Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "2004" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gary Edwards

NSA Whistleblower: NSA Spying On - and Blackmailing - Top Government Officials and Military Officers | Washington's Blog - 0 views

  •  
    Whistleblower Says Spy Agency Targeting Top American Leaders NSA whistleblower Russel Tice - a key source in the 2005 New York Times report that blew the lid off the Bush administration's use of warrantless wiretapping - told Peter B. Collins on Boiling Frogs Post (the website of FBI whistleblower Sibel Edmonds): Tice: Okay. They went after-and I know this because I had my hands literally on the paperwork for these sort of things-they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the-and judicial. But they went after other ones, too. They went after lawyers and law firms. All kinds of-heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House-their own people. They went after antiwar groups. They went after U.S. international-U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that-like the Red Cross, people like that that go overseas and do humanitarian work. They went after a few antiwar civil rights groups. So, you know, don't tell me that there's no abuse, because I've had this stuff in my hand and looked at it. And in some cases, I literally was involved in the technology that was going after this stuff. And you know, when I said to [former MSNBC show host Keith] Olbermann, I said, my particular thing is high tech and you know, what's going on is the other thing, which is the dragnet. The dragnet is what Mark Klein is talking about, the terrestrial dragnet. Well my specialty is outer sp
Paul Merrell

EU high court strikes down metadata collection law | Ars Technica - 0 views

  • While the United States continues to debate metadata collection conducted in secret by the National Security Agency, the European Union has been openly collecting the same sort of data for eight years. In the wake of terrorist attacks in Madrid (2004) and London (2005), the European Union passed a directive in 2006 requiring that all telecommunications providers retain all kinds of telephone and Internet metadata for at least six months and provide it to law enforcement upon request. According to a ruling handed down Tuesday by the European Court of Justice, that directive is now invalid. The case was brought by activists at Digital Rights Ireland and the Austrian Working Group on Data Retention. The two organizations had challenged the law as it had been imposed in their respective countries.
  • While the United States continues to debate metadata collection conducted in secret by the National Security Agency, the European Union has been openly collecting the same sort of data for eight years. In the wake of terrorist attacks in Madrid (2004) and London (2005), the European Union passed a directive in 2006 requiring that all telecommunications providers retain all kinds of telephone and Internet metadata for at least six months and provide it to law enforcement upon request. According to a ruling handed down Tuesday by the European Court of Justice, that directive is now invalid. The case was brought by activists at Digital Rights Ireland and the Austrian Working Group on Data Retention. The two organizations had challenged the law as it had been imposed in their respective countries.
  • The European judges concluded: The Court takes the view that, by requiring the retention of those data and by allowing the competent national authorities to access those data, the directive interferes in a particularly serious manner with the fundamental rights to respect for private life and to the protection of personal data. Furthermore, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the persons concerned a feeling that their private lives are the subject of constant surveillance. . . . Although the retention of data required by the directive may be considered to be appropriate for attaining the objective pursued by it, the wide-ranging and particularly serious interference of the directive with the fundamental rights at issue is not sufficiently circumscribed to ensure that that interference is actually limited to what is strictly necessary.
Paul Merrell

CIA and White House under pressure after Senate torture report leaks | World news | theguardian.com - 0 views

  • A leak of the major findings of a landmark Senate inquiry into the CIA’s post-9/11 torture of terrorism detainees led, on Friday, to intensified pressure on the White House and the CIA to release the inquiry speedily and with a minimum of redactions.The classified study, prepared by the Senate select committee on intelligence, concluded that the CIA’s interrogations, secret detentions and outsourced torture sessions were “brutal, and far worse than the agency communicated to policymakers.” More suspected terrorists underwent the agency’s post-9/11 treatment, which largely lasted from 2002 to 2006, than the CIA has publicly admitted, according to the report’s findings, which were first reported by McClatchy. Last week, committee chairwoman Dianne Feinstein of California stated that the Senate investigated the cases of 100 detainees – dozens more than previously known to have gone through the CIA’s so-called “interrogation, detention and rendition” programs.
  • In addition to misleading policymakers, the Senate report charges the CIA with selectively and leaking classified and inaccurate information to journalists in order to portray the program in a positive light.“The CIA manipulated the media by co-ordinating the leak of classified information, which inaccurately portrayed the effectiveness of the agency’s enhanced interrogation techniques,” the committee found.The agency also, according to the report, provided factually inaccurate information to Bush administration lawyers, who relied on it to concoct the legal theories that underpinned an apparatus of torturous interrogations and detentions that quickly spread to US military facilities at Guantánamo Bay, Iraq and Afghanistan.
  • According to the leaked conclusions, the committee found that that the agency poorly managed its interrogation and detention efforts. It relied extensively on outside contractors for design and implementation, especially “two contract psychologists,” whom an earlier Senate Armed Services Committee investigation identified as Bruce Jessen and Jim Mitchell. Both men were influential in retrofitting techniques that had been designed to train captured US troops to survive and resist torture by foreign adversaries for use on detainees.“Numerous internal critiques and objections concerning the CIA’s management and use of the Detention and Interrogation [sic] were ignored,” according to the committee findings. Those internal critiques include a now partially declassified 2004 inspector general’s report.
  • ...2 more annotations...
  • Despite the acrimony, the White House announced last week that the CIA will lead the executive-branch panel that will recommend how much of the Senate report’s executive summary, findings and recommendations to make public, a decision blasted by human-rights groups and intelligence scholars as a conflict of interest.
  • In a letter he sent to President Obama on Friday, Senator Mark Udall, a Democrat from Colorado, wrote, "[T]he most pressing reason for the White House to step in and manage this process is the CIA's clear conflict of interest on this issue and its demonstrated inability to face the truth about this program. … The CIA is certainly entitled to issue a public response to the Committee's study, but not to impede the declassification of the study itself."
Paul Merrell

