Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged wifi

Rss Feed Group items tagged

Paul Merrell

NSA monitors WiFi on US planes 'in violation' of privacy laws - RT USA - 0 views

  • Companies that provide WiFi on US domestic flights are handing over their data to the NSA, adapting their technology to allow security services new powers to spy on passengers. In doing so, they may be in violation of privacy laws. In a letter leaked to Wired, Gogo, the leading provider of inflight WiFi in the US, admitted to violating the requirements of the Communications Assistance for Law Enforcement Act (CALEA). The act is part of a wiretapping law passed in 1994 that requires telecoms carriers to provide law enforcement with a backdoor in their systems to monitor telephone and broadband communications. Gogo states in the letter to the Federal Communications Commission that it added new capabilities to its service that go beyond CALEA, at the behest of law enforcement agencies.
  • “In designing its existing network, Gogo worked closely with law enforcement to incorporate functionalities and protections that would serve public safety and national security interests,” Gogo attorney Karis Hastings wrote in the leaked letter, which dates from 2012. He did not elaborate as to the nature of the changes, but said Gogo “worked with federal agencies to reach agreement regarding a set of additional capabilities to accommodate law enforcement interests.” Gogo, which provides WiFi services to the biggest US airlines, are not the only ones to adapt their services to enable spying. Panasonic Avionics also added “additional functionality” to their services as per an agreement with US law enforcement, according to a report published in December. The deals with security services have civil liberties organizations up in arms. They have condemned the WiFi providers’ deals with authorities as scandalous.
Paul Merrell

Attention fliers: Canada's electronic spy agency is following you - new Snowden leaks -... - 0 views

  • Documents released by US whistleblower Edward Snowden show the Communications Security Establishment Canada (CSEC) used airport Wi-Fi to track passengers from around the world. Travelers passing through a major Canadian airport were potentially caught up in a vast electronic surveillance net, which allowed the nation’s electronic spy agency to track the wireless devices of thousands of airline passengers - even for days after they had departed the terminal, a document obtained by CBC News revealed. The document shows the spy agency was then able to track travelers for a week or more as the unwitting passengers, together with their wireless devices, visited other Wi-Fi "hot spots" in locations across Canada, and across the border at American airports.
  • After reviewing details of the leaked information, one of Canada's leading authorities on internet security says the secret operation was almost certainly illegal. "I can't see any circumstance in which this would not be unlawful, under current Canadian law, under our Charter, under CSEC's mandates," Professor Ronald Deibert, an internet security expert at the University of Toronto, told CBC News. It remains unclear from the leaked data how CSEC was able to infiltrate so many wireless devices to see who was using them, both on Canadian territory and beyond.
  • The CSEC is specifically tasked with gathering foreign intelligence by intercepting overseas phone and internet traffic, and is forbidden by law from collecting information on Canadians - or foreigners in Canada - without a court warrant. As CSEC Chief John Forster recently stated: "I can tell you that we do not target Canadians at home or abroad in our foreign intelligence activities, nor do we target anyone in Canada. "In fact, it's prohibited by law. Protecting the privacy of Canadians is our most important principle." However analysts who were privy to the document say that airline passengers in a Canadian airport were clearly on the territory of Canada. CSEC spokesperson Lauri Sullivan told the Star, an online Canadian news outlet, that the “classified document in question is a technical presentation between specialists exploring mathematical models built on everyday scenarios to identify and locate foreign terrorist threats.”
  • ...2 more annotations...
  • Early assessment of the leaked information indicates the passenger tracking operation was a trial run of a powerful new software program CSEC was developing with help from its American partner, the National Security Agency. The technology was to be shared with the so-called 'Five Eyes' surveillance bloc composed of Canada, the United States, Britain, New Zealand and Australia. In the document, CSEC described the new spy technology as "game-changing," saying it could be used for powerful surveillance on "any target that makes occasional forays into other cities/regions." Sources told CBC News the “technologies tested on Canadians in 2012 have since become fully operational.”
  • Ontario's privacy commissioner Ann Cavoukian admitted she is "blown away" by news of the secret operation. "It is really unbelievable that CSEC would engage in that kind of surveillance of Canadians," Cavoukian told the Canadian news agency. "This resembles the activities of a totalitarian state, not a free and open society."
Paul Merrell

We were subjected to 'meticulous, daily torture' - freed Gitmo detainee - RT News - 0 views

