Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged terrorism

Rss Feed Group items tagged

Paul Merrell

Iraqi PM orders release of female prisoners to appease protesters - 0 views

  • Iraqi Prime Minister Nuri al-Maliki ordered on Sunday the release of female prisoners, who were arrested for terrorism charges without judicial warrants or because of terror crimes committed by their relatives, to appease to protesters who want to see the scrapping of anti-terrorism measures in the country, a local website reported.
  • On Friday, tens of thousands of demonstrators in Anbar’s city, Ramadi, 100 km (62 miles) west of Baghdad, want Maliki to abolish anti-terrorism laws they say are used to persecute them. Part of the anti-terrorism measure, Maliki’s government arrested some females following the detention of their male relatives under terrorism charges.
  • The Arab League described recent developments as “worrying” and called for dialogue in a statement released on Friday.
  •  
    Interesting that Iraqi citizens are marching in streets protesting their nation's war on terror -- and getting results from their government -- while here in the Land of the Free the politics of fear goes virtually unchallenged. 
Paul Merrell

Libya Coming Full Circle. When A Deemed "Conspiracy Theory" Becomes Reality | Global Re... - 0 views

  • In the duration of the “revolutionary frenzy” that categorized western media coverage of the Libyan Civil War in 2011, public audiences were captivated with both tales of rebels aspiring for “democracy” and with complimenting stories of unabated brutality by Gaddafi forces. Without any serious mainstream criticism, an imperialist mythology centered on the interventionist doctrine of the “Responsibility to Protect” was cemented in public consciousness with even usually non-mainstream and “anti-imperialist” figures such as Juan Cole deliberately misrepresenting the situation in Libya. In Cole’s perspective, no reference to armed militants from the start of the conflict or the role of extremism and western premeditation found its way into the narrative and he predicted a simplistic narrative where the overthrow of Gaddafi would lead the region into an era of unity, prosperity and freedom. Libya Today How is Libya today? If one denied the existence of hell, they need not look further than Libya to observe a case of hell on Earth. Libya as a functioning, cohesive state has virtually ceased to exist, having been replaced by a myriad of conflicting factions divided on tribal and religious lines. While mainstream media tends to obscure the identity of these factions and their connection to western imperialists, Eric Draitser in his analysis, “Benghazi, the CIA, and the War in Libya” shows the beyond the fractious infighting, both primary factions engaging in direct combat have been beneficiaries of the NATO imperialist powers in their systematic aggression against the Libyan state.
  • “Confirmed: U.S. Armed Al Qaeda to Topple Libya’s Gaddaffi” with a very astonishing admission by “top military officers, CIA insiders and think-tankers” confirming the obvious truth that “conspiracy theorists” have been saying since 2011. The US backed Al Qaeda in Libya and that the Benghazi attack was a byproduct of this. Washington’s Blog notes that in 2012, it documented that: The U.S. supported opposition which overthrew Libya’s Gadaffi was largely comprised of Al Qaeda terrorists. According to a 2007 report by West Point’s Combating Terrorism Center’s center, the Libyan city of Benghazi was one of Al Qaeda’s main headquarters – and bases for sending Al Qaeda fighters into Iraq – prior to the overthrow of Gaddafi: The Hindustan Times reported last year: “There is no question that al Qaeda’s Libyan franchise, Libyan Islamic Fighting Group, is a part of the opposition,” Bruce Riedel, former CIA officer and a leading expert on terrorism, told Hindustan Times. It has always been Qaddafi’s biggest enemy and its stronghold is Benghazi. Al Qaeda is now largely in control of Libya.  Indeed, Al Qaeda flags were flown over the Benghazi courthouse once Gaddafi was toppled. What was once deemed conspiracy theory became confirmed reality when the Daily Mail reported as Washington’s Blog subsequently pointed out:
  • A self-selected group of former top military officers, CIA insiders and think-tankers, declared Tuesday in Washington that a seven-month review of the deadly 2012 terrorist attack has determined that it could have been prevented – if the U.S. hadn’t been helping to arm al-Qaeda militias throughout Libya a year earlier. ‘The United States switched sides in the war on terror with what we did in Libya, knowingly facilitating the provision of weapons to known al-Qaeda militias and figures,’ Clare Lopez, a member of the commission and a former CIA officer, told MailOnline. She blamed the Obama administration for failing to stop half of a $1 billion United Arab Emirates arms shipment from reaching al-Qaeda-linked militants. ‘Remember, these weapons that came into Benghazi were permitted to enter by our armed forces who were blockading the approaches from air and sea,’ Lopez claimed. ‘They were permitted to come in. … [They] knew these weapons were coming in, and that was allowed.. ‘The intelligence community was part of that, the Department of State was part of that, and certainly that means that the top leadership of the United States, our national security leadership, and potentially Congress – if they were briefed on this – also knew about this.’
  • ...4 more annotations...
  • ‘The White House and senior Congressional members,’ the group wrote in an interim report released Tuesday, ‘deliberately and knowingly pursued a policy that provided material support to terrorist organizations in order to topple a ruler [Muammar Gaddafi] who had been working closely with the West actively to suppress al-Qaeda.’ ‘Some look at it as treason,’ said Wayne Simmons, a former CIA officer who participated in the commission’s research. While Wayne Simmons’ characterization of such actions by the globalist, imperialist establishment in the United States as “treason” is correct in the sense that it was a clear violation of not only the Constitution, but the public interest of America, there is a rather disingenuous factor involved when some people, especially on the Neo-Con right, attempt to play the “treason card.”
  • Clearly the Neo-Con agenda has been coming full circle since the first Gulf War in the 1990s. The US “gun-walking” to jihadis in Syria from Libya, noted by the Washington Times and New York Times (albeit with partisan spin and distortion), was actually planned under Bush in 2007 as noted by Seymour Hersh in “The Redirection.” It has continued under Obama, influenced by Council on Foreign Relations figures throughout both administrations from Dick Cheney to Hillary Clinton. Consider the following points from “The Redirection”: To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda.
  • To dispel critics’ notions that this is passive, uncontrollable, and indirect support, consider: [Saudi Arabia's] Bandar and other Saudis have assured the White House that “they will keep a very close eye on the religious fundamentalists. Their message to us was ‘We’ve created this movement, and we can control it.’ It’s not that we don’t want the Salafis to throw bombs; it’s who they throw them at—Hezbollah, Moqtada al-Sadr, Iran, and at the Syrians, if they continue to work with Hezbollah and Iran. Neo-Conservative writer Gary Gambill would ride on this wave of terrorist aggression and pen an article for the Neo-Con “Middle East Forum” titled “Two Cheers for Syrian Islamists.” As noted in the analysis of the piece by Tony Cartalucci titled “Globalist Rag Gives ‘Two Cheers’ for Terrorism”, one can see how terrorism is a useful piece of capital of globalist imperialism that is easy to hide in the sight of inattentive masses with easy ploys of political spin and plausible deniability.
  • Libyan terrorists are invading Syria. They have been doing so since the influx of jihadis began, enabled by outside powers. These are not simply rogue networks operating independently but rather include state-sponsorship, especially of NATO-member Turkey and NATO’s criminal proxy government in Tripoli, Libya. We are told by the media that the regime in Tripoli under the auspice of the National Transitional Council, and populated with puppets like Mustapha Abdul Jalil, is a moderate regime distinct from the “marginal Islamist forces.” However, even in mainstream accounts, one can note that these “official, moderate” groups are involved with funding terrorism themselves as many geopolitical analysts have noted. Tony Cartalucci notes that, “In November 2011, the Telegraph in their article, “Leading Libyan Islamist met Free Syrian Army opposition group,” would report”: Abdulhakim Belhadj, head of the Tripoli Military Council and the former leader of the Libyan Islamic Fighting Group, “met with Free Syrian Army leaders in Istanbul and on the border with Turkey,” said a military official working with Mr Belhadj. “Mustafa Abdul Jalil (the interim Libyan president) sent him there.”
  •  
    Lots of documentation on the tawdry moves by the War Party in Libya and Benghazi, now blowing up in their faces. 
Paul Merrell

