Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged unmasking

Rss Feed Group items tagged

Paul Merrell

DiGenova: Rice Ordered 'Spreadsheets | The Daily Caller - 0 views

  • Former President Barack Obama’s national security adviser Susan Rice ordered U.S. spy agencies to produce “detailed spreadsheets” of legal phone calls involving Donald Trump and his aides when he was running for president, according to former U.S. Attorney Joseph diGenova. “What was produced by the intelligence community at the request of Ms. Rice were detailed spreadsheets of intercepted phone calls with unmasked Trump associates in perfectly legal conversations with individuals,” diGenova told The Daily Caller News Foundation Investigative Group Monday. “The overheard conversations involved no illegal activity by anybody of the Trump associates, or anyone they were speaking with,” diGenova said. “In short, the only apparent illegal activity was the unmasking of the people in the calls.”
  • Other official sources with direct knowledge and who requested anonymity confirmed to TheDCNF diGenova’s description of surveillance reports Rice ordered one year before the 2016 presidential election. Also on Monday, Fox News and Bloomberg News, citing multiple sources reported that Rice had requested the intelligence information that was produced in a highly organized operation. Fox said the unmasked names of Trump aides were given to officials at the National Security Council (NSC), the Department of Defense, James Clapper, President Obama’s Director of National Intelligence, and John Brennan, Obama’s CIA Director. Joining Rice in the alleged White House operations was her deputy Ben Rhodes, according to Fox. Critics of the atmosphere prevailing throughout the Obama administration’s last year in office point to former Obama Deputy Defense Secretary Evelyn Farkas who admitted in a March 2 television interview on MSNBC that she “was urging my former colleagues,” to “get as much information as you can, get as much intelligence as you can, before President Obama leaves the administration.”
  • Michael Doran, former NSC senior director, told TheDCNF Monday that “somebody blew a hole in the wall between national security secrets and partisan politics.” This “was a stream of information that was supposed to be hermetically sealed from politics and the Obama administration found a way to blow a hole in that wall,” he said.
  • ...1 more annotation...
  • Doran charged that potential serious crimes were undertaken because “this is a leaking of signal intelligence.” “That’s a felony,” he told TheDCNF. “And you can get 10 years for that. It is a tremendous abuse of the system. We’re not supposed to be monitoring American citizens. Bigger than the crime, is the breach of public trust.” Waurishuk said he was most dismayed that “this is now using national intelligence assets and capabilities to spy on the elected, yet-to-be-seated president.” “We’re looking at a potential constitutional crisis from the standpoint that we used an extremely strong capability that’s supposed to be used to safeguard and protect the country,” he said. “And we used it for political purposes by a sitting president. That takes on a new precedent.”
Paul Merrell

Turkey's Erdogan Gets Taste of His Own Medicine? « LewRockwell.com Blog - 0 views

  • After nearly a week of increasing public protests in Turkey, ostensibly over government plans to turn a last bit of green space in Istanbul into another shopping mall, matters became far more serious on Friday. Riot police descended on the protestors with various forms of tear gas (and possibly worse chemical and biological agents -- raw sewage?) and water cannon, blasting everyone and everything in sight including non-participants. When they caught protestors, they beat them violently and brutally, as can be seen in this video. Photographs show that police fired tear gas into crowded underground metro stations, leading to panic and worse. Istanbul looks like a war zone. Today indications are that protests have only increased in number and fury in response to the violence with which they were met yesterday.
  • Prime Minister Recep Tayyip Erdogan has come under increased criticism at home over his enthusiastic support for those fighting to overthrow the government in neighboring Syria. Turkish government support for the rebels came early and has included providing safe havens for the Islamist insurgents and safe passage into Syria from Libya, Yemen, and other countries of the insurgents' origin. Erdogan's stated policy of "zero problems with neighbors" has been turned on its head by his support for the rebels fighting next door. Public dissatisfaction with the Turkish government's policy of encouraging an Islamist insurgency next door has steadily increased. The insurgents fighting the Syrian government were still unsatisfied by the level of support they received from their Turkish hosts and they took to false flag attacks in places like Reyhanli and a planned false-flag sarin gas attack on southern Turkey in Adana in attempt to provoke a Turkish (and NATO) military response against Syria.
  • Suddenly the tables are turned at home. Faced with a nascent but growing protest movement of his own, Erdogan expresses a very different view toward the people in the street. The Prime Minister strongly supported the "Arab Spring" overthrow in Egypt and supports the overthrow of Assad next door because he said the leaders of these countries did not listen to their people. Just last week he met with President Obama and agreed that "Assad must go." Now with protesters in Turkey chanting "Erdogan must go" he is singing a different tune. Now "the people" he claimed to speak for -- on the streets in Egypt and Syria, at least -- were, in Turkey, "with terror, have dark ties," in his words. Suddenly "the people" are not so noble when they are calling for his ouster. With the tables turned on Erdogan, he can only demand order! "I call on the protesters to stop their demonstrations immediately," he thundered yesterday. Erdogan caught the tiger by the tail and thought he would become a new Ottoman Sultan. Reality bites back hard on the streets of Istanbul and elsewhere. This is far from over.
  •  
    The U.S. Pipelinestan war-by-proxy against Syria as a proxy for war against Iran as a proxy for war against Russia's lock on the natural gas market for the E.U. continues to run up against a rock wall of unanticipated consequences. With U.S. Patriot missile batteries stationed along Turkey's border with Syria through which Qatar's mercenary Al Qaeda forces are infiltrated and supplied, Turkey's autocratic government suddenly faces its own Arab Spring uprising.  With Obama trumpeting that Syrian use of chemical weapons would "cross a red line" justifying direct U.S. intervention, a mercenary false flag chemical attack in Turkey is unmasked. 
Gary Edwards