  • After years of being held at the US Naval Base in Cuba without trial, Ibrahim Idris, one of two Sudanese detainees released on Thursday, said US prison officials had "systematically tortured" him in the course of his 11-year imprisonment at Gitmo. Idris, who has been described by US officials as mentally ill, delivered his comments in a news conference in Khartoum, just hours after returning home courtesy of a US military plane. Appearing weak and speaking with apparent difficultly, Idris gave a brief account of his lengthy imprisonment at Gitmo. “We have been subjected to meticulous, daily torture," he said. "We were helpless…on an isolated island, surrounded by weapons." He praised the Sudanese government and human rights organizations for working to secure the release of prisoners at Gitmo, which has been called “the GULAG of our times” by Amnesty International. Closed-door military tribunals, for example, have been riddled with problems, including courtroom speakers that have a mysterious tendency for being blocked during key testimony.
  • Another released detainee, Noor Othman Muhammed, was unable to attend the conference because he was recovering in the hospital, Idris said. On Feb. 18, 2011, Muhammed pleaded guilty in a military tribunal to offenses under the Military Commissions Act of 2009, and was sentenced to 14 years confinement, according to a Defense Department news release. In exchange for his guilty plea and Muhammed's cooperation with prosecutors, the military court agreed through a pre-trial agreement to suspend all confinement in excess of 34 months. Idris, who had been designated for transfer since 2009, said some of the former prisoners had pled guilty in a bid to secure their freedom. As Barack Obama wins congressional approval to transfer some prisoners from Guantanamo Bay to their home countries, a released Sudanese inmate spoke of the torture he and others endured at the hands of their American jailers. Approval for a partial detainee release is contained in the National Defense Authorization Act, which passed the Senate by an 84-15 vote on Thursday night.
  • While the bill does not address all of the administration's concerns, its provisions ... will provide the administration additional flexibility to transfer detainees abroad consistent with our national security interests," White House spokesman Jay Carney said earlier Thursday. Of those still held in the prison, five individuals stand accused of participating in the Sept. 11, 2001 terrorist attacks. At the same time, some four dozen detainees are considered “too dangerous” to be released. About half of Gitmo's 158 detainees have been cleared to be released since 2009, yet congressional restrictions prevented that from happening.
  • ...2 more annotations...
  • A new outbreak of hunger strikes happened in early 2013. By July, 106 of the 166 detainees were on hunger strike, with 45 of them being force-fed.
  • According to Idris, those inmates who participated in these protests were “doubly tortured.” In November, a 19-member task force concluded in a 269-page report, entitled 'Ethics Abandoned: Medical Professionalism and Detainee Abuse in the ‘War on Terror', that since September 11, 2001, the Department of Defense (DoD) and CIA ordered medical professionals to assist in intelligence gathering, as well as forced-feeding of hunger strikers, in a way that inflicted “severe harm.” Gitmo officials announced earlier this month that the US military will no longer disclose to the media and public whether prisoners at Guantanamo Bay are on hunger strike, explaining that "the release of this information serves no operational purpose."
Paul Merrell

If GCHQ wants to improve national security it must fix our technology | Technology | th... - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
Paul Merrell

ExposeFacts - For Whistleblowers, Journalism and Democracy - 0 views

  • Launched by the Institute for Public Accuracy in June 2014, ExposeFacts.org represents a new approach for encouraging whistleblowers to disclose information that citizens need to make truly informed decisions in a democracy. From the outset, our message is clear: “Whistleblowers Welcome at ExposeFacts.org.” ExposeFacts aims to shed light on concealed activities that are relevant to human rights, corporate malfeasance, the environment, civil liberties and war. At a time when key provisions of the First, Fourth and Fifth Amendments are under assault, we are standing up for a free press, privacy, transparency and due process as we seek to reveal official information—whether governmental or corporate—that the public has a right to know. While no software can provide an ironclad guarantee of confidentiality, ExposeFacts—assisted by the Freedom of the Press Foundation and its “SecureDrop” whistleblower submission system—is utilizing the latest technology on behalf of anonymity for anyone submitting materials via the ExposeFacts.org website. As journalists we are committed to the goal of protecting the identity of every source who wishes to remain anonymous.
  • The seasoned editorial board of ExposeFacts will be assessing all the submitted material and, when deemed appropriate, will arrange for journalistic release of information. In exercising its judgment, the editorial board is able to call on the expertise of the ExposeFacts advisory board, which includes more than 40 journalists, whistleblowers, former U.S. government officials and others with wide-ranging expertise. We are proud that Pentagon Papers whistleblower Daniel Ellsberg was the first person to become a member of the ExposeFacts advisory board. The icon below links to a SecureDrop implementation for ExposeFacts overseen by the Freedom of the Press Foundation and is only accessible using the Tor browser. As the Freedom of the Press Foundation notes, no one can guarantee 100 percent security, but this provides a “significantly more secure environment for sources to get information than exists through normal digital channels, but there are always risks.” ExposeFacts follows all guidelines as recommended by Freedom of the Press Foundation, and whistleblowers should too; the SecureDrop onion URL should only be accessed with the Tor browser — and, for added security, be running the Tails operating system. Whistleblowers should not log-in to SecureDrop from a home or office Internet connection, but rather from public wifi, preferably one you do not frequent. Whistleblowers should keep to a minimum interacting with whistleblowing-related websites unless they are using such secure software.
    • Gary Edwards
       