Turkish-Uyghur Terror Inc. - America's Other Al Qaeda | nsnbc international - 0 views

  • Because it relatively poorly understood and under-reported in comparison to other more notorious terrorist groups, the Turkish-Uyghur terror network is perhaps more dangerous and of greater utility to the United States and its allies presently versus their increasingly exposed Al Qaeda legions. The genesis of modern Turkish-sponsored terrorism, like Al Qaeda, also originates from the Cold War. Part of the wider stay-behind networks known as “Gladios” created by NATO to allegedly fight Soviet forces in the event of a Soviet invasion and occupation of Western Europe, these terrorist groups were instead turned against the population of NATO member states and engaged in violence, terrorism, mass murder, and assassinations. A group of ultra-nationalists known as the “Grey Wolves” would be cultivated for this task within Turkey. In a 1998 LA Times article titled, “Turkish Dirty War Revealed, but Papal Shooting Still Obscured,” it would be reported that (emphasis added):
  • In the late 1970s, armed bands of Gray Wolves launched a wave of bomb attacks and shootings that killed hundreds of people, including public officials, journalists, students, lawyers, labor organizers, left-wing activists and ethnic Kurds. During this period, the Gray Wolves operated with encouragement and protection of the Counter-Guerrilla Organization, a section of the Turkish Army’s Special Warfare Department. Working out of the U.S. Military Aid Mission building in Ankara, the Special Warfare Department received funds and training from U.S. advisors to establish “stay behind” squads of civilian irregulars who were set up to engage in acts of sabotage and resistance in the event of a Soviet invasion. Similar Cold War counter-guerrilla units were created in every member state of the North Atlantic Treaty Organization. But instead of preparing for foreign enemies, these operatives often set their sights on domestic targets. Another LA Times piece titled, “Turkey’s Gray Wolves Nip at Heels of Power,” would reveal the extent of the Grey Wolves reign of terror (emphasis added): At the height of the Cold War, the army used the Gray Wolves as a violent counterweight to Turkish Communists. The party’s coffers swelled with secret contributions from the government.  By the late 1970s, the Gray Wolves had spun out of state control. Their paramilitary wing fought a campaign against leftist rivals that killed nearly 6,000 people. Ali Agca, who shot Pope John Paul II in a 1981 assassination attempt, is alleged to have been affiliated with the party.
  • The article would also reveal that despite this horrific past, the Grey Wolves and their political allies were still a very potent political force in Turkey. Today, the Grey Wolves function as a paramilitary wing of the Nationalist Movement Party (MHP), which holds the third largest number of seats in Turkey’s parliament. As troubling as this should be to Turks who may find themselves on the receiving end of a politically powerful terrorist organization apparently tolerated, even sponsored by NATO for decades and in particular, supported by the United States, the Grey Wolves’ terrorism has branched out far beyond Turkey’s borders. NATO Gladio Goes Global  According to a 2009 New American Media report titled, “Behind the China Riots — Oil, Terrorism & ‘Grey Wolves’,” Turkey’s Grey Wolves have established militant training camps as far as China’s western Xinjiang region, helping produce violent terrorists who have carried out a series of deadly attacks across China. The report would state (emphasis added):
  • ...4 more annotations...
  • Enter the Grey Wolves, one of the world’s most notorious terrorist organizations. Founded in the 1960s, the Wolves are a pan-Turkic paramilitary group with 1 million followers across the Near East, Central Asia and inside Xinjiang. During the decade of political violence in Turkey in the 1980s, the military-backed activists launched a wave of assassinations, massacres of ethnic minorities, and extortions of businesses. By official count, the Turkish government holds the Wolves responsible for more than 600 murders, while leftists estimate the victims numbered in the many thousands.  Following the collapse of the Soviet Union, the Grey Wolves set up training camps in Central Asia for youths from Turkic language groups, including Uighur. Their indoctrination program embraces the goal of establishing Turan, a Turkish empire across Euro-Asia, subjugating non-Turkish races and unleashing violence to achieve their ends. Out of the limelight, the Wolves provided commando training and material support for the East Turkestan Independence Movement. In essence, NATO’s stay-behind networks had become NATO’s “go-abroad” networks, projecting the same sort of violence, terrorism, and political coercion abroad after the Cold War that these networks carried out domestically during the Cold War.
  • The alleged “struggle” by the Uyghur people in Xinjiang, referred to by the terrorists and their foreign sponsors as “East Turkistan,” consists of two essential components – a foreign harbored political front including the Washington D.C. and Munich-based World Uyghur Congress (WUC) and a militant front clearly backed by the US and NATO through intermediary groups like Turkey’s Grey Wolves. Like the Grey Wolves, the World Uyghur Congress is a creation and perpetuation of Western special interests. WUC is directly funded by the US State Department via the National Endowment for Democracy (NED) over a quarter of a million dollars (on record) a year. The NED admittedly organizes and underwrites all of WUC’s events, and their annual meetings usually feature almost exclusively US representatives reaffirming their commitment to support WUC’s objectives
  • Looking at a map of China it is clear that this campaign of separatism directly serves the long-standing plans of the United States to encircle and contain China’s rise – a campaign that has been openly and repeated outlined in US policy papers for decades – the most recent of which was published by the Council on Foreign Relations (CFR) and was titled, “Revising U.S. Grand Strategy Toward China.” It states in no uncertain terms: Because the American effort to ‘integrate’ China into the liberal international order has now generated new threats to U.S. primacy in Asia—and could result in a consequential challenge to American power globally—Washington needs a new grand strategy toward China that centers on balancing the rise of Chinese power rather than continuing to assist its ascendancy. Encouraging separatism in China’s western Xinjiang region, if successful, would carve off a substantial amount of territory. In conjunction with US-backed separatism in China’s Tibet region, an immense buffer region stands to be created that would virtually isolate China from Central Asia. And while the Grey Wolves and their Uyghur proxies are working hard to create this barrier to China’s west, with their involvement in a recent bombing in Bangkok, it appears the US is now using them to augment efforts to create a similar encirclement across Southeast Asia.
  • The Turkish-Uyghur terror network, in addition to fomenting violence across China, has more recently been trafficking terrorists from Xinjiang, through Southeast Asia, and onward to Turkey where they are staged, armed, trained, and then sent to fight NATO’s proxy war in Syria. This trafficking network apparently snaked its way through Thailand – exposed when Thailand detained over 100 Uyghurs which it then deported upon Beijing’s request back to China in July. On the same day the deportations occurred WUC and NATO’s Grey Wolves organized violent protests in Turkey both in Ankara and at the Thai consulate in Istanbul during which the consulate was invaded and destroyed. A month later, a devastating bomb would detonate in the heart of Bangkok, killing 20 mostly Chinese tourists and injuring over 100 more. In addition to the BBC already being on site before the blast, the British network would conclude even before bodies were cleared from the site that Uyghurs were likely behind the blast. This was done specifically to deflect blame from another US proxy, Thaksin Shinawatra, who has been attempting for years to regain power in Thailand. In reality, Shinawatra and the Uyghur terrorists are both functions of the same Westesrn agenda to encircle and contain China by building up a “wall” of proxy states around Beijing, and if nothing else, to create chaos in which Beijing finds it nearly impossible to prosper.
Paul Merrell