Arnold Ahlert: Russia Would Love a Third Obama Term - The Patriot Post - 0 views

  • New York Post columnist John Crudele obliterates the despicable word-parsing. “Clinton was so careless when using her BlackBerry that the Russians stole her password,” he writes. “All Russian President Vladimir Putin’s gang had to do was log into Clinton’s account and read whatever they wanted.” When it comes to the DNC hack, “The Russians did it” is the theme-du-jour. Clinton campaign manager, Robby Mook stated Sunday that “experts are telling us that Russian state actors broke into the DNC, stole these emails, [and are] releasing these emails for the purpose of helping Donald Trump.” The campaign itself echoed that assertion. “This is further evidence the Russian government is trying to influence the outcome of the election.”
  • The reliably leftist Politico — so far left that reporter Ken Vogel remains employed there despite sending a story to the DNC before he sent it to his own editor — is quite comfortable advancing that agenda, using it as a vehicle to buff up Clinton’s tenure as secretary of state. “Former U.S. officials who worked on Russia policy with Clinton say that Putin was personally stung by Clinton’s December 2011 condemnation of Russia’s parliamentary elections, and had his anger communicated directly to President Barack Obama,” Politico reports. “They say Putin and his advisers are also keenly aware that, even as she executed Obama’s ‘reset’ policy with Russia, Clinton took a harder line toward Moscow than others in the administration. And they say Putin sees Clinton as a forceful proponent of ‘regime change’ policies that the Russian leader considers a grave threat to his own survival.” Yet even Politico is forced to admit the payback angle is “speculation,” and that some experts remain “unconvinced that Putin’s government engineered the DNC email hack or that it was meant to influence the election in Trump’s favor as opposed to embarrassing DNC officials for any number of reasons.”
  • Americans would also be wise to remain highly skeptical of this claim for any number of reasons. WikiLeaks founder Julian Assange asserts there is “there is no proof whatsoever” Russia is behind the hack and that “this is a diversion that’s being pushed by the Hillary Clinton campaign.” To be fair, Assange is a Russian sympathizer, and leftists aren’t the only ones attributing the hack to the Russians. The same FBI that gave Clinton a pass will be investigating the DNC hack, and at some point the bureau will reach a conclusion. In the meantime, it might be worth considering that this smacks of a carefully orchestrated disinformation campaign similar to the one Clinton and several other Obama administration officials engineered with regard to Benghazi. While Clinton was never held personally or legally accountable for the deaths of four Americans, it is beyond dispute that she lied unabashedly about a video causing the attack, while sending her daughter a damning email at 11:12 p.m. on Sept. 11, 2012, admitting the administration knew “the attack had nothing to do with the film. It was a planned attack, not a protest.” The theme of this coordinated narrative? Clinton campaign chair John Podesta referred Monday night to “a kind of bromance going on” between Putin and Trump. Clinton campaign manager Robby Mook echoed that assertion, insisting the email dump comes on the heels of “changes to the Republican platform to make it more pro-Russian.”
  • ...3 more annotations...
  • The Leftmedia were equally obliging. “The theory that Moscow orchestrated the leaks to help Trump … is fast gaining currency within the Obama administration because of the timing of the leaks and Trump’s own connections to the Russian government,” reports the Daily Beast. Other Leftmedia examples abound. “Until Friday, that charge, with its eerie suggestion of a Kremlin conspiracy to aid Donald J. Trump, has been only whispered,” shouted the New York Times. “Because the leaks are widely suspected of being the result of a Russian hacking operation, they can be used to reinforce the narrative that Russian President Vladimir Putin is rooting for Trump and that Trump, in turn, would be too accommodating to Moscow,” adds the Los Angeles Times. “Why would Russian President Vladimir Putin want to help Donald Trump win the White House?” asks NPR. “If you want to indulge in a bit of conspiracy theory, remember that Russian President Vladimir Putin has praised candidate Trump as recently as June,” states the Burlington Free Press.
  • Ultimately, here’s the question: If the Russians could access the DNC server, they could certainly access Clinton’s unsecure server. And if they could access Clinton’s server, including the 33,000 emails she deleted (maybe some were about how the Clintons profited from selling American uranium to Russia), ask yourself who they’d rather have in the Oval Office: Donald Trump, who professed admiration for Putin but remains a highly unpredictable individual — or Hillary Clinton, who could be subjected to blackmail for as long as eight years? Russia’s clear objective would be to have the weakest American leadership they can get. Blackmail aside, what would be weaker than an extension of Obama’s presidency?
  • Moreover, it is just as likely a number of the so-called “experts” as well as Clinton’s useful idiot media apparatchiks have considered the blackmail possibility and are trying to divert attention from it with a phony Trump connection story. Democrats can theorize, complain and blame to their hearts' content, but none of it obscures the reality that the DNC — and by extension Hillary Clinton and the entire Democrat Party — are a conglomeration of morally bereft, utterly incompetent individuals wholly ill-equipped to handle internal security, much less national security. And they are aided and abetted by an equally corrupt media, more than willing to abide that potentially catastrophic reality as long as it gets a Democrat in the Oval Office. WikiLeaks has promised additional dumps with be forthcoming. How much deeper Democrats sink is anyone’s guess.
  •  
    "If one lives by the vulnerable server, one dies by the vulnerable server. As the week unfolds, America is witnessing the ultimate unmasking of the Democrat Party, an entity whose self-aggrandizing claims of unity, fairness and intellectual honesty have been revealed as utterly fraudulent by a flood of DNC emails released by WikiLeaks. Moreover, a stunning level of hypocrisy attends the entire exposure, as DNC Chairwoman Debbie Wasserman Schultz is sent packing for this breach of confidential party information, while Hillary Clinton, whose equally accessible private server contained far more critical top-secret information, officially became the party's standard-bearer. But not to worry, assured FBI Director James Comey, who insisted there was no direct evidence that Clinton's server had been hacked by hostile actors - before adding it was possible that hostile actors "gained access" to Clinton's accounts. Clinton was equally adept at making semantical distinctions. "If you go by the evidence, there is no evidence that the system was breached or hacked successfully," Clinton said. "And I think that what's important here is follow the evidence. And there is no evidence. And that can't be said about a lot of other systems, including government systems.""
Paul Merrell

