowed HSBC in December 2011 to enter into a “deferred prosecution” settlement in which the bank agreed to pay a $1.9 billion fine and admit “willful criminal conduct” in exchange for dropping criminal investigations and prosecutions of HSBC directors or employees. Cruz called the $1.92 billion fine the U.S. government imposed on HSBC “a joke” and filed a $10 million lawsuit for “retaliation and wrongful termination.” From 2002 to 2003, Comey held the position of U.S. Attorney for the Southern District of New York, the same position held by Lynch. On March 4, 2013, he joined the HSBC board of directors, agreeing to serve as an independent non-executive director and a member of the bank’s Financial System Vulnerabilities Committee, positions he held until he resigned on Aug. 3, 2013, to become head of the FBI.
  • Comey, Fitzgerald and Valerie Plame On Jan. 1, 2004, the Washington Post reported that after Attorney General John Aschroft recused himself and his staff from any involvement in the investigation of who leaked the name of CIA employee Valerie Plame after journalist Robert Novak named her in print as a CIA operative, Comey assumed the role of acting attorney general for the purposes of the investigation. Comey appointed Patrick J. Fitzgerald, a U.S. attorney in Chicago, to act as special counsel in conducting the inquiry into what became known as “Plamegate.” At the time Comey made the appointment, Fitzgerald was already godfather to one of Comey’s children. On April 13, 2015, co-authoring a USA Today op-ed piece, Plame and her husband, retired ambassador Joseph Wilson, made public their support for Hillary Clinton’s 2016 presidential campaign, openly acknowledging their political closeness to both Hillary and Bill Clinton. The first two paragraphs of the editorial read: We have known Hillary Clinton both professionally and personally for close to 20 years, dating back to before President Bill Clinton’s first trip to Africa in 1998 — a trip that they both acknowledge changed their lives, and gave considerable meaning to their post-White House years and to the activities of the Clinton Foundation. Joe, serving as the National Security Council Senior Director for African Affairs, was instrumental in arranging that historic visit. Our history became entwined with Hillary further after Valerie’s identity as a CIA officer was deliberately exposed. That criminal act was taken in retribution for Joe’s article in The New York Times in which he explained he had discovered no basis for the Bush administration’s justification for the Iraq War that Saddam Hussein was seeking yellowcake uranium to develop a nuclear weapon.
  • In January 2016, Chuck Ross in the Daily Caller reported that Hillary Clinton emails made public made clear that one of her “most frequent favor-seekers when she was secretary of state was former Ambassador Joseph Wilson, a longtime Clinton friend, an endorser of Clinton’s 2008 presidential campaign, and an Africa expert with deep business ties on the continent.” Ross noted that Wilson emailed Clinton on Dec. 22, 2009, seeking help for Symbion Power, an American engineering contractor for whom Wilson consulted, in the company’s bid to pursue a U.S. Agency of International Development contract for work in Afghanistan. In the case of the Afghanistan project, Ross noted, Clinton vouched for Wilson and Symbion as she forwarded the request to Jack Lew, who served then as deputy secretary of state for management and resources. Ross further reported Wilson’s request might also have been discussed with President Obama, as one email indicates. In 2005, Fitzgerald prosecuted Libby, a prominent adviser to then Vice President Dick Cheney, in the Plame investigation, charging him with two counts of perjury, two counts of making false statements to federal prosecutors and one count of obstruction of justice. On March 6, 2007, Libby was convicted of four of the five counts, and on June 5, 2007, was sentenced by U.S. District Judge Reggie B. Walton to two and a half years in federal prison. On April 6, 2015, the Wall Street Journal reported the publication of New York Times reporter Judith Miller’s memoir “The Story: A Reporter’s Journey” exposed “unscrupulous conduct” by Fitzgerald in the 2007 trial of Libby.