The Informants | Mother Jones - 0 views

  • Over the past year, Mother Jones and the Investigative Reporting Program at the University of California-Berkeley have examined prosecutions of 508 defendants in terrorism-related cases, as defined by the Department of Justice. Our investigation found: Nearly half the prosecutions involved the use of informants, many of them incentivized by money (operatives can be paid as much as $100,000 per assignment) or the need to work off criminal or immigration violations. (For more on the details of those 508 cases, see our charts page and searchable database.)
  • Sting operations resulted in prosecutions against 158 defendants. Of that total, 49 defendants participated in plots led by an agent provocateur—an FBI operative instigating terrorist action. With three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings. (The exceptions are Najibullah Zazi, who came close to bombing the New York City subway system in September 2009; Hesham Mohamed Hadayet, an Egyptian who opened fire on the El-Al ticket counter at the Los Angeles airport; and failed Times Square bomber Faisal Shahzad.) In many sting cases, key encounters between the informant and the target were not recorded—making it hard for defendants claiming entrapment to prove their case. Terrorism-related charges are so difficult to beat in court, even when the evidence is thin, that defendants often don't risk a trial.
  • "The problem with the cases we're talking about is that defendants would not have done anything if not kicked in the ass by government agents," says Martin Stolar, a lawyer who represented a man caught in a 2004 sting involving New York's Herald Square subway station. "They're creating crimes to solve crimes so they can claim a victory in the war on terror."
Paul Merrell

Turkey Cooks the Books in Syria | The American Conservative - 0 views

  • If you had been a reader of The American Conservative magazine back in December 2011, you might have learned from an article written by me that “Unmarked NATO warplanes are arriving at Turkish military bases close to Iskenderum on the Syrian border, delivering weapons [to the Free Syrian Army] derived from Colonel Muammar Gaddafi’s arsenals…” Well, it seems that the rest of the media is beginning to catch up with the old news, supplemented with significant details by Sy Hersh in the latest issue of the London Review of Books in an article entitled “The Red Line and the Rat Line.” The reality is that numerous former intelligence officials, like myself, have long known most of the story surrounding the on-again off-again intervention by the United States and others in Syria, but what was needed was a Sy Hersh, with his unmatched range of contacts deep in both the Pentagon as well as at CIA and State Department, to stitch it all together with corroboration from multiple sources. In a sense it was a secret that wasn’t really very well hidden but which the mainstream media wouldn’t touch with a barge pole because it revealed that the Obama Administration, just like the Bushies who preceded it, has been actively though clandestinely conspiring to overthrow yet another government in the Middle East. One might well conclude that the White House is like the Bourbon Kings of France in that it never forgets anything but never learns anything either.
  • The few media outlets that are willing to pick up the Syria story even now are gingerly treating it as something new, jumping in based on their own editorial biases, sometimes emphasizing the CIA and MI6 role in cooperating with the Turks to undermine Bashar al-Assad. But Hersh’s tale is only surprising if one had not been reading between the lines over the past three years, where the clandestine role of the British and American governments was evident and frequently reported on over the internet and, most particularly, in the local media in the Middle East. Far from being either rogue or deliberately deceptive, operations by the U.S. and UK intelligence services, the so-called “ratlines” feeding weapons into Syria, were fully vetted and approved by both the White House and Number 10 Downing Street. The more recent exposure of the Benghazi CIA base’s possible involvement in obtaining Libyan arms as part of the process of equipping the Syrian insurgents almost blew the lid off of the arrangement but somehow the media attention was diverted by a partisan attack on the Obama Administration over who said what and when to explain the security breakdown and the real story sank out of sight.
  • So this is what happened, roughly speaking: the United States had been seeking the ouster of President Bashar al-Assad of Syria since at least 2003, joining with Saudi Arabia, which had been funding efforts to destabilize his regime even earlier. Why? Because from the Saudi viewpoint Syria was an ally of Iran and was also a heretical state led by a secular government dominated by Alawite Muslims, viewed as being uncomfortably close to Shi’ites in their apostasy. From the U.S. viewpoint, the ties to Iran and reports of Syrian interference in Lebanon were a sufficient casus belli coupled with a geostrategic assessment shared with the Saudis that Syria served as the essential land bridge connecting Hezbollah in Lebanon to Iran. The subsequent Congressional Syria Accountability Acts of 2004 and 2010, like similar legislation directed against Iran, have resulted in little accountability and have instead stifled diplomacy. They punished Syria with sanctions for supporting Hezbollah in Lebanon and for its links to Tehran, making any possible improvement in relations problematical. The 2010 Act even calls for steps to bring about regime change in Damascus. The United States also engaged in a program eerily reminiscent of its recent moves to destabilize the government in Ukraine, i.e., sending in ambassadors and charges who deliberately provoked the Syrian government by meeting with opposition leaders and openly making demands for greater democracy. The last U.S. Ambassador to Syria Robert Ford spoke openly in support of the protesters while serving in Damascus in 2010. On one occasion he was pelted with tomatoes and was eventually removed over safety concerns.
  • ...4 more annotations...
  • Lost in translation is the fact that Washington’s growing support for radical insurgency in Syria would also inevitably destabilize all its neighbors, most notably including Iraq, which has indeed been the case, making a shambles of U.S. claims that it was seeking to introduce stable democracies into the region. Some also saw irony in the fact that a few years before Washington decided al-Assad was an enemy it had been sending victims of the CIA’s rendition program to Syria, suggesting that at least some short-term and long-term strategies were on a collision course from the start, if indeed the advocates of the two policies were actually communicating with each other at all. Prime Minister Recep Tayyip Erdogan of Turkey, whose country shared a long border with Syria and who had legitimate security concerns relating to Kurdish separatists operating out of the border region, became the proxy in the secret war for Washington and its principal European allies, the British and French. When the U.S.-Saudi supported insurgency began to heat up and turn violent, Turkey became the key front line state in pushing for aggressive action against Damascus. Erdogan miscalculated, thinking that al-Assad was on his last legs, needing only a push to force him out, and Ankara saw itself as ultimately benefiting from a weak Syria with a Turkish-controlled buffer zone along the border to keep the Kurds in check.
  • Hersh reports how President Barack Obama had to back down from attacking Syria when the Anglo-American intelligence community informed him flatly and unambiguously that Damascus was not responsible for the poison gas attack that took place in Damascus on August 21, 2013 that was being exploited as a casus belli. The information supporting that assertion was known to many like myself who move around the fringes of the intelligence community, but the real revelation from Hersh is the depth of Turkish involvement in the incident in order to have the atrocity be exploitable as a pretext for American armed intervention, which, at that point, Erdogan strongly desired. As the use of weapons of mass destruction against civilians was one of the red lines that Obama had foolishly promoted regarding Syria Erdogan was eager to deliver just that to force the U.S.’s hand. Relying on unidentified senior U.S. intelligence sources, Hersh demonstrates how Turkey’s own preferred militant group Jabhat al-Nusra, which is generally regarded as an al-Qaeda affiliate, apparently used Turkish-provided chemicals and instructions to stage the attack.
  • Is it all true? Unless one has access to the same raw information as Sy Hersh it is difficult to say with any certainty, but I believe I know who some of the sources are and they both have good access to intelligence and are reliable. Plus, the whole narrative has an undeniable plausibility, particularly if one also considers other evidence of Erdogan’s willingness to take large risks coupled with a more general Turkish underhandedness relating to Syria. On March 23rd, one week before local elections in Turkey that Erdogan feared would go badly for him, a Turkish air force F-16 shot down a Syrian Mig-23, claiming that it had strayed half a mile into Turkish airspace. The pilot who bailed out, claimed that he was attacking insurgent targets at least four miles inside the border when he was shot down, an assertion borne out by physical evidence as the plane’s remains landed inside Syria. Was Erdogan demonstrating how tough he could be just before elections? Possibly.
  • Critics of Hersh claim that the Turks would be incapable of carrying out such a grand subterfuge, but I would argue that putting together some technicians, chemicals, and a couple of trucks to carry the load are well within the capability of MIT, an organization that I have worked with and whose abilities I respect. And one must regard with dismay the “tangled webs we weave,” with due credit to Bobby Burns, for what has subsequently evolved in Syria. Allies like Turkey that are willing to cook the books to bring about military action are exploiting the uncertainty of a White House that continues to search for foreign policy successes while simultaneously being unable to define any genuine American interests. Syria is far from an innocent in the ensuing mayhem, but it has become the fall guy for a whole series of failed policies. Turkey meanwhile has exploited the confusion to clamp down on dissent and to institutionalize Erdogan’s authoritarian inclinations. Ten years of American-licensed meddling combined with obliviousness to possible consequences has led to in excess of 100,000 dead Syrians and the introduction of large terrorist infrastructures into the Arab heartland, yet another foreign policy disaster in the making with no clear way out.
  •  
    Former CIA officer Philip Giraldi adds valuable context to revelations of Turkey's involvement in the false flag Sarin gas attack in Syria and in Turkey's follow-up plan to stage a false flag attack on a Turkish tomb in Syria as a pretext for Turkish invasion of Syria. 
Paul Merrell