      Thanks Paul! Great article and I agree with you about switching. Rather than a USB, I would rather look into a SSD and try to isolate performance to an ISP bandwidth issue. FYI, I read your Diigo posts daily at this Web site: https://groups.diigo.com/group/socialism-and-the-end-of-the-american-dream/content/user/marbux Seems to be the best visual presentation of your research. I do however think Diigo could improve their hosting of this research by enabling more extensive comments. Notice that your comments are often clipped :( Still, I really do appreciate your sharing both your research and your commentary. Priceless stuff! Many thanks! ~ge~
  •  
    A new resource site for whistle-blowers. somewhat in the tradition of Wikileaks, but designed for encrypted communications between whistleblowers and journalists.  This one has an impressive board of advisors that includes several names I know and tend to trust, among them former whistle-blowers Daniel Ellsberg, Ray McGovern, Thomas Drake, William Binney, and Ann Wright. Leaked records can only be dropped from a web browser running the Tor anonymizer software and uses the SecureDrop system originally developed by Aaron Schwartz. They strongly recommend using the Tails secure operating system that can be installed to a thumb drive and leaves no tracks on the host machine. https://tails.boum.org/index.en.html Curious, I downloaded Tails and installed it to a virtual machine. It's a heavily customized version of Debian. It has a very nice Gnome desktop and blocks any attempt to connect to an external network by means other than installed software that demands encrypted communications. For example, web sites can only be viewed via the Tor anonymizing proxy network. It does take longer for web pages to load because they are moving over a chain of proxies, but even so it's faster than pages loaded in the dial-up modem days, even for web pages that are loaded with graphics, javascript, and other cruft. E.g., about 2 seconds for New York Times pages. All cookies are treated by default as session cookies so disappear when you close the page or the browser. I love my Linux Mint desktop, but I am thinking hard about switching that box to Tails. I've been looking for methods to send a lot more encrypted stuff down the pipe for NSA to store. Tails looks to make that not only easy, but unavoidable. From what I've gathered so far, if you want to install more software on Tails, it takes about an hour to create a customized version and then update your Tails installation from a new ISO file. Tails has a wonderful odor of having been designed for secure computing. Current
Paul Merrell

Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide - The Intercept - 0 views

  • When Apple and Google unveiled new encryption schemes last month, law enforcement officials complained that they wouldn’t be able to unlock evidence on criminals’ digital devices. What they didn’t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces — easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by The Intercept. We’re publishing in full, for the first time, manuals explaining the prominent commercial implant software “Remote Control System,” manufactured by the Italian company Hacking Team. Despite FBI director James Comey’s dire warnings about the impact of widespread data scrambling — “criminals and terrorists would like nothing more,” he declared — Hacking Team explicitly promises on its website that its software can “defeat encryption.”
  • The manuals describe Hacking Team’s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team’s manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software. Hacking Team’s efforts include a visible push into the U.S. Though Remote Control System is sold around the world — suspected clients include small governments in dozens of countries, from Ethiopia to Kazakhstan to Saudi Arabia to Mexico to Oman — the company keeps one of its three listed worldwide offices in Annapolis, Maryland, on the edge of the federal intelligence and law-enforcement cluster around the nation’s capital; has sent representatives to American homeland security trade shows and conferences, where it has led training seminars like “Cyber Intelligence Solutions to Data Encryption” for police; and has even taken an investment from a firm headed by America’s former ambassador to Italy. The United States is also, according to two separate research teams, far and away Hacking Team’s top nexus for servers, hosting upwards of 100 such systems, roughly a fifth of all its servers globally.
Paul Merrell