  • WSJ reporter Peter Berkowitz noted Miller “writes that Mr. Fitzgerald induced her to give what she now realizes was false testimony.” “By withholding critical information and manipulating her memory as he prepared her to testify, Ms. Miller relates, Mr. Fitzgerald ‘steered’ her ‘in the wrong direction.’” http://www.wnd.com/2016/07/comey-has-long-history-of-clinton-related-cases/
  •  
    Bend over and grab your ankles. The rats nest of Clinton operatives in Washington DC is far deeper than anyone ever imagined. "FBI Director James Comey has a long history of involvement in Department of Justice actions that arguably ended up favorable to the Clintons. In 2004, Comey, then serving as a deputy attorney general in the Justice Department, apparently limited the scope of the criminal investigation of Sandy Berger, which left out former Clinton administration officials who may have coordinated with Berger in his removal and destruction of classified records from the National Archives. The documents were relevant to accusations that the Clinton administration was negligent in the build-up to the 9/11 terrorist attack. On Tuesday, Comey announced that despite evidence of "extreme negligence by Hillary Clinton and her top aides regarding the handling of classified information through a private email server, the FBI would not refer criminal charges to Attorney General Loretta Lynch and the Justice Department. Curiously, Berger, Lynch and Cheryl Mills all worked as partners in the Washington law firm Hogan & Hartson, which prepared tax returns for the Clintons and did patent work for a software firm that played a role in the private email server Hillary Clinton used when she was secretary of state. Lynch and Comey both served as U.S. attorney for the Southern District of New York. They crossed paths in the investigation of HSBC bank, which avoided criminal charges in a massive money-laundering scandal for which the bank paid a $1.9 billion fine. After Attorney General John Aschroft recused himself in the Valerie Plame affair in 2004, Comey appointed as special counsel Patrick J. Fitzgerald, who ended up convicting "Scooter" Libby, a top aide to then Vice President Dick Cheney, of perjury and obstruction of justice. The charge affirmed the accusations of Plame and her former ambassador husband, Joe Wilson - both partisan supporters of Bill and
  •  
    The "ethical" situation is far worse than described. Attorney disciplinary rules require that a lawyer, including all lawyers in the same firm, owe a lifetime duty of loyalty to a client, a duty that does not end with representation in a particular matter. Accordingly, Lynch had what the disciplinary rules refer to as an "actual conflict of interest" between her duties of loyalty to both Hillary and the U.S. government that required her withdrawal from representing either in the decision whether to prosecute Hillary. Saying that she would rubber stamp what Comey recommended was not the required withdrawal. Comey is an investigator, not a prosecutor. This was a situation for appointment of a special counsel to represent the Department of Justice in the decision whether to prosecute, not satisfied by rubber stamping Comey's recomendation,.
Paul Merrell

Remarks by President Obama in Address to the United Nations General Assembly | The Whit... - 0 views

  • Remarks by President Obama in Address to the United Nations General Assembly United Nations General Assembly Hall New York City, New York 10:13 A.M. EDT PRESIDENT OBAMA:  Mr. President, Mr. Secretary General, fellow delegates, ladies and gentlemen:  We come together at a crossroads between war and peace; between disorder and integration; between fear and hope. Around the globe, there are signposts of progress.  The shadow of World War that existed at the founding of this institution has been lifted, and the prospect of war between major powers reduced.  The ranks of member states has more than tripled, and more people live under governments they elected. Hundreds of millions of human beings have been freed from the prison of poverty, with the proportion of those living in extreme poverty cut in half.  And the world economy continues to strengthen after the worst financial crisis of our lives. 
  • And yet there is a pervasive unease in our world -- a sense that the very forces that have brought us together have created new dangers and made it difficult for any single nation to insulate itself from global forces.  As we gather here, an outbreak of Ebola overwhelms public health systems in West Africa and threatens to move rapidly across borders.  Russian aggression in Europe recalls the days when large nations trampled small ones in pursuit of territorial ambition.  The brutality of terrorists in Syria and Iraq forces us to look into the heart of darkness.
  • First, all of us -- big nations and small -- must meet our responsibility to observe and enforce international norms.  We are here because others realized that we gain more from cooperation than conquest. 
  • ...14 more annotations...