Al Qaeda: The Database | Global Research - 0 views

  • This article originally published by Global Research in 2005 sheds light on the nature of Al Qaeda, an intelligence construct used by Washington to destabilize and destroy sovereign countries, while sustaining the illusion of  an outside enemy, which threatens the security of the Western World.
  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . .
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.” “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat.
  • ...5 more annotations...
  • “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world. “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
  • This article originally published by Global Research in 2005 sheds light on the nature of Al Qaeda, an intelligence construct used by Washington to destabilize and destroy sovereign countries, while sustaining the illusion of  an outside enemy, which threatens the security of the Western World. *       *       * Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . .
  • “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
Paul Merrell

NSA Whistleblower: Snowden Never Had Access to the "Juiciest" Intelligence Documents | Global Research - 0 views

  • NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping. Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:
  • He says the NSA started spying on President Obama when he was a candidate for Senate:
  • Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this. Washington’s Blog called Tice to find out more about what he saw when he was at NSA.
  • ...8 more annotations...
  • NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.] Does Snowden even have documents which contain the information which you’ve seen? RUSSELL TICE:  The answer is no. WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
  • RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden? Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing? They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.] Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” - Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way. I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.
  • Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS. And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance]. ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks. These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
  • It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency. When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up. There was no such thing beforehand. It was made up … to try to placate the American people. The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of. So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
  • Snowden’s Failure To Understand the Most Important Documents RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG. The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at. But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there. I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
  • Cheney Was Running the Show WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive]. Is that right … and if so, how do you know that? RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington. WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means? RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.
  • NSA Is Spying On CONTENT as Well as Metadata WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata? RUSSELL TICE: Of course it is. Of course. [Background. But see this.] NSA Spying On Journalists, Congress, Admirals, Lawyers … RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such. I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state. Or an Admiral and his wife, and his kids and his staffers …
  • The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else. These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.
  •  
    Whistleblower Russell Tice says that there are super-classified domestic surveillance records that Edward Snowden, Congressional oversight committees, and the NSA Inspector-General did not have access to. Must-read.
Paul Merrell

Towards a World War III Scenario: America's "Contingency Plan" to Attack Iran with Nuclear Weapons | Global Research - 0 views