Truly Massive Display of Hypocrisy by Western Leaders - LewRockwell.com - 0 views

  • Hypocrites up and down the line. Terrorists themselves. Leaders who have been stoking the furnace of terrorism themselves, creating terrorists, supplying them with arms, tolerating their education in Saudi Arabia. Hypocrites. All those leaders who have been attacking Muslim countries for years on end and supplying arms. Hypocrites. All those leaders who yell “terrorism” when it suits their grander schemes of domination. Now when there is blowback in Paris, they yell “extremism” and use the occasion to continue and enlarge the war on terror. They use it to strengthen police state surveillance and to frighten the populations under their control. The West’s leaders have created terrorism, intentionally and unintentionally, knowingly and unknowingly, depending on the person and situation, and now they again are seeking to benefit from an attack on western ground. These same leaders stand by while Netanyahu engages in slaughtering Palestinians. They dismember Libya. They supply arms in Syria. They attack and destroy Iraq and Afghanistan. They now bemoan deaths for which they bear responsibility, for it is they who have invaded one Muslim country after another.
  • “British prime minister David Cameron, German chancellor Angela Merkel and Israeli prime minister Benjamin Netanyahu are among more than 40 world leaders who linked arms as they led the march to loud applause from the massive crowd. “Speaking at the march, Mr Cameron said extremist violence would remain a threat for many years to come. “‘We in Britain face a very similar threat, a threat of fanatical extremism,’ he said.” Among the unnamed 40 are the hypocrites who have been on the attack. Hypocrites, including Obama: “In the wake of terrorist attacks in France and elsewhere, the Obama administration announced Sunday it will host a Summit on Countering Violent Extremism next month.”
  • These leaders have no moral standing whatever, no moral credibility whatever on this matter or any other. They have long since dirtied their hands with their lies and propaganda. In their foulness, they have given up all respect. These are despicable people who are so low that they use the Paris attacks to jump on a moral white horse and act as if they are pure and defenders of their citizens. Hypocrites. They have no intention whatever of changing their very own policies of extremism and foreign intervention that have brought about attacks such as those in Paris and on 9/11. The West indulged in new forms of colonialism and imperialism in the 20th century and now the 21st. This has to be recognized, admitted and ended. It is leading to an even greater conflagration than anything yet seen.
  •  
    Right-on-the-money rant. The cure for Islamic terrorism is not to be found in the force of arms. It is to end our own western nations' terrorism of Muslim people and to end our deployment of Islamic terrorists to fight our proxy wars. "Terrorism is the price of empire. If you do not wish to pay the price, you must give up the empire." Pat Buchanan, Where the Right Went Wrong: How Neoconservatives Subverted the Reagan Revolution and Hijacked the Bush Presidency (2005). 
Paul Merrell

Beijing Strikes Back in US-China Tech Wars | The Diplomat - 0 views

  • China’s new draft anti-terror legislation has sent waves across the U.S. tech community. If there is a brewing tech war between U.S. and China over government surveillance backdoors and a preference for indigenous software, China’s new draft terror law makes it clear that Beijing is happy to give the United States a taste of its own medicine. The law has already drawn considerable criticism from international human rights groups, including Amnesty International and Human Rights Watch for its purported attempts to legitimize wanton human rights violations in the name of counter-terrorism. Additionally, China has opted to implement its own definition of terrorism, placing  “any thought, speech, or activity that, by means of violence, sabotage, or threat, aims to generate social panic, influence national policy-making, create ethnic hatred, subvert state power, or split the state” under the umbrella of the overused T-word. The problematic human rights issues aside, the draft anti-terror law will have important implications for foreign tech firms within China. According to Reuters’ reporting on the draft anti-terror law, counter-terrorism precautions by the Chinese government would essentially require foreign firms to “hand over encryption keys and install security ‘backdoors’” into their software. Additionally, these firms would have to store critical data — certainly data on Chinese citizens and residents — on Chinese soil. The onerous implications of this law could have lead to an immediate freeze to the activities of several Western tech companies in China, the world’s second largest economy and a booming emerging market for new technologies.
  • On the surface, the most troublesome implication of this law is that in order to comply with this law, Western firms, including non-technical ventures such as financial institutions and manufacturers, will be forced to give up a great deal of security. In essence, corporate secrets, financial data — all critical data — would be insecure and available for access by Chinese regulators. The new law would also prohibit the use of secure virtual private networks (VPNs) to get around these requirements.
  • The U.S. diplomatic response to Beijing’s new draft law is perhaps best captured in the fact that a whopping four cabinet members in the Obama administration, including Secretary of State John Kerry and U.S. Trade Representative Michael Froman, wrote the Chinese government expressing “serious concern.” China, for its part, seemed unfazed by U.S. concerns. Foreign Ministry spokesperson Hua Chunying told the press that she hoped the United States would view the new anti-terror precautions in “in a calm and objective way.” Indeed, following Edward Snowden’s revelations regarding the extent of the United States’ surveillance of private firms both within and outside the United States, Beijing likely views U.S. concerns as hypocritical. One U.S. industry source told Reuters that the new law was ”the equivalent of the Patriot Act on really, really strong steroids.”
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

How our deep partisan split affects President Obama and terror fears - The Washington Post - 0 views

  • On Monday, CNN released a poll indicating that 40 percent of Americans think the terrorists are winning the war on terror. It's a grim, weird finding that offers more questions about perceptions of terror than answers. Why are people in rural areas slightly more concerned about being killed in a terror attack than people in cities, as the poll finds? It doesn't make much sense, given where terrorists usually find their targets. The poll also had some good news for the White House: More than half of the country has a great deal or a moderate amount of confidence in the administration to protect the country from future terrorist acts. Among Democrats, 83 percent have confidence in the administration's ability to tackle terrorism, compared to only 17 percent of Republicans. That's pretty close to President Obama's Gallup approval ratings by party, with Republicans a bit more confident in Obama's ability to protect us than they approve of his job performance. The "who's winning the war on terror" question is similarly split on party lines, though less dramatically. Seventy-five percent of Democrats think that either the U.S. is winning or there's no clear winner, while more than half of Republicans think the terrorists are winning.
  • With big splits like that, it's little wonder, then, that even something like the imminent threat of a terror attack is viewed through a partisan lens. Among Democrats, 61 percent are not too worried about being killed in an attack, according to that CNN/ORC poll. Fifty-nine percent of Republicans are. And that almost certainly answers our rural/urban terror question. People in rural areas are probably worried about terror attacks because they're Republican, not because of where they live. Partisanship soaked in deep.
Paul Merrell