  • Recently, Russia’s actions in Ukraine challenge this post-war order.  Here are the facts.  After the people of Ukraine mobilized popular protests and calls for reform, their corrupt president fled.  Against the will of the government in Kyiv, Crimea was annexed.  Russia poured arms into eastern Ukraine, fueling violent separatists and a conflict that has killed thousands.  When a civilian airliner was shot down from areas that these proxies controlled, they refused to allow access to the crash for days.  When Ukraine started to reassert control over its territory, Russia gave up the pretense of merely supporting the separatists, and moved troops across the border. This is a vision of the world in which might makes right -- a world in which one nation’s borders can be redrawn by another, and civilized people are not allowed to recover the remains of their loved ones because of the truth that might be revealed. America stands for something different.  We believe that right makes might -- that bigger nations should not be able to bully smaller ones, and that people should be able to choose their own future.
  • nd these are simple truths, but they must be defended. America and our allies will support the people of Ukraine as they develop their democracy and economy.  We will reinforce our NATO Allies and uphold our commitment to collective self-defense.  We will impose a cost on Russia for aggression, and we will counter falsehoods with the truth.  And we call upon others to join us on the right side of history -- for while small gains can be won at the barrel of a gun, they will ultimately be turned back if enough voices support the freedom of nations and peoples to make their own decisions. Moreover, a different path is available -- the path of diplomacy and peace, and the ideals this institution is designed to uphold.  The recent cease-fire agreement in Ukraine offers an opening to achieve those objectives.  If Russia takes that path -- a path that for stretches of the post-Cold War period resulted in prosperity for the Russian people -- then we will lift our sanctions and welcome Russia’s role in addressing common challenges.  After all, that’s what the United States and Russia have been able to do in past years -- from reducing our nuclear stockpiles to meeting our obligations under the Nuclear Nonproliferation Treaty, to cooperating to remove and destroy Syria’s declared chemical weapons.  And that’s the kind of cooperation we are prepared to pursue again -- if Russia changes course. 
  • This speaks to a central question of our global age -- whether we will solve our problems together, in a spirit of mutual interest and mutual respect, or whether we descend into the destructive rivalries of the past.  When nations find common ground, not simply based on power, but on principle, then we can make enormous progress.  And I stand before you today committed to investing American strength to working with all nations to address the problems we face in the 21st century.
  • America is pursuing a diplomatic resolution to the Iranian nuclear issue, as part of our commitment to stop the spread of nuclear weapons and pursue the peace and security of a world without them.  And this can only take place if Iran seizes this historic opportunity.  My message to Iran’s leaders and people has been simple and consistent:  Do not let this opportunity pass.  We can reach a solution that meets your energy needs while assuring the world that your program is peaceful.  America is and will continue to be a Pacific power, promoting peace, stability, and the free flow of commerce among nations.  But we will insist that all nations abide by the rules of the road, and resolve their territorial disputes peacefully, consistent with international law. 
  • In other words, on issue after issue, we cannot rely on a rule book written for a different century.  If we lift our eyes beyond our borders -- if we think globally and if we act cooperatively -- we can shape the course of this century, as our predecessors shaped the post-World War II age.  But as we look to the future, one issue risks a cycle of conflict that could derail so much progress, and that is the cancer of violent extremism that has ravaged so many parts of the Muslim world. Of course, terrorism is not new.  Speaking before this Assembly, President Kennedy put it well:  “Terror is not a new weapon,” he said.  “Throughout history it has been used by those who could not prevail, either by persuasion or example.”  In the 20th century, terror was used by all manner of groups who failed to come to power through public support.  But in this century, we have faced a more lethal and ideological brand of terrorists who have perverted one of the world’s great religions.  With access to technology that allows small groups to do great harm, they have embraced a nightmarish vision that would divide the world into adherents and infidels -- killing as many innocent civilians as possible, employing the most brutal methods to intimidate people within their communities.