  • U.S. plans to attack Iran with a mix of nuclear and conventional weapons have been in readiness since June, 2005, according to Michel Chossudovsky. a distinguished authority on international affairs. “Confirmed by military documents as well as official statements, both the U.S. and Israel contemplate the use of nuclear weapons directed against Iran,” writes professor Michel Chossudovsky, Director of the Centre for Research on Globalization in Montreal. The plans were formulated in 2004. The previous year, Congress gave the Pentagon the green light to use thermo-nuclear weapons in conventional war theaters in the Middle East and Central Asia, allocating $6 billion in 2004 alone to create the new generation of “defensive” tactical nuclear weapons or “mini-nukes”.
  • “President Obama has largely endorsed the doctrine of pre-emptive use of nuclear weapons formulated by the previous administration,” Chossudovsky writes in his new book, “Towards a World War III Scenario: The Dangers of Nuclear War” (Global Research, 2012). His Administration “has also intimated it will use nukes in the event of an Iran response to an Israeli attack on Iran.”
  • “What is unfolding (in Iran) is the outright legitimization of war in the name of an illusive notion of global security. America’s mini-nukes, with an explosive capacity of up to six times a Hiroshima bomb, are upheld as a ‘humanitarian’ bomb, whereas Iran’s nonexistent nuclear weapons are branded as an indisputable threat to global security,” Chossudovsky writes. He points out that a U.S.-Israeli strike against Iran would probably not be limited to Iran’s nuclear facilities but likely would be “an all-out air attack on both military and civilian infrastructure, transport systems, factories and public buildings.”
  • ...1 more annotation...
  • He goes on to say, “At no point since the first atomic bomb was dropped on Hiroshima on August 6, 1945, has humanity been closer to the unthinkable — a nuclear holocaust which could potentially spread in terms of radioactive fallout over a large part of the Middle East.”
Paul Merrell

Core Secrets: NSA Saboteurs in China and Germany - The Intercept - 0 views

  • The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA.
  • with vast amounts of customer data, including phone records and email traffic. But documents published today by The Intercept suggest that even as the agency uses secret operatives to penetrate them, companies have also cooperated more broadly to undermine the physical infrastructure of the internet than has been previously confirmed. In addition to so-called “close access” operations, the NSA’s “core secrets” include the fact that the agency works with U.S. and foreign companies to weaken their encryption systems; the fact that the NSA spends “hundreds of millions of dollars” on technology to defeat commercial encryption; and the fact that the agency works with U.S. and foreign companies to penetrate computer networks, possibly without the knowledge of the host countries. Many of the NSA’s core secrets concern its relationships to domestic and foreign corporations.
  • Sentry Eagle includes six programs: Sentry Hawk (for activities involving computer network exploitation, or spying), Sentry Falcon (computer network defense), Sentry Osprey (cooperation with the CIA and other intelligence agencies), Sentry Raven (breaking encryption systems), Sentry Condor (computer network operations and attacks), and Sentry Owl (collaborations with private companies). Though marked as a draft from 2004, it refers to the various programs in language indicating that they were ongoing at the time, and later documents in the Snowden archive confirm that some of the activities were going on as recently as 2012.
  • ...3 more annotations...
  • The agency’s core secrets are outlined in a 13-page “brief sheet” about Sentry Eagle, an umbrella term that the NSA used to encompass its most sensitive programs “to protect America’s cyberspace.” “You are being indoctrinated on Sentry Eagle,” the 2004 document begins, before going on to list the most highly classified aspects of its various programs. It warns that the details of the Sentry Eagle programs are to be shared with only a “limited number” of people, and even then only with the approval of one of a handful of senior intelligence officials, including the NSA director. “The facts contained in this program constitute a combination of the greatest number of highly sensitive facts related to NSA/CSS’s overall cryptologic mission,” the briefing document states. “Unauthorized disclosure…will cause exceptionally grave damage to U.S. national security. The loss of this information could critically compromise highly sensitive cryptologic U.S. and foreign relationships, multi-year past and future NSA investments, and the ability to exploit foreign adversary cyberspace while protecting U.S. cyberspace.”
  • The most controversial revelation in Sentry Eagle might be a fleeting reference to the NSA infiltrating clandestine agents into “commercial entities.” The briefing document states that among Sentry Eagle’s most closely guarded components are “facts related to NSA personnel (under cover), operational meetings, specific operations, specific technology, specific locations and covert communications related to SIGINT enabling with specific commercial entities (A/B/C).” It is not clear whether these “commercial entities” are American or foreign or both. Generally the placeholder “(A/B/C)” is used in the briefing document to refer to American companies, though on one occasion it refers to both American and foreign companies. Foreign companies are referred to with the placeholder “(M/N/O).” The NSA refused to provide any clarification to The Intercept.
  • Documents: Sentry Eagle Brief Sheet (13 pages) TAREX Classification Guide (7 pages) Exceptionally Controlled Information Listing (6 pages) ECI WHIPGENIE Classification Guide (7 pages) ECI Pawleys Classification Guide (4 pages) ECI Compartments (4 pages) CNO Core Secrets Slide Slices (10 pages) CNO Core Secrets Security Structure (3 pages) Computer Network Exploitation Classification Guide (8 pages) CNO Core Secrets (7 pages)
Paul Merrell

Rad Geek People's Daily 2005-12-20 - Lazy linking on Leftist labor libertarianism - 0 views

  • For a while now I’ve been urg­ing lib­er­tar­i­ans and the labor move­ment to take a more se­ri­ous and sym­pa­thet­ic look at one an­oth­er. (Cf. GT 2004-05-01: Free the Unions (and all po­lit­i­cal pris­on­ers!), GT 2005-03-23: El pueblo unido jamás será ven­ci­do! and GT 2005-03-31: Anar­quis­tas por La Causa for rep­re­sen­ta­tive ex­am­ples.) Just as with rad­i­cal lib­er­tar­i­an­ism and rad­i­cal fem­i­nism I think that the sup­pos­ed­ly ob­vi­ous and un­bridge­able op­po­si­tion be­tween the two is the re­sult more of ter­mi­no­log­i­cal dif­fi­cul­ties and shift­ing po­lit­i­cal al­liances over the course of the 20th cen­tu­ry than any deep or prin­ci­pled gulf. The best way to see this is with more en­gaged dis­cus­sion: fewer polemics, more his­to­ry, more earnest ques­tion­ing, and more lis­ten­ing. So I’m ex­cit­ed to see a lot of in­ter­est­ing new ma­te­r­i­al just in the past cou­ple of weeks from lib­er­tar­i­ans (most­ly but not ex­clu­sive­ly left-lib­er­tar­i­ans) try­ing to get clear on the ques­tions and ham­mer out some of the an­swers about the prospect for a lib­er­tar­i­an­ism that has a place for work­ers or­ga­niz­ing freely, and a wild­cat labor move­ment that frees it­self from the smoth­er­ing pa­tron­age of the State. Here’s a bit of lazy link­ing to the dis­cus­sion so far.
  •  
    Food for thought. 
Paul Merrell