My Life Unmasking British Eavesdroppers - 0 views

  • In my 40 years of reporting on mass surveillance, I have been raided three times; jailed once; had television programs I made or assisted making banned from airing under government pressure five times; seen tapes seized; faced being shoved out of a helicopter; had my phone tapped for at least a decade; and — with this arrest — been lined up to face up to 30 years imprisonment for alleged violations of secrecy laws. And why do I keep going? Because from the beginning, my investigations revealed a once-unimaginable scope of governmental surveillance, collusion, and concealment by the British and U.S. governments — practices that were always as much about domestic spying during times of peace as they were about keeping citizens safe from supposed foreign enemies, thus giving the British government the potential power to become, as our source that night had put it, a virtual “police state.”
  • A decade later, in a parliamentary debate, Foreign Secretary David Owen revealed that he was initially against our being prosecuted, but was convinced to go along after being promised that we journalists could be jailed in secret. “Everybody came in and persuaded me that it would be terrible not to prosecute. … I eventually relented. But one of my reasons for doing so was that I was given an absolute promise that the case would be heard in camera [a secret hearing].” In the face of this security onslaught, the politicians collapsed and agreed we should all be charged with espionage — although there was no suggestion that we wanted to do anything other than write articles. I was alleged to be “a thoroughly subversive man who was quite prepared to publish information which was secret,” my lawyer later wrote in his memoir.
  •  
    Play it again, Sam! Reliving the history of the journalist who broke the ECHELON story.
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

US-Saudi Blitz into Yemen: Naked Aggression, Absolute Desperation | Global Research - C... - 0 views

  • The “proxy war” model the US has been employing throughout the Middle East, Eastern Europe, and even in parts of Asia appears to have failed yet again, this time in the Persian Gulf state of Yemen. Overcoming the US-Saudi backed regime in Yemen, and a coalition of sectarian extremists including Al Qaeda and its rebrand, the “Islamic State,” pro-Iranian Yemeni Houthi militias have turned the tide against American “soft power” and has necessitated a more direct military intervention. While US military forces themselves are not involved allegedly, Saudi warplanes and a possible ground force are. Though Saudi Arabia claims “10 countries” have joined its coalition to intervene in Yemen, like the US invasion and occupation of Iraq hid behind a “coalition,” it is overwhelmingly a Saudi operation with “coalition partners” added in a vain attempt to generate diplomatic legitimacy. The New York Times, even in the title of its report, “Saudi Arabia Begins Air Assault in Yemen,” seems not to notice these “10” other countries. It reports:
  • Saudi Arabia announced on Wednesday night that it had launched a military campaign in Yemen, the beginning of what a Saudi official said was an offensive to restore a Yemeni government that had collapsed after rebel forces took control of large swaths of the country.  The air campaign began as the internal conflict in Yemen showed signs of degenerating into a proxy war between regional powers. The Saudi announcement came during a rare news conference in Washington by Adel al-Jubeir, the kingdom’s ambassador to the United States.
  • Indeed, the conflict in Yemen is a proxy war. Not between Iran and Saudi Arabia per say, but between Iran and the United States, with the United States electing Saudi Arabia as its unfortunate stand-in. Iran’s interest in Yemen serves as a direct result of the US-engineered “Arab Spring” and attempts to overturn the political order of North Africa and the Middle East to create a unified sectarian front against Iran for the purpose of a direct conflict with Tehran. The war raging in Syria is one part of this greater geopolitical conspiracy, aimed at overturning one of Iran’s most important regional allies, cutting the bridge between it and another important ally, Hezbollah in Lebanon. And while Iran’s interest in Yemen is currently portrayed as yet another example of Iranian aggression, indicative of its inability to live in peace with its neighbors, US policymakers themselves have long ago already noted that Iran’s influence throughout the region, including backing armed groups, serves a solely defensive purpose, acknowledging the West and its regional allies’ attempts to encircle, subvert, and overturn Iran’s current political order.
  • ...4 more annotations...
  • The unelected hereditary regime ruling over Saudi Arabia, a nation notorious for egregious human rights abuses, and a land utterly devoid of even a semblance of what is referred to as “human rights,” is now posing as arbiter of which government in neighboring Yemen is “legitimate” and which is not, to the extent of which it is prepared to use military force to restore the former over the latter. The United States providing support for the Saudi regime is designed to lend legitimacy to what would otherwise be a difficult narrative to sell. However, the United States itself has suffered from an increasing deficit in its own legitimacy and moral authority. Most ironic of all, US and Saudi-backed sectarian extremists, including Al Qaeda in Yemen, had served as proxy forces meant to keep Houthi militias in check by proxy so the need for a direct military intervention such as the one now unfolding would not be necessary. This means that Saudi Arabia and the US are intervening in Yemen only after the terrorists they were supporting were overwhelmed and the regime they were propping up collapsed. In reality, Saudi Arabia’s and the United States’ rhetoric aside, a brutal regional regime meddled in Yemen and lost, and now the aspiring global hemegon sponsoring it from abroad has ordered it to intervene directly and clean up its mess.
  • The aerial assault on Yemen is meant to impress upon onlookers Saudi military might. A ground contingent might also attempt to quickly sweep in and panic Houthi fighters into folding. Barring a quick victory built on psychologically overwhelming Houthi fighters, Saudi Arabia risks enveloping itself in a conflict that could easily escape out from under the military machine the US has built for it. It is too early to tell how the military operation will play out and how far the Saudis and their US sponsors will go to reassert themselves over Yemen. However, that the Houthis have outmatched combined US-Saudi proxy forces right on Riyadh’s doorstep indicates an operational capacity that may not only survive the current Saudi assault, but be strengthened by it. Reports that Houthi fighters have employed captured Yemeni warplanes further bolsters this notion – revealing tactical, operational, and strategic sophistication that may well know how to weather whatever the Saudis have to throw at it, and come back stronger.
  • What may result is a conflict that spills over Yemen’s borders and into Saudi Arabia proper. Whatever dark secrets the Western media’s decades of self-censorship regarding the true sociopolitical nature of Saudi Arabia will become apparent when the people of the Arabian peninsula must choose to risk their lives fighting for a Western client regime, or take a piece of the peninsula for themselves. Additionally, a transfer of resources and fighters arrayed under the flag of the so-called “Islamic State” and Al Qaeda from Syria to the Arabian Peninsula will further indicate that the US and its regional allies have been behind the chaos and atrocities carried out in the Levant for the past 4 years. Such revelations will only further undermine the moral imperative of the West and its regional allies, which in turn will further sabotage their efforts to rally support for an increasingly desperate battle they themselves conspired to start.
  • the Yemeni people are not being allowed to determine their own affairs. Everything up to and including military invasion has been reserved specifically to ensure that the people of Yemen do not determine things for themselves, clearly, because it does not suit US interests. Such naked hypocrisy will be duly noted by the global public and across diplomatic circles. The West’s inability to maintain a cohesive narrative is a growing sign of weakness. Shareholders in the global enterprise the West is engaged in may see such weakness as a cause to divest – or at the very least – a cause to diversify toward other enterprises. Such enterprises may include Russia and China’s mulipolar world. The vanishing of Western global hegemony will be done in destructive conflict waged in desperation and spite. Today, that desperation and spite befalls Yemen.
  •  
    Usually I agree with Tony Cartalucci, but I think it's too early to pick winners and losers in Yemen. At least a couple of other nations allied with the Saudis are flying aerial missions and there's a commitment of troops and air support by Egypt, although it isn't clear that these would enter Yemen, but may just deploy to "protect" the waters approaching the Suez Canal from the Yemenis. The Saudis have a surfeit of U.S. weaponry but their military is inexperienced. The House of Saud has preferred proxy wars conducted by Salafist mercenaries over direct military intervention. How effective its military will be is a very big unknown at this point. But I like Cartalucci's point that if the House of Saud has to send in its ISIL mercenaries, it will go a long way toward unmasking the U.S. excuse for invading Syria and resuming boots on the ground in Iraq.
Paul Merrell