The DEA isn't just tracking license plates - it's taking pictures of vehicles' passenge... - 0 views

  • The Drug Enforcement Administration is collecting information about more than just license plates with the tracking system revealed by the American Civil Liberties Union. Documents released by the ACLU this morning show that the DEA is also using the license plate readers (LPRs) on which this system relies to capture photographs of a vehicles’ passengers. The images can then be run through facial recognition software. This is meant to give the DEA more context about the people whose movements it’s tracking with this program, which gathers data from more than 100 LPRs managed by an unknown number of police departments around the country to aid in their investigations. The program was originally meant to assist with civil asset forfeiture cases, but it has since expanded to assist departments approved by the El Paso Intelligence Center with investigations into murders, rapes, and other crimes, the Wall Street Journal reports.
  • Previous reports indicated that the DEA was collecting license plate information about “millions” of Americans. That figure might be low if it didn’t account for the number of plates collected versus the number of people in a vehicle when these images are taken. Either way, this program represents a clear violation of privacy for many Americans, most of whom didn’t know the DEA could collect this information. As I wrote before: The result is a national surveillance program with an unknown number of contributors offering up location data about millions of Americans; all to a database used by an untold number of police departments without any public oversight regarding their searches.
  • That’s a problem. Backchannel reported in December that police have used their access to license plate readers to stalk former colleagues, and IB Times revealed earlier this month that Gov. Chris Christie (R-NJ) used location data to smear a political rival. Perhaps the DEA will support the program by claiming that learning who is in a vehicle isn’t much different from learning where the vehicle was going — it could all be considered metadata, and the government considers that information to be fair game.
Paul Merrell