Did Iranian Weapons Kill Americans? Another phony argument against a deal with Iran | Council for the National Interest - 0 views

  • There is a new entrant in the already crowded field of Israeli Lobby funded groups opposed to an agreement with Iran over its nuclear program. It is the “wounded warriors” and their families denouncing the perfidious Persians. The first salvo was fired on August 4th in a letter to Rupert Murdoch’s New York Post from the daughter of an Army Lieutenant Colonel killed in Iraq by “Iranian weapons,” who concluded that “we are already at war with Iran.” After the letter ads began to appear in television markets where congressmen considered to be vulnerable to pressure from Israel’s friends were located. The ads were produced by a group called “Veterans Against an Iran Deal,” whose executive director is Michael Pregent, a former adviser to General David Petraeus who is also an “Expert” affiliated with the Washington Institute for Near East Policy (WINEP), an American Israel Public Affairs Committee (AIPAC) spin off. The group has a website which claims that “the Iranian regime murdered and maimed thousands of Americans” but there is no indication who exactly supports it and is providing funding or what kind of following it has. The group’s first ad featured as a spokesman a retired army Staff Sergeant named Robert Bartlett. In the video, Bartlett, whose face bears the scars resulting from being on the receiving end of an improvised explosive device in Iraq, claims he was “blown up by an Iranian bomb.” In addition to blaming Iran for providing Iraqi insurgents with the weapons that were used to maim him and kill his colleagues he also tells how Iranians would “kidnap kids” and kill them in front of their parents. Per Bartlett, those who deal with Iran will have “blood on their hands” and will be responsible for funding Iranian terror.
  • Bartlett’s anger is nevertheless understandable, but his claim that he was maimed by Iranian provided weapons should not go unchallenged. In actual fact, it is a lie. In 2005 the Bush Administration began to claim that Iran had been “interfering” in Iraq. The claim, rarely backed up by an substance, was based on suppositions about Tehran’s likely interests regarding its predominantly Shi’ite neighbor and it was little more than an excuse to explain the persistence and intensity of Iraqi resistance to the American invasion. Sophisticated roadside bombs using shaped charges, initially referred to as Improvised Explosive Devices (IEDs) and subsequently as Explosively Formed Penetrators (EFPs), first appeared in Iraq in the summer of 2004. Initial reports on the weapon in June 2005, stated that it was being used by Sunni insurgents and was likely produced by ordnance experts from the disbanded Iraqi Army. Saddam Hussein’s Iraq had a large army with a sophisticated if limited ability to produce some weapons in its own armories. When the army was foolishly disbanded by the Coalition Provisional Authority, skilled workers who had been employed in the weapons shops were made redundant and took with them the knowledge to make any number of improvised weapons using the materiel that remained in Iraq’s arms storage depots.
  • The indictment of Iran as the source of weapons being used by insurgents continued and intensified as the security situation in Iraq deteriorated. Some media coverage attributed the killing of hundreds of American soldiers to Iranian supplied weapons because any death by EFP was immediately attributed to Iran. In spite of the lack of any solid evidence, the largely neoconservative supporters of pre-emptive action against Iran stated specifically that Iran was “killing American soldiers” through its provision of sophisticated weaponry. A nearly hysterical progress report given to Congress by General David Petraeus and Ambassador Ryan Crocker on April 8, 2008 went even farther, claiming that Iran was responsible for most of the violence occurring in Iraq. But the argument about Iranian involvement in Iraq was itself logically inconsistent, something that Crocker and Petraeus should have understood. The Iraqi insurgency in the period 2004-2006 was largely Sunni and hostile to Iran. That the Iranians would be supplying the Sunnis or that the Sunnis would have sought such aid was implausible.
  •  
    Shia Iran providing IED weapons to Sunni militants in Iraq? Preposterous. The latest Israel lobby false propaganda blast aimed at shooting down the agreement with Iran in Congress.  
Paul Merrell

Investigative Reporter Robert Parry to receive I.F. Stone Medal for Journalistic Independence - Nieman Foundation - 0 views

  • In recognition of a career distinguished by meticulously researched investigations, intrepid questioning and reporting that has challenged both conventional wisdom and mainstream media, the Nieman Foundation for Journalism at Harvard will present journalist Robert Parry with the 2015 I.F. Stone Medal for Journalistic Independence during a ceremony in Cambridge, Mass., on Oct. 22, 2015.
  • Parry established the website, consortiumnews.com in 1995 as the first investigative news magazine on the Internet. He continues to edit the site and notes that a founding idea behind the project was the belief that “a major investment was needed in journalistic endeavors committed to honestly informing the American people about important events, reporting that truly operated without fear or favor.” Parry is known for breaking many of the stories related to the Iran-Contra affair while working at The Associated Press and Newsweek in the 1980s. He received the George Polk Award for National Reporting in 1984 for his work on Iran-Contra at the AP, where he broke the story that the CIA had provided a manual to the Nicaraguan Contras (“Psychological Operations in Guerrilla Warfare”) that outlined ways to build support for the Contra cause and carry out political assassinations.
  • In 1985, he was the first to report on Oliver North’s involvement in the affair and along with his AP colleague Brian Barger, was the first to describe the Contras’ role in cocaine trafficking in the United States – stories that led to an internal investigation and a congressional inquiry. Parry also was a 1985 Pulitzer finalist for his work. In the early 1990s, Parry made several documentaries for PBS’s Frontline on the October Surprise allegations about a plot to influence the outcome of the 1980 presidential election between incumbent Jimmy Carter and Ronald Reagan. He continued to report on the topic and published two related books: “Trick or Treason: The October Surprise Mystery” (1993) and “The October Surprise X-Files: The Hidden Origins of the Reagan-Bush Era” (1996). Parry’s other books include “America’s Stolen Narrative: From Washington and Madison to Nixon, Reagan and the Bushes to Obama” (2012), “Neck Deep: The Disastrous Presidency of George W. Bush” (2007), “Secrecy & Privilege: Rise of the Bush Dynasty from Watergate to Iraq” (2004), “and “Lost History: Contras, Cocaine, the Press & ‘Project Truth’” (1992).
  • ...1 more annotation...
  • Parry worked for Bloomberg News from 2000-2004. He has reported from Grenada, El Salvador, Nicaragua, Iran, Israel and Haiti and has taught at the New York University Graduate School of Journalism. Former Nieman Foundation curator Bill Kovach, chair of the advisory committee that oversees the annual award, said, “Robert Parry has for decades been one of the most tenacious investigative journalists. Driven by his concern that the information flooding our communications system increasingly substitutes opinion for historical fact and undermines effective citizen and government decisions, he has created a unique news website to replace disinformation with facts based on deep research.” Established in 2008, the I.F Stone Medal honors the life of investigative journalist I.F. Stone and is presented annually to a journalist whose work captures the spirit of journalistic independence, integrity and courage that characterized I.F. Stone’s Weekly, published 1953-1971. The award is administered by the Nieman Foundation for Journalism at Harvard and its Nieman Watchdog Project.
  •  
    Recognition for a journalist whose articles I often bookmark on Diigo.
Joseph Skues