Edward Snowden comes forward as source of NSA leaks - The Washington Post - 0 views

  • A 29-year-old man who says he is a former undercover CIA employee said Sunday that he was the principal source of recent disclosures about ­top-secret National Security Agency programs, exposing himself to possible prosecution in an acknowledgment that had little if any precedent in the long history of U.S. intelligence leaks. Edward Snowden, a tech specialist who has contracted for the NSA and works for the consulting firm Booz Allen Hamilton, unmasked himself as a source after a string of stories in The Washington Post and the Guardian that detailed previously unknown U.S. surveillance programs. He said he disclosed secret documents in response to what he described as the systematic surveillance of innocent citizens.In an interview Sunday, Snowden said he is willing to face the consequences of exposure.“I’m not going to hide,” Snowden told The Post from Hong Kong, where he has been staying. “Allowing the U.S. government to intimidate its people with threats of retaliation for revealing wrongdoing is contrary to the public interest.”
  • Asked whether he believes that his disclosures will change anything, he said: “I think they already have. Everyone everywhere now understands how bad things have gotten — and they’re talking about it. They have the power to decide for themselves whether they are willing to sacrifice their privacy to the surveillance state.”Snowden said nobody had been aware of his actions, including those closest to him. He said there was no single event that spurred his decision to leak the information, but he said President Obama has failed to live up to his pledges of transparency.“My sole motive is to inform the public as to that which is done in their name and that which is done against them,” he said in a note that accompanied the first document he leaked to The Post.The Guardian was the first to publicly identify Snowden, at his request.The White House said late Sunday that it would not have any comment on the matter.
  • In a brief statement, a spokesman for the Office of the Director of National Intelligence said the intelligence community is “reviewing the damage” the leaks have done. “Any person who has a security clearance knows that he or she has an obligation to protect classified information and abide by the law,” said the spokesman, Shawn Turner.Snowden said he is seeking “asylum from any countries that believe in free speech and oppose the victimization of global privacy,” but the law appears to provide for his extradition from Hong Kong, a semiautonomous territory of China, to the United States.
  • ...2 more annotations...
  • Snowden’s name surfaced as top intelligence officials in the Obama administration and Congress pushed back against the journalists responsible for revealing the existence of sensitive surveillance programs and called for an investigation into the leaks.Clapper, in an interview with NBC that aired Saturday night, condemned the leaker’s actions but also sought to spotlight the journalists who first reported the programs, calling their disclosures irresponsible and full of “hyperbole.” Earlier Saturday, he issued a statement accusing the media of a “rush to publish.”“For me, it is literally — not figuratively — literally gut-wrenching to see this happen because of the huge, grave damage it does to our intelligence capabilities,” Clapper said.
  • A chief critic of the efforts, Sen. Rand Paul (R-Ky.), said he is considering filing a lawsuit against the government and called on 10 million Americans to join in.“I’m going to be asking all the Internet providers and all of the phone companies, ask your customers to join me in a class-action lawsuit,” Paul said on “Fox News Sunday.”
  •  
    A new national hero springs forth, Edward Snowden. In related news, those who conduct surveillance for the government seem to object for some reason to being surveilled themselves. 
Paul Merrell