Fighting Al Qaeda by Supporting Al Qaeda in Syria: The Obama Administration is a "State... - 0 views

  • First published by GR on June 19, 2013 A major transition in US counter-terrorism doctrine is unfolding. While Barack Obama, following in the footsteps of  George W. Bush, remains firmly committed to waging a “Global War on Terrorism” (GWOT), his administration is now openly supporting selected rebel units in Syria which are part of the Al Qaeda network. Known and documented, Al Qaeda is a creation of the CIA, which has covertly supported the “Islamic Terror Network” since the heyday of the Soviet Afghan war. While Al Qaeda is a US sponsored “intelligence asset”, a “New Normal” has been established. An Al Qaeda affiliated organization, namely Syria’s Al Nusrah, is being supported “overtly” by the US President, rather than “covertly” by the CIA.
  • The support of Al Nusrah, an affiliate of al Qaeda in Iraq (AQI), is no longer channeled in secrecy as part of a CIA-MI6 covert operation, it  is now being supported –in a semi-official fashion– as part of a US foreign policy agenda. The latter is also part of America’s diplomatic discourse, implemented in consultation with Britain, Canada, Germany and France. Although Al Nusrah was not mentioned explicitly, “support to the Syrian rebels” was the main topic of debate at the June 2013 G-8 meetings in Northern Ireland. While intelligence covert ops continue to perform an important role, Washington’s support to Al Qaeda in Syria is now “out in the open”, within the public domain. It is no longer part of a secret undertaking. It is part of the mainstay of US foreign policy, carried out under the helm of Secretary of State John Kerry.
  • “Support to the rebels” is also debated in the US Congress. It is the object of a bill which has already been adopted by the Senate Foreign Relations Committee.  Senator Corker who co-sponsored the bill stated that: “The future for Syria is uncertain, but the U.S. has a vested interest in trying to prevent an extremist takeover, which poses a very real risk for us and the region,” (emphasis added) In a twisted logic, the bill purports to prevent “an extremist takeover” by supporting an Al Qaeda terrorist formation.
  • ...1 more annotation...
  • According to the 2001 Patriot Act, those “who pay for the bomb“, namely those who fund affiliates of Al Qaeda, are terrorists. In the words of George W. Bush on September 11, 2001,   “We will make no distinction between the terrorists who committed these acts and those who harbor them.” The Act pertains to the harboring and financing of terrorist organizations. Al Qaeda and its affiliates are defined in the PATRIOT Act as a terror network. Persons and organizations which support or abet Al Qaeda are considered as terrorists. The forbidden question: Does the substance of Executive order 13224 and the PATRIOT  legislation quoted above apply to a US president, a Secretary of State, a Member of the US Congress?
  •  
    Well, here is an Obama "high crime and misdemeanor". Subverting the U.S. government to sponsor terrorism. 
Paul Merrell

Growing Support for Campaign Against ISIS - and Possible Use of U.S. Ground Troops | Pe... - 0 views

  • The public has grown more supportive of the U.S. fight against ISIS, as about twice as many approve (63%) as disapprove (30%) of the military campaign against the Islamic militant group in Iraq and Syria. Last October, 57% approved and 33% disapproved. The possibility of sending U.S. ground troops to the region is more divisive, although the idea draws more support than it did four months ago. Currently, about as many favor (47%) as oppose (49%) sending U.S. ground troops to fight Islamic militants in Iraq and Syria; in October, 39% favored the idea and 55% opposed it. The new national survey by the Pew Research Center, conducted Feb. 18-22 among 1,504 adults, also finds a shift over the past year in public attitudes about the best approach for dealing with global terrorism.
  • There is a wide and growing partisan divide in these attitudes: Today, 74% of Republicans say the best way to defeat global terrorism is with “overwhelming force,” up from 57% a year ago. Meanwhile, Democrats’ attitudes are virtually unchanged. Just 30% of Democrats favor the use of overwhelming force to defeat terrorism; 29% said this last March. While the public has grown more supportive of assertive action against ISIS, many Americans continue to express trepidation about the U.S. becoming too deeply involved in Iraq and Syria. While 49% say their bigger worry about U.S. military action is that it will not go far enough in stopping Islamic militants, nearly as many (46%) say their bigger concern is that the U.S. will go too far in getting involved in the situation. That has changed only modestly since October, although the share voicing more concern about not going far enough to defeat the militants has risen six points (from 43% to 49%).
  • In the new survey, 47% say “using overwhelming military force is the best way to defeat terrorism around the world.” About as many (46%) say that “relying too much on military force to defeat terrorism creates hatred that leads to more terrorism.” In the Pew Research Center’s political typology survey, conducted Jan. 23-Mar. 16, 2014, 57% said an over-reliance on military force creates more hatred leading to increased terrorism, while fewer (37%) said that overwhelming military force is the best way to defeat global terrorism.
  • ...1 more annotation...
  • The partisan differences evident in overall attitudes about the best way to defeat terrorism are reflected in concerns about the ISIS campaign and opinions about whether to dispatch U.S. ground forces to Iraq and Syria. Republicans are about twice as likely as Democrats to favor the use of ground troops to fight Islamic militants in Iraq and Syria (67% vs. 32%). By contrast, more than three times as many Democrats as Republicans say their bigger concern about U.S. military action is that the United States will go too far in getting involved in the  (64% vs. 20%).
  •  
    Keep reality in mind: ISIL is a U.S. creation.  
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Paul Merrell

Brussels Attack: Implications of Alleged ISIS Links - nsnbc international | nsnbc inter... - 0 views