Why capitalism can't meet human needs - 0 views

  • This crisis began when the housing bubble burst. Capitalist banks were lending money to profit-seeking real estate developers to build houses. The same banks were lending money to mortgage companies to make as many loans as they could. The goal was to boost profits. Soon there were more houses than the workers and the middle class could buy. The prices of homes fell. Mortgages could not be refinanced. Workers could not pay the steep increases in interest rates built into their loans. Banks stopped lending. Millions of households went into foreclosure. Put simply, people became homeless because there were too many houses! Not too many houses that were needed or already here, but too many houses that can be sold at a profit. Furthermore, the workers who build homes and all the workers who make the things that go into homes are losing their jobs because these homes can no longer be sold at a profit. That is the essence of all the capitalist crises that have occurred since the first crisis in 1825. It is the crisis of overproduction.
  • Now the crisis of overproduction is sweeping the auto industry. From the auto industry and the housing industry it is spreading throughout the economy. The stock markets are plummeting because the financial bailouts, the pumping of trillions of dollars into the banks, cannot stop the capitalist economic crisis.
  • Profits consist of unpaid labor.
  • ...17 more annotations...
  • Under the system of capitalist exploitation wealth flows to the top, and the level of inequality is obscene.
  • the super-rich who have all the levers of power in society, owned 34.3 percent of the wealth in 2004.
  • Racism and national oppression
  • distribution of wealth under capitalism
  • the median wealth (that is, savings and other assets) of households by race in 2004 was $140,700 for whites, $20,600 for African Americans and $18,600 for Latin@s
  • Oppression and economic discrimination also fall on women and lesbian, gay, bi and trans people under capitalism
  • sex and gender bias as a way to divide and conquer.
  • A system in which people are homeless because there are too many homes must go
  • How else could 1 percent of the population dominate the workers and oppressed
  • As the present crisis engulfs wider and wider sections of the workers, the potential for bringing about that unity is growing stronger.
  • The Pentagon is nothing more than an enforcer for U.S. capitalism
  • The growing witch-hunt against undocumented workers has the same poisonous, divisive goal.
  • in which workers are losing their jobs and being plunged into poverty because they have produced too much wealth
  • which cannot provide jobs and education but imprisons 2.4 million people
  • majority of them Black and Latin@, is bankrupt
  • where production takes place for human need, not for profit. The class that produces the wealth, the multinational working class, should own and distribute that wealth.
  • Trillions of dollars are now being used to bail out the banks and fund the Pentagon under capitalism. Under socialism, that money would guarantee that everyone would have a decent job and income, free health care, affordable housing, free education, low-cost transportation, healthy, reasonably priced food and much more. The well-being of the multinational working class would be the goal of society, not their exploitation as it is under capitalism.
Joseph Skues

Yes, Islam condones wife beatings - 0 views

  •  
    "Recently, Marvin Levant (Dec. 28), Steve Harris (Dec. 30), Syed Soharwardy (Jan. 2), and Riazuddin Ahmed (Jan. 5) debated Islam through the forum of the Herald's letters to the editor. The issue of wife beating and gender inequality in Islam has become convoluted and highly controversial as many Muslims try to sugar-coat the ugly truths and others try to shed some light on the issue. Soharwardy's statement that "Beating one's wife is not only wrong, it is criminal and completely un-Islamic" is incorrect. The Qur'an says that "men are in charge of women because Allah has made one of them (men) to excel the other (women), thus man's superiority over women . . . good women are the obedient ones . . . admonish the rebellious women and banish them, and scourge them (whip them severely to inflict pain) (4:34) . . . smote them (hit or strike with the hand or with a weapon causing pain, beat them . . . (4:62)". Islam does not recognize gender equality. For example, polygamy is accepted in Islam, but polyandry is not. A woman's testimony is considered half as worthy as a man's in court; a son inherits twice as much as a daughter does. Muslim men may marry Muslim, Jewish or Christian women, but Muslim women can marry only Muslim men. In short, sharia law leads to the inhuman treatment of Muslim women by their husbands and others, especially in South Asia and the Middle East. Higher education is emphasized more for sons than for daughters; in cultural honour killings, almost always women are the target for murder. Under sharia, divorced Muslim women get custody of their sons under eight years of age and daughters until puberty, and then the fathers take the children away. Sharia enabled one of the worst fundamentalists, the vile and ruthless military dictator, Muhammad Zia-ul-Haq, to put more than 15,000 rape victims in jail because they could not comply with the absurd Islamic condition requiring them to have numerous male witnesses of their victimization. They were char
Paul Merrell

West's antiquated unipolar world collides with the East's vision of a mulipolar future. | New Eastern Outlook - 0 views