The Top Censored Stories Of 2016 With Project Censored's Mickey Huff - 0 views

  • MINNEAPOLIS — Censorship, a tool often wielded by despots, is also a pastime of democratic governments and their corporate media lapdogs. Whether journalists are operating as part of a free press or as the puppets of a repressive government, the goal is the same: control public perceptions by carefully bending information to suit a particular agenda. And while our corporate-owned media may have thought they’d mastered the art of propaganda, a recent Gallup poll suggests otherwise. According to that poll, a staggering 72 percent of Americans don’t trust mass media.
  • Much of this drop in public confidence can be traced to the media’s efforts to treat politics as theater and entertainment. It also doesn’t help that media figures serve as mouthpieces for the corporatocracy and the military-industrial complex. In both cases, the media has failed to deliver on its most important public service: reporting news and information via a critical, questioning lens. This is why truly free, independent media is so critical in the fight against censorship. As the corporate-owned, government-aligned mass media kowtows to the powers that be, independent media is there to shine a light on conflicts of interest, threats to constitutional rights, and other issues that the public has a right to know about. Since its founding in 1976, Project Censored has unmasked propaganda surrounding the most pressing issues of the day, providing coverage that speaks truth to power. Today, I’m joined by Mickey Huff, director of Project Censored, to discuss the top five censored stories of 2016 — stories the mainstream media swept under the rug or manipulated to suit corporate or government interests. Learn more about fake news and see the top censored stories of 2016 in the full episode of Behind The Headline:
Paul Merrell

Democratic establishment unmasked: prime defenders of NSA bulk spying l Glenn Greenwald... - 0 views

  •  
    Rep. Michelle Bachman needs an education about the First and Fourth Amendments, as do over 200 other members of the U.S. House of Representatives. If you click through on the link to the roll call vote results to see how your member of Congress voted, you may encounter a black-on-black screen if you are using Google Chrome. However, that results page displays just fine in Firefox.   
Paul Merrell

'Comprehensive' CIA Torture Report Won't Even Name Well-Known Architects of Torture Pro... - 0 views

  • Some familiar names will be missing from the Senate Intelligence Committee's long-awaited report on the CIA's torture program, VICE News has learned.Notably, two retired Air Force psychologists, Dr. Bruce Jessen and Dr. James Mitchell, who have been credited with being the architects of the CIA's so-called "enhanced interrogation techniques," have their names redacted in the 480-page executive summary of the report, according to current and former US officials knowledgeable about the contents of the document.
  • Feinstein's concerns about the redactions led Senator Carl Levin to issue a statement condemning the blacked-out passages, in which he noted that much of the redacted information had already been disclosed in a previous report about the treatment of detainees in custody of the US military. That report was released in 2009 by the Senate Armed Services Committee, of which he is chairman.Specifically, Levin is referring to a section that addresses the CIA's interrogation of Abu Zubaydah, whose interrogation and torture also factors prominently in the Senate Intelligence Committee's executive summary, portions of which have been redacted, officials familiar with the document told VICE News.
  • The CIA has argued that the Intelligence Committee's use of pseudonyms in its executive summary does not provide the officers who were involved in the program with enough cover. People familiar with the document also said it leaves an impression that the agency gave the committee its blessing to partially identify its officers.Officials say the agency is concerned that journalists and human rights researchers will be able to unmask the officers, whose identities, in some cases, are still classified, based on the way the pseudonyms are used and the fact that some information about the individuals has already appeared in previously published reports.The report currently says individual CIA officers and contractors, identified by pseudonyms, were present in unnamed European countries with named CIA captives during particular years. In some cases, those officers are identified with the same pseudonyms in other parts of the report as having been promoted to leadership positions in the CIA, which also makes it easier to identify them.
  • ...3 more annotations...
  • One version of the Senate Intelligence Committee's executive summary had apparently identified Mitchell and Jessen by name, and a copy of the panel's findings and conclusions obtained by McClatchy Newspapers included a bullet point that said: "Two contract psychologists devised the CIA's enhanced interrogation techniques and were central figures in the program's operation."But, according to current and former intelligence officials and committee staffers knowledgeable about the report, the CIA has insisted that the executive summary exclude any reference to Mitchell and Jessen by name, despite the fact that their roles in the program have been widely reported. The issue is part of a larger battle that has surfaced in recent weeks between the CIA and the Senate Intelligence Committee over the intelligence community's redactions in the executive summary that the committee's chairwoman, Senator Dianne Feinstein, said were excessive.
  • The names of countries where the CIA set up so-called black site prisons have also been redacted."Exposing details of past intelligence cooperation with specific foreign governments could jeopardize current relationships with those governments, cause domestic political upheaval in those countries, and undermine the willingness of foreign intelligence services to work with America in the future," the person familiar with the administration's redactions said.
  • The CIA, which has responded to the Senate's report with a 122-page rebuttal, does not wholly disagree with the Intelligence Committee's findings. But there are vehement disagreements the CIA has with the committee over certain assertions the panel has made involving 10 detainees. The rebuttal includes a list of recommendations the agency intends to implement. The CIA response does not defend the use of torture techniques and it adds that there were instances when the value of intelligence was inflated.With that said, several committee staffers say that the CIA's response asserts that all of the intelligence obtained from detainees was valuable and saved lives. It also says there is no way to determine whether interrogators would have been able to obtain intelligence if the detainee were not tortured.
  •  
    Let's keep in mind that the CIA agents' names that CIA wants to keep concealed are required to be arrested and prosecuted as war criminals by a treaty the U.S. is party to, the Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment. E.g., in Article 6: " Upon being satisfied, after an examination of information available to it, that the circumstances so warrant, any State Party in whose territory a person alleged to have committed any offence referred to in article 4 is present shall take him into custody or take other legal measures to ensure his presence. The custody and other legal measures shall be as provided in the law of that State but may be continued only for such time as is necessary to enable any criminal or extradition proceedings to be instituted." But here we are presented with the CIA attempting to conceal the identities of its officials who committed torture and to retain them as active agents, rather than assisting in their arrest and prosecution. From the same treaty's Article 2: "1. Each State Party shall take effective legislative, administrative, judicial or other measures to prevent acts of torture in any territory under its jurisdiction. "2. No exceptional circumstances whatsoever, whether a state of war or a threat of war, internal political instability or any other public emergency, may be invoked as a justification of torture. "3. An order from a superior officer or a public authority may not be invoked as a justification of torture."  
Paul Merrell