  • Just days after arresting French-born Belgium national  and terror suspect Salah Abdeslam in Brussels, a coordinated terror attack unfolded in the very same city, killing at least 28, and injuring many more.
  • NBC News has already  announced that European officials are linking the attack to ISIS, though it is unclear whether or not Abdeslam’s network – which carried out the November 2015 Paris terror attacks – was directly involved.
  • Police in Brussels were still hunting for several other alleged accomplices of Abdeslam, including Najim Laachraoui and Mohamed Abrini. Laachraoui and Abrini, like virtually every other suspect involved in a string of terrorist attacks across North America, Europe, and Australia, were well known to Western security agencies, having both been documented as having traveled to Syria to fight against Damascus under ISIS, with Abrini having been arrested and jailed several times in the past, and Laachraoui already having a 2014 international arrest warrant issued for him in connection to a trial involving recruiting Europeans to fight for ISIS.
  • ...5 more annotations...
  • In other words, all of the suspects have been under the nose, on the radar, and in the prisons of Western security agencies on and off for years, yet were still able to carry out at least one high profile terrorist attack – possibly two, and with the vast majority of the suspects involved having traveled to Syria to fight alongside ISIS before inexplicably being allowed to re-enter Europe and rejoin society without consequence – as if inviting them to take their extremism to the next level.
  • The Guardian’s “Brussels attack: were they revenge for Abdeslam’s arrest?,” attempted to link the bombings in Brussels to the arrest of Abdeslam and the Paris attack terror network. The op-ed acknowledges that these terrorist attacks are being carried out by locals – Europeans – using local resources. Should the Brussels attack be linked to this same terror network, it will greatly complicate efforts by some to leverage this tragedy to further their agendas against refugees and even to change the dynamics of the war in Syria itself. Europeans are clearly already being radicalized and then leaving to Syria to fight alongside ISIS and then returning – rather than a torrent of foreigners streaming in from abroad and carrying out violence against European targets. Should the Brussels attack turn out to be the work of this ISIS-linked terror group, considering the familiarity European security agencies had with all the suspects long before even the 2015 Paris attacks, indicates criminal negligence at best, and complicity at worst.
  • ISIS’ own alleged agenda of transforming the world into a “caliphate” is cartoonishly absurd. In reality, it is clear that ISIS shows up and exercises force in regions of the world the US and its allies cannot intervene in directly. This includes North Africa, the Middle East, and even as far as Asia. Far from a “conspiracy theory,” it would be the US’ own Defense Intelligence Agency (DIA) that would admit as much in a leaked 2012 report (.pdf) which stated: If the situation unravels there is the possibility of establishing a declared or undeclared Salafist principality in eastern Syria (Hasaka and Der Zor), and this is exactly what the supporting powers to the opposition want, in order to isolate the Syrian regime, which is considered the strategic depth of the Shia expansion (Iraq and Iran). To clarify just who these “supporting powers” were that sought the creation of a “Salafist” (Islamic) principality” (State), the DIA report explains: The West, Gulf countries, and Turkey support the opposition; while Russia, China, and Iran support the regime.
  • Between this admission, and an earlier exposé in 2007 by veteran journalist Seymour Hersh in his New Yorker piece titled, “The Redirection” where US and Saudi plans to use Al Qaeda to wage proxy war on Syria and Iran were revealed, it is clear that both Al Qaeda and ISIS are being used by the West to wage war on Damascus, Baghdad, Tehran, and even Moscow. ISIS supply lines clearly, even admittedly run from NATO territory in Turkey where the US and its regional allies have categorically failed to interdict them and even appear to be aiding and abetting the flow of men and materiel into ISIS-held territory in Syria and Iraq. These supply lines are what has allowed pressure to be continuously placed upon Damascus and its allies over the past 5 years in ways nonexistent “moderate rebels” couldn’t.
  • In Indonesia, as Jakarta clearly began re-balancing toward Beijing, ISIS carried out its first deadly attack on the Southeast Asian nation. Thailand’s similar re-balancing also prompted threats from the US that an “ISIS attack” was imminent. In Europe, where the flames of a “clash of civilizations” are being furiously and intentionally fanned, ISIS serves as a constant implement to empower extremists on both sides, while drowning out the voices of unity, moderation, and peace in the middle. It allows for a growing police state and xenophobic tendencies to flourish at home, while justifying further war abroad. While some Western newspapers are already trying to frame the Belgium attack as “incompetence” by European security agencies, there must be a better explanation as to why this “war with ISIS” continues to drag on, when the source of ISIS’ fighting capacity appears to be within rather than beyond the West – and aiding rather than opposing Western special interests.
  •  
    Reeks of a false flag attack.
Paul Merrell

Russia May Hit Back at Saudi Arabia for Volgogard Attacks - 0 views

  • Russian intelligence has now reportedly obtained solid proof that Saudi Arabia was directly involved in the twin terror attacks on the city of Volgograd. The attacks killed more than 32 people and injured over 100 others. Most of the victims were civilians. According to an informed Russian official source, reported by the Fars News Agency, Russia’s Federal Security Service (FSB) has informed President Vladimir Putin of the Saudi link to the Volgograd massacre. This will come as no surprise to Putin. The Russian leader was warned by the Saudi intelligence chief Prince Bandar Bin Sultan during a heated four-hour private meeting back in July that Wahhabi-sponsored terrorists based in the North Caucasus region of Russia would be targeting the Sochi Winter Olympics.
  • The Sochi Games are due to open on February 7. Volgograd is a key transport hub linking Moscow with the southern Russian territory and the Black Sea resort city of Sochi in particular, where the Winter Olympics are to be held. The double bombings on Volgograd’s transport system on 29-30 December were therefore unmistakably an assault on Russia’s hosting of the Olympics. The atrocity caused the deaths of several women and children, and in the aftermath President Putin was livid in his disgust at the attacks. He said there was no justification, whatsoever, for the killing of innocent civilians and he vowed to “destroy the terrorists” behind the bombings. This raises the onerous question: What will Putin do next if he has, in fact, been told that the authors of the Volgograd crime against humanity are connected to the Saudi rulers? This could be construed as an act of war. There are unconfirmed reports that Putin and his senior intelligence officers have already drawn up plans to “destroy Saudi Arabia” over its systematic sponsoring of terrorism on Russian territory.
  • The Volgograd atrocity is just the latest in a long series of terrorist acts connected to Saudi-sponsored radicals in the North Caucasus. Back in October, another suicide bomb on a packed bus in Volgograd left six dead. The group believed to be behind these attacks is known as the Caucasus Caliphate, led by Doko Umarov. Saudi Arabia is a major source of funds for the Caucasus Caliphate, which espouses the same fundamentalist ideology as the Saudi-sponsored Takfiris operating in Syria, Lebanon, Pakistan, Yemen and Iraq. Based in Chechnya and Dagestan, Umarov has publicly stated that “all means necessary would be used to derail” the Sochi Olympics. Previously, the same network carried out suicide bomb attacks on Moscow’s metro system in 2010 and 2011, which caused dozens of deaths. The Caucasus extremists are known to have close logistical connection with both American and Saudi military intelligence.
  • ...3 more annotations...
  • Indeed, from the early 1990s following the breakup of the Soviet Union, the Americans and the Saudis redeployed their Afghan Al Qaeda tactics into the southern Russian territories as a way to further destabilize Moscow. One of the architects of this plan was former CIA chief William Casey. This US and Saudi covert operations fuelled the two Chechen wars of 1994-95 and 1999-2000. Although Moscow has since managed to subdue the large-scale violence, the Caucasus Caliphate remains a potent source of terrorism and sabotage, as the latest horror in Volgograd all too grimly attests. Saudi spy chief Bandar’s earlier threat to Putin that the Sochi Games were at risk of attack from the Caucasus-based terror groups was thus no idle threat. In retrospect his words amount to self-indictment. Bandar reportedly boasted to Putin: “We control them (the Caucasus militants).” This implies that Saudi Arabia can turn on and off the conduct of these terror groups. That places Saudi Arabia as the ultimate author of a catalogue of crimes that Russia has endured for the most part of 20 years, the latest being in the city of Volgograd.
  • It is not known what precise evidence Russian intelligence has lately uncovered that allegedly pinpoints Saudi Arabia’s involvement in the Volgograd massacre. But there is already copious circumstantial evidence, as well as Bandar’s own braggadocio. One of the suicide bombers in the Volgograd double attack has been identified as Russian national Pavel Pechyonkin (32). He reportedly traveled to Syria last year and fought in the ranks of Saudi-backed extremists trying to topple the government of Bashar al Assad.
  • If the Russians have acquired hard evidence of Saudi collusion in terrorism on their soil, there is firm legal ground for Russia to exact retaliation under the doctrine of self-defense. In a second meeting between Bandar and Putin, the Russian leader reportedly told the Saudi in no uncertain terms that his support for terrorism was “a double-edged sword” that would eventually inflict damage on those who wield it. For years now Saudi Arabia has gotten away with covert state-sponsored terrorism disrupting its Middle East neighbors. Syria, Lebanon and Iraq are but the latest victims. The Saudis have done this with impunity in the service of American imperialism, just as Zionist Israel has likewise functioned as an imperial crime syndicate. But now Saudi Arabia may have swung its double-edged sword too recklessly. It has apparently been caught red-handed in an outrage against the Russian bear. Prince Bandar, we can be sure, will from now on be making extra checks beneath his car.
  •  
    Note that it has long been known that Chechen revolutionaries in Russia have been the beneficiaries of Saudi and U.S. assistance, with firm evidence of Saudi command and control.  
Paul Merrell