  • I have made it clear that America will not base our entire foreign policy on reacting to terrorism.  Instead, we’ve waged a focused campaign against al Qaeda and its associated forces -- taking out their leaders, denying them the safe havens they rely on.  At the same time, we have reaffirmed again and again that the United States is not and never will be at war with Islam.  Islam teaches peace.  Muslims the world over aspire to live with dignity and a sense of justice.  And when it comes to America and Islam, there is no us and them, there is only us -- because millions of Muslim Americans are part of the fabric of our country. So we reject any suggestion of a clash of civilizations. Belief in permanent religious war is the misguided refuge of extremists who cannot build or create anything, and therefore peddle only fanaticism and hate.  And it is no exaggeration to say that humanity’s future depends on us uniting against those who would divide us along the fault lines of tribe or sect, race or religion.
  • But this is not simply a matter of words.  Collectively, we must take concrete steps to address the danger posed by religiously motivated fanatics, and the trends that fuel their recruitment.  Moreover, this campaign against extremism goes beyond a narrow security challenge.  For while we’ve degraded methodically core al Qaeda and supported a transition to a sovereign Afghan government, extremist ideology has shifted to other places -- particularly in the Middle East and North Africa, where a quarter of young people have no job, where food and water could grow scarce, where corruption is rampant and sectarian conflicts have become increasingly hard to contain.   As an international community, we must meet this challenge with a focus on four areas.  First, the terrorist group known as ISIL must be degraded and ultimately destroyed.
  • The second:  It is time for the world -- especially Muslim communities -- to explicitly, forcefully, and consistently reject the ideology of organizations like al Qaeda and ISIL.
  • Later today, the Security Council will adopt a resolution that underscores the responsibility of states to counter violent extremism.  But resolutions must be followed by tangible commitments, so we’re accountable when we fall short.  Next year, we should all be prepared to announce the concrete steps that we have taken to counter extremist ideologies in our own countries -- by getting intolerance out of schools, stopping radicalization before it spreads, and promoting institutions and programs that build new bridges of understanding.
  • Third, we must address the cycle of conflict -- especially sectarian conflict -- that creates the conditions that terrorists prey upon.
  • The good news is we also see signs that this tide could be reversed.  We have a new, inclusive government in Baghdad; a new Iraqi Prime Minister welcomed by his neighbors; Lebanese factions rejecting those who try to provoke war.  And these steps must be followed by a broader truce.  Nowhere is this more necessary than Syria.  Together with our partners, America is training and equipping the Syrian opposition to be a counterweight to the terrorists of ISIL and the brutality of the Assad regime.  But the only lasting solution to Syria’s civil war is political -- an inclusive political transition that responds to the legitimate aspirations of all Syrian citizens, regardless of ethnicity, regardless of creed.
  • My fourth and final point is a simple one:  The countries of the Arab and Muslim world must focus on the extraordinary potential of their people -- especially the youth.
  • We recognize as well that leadership will be necessary to address the conflict between Palestinians and Israelis.  As bleak as the landscape appears, America will not give up on the pursuit of peace.  Understand, the situation in Iraq and Syria and Libya should cure anybody of the illusion that the Arab-Israeli conflict is the main source of problems in the region.  For far too long, that's been used as an excuse to distract people from problems at home.  The violence engulfing the region today has made too many Israelis ready to abandon the hard work of peace.  And that's something worthy of reflection within Israel.
  • Because let’s be clear:  The status quo in the West Bank and Gaza is not sustainable.  We cannot afford to turn away from this effort -- not when rockets are fired at innocent Israelis, or the lives of so many Palestinian children are taken from us in Gaza. So long as I am President, we will stand up for the principle that Israelis, Palestinians, the region and the world will be more just and more safe with two states living side by side, in peace and security. So this is what America is prepared to do:  Taking action against immediate threats, while pursuing a world in which the need for such action is diminished.  The United States will never shy away from defending our interests, but we will also not shy away from the promise of this institution and its Universal Declaration of Human Rights -- the notion that peace is not merely the absence of war, but the presence of a better life. 
  •  
    Epic hypocrisy. He bows to international law while waging multiple wars in direct defiance of it. And that's just in the first few paragraphs. It gets worse the farther he gets in his speech.