In NSA-intercepted data, those not targeted far outnumber the foreigners who are - The ... - 0 views

  • Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents.
  • In order to allow time for analysis and outside reporting, neither Snowden nor The Post has disclosed until now that he obtained and shared the content of intercepted communications. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year, senior government officials have depicted it as beyond Snowden’s reach. The Post reviewed roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts.
  • Taken together, the files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge. One program, code-named PRISM, extracts content stored in user accounts at Yahoo, Microsoft, Facebook, Google and five other leading Internet companies. Another, known inside the NSA as Upstream, intercepts data on the move as it crosses the U.S. junctions of global voice and data networks.
  • ...1 more annotation...
  • The Obama administration declines to discuss the scale of incidental collection. The NSA, backed by Director of National Intelligence James R. Clapper Jr., has asserted that it is unable to make any estimate, even in classified form, of the number of Americans swept in. It is not obvious why the NSA could not offer at least a partial count, given that its analysts routinely pick out “U.S. persons” and mask their identities, in most cases, before distributing intelligence reports. If Snowden’s sample is representative, the population under scrutiny in the PRISM and Upstream programs is far larger than the government has suggested. In a June 26 “transparency report,” the Office of the Director of National Intelligence disclosed that 89,138 people were targets of last year’s collection under FISA Section 702. At the 9-to-1 ratio of incidental collection in Snowden’s sample, the office’s figure would correspond to nearly 900,000 accounts, targeted or not, under surveillance.
  •  
    Now that we're getting into the "incidental" search of American's emails and online docs, we're getting much closer to learning *who* is surveilled other than foreign leaders. It isn't a pretty sight. Note that the President's Privacy and Civil Liberties Oversight Board just issued a report on NSA's FISA sec. 702 program and gave it the legal green light. Their Fourth Amendment analysis was stunningly poor.   http://goo.gl/3Ufc9n 
Paul Merrell

New Cyber-Spying Discovery Points to NSA and the "Five Eyes" - WhoWhatWhy - 0 views

  • here’s yet another tantalizing clue that the National Security Agency and its “Five Eyes” allies are behind a poweful cyber-espionage tool called Regin, used to spy on friend and enemy alike. That’s the conclusion Russian cybersecurity firm Kaspersky drew after examining the source code of Regin and an innocuously-named spying tool called QWERTY. It’s an appropriate monicker. The malware, known as a keylogger,  vacuums up anything typed on a computer keyboard and sends it back to the programmer controlling it. The crucial clue Kaspersky found is that QWERTY “can only operate as part of the Regin platform.” After tracking Regin across 14 countries for years, Kaspersky and technology firm Symantec identified it in November 2014.  At the time, Symantec said Regin’s “capabilities and the level of resources behind [it] indicate that it is one of the main cyberespionage tools used by a nation state.” 
  • Though neither company said it, suspicion immediately arose that the NSA and its allies had created Regin. It immediately drew comparisons with Stuxnet, the joint U.S.-Israeli computer worm used to damage Iranian nuclear centrifuges in Natanz in 2009. Unlike Stuxnet’s narrow mission of sabotage, Regin is designed for spying in a wide set of environments. It hides in plain sight, disguised as ordinary Microsoft software.
  • The new evidence further points to the Five Eyes. The German news magazine Der Spiegel has a trove of documents from NSA whistleblower Edward Snowden, which included the source code. Der Spiegel gave Kaspersky the code to examine: The new analysis provides clear proof that Regin is in fact the cyber-attack platform belonging to the Five Eyes alliance, which includes the U.S., Britain, Canada, Australia and New Zealand. Neither Kaspersky nor Symantec commented directly on the likely creator of Regin. But there can be little room left for doubt regarding the malware’s origin. Der Spiegel pointed to five elements they believe suggest Five Eyes authorship: the presence of QWERTY in Snowden’s files, its use in the Belgacom hack by Britain’s GCHQ, references to the sport of cricket in the code, structural similarities to tools outlined in other Snowden documents, and targets consistent with other Five Eyes tools and campaigns.
  • ...1 more annotation...
  • Regin has been used to spy on telecom providers, financial institutions, energy companies, airlines, research institutes and the hospitality industry, and on European Union officials. The 14 countries found to have been penetrated include Russia, Malaysia, Afghanistan, and Fiji. Even though the trail is hot now, security experts say that Regin is still out there committing wholesale espionage. That’s because parts of it like QWERTY help mask other components. Like any good spy, it’s constantly changing disguises.
Paul Merrell

Senator blasts CIA for censoring 'torture' report - 0 views

  • Sen. Ron Wyden says the CIA is trying to blunt the impact of an upcoming Senate report examining the harsh treatment of al-Qaida detainees by insisting on censoring the pseudonyms used for agency officers mentioned in the document. "The intelligence leadership doing everything they can to bury the facts," said Wyden, D-Ore., a Senate Intelligence Committee member who has been a frequent critic of the spy agency.
  • President Barack Obama and other senior officials have said the CIA's use of waterboarding, stress positions, sleep deprivation and other harsh techniques on some detainees constituted torture. Many current and former CIA officers dispute that. The Senate report asserts that the harsh treatment didn't work and that CIA officials misled Congress and other government agencies about it. Also to be released is a CIA response, and a separate one by Senate Republicans, which challenge the report's conclusions. CIA officials say they fear the publication of officer pseudonyms — often just a first name such as "Roger"— would lead to the unmasking of undercover officers. Readers could track the same person in different jobs and places, making it easier to discover their identity. Without the pseudonyms, Wyden says, the report would be much harder to understand because readers wouldn't be able to distinguish different CIA officers. Readers wouldn't know, for example, whether same CIA official had been accused of lying multiple times.
  • Wyden pointed out that the 9/11 Commission Report and a 2004 report into abuses at Iraq's Abu Ghraib prison used pseudonyms for CIA officers. "I think it is appropriate to redact specific identifying information so the identities of undercover officers are not publicly exposed," Wyden told The Associated Press. Wyden said the Senate report documents "falsehoods, misdeeds and mistakes" by the CIA. Asked about Wyden's remarks, CIA spokesman Dean Boyd said, "Pseudonyms are redacted to keep individual intelligence officers from being identified and potentially harmed. Making public those pseudonyms associated with individual officers, as well as dates, locations and other identifying information related to those officers, dramatically increases the likelihood that they will be exposed and potentially subject to threats or violence."
  •  
    But if we put the torturers in prison for the rest of their lives where they belong, we wouldn't need to worry about them being under cover or being identified. We could just use their real names. 
Paul Merrell