Poll Result: 9/11 and the War on Terror - 0 views

  • These are the topline results of a YouGov/Economist survey of 1000 US adults interviewed September 7 - 9, 2013 on 9/11 and the war on terror. The results show that Americans are beginning to oppose confrontating enemies abroad and would rather focus on domestic affairs. The margin of error is 4%.
  • Which comes closer to your view?In the long run, the United States will be safer from terrorism if it confronts thecountries and groups that promote terrorism. . . . . . . . . . . . . . . . . . . . . . . . . . . . .39%In the long run, the United States will be safer from terrorism if it stays out ofother countries’ affairs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61%
  •  
    Not just weary of of foreign wars, the U.S. public is also weary of the War on Terror™. 
Paul Merrell

Islamic Jihadis Take Over Second-Biggest City In Iraq ... But Al Qaeda Wasn't Even IN I... - 0 views

  • Here are the number of terror attacks in Iraq between 1979 and 2011 courtesy of the National Consortium for the Study of Terrorism and Responses to Terrorism Global Terrorism Database (part of a joint government-university program on terrorism, is hosted at the University of Maryland):
  • Al Qaeda wasn’t even in Iraq until the U.S. invaded that country. And U.S. policy in Libya is partly responsible for sending an influx of Al Qaeda terrorists – and heavy weapons – into Iraq. And now things are getting a whole lot worse … You may not have heard, but Al Qaeda allies took over the Iraqi city of Fallujah 6 months ago. And today, Al Qaeda-linked extremists in Iraq captured Iraq’s second-biggest city, the major oil center of Mosul.
  • To make matters worse, the army fled, so the militants seized huge caches of U.S. supplied weapons, including humvees:
Paul Merrell

'Inventing Terrorists' Study Offers Critical Examination of Government's Use of Preempt... - 0 views

  • Nearly ninety-five percent of individuals on a Justice Department list of “terrorism and terrorism-related convictions” from 2001-2010 included some elements of preemptive prosecution, according to a study by attorneys which they say is the first to “directly examine and critique preemptive prosecution and its abuses.” The study is called “Inventing Terrorists: The Lawfare of Preemptive Prosecution” [PDF]. It was released by Project SALAM, which stands for Support and Legal Advocacy for Muslims, and the National Coalition to Protect Civil Freedoms (NCPCF), a coalition of groups that “oppose profiling, preemptive prosecution and prisoner abuse.” While Mother Jones has already published extensive work on the entrapment and prosecution of “terrorists” since the 9/11 attacks examining the Justice Department’s list, this study is noteworthy because it advances the journalism to outline how the government has perverted the criminal justice system through practices that have become popular especially against Muslims.
  • The study broke down each case into three separate categories: preemptive prosecution; “elements of preemptive prosecution,” meaning the defendants’ may have committed non-terrorism-related crimes that the government “inflated” into a terrorism charge; and terrorism-related charges that were legitimate and not the result of preemptive prosecution. The Justice Department’s list only contained 399 cases. The study concluded “the number of preemptive prosecution cases is 289 out of 399, or 72.4%. The number of elements of preemptive prosecution cases is 87 out of 399, or 21.8%.” “Combining preemptive prosecution cases and elements of preemptive prosecution cases, the total number of such cases on the DOJ list is 376, or 94.2%,” according to the study.
  • Nearly twenty-five percent of the cases contained material support charges. Nearly thirty percent were cases with conspiracy charges. Over seventeen percent of cases involved sting operations. More than sixteen percent of cases included false statement or perjury charges, and around six percent of cases involved immigration-related charges. The study also concluded that there were only eleven cases where threats had been “potentially significant” to the United States. “Only three were successful (the Tsarnaev brothers and Major Nidal Hasan), accounting for seventeen deaths and several hundred injuries.” Out of hundreds of cases, the authors were only able to come up with twenty-three individuals who they believed ever posed a threat and were not preemptively prosecuted. But, as is noted in the study, nine of these people were inexplicably listed even though they committed non-terrorism related crimes.
  • ...1 more annotation...
  • Thus, the study clearly demonstrates how resources for fighting terrorism have mostly been used to target individuals who are suspicious and easier to prosecute because they practice a certain religion or have an “ideology” the general public will resent. And if most of these people were not people of color with Arabic-sounding names that could be used to promote a fear of foreigners in the criminal justice process, their crimes would be given the same light treatment other members of the general public typically receive.
  •  
    What to do if you're in the FBI and Congress has rained billions of dollars on you to head off the next 9-11? Tell Congress it was a false flag operation, or get out there and invent a bunch of terrorists? 
Paul Merrell