  • For years the West has been cultivating a proxy political machine inside of Ukraine for the purpose of peeling the nation away from its historical and socioeconomic ties to Russia. The deep relationship between Western corporate-financier interests on Wall Street and in London and the opposition in Ukraine are best summarized in PR Weeks “Analysis: PR gets trodden underfoot as sands shift in Ukraine.” In the article, the involvement of some of the most notorious corporate lobbying firms on Earth, including Bell Pottinger and the Podesta Group, are revealed to have been involved in Ukraine’s internal affairs since the so-called “Orange Revolution” in 2004 – a coup admittedly orchestrated by the West and in particular the US government.  The article chronicles (and defends) the continuing, unabated meddling of the West up to and including the most recent turmoil consuming Ukraine.    PR Week’s article revealed that heavily funded networks propping up the proxy regime in Kiev are sponsored by “individuals and private companies who support stronger EU-Ukraine relations.” It is these Western corporate-financier interests, not Ukrainian aspirations for “democracy” and “freedom,” that kicked off the “Euromaidan” mobs in the first place – and will be the driving force that misshapes and deforms the regions of western Ukraine now overrun by the West’s proxies.  To the east in Ukraine, people are prominently pro-Russian, sharing closer cultural, linguistic, and socioeconomic ties to Russia as well as long historical parallels. They have welcomed moves by Russia to counter the coup in Kiev and protect eastern Ukraine from the corrosive influence that will grow as the West further entrenches itself.
  • With the vacant chair of deposed Ukrainian President Viktor Yanukovych still warm, the tentacles of Western corporate-financier interests have already wound themselves around Kiev and have begun to squeeze.  Chevron, which had signed a multi-billion dollar deal with Ukraine in November, 2013, was operating in the west of Ukraine, and alongside other Western energy giants such as ExxonMobil and Shell. The deals were part of President Yanukovych’s apparent gravitation toward the West and impending integration with the EU which was then suddenly overturned in favor with re-cementing ties with Russia. Western oil giants clearly saw the benefit of backing a putsch that would leave the western half firmly in the orbit of the US, UK, and EU. They can not only continue their business on the western edge of Ukraine, but expand their interests unabated across the country now that a capitulating, puppet regime sits in Kiev.   While Western big-oil plans to move in and siphon billions, the International Monetary Fund (IMF) is already planning deep cuts in social benefits as part of a staggering austerity regime to restructure financially the seized western region of Ukraine, and if possible, all of Ukraine proper.
  • RT reported in its article, “Pensions in Ukraine to be halved – sequestration draft,” that: The self-proclaimed government in Kiev is reportedly planning to cut pensions by 50 percent as part of unprecedented austerity measures to save Ukraine from default. With an “empty treasury”, reduction of payments might take place in March.  According to the draft document obtained by Kommersant-Ukraine, social payments will be the first to be reduced. The proxy regime set up in Kiev has already indicated its eager acceptance to all IMF conditions. The fate of western Ukraine will be no different than other members of the European Union preyed upon by the corporate-financier interests that created the supranational consolidation in the first place. The reduction of a multipolar Europe into a unipolar, supranational consolidation which can be easily and collectively looted is a microcosm of what the West’s Fortune 500 plan as part of their global unipolar order.  
  • ...1 more annotation...
  • The natural resources, human capital, and geopolitical advantages found within the borders of Ukraine, will now become the natural resources, human capital, and geopolitical advantages of Chevron, BP, Monsanto, a myriad of defense contractors, telecom corporations, and other familiar brands seen marauding across the planet leaving in its wake destitution, socioeconomic disparity, and perpetual division they intentionally sow in order to protect their holdings from any form of unified or organized opposition.    No matter how obvious the West’s game may be to some, had Ukraine fallen entirely under the control of Western interests, a multitude of excuses could and would have been peddled to explain the unraveling of Ukrainian society in terms that would exonerate the corporate-financier interests truly driving the crisis. But Ukraine has not entirely fallen to the West, and because of that, the planned decimation of western Ukraine, its economy, and its sovereignty will stand out in stark contrast to the eastern region that has remained beyond the West’s reach and within the orbit of Russia’s multipolar vision of the future.  
Paul Merrell

Things Barack Obama Doesn't Consider "Abuse" | emptywheel - 0 views

  • President Obama will shortly give a speech in which he’ll make cosmetic changes to the NSA dragnet, but will continue, in many ways, the accessing of personal data from Americans with no probable cause. As part of his cosmetic effort, he will also say there has been no evidence of abuse in these programs. That means he does not consider any of the following abuse: The NSA spied on the porn and phone sex habits of ideological opponents, including those with no significant ties to extremists, and including a US person.
  • According to the NSA in 2009, it had a program similar to Project Minaret — the tracking of anti-war opponents in the 1970s — in which it spied on people in the US in the guise of counterterrorism without approval. We still don’t have details of this abuse. When the NSA got FISC approval for the Internet (2004) and phone (2006) dragnets, NSA did not turn off features of Bush’s illegal program that did not comply with the FISC authorization. These abuses continued until 2009 (one of them, the collection of Internet metadata that qualified as content, continued even after 2004 identification of those abuses). Even after the FISC spent 9 months reining in some of this abuse, the NSA continued to ignore limits on disseminating US person data. Similarly, the NSA and FBI never complied with PATRIOT Act requirements to develop minimization procedures for the Section 215 program (in part, probably, because NSA’s role in the phone dragnet would violate any compliant minimization procedures).
  • The NSA has twice — in 2009 and 2011 — admitted to collecting US person content in the United States in bulk after having done so for years. It tried to claim (and still claims publicly in spite of legal rulings to the contrary) this US person content did not count as intentionally-collected US person content (FISC disagreed both times), and has succeeded in continuing some of it by refusing to count it, so it can claim it doesn’t know it is happening. As recently as spring 2012, 9% of the NSA’s violations involved analysts breaking standard operating procedures they know. NSA doesn’t report these as willful violations, however, because they’ve deemed any rule-breaking in pursuit of “the mission” not to be willful violations. In 2008, Congress passed a law allowing bulk collection of foreign-targeted content in the US, Section 702, to end the NSA’s practice of stealing Internet company data from telecom cables. Yet in spite of having a legal way to acquire such data, the NSA (through GCHQ) continues to steal data from some of the same companies, this time overseas, from their own cables. Arguably this is a violation of Section 702 of FISA.
  • ...1 more annotation...
  • NSA may intentionally collect US person content (including Internet metadata that legally qualifies as content) overseas (it won’t count this data, so we don’t know how systematic it is). If it does, it may be a violation of Section 703 of FISA. Rather than discussing any of these violations, the NSA has waved around a few cases of LOVEINT (most, if not all, of which have not been prosecuted) as part of a successful ploy to distract from much more systemic abuses of its authority, affecting far more Americans. But there has been abuse, even beyond practices (like back door searches) that gut the Fourth Amendment or (like NSA’s approach to encryption) that hurt Americans’ security. President Obama will spend a lot of time saying there have been no abuses. He’s wrong.
  •  
    One I had missed before, Marcy Wheeler's missive just before Obama delivered his speech on the NSA in January 2014, announcing his proposed "reforms."
Paul Merrell