M of A - Syria - The U.S. Propaganda Shams Now Openly Fail - 0 views

  • The Obama administration, and especially the CIA and the State Department, seem to be in trouble. They shout everything they can against Russia and allege that the cleansing of east-Aleppo of al-Qaeda terrorist is genocidal. Meanwhile no mention is ever made of the famine of the Houthis in Yemen which the U.S. and Saudi bombing and their blockade directly causes.
  • But more and more major news accounts support the Russian allegation that the "moderate rebels" the U.S. is coddling in Syria are actually in cahoots with al-Qaeda if not al-Qaeda itself.
  • The new news reports follow after an interview by the German former politician and journalist Jürgen Todenhöfer with an al-Qaeda commander published in English on this site. The commander said that Nusra (aka al-Qaeda) were directly supplied, via a subgroup, with U.S. TOW missiles. He added about such groups: They are all with us. We are all the al-Nusra Front. A groups is created and calls itself "Islamic Army", or "Fateh al-Sham". Each group has its own name but their believe is homogeneous. The general name is al-Nusra Front. One person has, for example, 2,000 fighters. Then he creates from these a new group and calls it "Ahrar al-Sham". Brothers, who's believe, thoughts and aims are identical to those of al-Nusra Front. Another interview recently published by the former military Jack Murphy was with a Green Beret soldier who served in Turkey and Syria. The Green Berets are special forces of the U.S. army. They are specialists in training and  fighting with indigenous guerrilla groups against governments the U.S. dislikes. The soldier interviewed was ordered to train "moderate Syrian rebels" in Turkey. Parts of the interview (paywalled) are quoted here:
  • ...4 more annotations...
  • "No one on the ground believes in this mission or this effort”, a former Green Beret writes of America’s covert and clandestine programs to train and arm Syrian insurgents, “they know we are just training the next generation of jihadis, so they are sabotaging it by saying, ‘Fuck it, who cares?’”. “I don’t want to be responsible for Nusra guys saying they were trained by Americans,” the Green Beret added. ... Murphy states bluntly: “distinguishing between the FSA and al-Nusra is impossible, because they are virtually the same organization. As early as 2013, FSA commanders were defecting with their entire units to join al-Nusra. There, they still retain the FSA monicker, but it is merely for show, to give the appearance of secularism so they can maintain access to weaponry provided by the CIA and Saudi intelligence services. The reality is that the FSA is little more than a cover for the al-Qaeda-affiliated al-Nusra. ... It is one thing when Russia says somesthing, but another when Reuters, WSJ, and independent German and U.S. subject experts report this as facts. The first can be shunned as "Putin lies" but the others are extremely hard to refute. The Russians are right. The U.S. did not separate the "moderate rebels" from al Qaeda, as it had agreed to in the ceasefire agreement, because the "moderates" and al-Qaeda are the same. The "moderates" are al-Qaeda. This was not unknown. The 2012 Defense Intelligence Analysis said as much. The CIA of course knew this all along. But the Saudi tool heading the CIA, John Brennan, can not admit such as his masters in the Gulf are also the ones who finance al-Qaeda. They buy the weapons Brennan's people hadn over to al-Qaeda. The "end-user" according to this certificate for a weapon buy in Ukraine is Saudi Arabia. But who will believe that the Saudi dictators need for example 100 obsolete T-55 tanks? The weapons on the certificate, for an estimated $300-$500 million, are obviously for al-Qaeda in Yemen and in Syria. (Did Joe Biden or his son, both heavily engaged in Ukraine, get a provision from the deal?)
  • As the facts accumulate how long can the New York Times and Washington Post keep up with their propaganda claims. One has to admit, they really try their best. Unfortunately for them, their best is only mediocre. The NYT today found out that Vladimir Putin Relishes His Role as Disrupter. How does the NYT know what Putin "relishes"? The reporter did not ask Putin himself. But he did ask some knowledgeable experts with insight into Putin's inner mind and those assured the author that this is indeed the case. They know exactly how Putin feels. They are Richard Haass, the president of the Council on Foreign Relations, James R. Clapper Jr., the director of national intelligence, James B. Comey, the F.B.I. director and Robert Kagan, leading voice of of the neocons and Clinton promoter. Some "experts". Add that to dozens of stories on how "Russia indiscriminately bombs civilians/hospitals/bakeries in east-Aleppo" but never hits any "rebels" because none occur in these stories at all. A recent NYT piece of that kind had 14 "voices" in it. Eight belonged to various propagandists associated with the "White Helmets", four were "western" diplomats, one Syrian government official and a Russian spokesperson were quoted at the end. No Russian military and no one from west-Aleppo, where by far most people in the city live under government protection and daily rocket hail by the "rebels", were even asked. But all those tales we hear about the devilish Russians MUST be true! Even the 7 years old Bana Alabeb now tweets from east-Aleppo about her tragic fate under indiscriminate Russian assaults. This in perfect English and with an excellent WiFi and Internet connection as her many "White Helmets" photo attachments and her videos attest. But the whole city is devastated and in ruins she says, with phosphor bombs going off right in front of her house.
  • But Bana is a very responsible little lady: Bana Alabed @AlabedBana Dear world, it's better to start 3rd world war instead of letting Russia & assad commit #HolocaustAleppo 1:53 PM - 29 Sep 2016 Here "mother" phoned up the Daily Mail for an "exclusive" and assures us that this is all true. The Telegraph has her in a slideshow with sad music and the Guardian promotes her too. Another Gay Girl in Damascus media fail. In 2011 the Guardian also was part of that scam. If that 7-year old girl is in east-Aleppo and not in Denmark or the UK, I must be on Mars. No sane reader will take such a stunt serious. What Public Relation company came up with this sorry flimflam? Like the "moderate rebels" fantasy, such tales and the nonsense the "White Helmet" propaganda outlet distributes, are starting to fail. The UAE's National, a well established international newspaper, recently dug a bit around the White Helmet's creator, a "former" British military agent working for Gulf defense interests. That does not sound charitable. This is noticeable report, even as it still lacks any details, as it is the first in a major paper that shows some auspiciousness against that outlet. The Obama administration's lies about the "moderate rebels" are now openly discussed in major media. The propaganda of #HolocaustAleppo (isn't abusing the holocaust meme anti-semitic?) is turning into a laughing stock.
  • Russia is upping its stake in Syria. Additional Russian SU-24, SU-25 and SU-34 jets are arriving. Nearly 6,000 Russian soldiers are on the ground. The CIA's  al-Qaeda "rebels" are losing in east-Aleppo and are in stalemate and under pressure elsewhere. They will be bombed to smithereens. A few new BM-21 multiple missile launchers and heavier anti-air artillery was delivered to them. But those are just band-aids on lethally bleeding wounds. Even MANPADs will not change the situation one bit. The U.S., the Saudis and especially Brennan's CIA have lost that fight. Will Obama and Kerry admit it? Or will they throw another Hail Mary and do something crazy?
  •  
    I omitted a nice set of set of links in this article to MSM reports of Syiran "moderates" being one and the same with the jihadis.
1 - 8 of 8
Showing 20 items per page