Land Destroyer: America's Covert Re-Invasion of Iraq - 0 views

  • mage: ISIS clearly did not materialize spontaneously within Iraq, it hasclearly redeployed from its NATO-sponsored destruction of Syria to northern Iraq, perhaps in an attempt to justify a NATO incursion and thecreation of a buffer zone straddling Syrian, Iraqi, and even possibly Iranian territory with the goal of targeting Iran directly with ISIS.   June 13, 2014 (Tony Cartalucci - LD) - Heavily armed, well funded, and organized as a professional, standing army, the forces of the Islamic State of Iraq and Syria (ISIS) swept southward into Iraq from Turkey and northeastern Syria, taking the cities of Mosul and Tikrit, and now threaten the Iraqi capital city of Baghdad itself. The United States was sure to prop up two unfounded narratives - the first being that US intelligence agencies, despite assets in Iraq and above it in the form of surveillance drones, failed to give warning of the invasion, and that ISIS is some sort of self-sustaining terror organization carving out a "state" by "robbing banks" and collecting "donations" on Twitter. The Wall Street Journal in its report, "Iraqi Drama Catches U.S. Off Guard," stated: The quickly unfolding drama prompted a White House meeting Wednesday of top policy makers and military leaders who were caught off guard by the swift collapse of Iraqi security forces, officials acknowledged.
  • mage: ISIS has convoys of brand new matching Toyota's the samevehicles seen among admittedly NATO-armed terrorists operatingeverywhere from Libya to Syria, and now Iraq. It is a synthetic, state-sponsored regional mercenary expeditionary force.
  • The question remains, if a Lebanese newspaper knew ISIS was on the move eastward, why didn't the CIA? The obvious answer is the CIA did know, and is simply feigning ignorance at the expense of their reputation to bait its enemies into suspecting the agency of  incompetency rather than complicity in the horrific terroristic swath ISIS is now carving through northern Iraq. Described extensively in the full New Eastern Outlook Journal (NEO) report, "NATO’s Terror Hordes in Iraq a Pretext for Syria Invasion," the United States, Turkey, Saudi Arabia, and Qatar, have funded and armed terrorists operating in Syria for the past 3 years to the tune of hundreds of millions of dollars - coincidentally the same amount that ISIS would require to gain primacy among militant groups fighting in Syria and to mobilize forces capable of crossing into Iraq and overwhelming Baghdad's national defenses.
  • ...4 more annotations...
  • a 3-year ongoing CIA program (here, here, and here) all along the Turkish-Syrian border to "monitor" and "arm" "moderate" militants fighting the Syrian government, the US claims it was caught "by surprise." If drones and CIA operatives operating in ISIS territory weren't enough to detect the impending invasion, perhaps the CIA should have just picked up a newspaper.Indeed, the Lebanon Daily Start in March 2014 reported that ISIS openly withdrew its forces from Latakia and Idlib provinces in western Syria, and redeployed them in Syria's east - along the Syrian-Iraqi border. The article titled, "Al-Qaeda splinter group in Syria leaves two provinces: activists," stated explicitly that: On Friday, ISIS – which alienated many rebels by seizing territory and killing rival commanders – finished withdrawing from the Idlib and Latakia provinces and moved its forces toward the eastern Raqqa province and the eastern outskirts of the northern city of Aleppo, activists said.
  • The NEO report includes links to the US Army’s West Point Countering Terrorism Center reports, “Bombers, Bank Accounts and Bleedout: al-Qa’ida’s Road In and Out of Iraq,” and “Al-Qa’ida’s Foreign Fighters in Iraq,” which detail extensively the terror network used to flood Iraq with foreign terrorists, weapons, and cash to fuel an artificial "sectarian war" during the US occupation, and then turned over to flood Syria with terrorists in the West's bid to overthrow the government in Damascus. What's ISIS Doing in Iraq? The NEO report would also post Seymour Hersh's 2007 article, "The Redirection," documenting over the course of 9 pages US, Saudi, and Israeli intentions to create and deploy sectarian extremists region-wide to confront Iran, Syria, and Hezbollah in Lebanon. Hersh would note that these "sectarian extremists" were either tied to Al Qaeda, or Al Qaeda itself. The ISIS army moving toward Baghdad is the final manifestation of this conspiracy, a standing army operating with impunity, threatening to topple the Syrian government, purge pro-Iranian forces in Iraq, and even threatening Iran itself by building a bridge from Al Qaeda's NATO safe havens in Turkey, across northern Iraq, and up to Iran's borders directly. Labeled "terrorists" by the West, grants the West plausible deniability in its creation, deployment, and across the broad spectrum of atrocities it is now carrying out.  
  • It is a defacto re-invasion of Iraq by Western interests - but this time without Western forces directly participating - rather a proxy force the West is desperately attempting to disavow any knowledge of or any connection to. However, no other explanation can account for the size and prowess of ISIS beyond state sponsorship. And since ISIS is the clear benefactor of state sponsorship, the question is, which states are sponsoring it? With Iraq, Syria, and Iran along with Lebanese-based Hezbollah locked in armed struggle with ISIS and other Al Qaeda franchises across the region, the only blocs left are NATO and the GCC (Saudi Arabia and Qatar in particular).
  • With the West declaring ISIS fully villainous in an attempt to intervene more directly in northern Iraq and eastern Syria, creating a long desired "buffer zone" within which to harbor, arm, and fund an even larger terrorist expeditionary force, Syria, Iraq, Iran, and others are offered an opportunity to preempt Western involvement and to crush the ISIS - cornering and eliminating NATO-GCC's expeditionary force while scoring geopolitical points of vanquishing Washington's latest "villain." Joint Iraq-Iranian operations in the north and south of ISIS's locations, and just along Turkey's borders could envelop and trap ISIS to then be whittled down and destroyed - just as Syria has been doing to NATO's proxy terrorist forces within its own borders.Whatever the regional outcome may be, the fact is the West has re-invaded Iraq, with a force as brutal, if not worse than the "shock and awe" doctrine of 2003. Iraq faces another difficult occupation if it cannot summon a response from within, and among its allies abroad, to counter and crush this threat with utmost expediency.
Paul Merrell

Secret documents shine light on GCSB spying in Bangladesh - National - NZ Herald News - 0 views