Congress Seeks to undermine Iran Deal by Linking Iran with ISIS | Global Research - Cen... - 0 views

  • One of the consequences of the Iran Deal was the declaration by countless politicians that they were going to crack down on Iran’s sponsorship of terrorism. Even the White House signed on to this idea. Well now some of the backlash has officially begun: Congress is linking Iran with ISIS, even though Iran is fighting ISIS. [and ISIS is supported by the US, GR ed.] Few mainstream publications have picked up on the fact that in a response to the San Bernardino killings, the Congress last week passed legislation, which the president duly signed, that puts Iran in an axis of international-terrorist evil along with Syria, Iraq and Sudan. The legislation amends our country’s visa waiver program. Iranian dual nationals, as well as US citizens who have visited Iran, will need visas to get into the U.S. Reuters: Iranian Foreign Minister Mohammad Javad Zarif on Friday said it was “absurd” that Tehran should be included on the list. “No Iranian nor anybody who visited Iran had anything to do with the tragedies that have taken place in Paris or in San Bernardino or anywhere else,” he said in an interview with Middle East-focused website Al Monitor. Secretary of State John Kerry promptly met with Zarif, his Iranian counterpart, to assure him that the new law doesn’t undercut the Iran deal. But the Iranians say that the legislation is the result of pro-Israel lobbying. And even the State Department describes Iran as a state sponsor of terrorism.  
  •  Iranians say the bill reflects pro-Israel lobbying. Reuters: Iran said on Monday that Israeli lobbying was behind a new measure passed by the U.S. Congress that will prevent visa-free travel to the United States for people who have visited Iran or hold Iranian nationality. The measure, which President Barack Obama signed into law on Friday, also applies to Iraq, Syria and Sudan, and was introduced as a security measure after the Islamic State attacks in Paris and a similar attack in San Bernardino, California.
  • More from Reuters‘ description of the Israel lobby angle: Iran, a Shi’ite Muslim theocracy staunchly opposed to Sunni radicalism espoused by groups like Islamic State, says its inclusion on the list is intended to undermine a deal on its nuclear programme that Tehran reached with world powers, including the United States, in July, known as the JCPOA. Iranian Foreign Ministry spokesman Hossein Jaberi Ansari said in a televised news conference that the U.S. measure had been passed “under pressure from the Zionist lobby and currents opposed to the JCPOA”. The administration wants to have it both ways on blaming Iran. Yesterday on National Public Radio, Adam Szubin, the counter-terrorism finance under secretary at the Treasury Department, also put Iran in the category of ISIS, as an international terror deliverer: if you are familiar with the model of how al-Qaida or groups like Hamas and even Hezbollah have financed themselves, they’ve typically been heavily reliant on foreign donations, whether from state sponsors like Iran or whether from wealthy what we call deep-pocket donors, often in the Gulf. But that financing model is not ISIL. When you have a group that’s raising hundreds of millions of dollars in a year from internal sources, we don’t have those same chokepoints to go after in terms of the foreign flows.
  • ...2 more annotations...
  • Meanwhile John Kerry is doing fancy footwork, explaining the legislation away, in a letter to Javad Zarif. we remain fully committed to the sanctions lifting provided for under the JCPOA. We will adhere to the full measure of our commitments, per the agreement. At the State Department briefing Monday, reporters questioned why the legislation didn’t amount to a violation of the Iran Deal:
  • Here is some more blindness in the media on these issues. NPR has continually deceived listeners about Sheldon Adelson’s agenda, and it did so again yesterday. Adelson is a leading opponent of the Iran Deal, as a supporter of Israel. He has called on President Obama to nuke Iran. But in a report on Adelson’s purchase of a Nevada newspaper, NPR once again leaves out the Israel angle of Adelson’s interests. It says blandly: Adelson is also prominently involved in national politics. That link is to a story about his on-line gambling concerns. But as Cory Bennett of the Hill said on CSPAN the other day– something I did not know till now– Iran is said to have undertaken a cyber-attack on Sheldon Adelson’s casino last year because of his call to nuke Iran.  The alleged cyber-attack:  Investigators determined that hacker activists were the ones who broke into servers belonging to the Las Vegas Sands Corporation in February 2014, costing the company more than $40 million in damages and data recovery costs, Bloomberg Businessweek reported Thusday citing a report by cybersecurity firm Dell SecureWorks. The hackers were acting in retaliation to the company’s CEO, casino magnate Sheldon Adelson’s statement that Obama should detonate a nuclear bomb in Tehran, which stirred controversy around the world. This is the battle behind the headlines. And in a transparent effort to get Adelson’s backing, as well as that of the Andrew Herenstein’s of the world, the neoconservative favorite in the Republican race, Senator Marco Rubio, has vowed to tear up the Iran deal on his first day in the White House if he’s elected. Thus the ideological war over how much the U.S. should support Israel is playing out in global terms; and our media are shying away from the story.
  •  
    It's preposterous for Congress to say that Iran is associated with ISIL and for Obama to sign such a bill. Iran is one of the major military forces in the fight against ISIL in both Syria and Iraq.
Paul Merrell