Paul Merrell

NSA Data Will Soon Be Used By Domestic Law Enforcement - 0 views

  • If you’re reading this, then I’m willing to bet that you’ve been called many different names throughout your life. If I were to hazard a guess, I would say they were names like kook, paranoid, conspiracy theorist, alarmist, insane, or gullible. And after this week, you can go by a new name: Vindicated. I’m of course talking about recent revelations from the NSA. Long before Edward Snowden came along, it was no secret that the NSA was spying on everyone without good cause. Anyone who believed that fact was called a conspiracy theorist, but their fears were eventually validated. These same people also understood that the NSA’s surveillance powers would never be used exclusively against terrorists and hostile governments. The power they have is just too tempting for any government. If various government agencies weren’t using the NSA’s surveillance apparatus to solve domestic crimes, it was only a matter of time before it was used for just that.
  • And again, they called us conspiracy theorists for believing that. And again, we were right all long. A while back, we noted a report showing that the “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains why this is important: What does this rule change mean for you? In short, domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. FBI agents don’t need to have any “national security” related reason to plug your name, email address, phone number, or other “selector” into the NSA’s gargantuan data trove. They can simply poke around in your private information in the course of totally routine investigations. And if they find something that suggests, say, involvement in illegal drug activity, they can send that information to local or state police. That means information the NSA collects for purposes of so-called “national security” will be used by police to lock up ordinary Americans for routine crimes.
  • Anybody who knows anything about how governments work, should not surprised. You can’t give them any kind of power, and expect them to use it responsibly. You can’t give them any stipulations. Eventually they’ll find a legal loophole to work around any limitations that have been placed on them. In other news, the Pentagon admitted this week that they’ve been deploying military drones over the United States for domestic surveillance purposes. Much like the NSA’s surveillance apparatus, we were assured that drones were for terrorists in faraway lands. Nothing so Orwellian would ever be used against ordinary American citizens at home. Yet here we are, with more to come.
  •  
    The Privacy Act, 5 U.S.C. 552a, provides in relevant part: "(a)(4) the term "record" means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph[.] ... "(b) Conditions of Disclosure.-No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be- ... "(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought[.]" So a separate written request for each "portion" of any individual record that describes the "law enforcement activity for which the record is sought[.]" That doesn't sound like the contemplated unfettered access to bulk raw data. And it gets even better, with a right to sue for any violation, attorney fees and expenses, and a statutory minimum of $1,000 damages per violation just for winning the case.  
Gary Edwards

2012 ELECTION - NEIL HOWE STYLE « The Burning Platform - 0 views

  •  
    Excellent analysis of the 2012 elections based on recent polling data and the voting history of five generations. excerpt: Pundits have long been predicting that the presidential election will be much closer and much meaner in 2012 than it was in 2008. Closer it now is. According to the RCP Poll Average, the race is now a virtual tie: Incumbent Obama now leads by a mere 1.8 percent over Romney, whereas challenger Obama led McCain by 7.6 percent exactly four years ago. It will certainly revolve around a very different array of issues-much less argument about the war on terror and GOP performance, and a lot more about the stagnating economy and Democratic performance. In one respect, however, the next election will be a replay of the last: There will be a historically large divide in the preferences of younger voters (under 30) versus older voters (65+). In 2008, this divide (21 percentage points) was wider than in any election since the advent of age-bracketed voting data in the 1960s. The second-biggest divide (16 percentage points) was back in 1972, when nearly half of all young voters voted for McGovern while older voters went overwhelmingly for Nixon. I've been tracking generational leanings in the polls pretty carefully. The Pew Research Center has issued several reports (most notably, The Generation Gap and the 2012 Election) exploring this divide, and Time followed up with its own cover story ("The New Generation Gap"). More recently, Mike and Morley, Forbes, The New York Times, and many others have also weighed in. Bottom line: Every generation is today a bit more favorable toward Obama than they were in 2010 and a good deal less favorable than in 2008. The partisan gap between the Democrat-leaning young and the Republican-leaning old, however, remains as strong as ever-at around 20 percent. Back in 2008, the big story was how and why today's rising Millennial Generation voted by a large and decisive margin for the D
1 - 20 of 105 Next › Last »
Showing 20 items per page