  • Secret documents reveal New Zealand has shared intelligence collected through covert surveillance with Bangladesh despite that country's security forces being implicated in extrajudicial killings, torture and other human rights abuses. The documents shine light on the major role played by the Government Communications Security Bureau (GCSB) in electronic spying operations conducted in the small South Asian nation. The surveillance has been used to aid the United States as part of its global counter-terrorism campaign, launched after the September 11 attacks in 2001. The New Zealand Herald analysed the documents in collaboration with US news website The Intercept, which obtained them from the NSA whistle-blower Edward Snowden.
  • Green Party co-leader Russel Norman said the spy agency was "dragging" New Zealand into human rights abuses, and the Government should stop providing intelligence assistance to Bangladesh. "All three key anti-terrorism government agencies in Bangladesh have been implicated in horrendous human rights abuses, so it is impossible to guarantee that the information passed on did not lead to innocent people being killed or tortured," Dr Norman said. "John Key has always justified the GCSB on the basis that it is there to protect the good guys, but these documents reveal that it is helping the bad guys.
  • The intelligence gathered by the GCSB staff was also being forwarded to foreign intelligence agencies, including Bangladesh's state intelligence agency. In recent years, human rights groups have issued several reports documenting Bangladeshi intelligence and security agencies' disregard for international prohibitions on torture and alleged involvement in politically motivated killings. In 2014, a case was filed in the International Criminal Court accusing the Bangladesh Government of committing crimes against humanity. The GCSB's surveillance operations in Bangladesh are among the most surprising and obscure yet revealed. Bangladesh barely registers in New Zealand foreign policy. The Ministry of Foreign Affairs and Trade website says: "Relations between New Zealand and Bangladesh remain friendly, although interaction is limited." Nonetheless, a New Zealand government source told the Herald that Bangladesh is the main focus of one of the GCSB's four analysis sections, called ICT, and has been for over a decade. ICT, the Transnational Issues section, was set up in April 2002 in the wake of the September 11 attacks to focus on terrorism threats.
  • ...5 more annotations...
  • The 2009 document reveals that there is a special collection site in the Bangladesh capital, Dhaka, for eavesdropping on local communications. New Zealand does not have a high commission or any other official building in Bangladesh in which to hide a covert listening post. The Snowden documents suggest the Dhaka unit may be located inside a US-controlled building with operations overseen by the NSA and the Central Intelligence Agency (CIA).
  • The Bangladesh spying is revealed in an April 2013 US National Security Agency (NSA) report about its relationship with New Zealand. In a section called "What Partner Provides to NSA", it says "GCSB has been the lead for the intelligence community on the Bangladesh CT [Counter-Terrorism] target since 2004." The GCSB provides "one of the key SIGINT [signals intelligence] sources of [Bangladesh counter-terrorism] reporting to the US intelligence community."
  • The intelligence gathered by the GCSB staff was being forwarded to foreign intelligence agencies. The April 2013 NSA report said the "GCSB's Bangladesh CT [counter terrorism] reporting provided unique intelligence leads that have enabled successful CT operations by Bangladesh State Intelligence Service, CIA and India over the past year". The specific Bangladesh "State Intelligence Service" referred to is not named in the document. Bangladesh has several agencies that focus on gathering intelligence, primarily including the Directorate General of Forces Intelligence (DGFI), the National Security Intelligence agency (NSI), and the police Special Branch. The lead agency that executes the country's counter-terrorism operations is the Rapid Action Battalion, or RAB. Each of these agencies has been accused of involvement in severe human rights abuses over a sustained number of years. In 2008, for instance, Human Rights Watch alleged that the Special Branch headquarters in Dhaka's Maghbazar neighbourhood was used to torture detainees.
  • In 2010, a trade union activist accused the NSI of arresting, torturing, and threatening to kill him. The same activist was found dead in unexplained circumstances two years later, his toes and feet broken, legs and body battered and bruised, and his legs apparently pierced with a sharp object. Bangladesh's intelligence agencies and main police and security forces co-operate closely. Most notably, they work together as part of a notorious centre called the Taskforce for Interrogation Cell, located inside a compound in northern Dhaka that is controlled by the RAB unit. In 2011, Britain's Guardian newspaper reported the interrogation cell was used as a place to extract information and confessions from "enemies of the state". It was described as a "torture centre" used for "deliberate and systematic" mistreatment of detainees. One British man detained there in 2009 on terrorism-related charges was allegedly hooded and strapped to a chair while a drill was driven into his right shoulder and hip.
  • Other torture methods used by Bangladeshi authorities, according to Human Rights Watch, have included "burning with acid, hammering of nails into toes ... electric shocks, beatings on legs with iron rods, beating with batons on backs after sprinkling sand on them, ice torture, finger piercing, and mock executions". In February last year, the US Government suspended its own support for the RAB, citing "gross violation of human rights" committed by the force's members. The same month, a case against the Bangladesh Government was lodged in the International Criminal Court, accusing the country's officials of waging a brutal campaign of "widespread or systematic" torture, killings, and other human rights abuses that amounted to crimes against humanity.
Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Paul Merrell

BBC News - UK terror threat level raised to 'severe' - 0 views

  • The UK's terror threat level has been raised from "substantial" to "severe" in response to conflicts in Iraq and Syria, Home Secretary Theresa May says. The new alert level rates the risk of an attack on the UK "highly likely", although Mrs May said there was no evidence to suggest one was "imminent". It is the second highest of five possible UK threat levels. David Cameron promised new legislation would make it easier to take passports from those travelling abroad to fight.
  •  
    Of course a heightened "terror threat level" accompanies a move to restrict civil liberties by expansion of the UK's "no travel" list for its citizens, notwithstanding that there is no evidence to suggest that a terror attack on the UK is imminent and the restriction is aimed at preventing Brits from traveling abroad, not at intercepting inbound terrorists™.  'Tis the politics of fear in action.
Paul Merrell

How the FBI Created a Terrorist - The Intercept - 0 views

  • Informant-led sting operations are central to the FBI’s counterterrorism program. Of 508 defendants prosecuted in federal terrorism-related cases in the decade after 9/11, 243 were involved with an FBI informant, while 158 were the targets of sting operations. Of those cases, an informant or FBI undercover operative led 49 defendants in their terrorism plots, similar to the way Osmakac was led in his. In these cases, the FBI says paid informants and undercover agents are foiling attacks before they occur. But the evidence suggests — and a recent Human Rights Watch report on the subject illustrates — that the FBI isn’t always nabbing would-be terrorists so much as setting up mentally ill or economically desperate people to commit crimes they could never have accomplished on their own.
  • At least in Osmakac’s case, FBI agents seem to agree with that criticism, though they never intended for that admission to become public. In the Osmakac sting, the undercover FBI agent went by the pseudonym “Amir Jones.” He’s the guy behind the camera in Osmakac’s martyrdom video. Amir, posing as a dealer who could provide weapons, wore a hidden recording device throughout the sting. The device picked up conversations, including, apparently, back at the FBI’s Tampa Field Office, a gated compound beneath the flight path of Tampa International Airport, among agents and employees who assumed their words were private and protected. These unintentional recordings offer an exclusive look inside an FBI counterterrorism sting, and suggest that, even in the eyes of the FBI agents involved, these sting targets aren’t always the threatening figures they are made out to be.
  • OW OSMAKAC CAME to the attention of law enforcement in the first place is still unclear. In a December 2012 Senate floor speech, Dianne Feinstein, chairwoman of the Senate Intelligence Committee, cited Osmakac’s case as one of nine that demonstrated the effectiveness of surveillance under the FISA Amendments Act. Senate legal counsel later walked back those comments, saying they were misconstrued. Osmakac is among terrorism defendants who were subjected to some sort of FISA surveillance, according to court records, but whether he was under individual surveillance or identified through bulk collection is unknown. Discovery material referenced in a defense motion included a surveillance log coversheet with the description, “CT-GLOBAL EXTREMIST INSPIRED.” If he first came onto the FBI’s radar as a result of eavesdropping, then it’s plausible that as part of the sting, the FBI manufactured another explanation for his targeting. This is a long-running, if controversial process known as “parallel construction,” which has also been used by the U.S. Drug Enforcement Administration when drug offenders are identified through bulk collection and then prosecuted for drug crimes. In court records, the FBI maintained that Osmakac came to agents’ attention through Dabus. The informant reached out to the FBI after meeting Osmakac, and soon offered him a job at Java Village.
  •  
    A judge denied the defense access to FBI transcripts of conversations among agents on grounds that they would provide no assistance to the defense beyond what was available to the defense by discovery. He also entered a protective order barring their disclosure. The defendant was found guilty and sentenced to 40 years in prison.  But the FBI transcripts were leaked to The Intercept, apparently by someone inside the Dept. of Justice or the judicial system, since the defense never was provided with them. The transcripts along with evidence from the case and gathered through interviews provide a chilling look into the methods the FBI uses to manufacture "terrorists" for prosecution and conviction (in this case victimizing a young Muslim American with a severe mental illness), obviously only for propaganda and to justify its counter-terrorism budget. This is an area that needs Congressional attention. The courts' protections from entrapment are far too lax, particularly when members of a particular religion are being targeted for political reasons and anti-Muslim hysteria is sweeping the land. The government should not be permitted to manufacture criminals.
‹ Previous 21 - 40 of 815 Next › Last »
Showing 20 items per page