Israeli Drone Feeds Hacked By British and American Intelligence - 0 views

  • MERICAN AND BRITISH INTELLIGENCE secretly tapped into live video feeds from Israeli drones and fighter jets, monitoring military operations in Gaza, watching for a potential strike against Iran, and keeping tabs on the drone technology Israel exports around the world. Under a classified program code-named “Anarchist,” the U.K.’s Government Communications Headquarters, or GCHQ, working with the National Security Agency, systematically targeted Israeli drones from a mountaintop on the Mediterranean island of Cyprus. GCHQ files provided by former NSA contractor Edward Snowden include a series of “Anarchist snapshots” — thumbnail images from videos recorded by drone cameras. The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones.
  • Several of the snapshots, a subset collected in 2009 and 2010, appear to show drones carrying missiles. Although they are not clear enough to be conclusive, the images offer rare visual evidence to support reports that Israel flies attack drones — an open secret that the Israeli government won’t acknowledge. “There’s a good chance that we are looking at the first images of an armed Israeli drone in the public domain,” said Chris Woods, author of Sudden Justice, a history of drone warfare. “They’ve gone to extraordinary lengths to suppress information on weaponized drones.” The Intercept is publishing a selection of the drone snapshots in an accompanying article.
  • Additionally, in 2012, a GCHQ analyst reported “regular collects of Heron TP carrying weapons,” referring to a giant drone made by the state-owned Israel Aerospace Industries, known as IAI. Anarchist operated from a Royal Air Force installation in the Troodos Mountains, near Mount Olympus, the highest point on Cyprus. The Troodos site “has long been regarded as a ‘Jewel in the Crown’ by NSA as it offers unique access to the Levant, North Africa, and Turkey,” according to an article from GCHQ’s internal wiki. Last August, The Intercept published a portion of a GCHQ document that revealed that NSA and GCHQ tracked weapons signals from Troodos, and earlier reporting on the Snowden documents indicated that the NSA targeted Israeli drones and an Israeli missile system for tracking, but the details of the operations have not been previously disclosed. “This access is indispensable for maintaining an understanding of Israeli military training and operations and thus an insight to possible future developments in the region,” a GCHQ report from 2008 enthused. “In times of crisis this access is critical and one of the only avenues to provide up to the minute information and support to U.S. and Allied operations in the area.”
  • ...1 more annotation...
  • The documents highlight the conflicted relationship between the United States and Israel and U.S. concerns about Israel’s potentially destabilizing actions in the region. The two nations are close counterterrorism partners, and have a memorandum of understanding, dating back to 2009, that allows Israel access to raw communications data collected by the NSA. Yet they are nonetheless constantly engaged in a game of spy versus spy. Last month, the Wall Street Journal reported that, although President Obama had pledged to stop spying on friendly heads of state, the White House carved out an exception for Israeli Prime Minister Benjamin Netanyahu and other top Israeli officials. Michael Hayden, former head of the CIA and NSA, told the Journal that the intelligence relationship with Israel was “the most combustible mixture of intimacy and caution that we have.”
Paul Merrell

Weekly Update: JW Sues for Unmasking Targeting Trump Team - 0 views

  • Much Needed New Scrutiny of the Clinton Foundation   Will there ever be a serious investigation and prosecution of the Clinton cash machine? Maybe. Micah Morrison, our chief investigative reporter, has an important update in his latest Investigative Bulletin:   Rumors have been floating up from Little Rock for months now of a new investigation into the Clinton Foundation. John Solomon advanced the story recently in a January report for The Hill. FBI agents in the Arkansas capital, he wrote, “have taken the lead” in a new Justice Department inquiry “into whether the Clinton Foundation engaged in any pay-to-play politics or other illegal activities while Hillary Clinton served as secretary of state.” Solomon reports that the probe “may also examine whether any tax-exempt assets were converted for personal or political use and whether the foundation complied with applicable tax laws.”   Main Justice also is “re-examining whether there are any unresolved issues from the closed case into Clinton’s transmission of classified information through her personal email server,” Solomon notes.   Solomon is not alone. The Wall Street Journal is tracking the story. And earlier this month, investigative journalist Peter Schweizer cryptically told SiriusXM radio that federal authorities should “convene a grand jury” in Little Rock “and let the American people look at the evidence” about the Clinton Foundation.   Judicial Watch continues to turn up new evidence of Clinton pay-to-play and mishandling of classified information. In recent months, through FOIA litigation, Judicial Watch has forced the release of more than 2,600 emails and documents from Mrs. Clinton and her associates, with more to come. The emails include evidence of Clinton Foundation donors such XL Keystone lobbyist Gordon Griffin, futures brokerage firm CME Group chairman Terrence Duffy, and an associate of Shangri La Entertainment mogul Steve Bing seeking special favors from the State Department. Read more about Judicial Watch’s pay-to-play disclosures here.   Judicial Watch also revealed many previously unreported incidents of mishandling of classified information. Mrs. Clinton and her former State Department deputy chief of staff, Huma Abedin, sent and received classified information through unsecure channels. The emails and documents involved sensitive information about President Obama, the Middle East, Africa, Afghanistan, Mexico, Burma, India, intelligence-related operations and world leaders. For documents and details from Judicial Watch on the mishandling of classified information, see here, here, here and here.   Smelling a rat in Arkansas when it comes to the Clintons of course is nothing new, and the former First Couple are masters of the gray areas around pay-to-play. But mishandling of classified information is a serious matter. And the tax angle is intriguing, even if you’re not Al Capone. The tenacious financial expert Charles Ortel, who has been digging deep into Clinton finances for years, told us back in 2015 that there are “epic problems” with the entire Clinton Foundation edifice, which traces its origins back to Arkansas. He noted that independent accounting firms may have been “duped by false and materially misleading representations” made by Clinton charitable entities. Down in Arkansas, law enforcement may be finally catching up with Ortel’s insights.
1 - 16 of 16
Showing 20 items per page