Former Oil Tycoon Launches Pro-European Political Movement within Russia | nsnbc international - 0 views

  • September the 20th marked the launch of Open Russia, a pro-European political movement spearheaded by former Russian oil tycoon Mikhail Khodorkovsky. Russia’s former wealthiest man was released from prison in December 2013 due to a pardon by Vladimir Putin, after serving close to 10 years in jail following his conviction in 2005.
  • Although officially convicted of tax evasion and embezzlement, it seems that Khodorkovsky was singled out among the Russian oligarchs due to him using his mass fortune to interfere in domestic Russian politics, in an attempt to overthrow Putin for the benefit of the Western elite. Open Russia is the rebirth of the Open Russia Foundation, which was launched in 2001 by Khodorkovsky to foster animosity in Russia but was later shut down after the tycoon was behind bars. The board of the Open Russia Foundation included two Anglo-American titans, namely Henry Kissinger and Lord Jacob Rothschild, revealing the mindset and intentions of the individuals who steered the foundation.
  • Khodorkovsky profited immensely from the mass privatisation of state assets following the collapse of the Soviet Union in the 1990’s, at a time when corruption and back-door deals was the norm in Russia. He was the Chairman and CEO of the Russian based ‘Yakos Oil Company’ from 1997 to 2004, where he acquired an immense fortune leading him to be named the 16th wealthiest person on earth by Forbes magazine in 2004, worth a staggering $15 billion. Immediately after his release from prison at the end of 2013, Khodorkovsky declared on numerous occasions that he had no desire to enter politics. Yet only months after his initial statements he has launched a pro-European political movement within Russia, openly called for the overthrow of Putin in Moscow, announced he would be interested in leading Russia as President in the coming years, as well as asserting that Ukraine is the “model” for Russia to follow in the future. “I feel it imperative that the section of the population that is Europe-centered would have the opportunity to impact the way the country develops…. Without a doubt, Putin’s leaving is one of the necessary elements of Russia being able to take a European path of development…. It’s clear that Ukraine is that model that Russia is ready to accept and it’s precisely for this reason that Putin was so not interested in seeing the success of that revolution”, Khodorkovsky told the Daily Beast in an interview earlier this month.
  • ...1 more annotation...
  • Khodorkovsky recently demonstrated that he still has very close links with the Anglo-American Establishment after speaking at the most distinguished think tank in America, the Council on Foreign Relations (CFR). He also delivered a speech at Freedom House, an organisation that has been involved in the majority of Western orchestrated colour revolutions that have erupted across the planet over the past two decades.
Paul Merrell

Int'l Criminal Court's Examination of U.S. Treatment of Detainees Takes Shape | Just Security - 0 views

  • On Tuesday, the Chief Prosecutor of the International Criminal Court announced, in the most explicit and detailed terms to date, that the U.S. treatment of detainees captured in the Afghanistan conflict is under examination by her office. The statement is included in the Office of the Prosecutor’s (OTP) annual “Report on Preliminary Examination Activities,” released on the eve of the Assembly of States Parties this month.
  • In particular, the OTP is assessing the degree to which national proceedings are underway with respect to the allegations underlying the examination.  Furthermore, an affirmative determination that there is a reasonable basis to proceed with an investigation is far from a finding of strong evidence of criminal wrongdoing. Nevertheless, the appearance of the latter is surely one issue on the minds of administration officials. David Bosco, for instance, reported that “the U.S. delegation urged the court not to publish the allegations, even in preliminary form. They warned that the world would see any ICC mention of possible American war crimes as evidence of guilt, even if the court never brought a formal case.”
  • Here are the key graphs: “94. The Office has been assessing available information relating to the alleged abuse of detainees by international forces within the temporal jurisdiction of the Court. In particular, the alleged torture or ill-treatment of conflict-related detainees by US armed forces in Afghanistan in the period 2003-2008 forms another potential case identified by the Office. In accordance with the Presidential Directive of 7 February 2002, Taliban detainees were denied the status of prisoner of war under article 4 of the Third Geneva Convention but were required to be treated humanely. In this context, the information available suggests that between May 2003 and June 2004, members of the US military in Afghanistan used so-called “enhanced interrogation techniques” against conflict-related detainees in an effort to improve the level of actionable intelligence obtained from interrogations. The development and implementation of such techniques is documented inter alia in declassified US Government documents released to the public, including Department of Defense reports as well as the US Senate Armed Services Committee’s inquiry. These reports describe interrogation techniques approved for use as including food deprivation, deprivation of clothing, environmental manipulation, sleep adjustment, use of individual fears, use of stress positions, sensory deprivation (deprivation of light and sound), and sensory overstimulation.
  • ...4 more annotations...
  • The Prosecutor proceeds in 4 phases within any preliminary examination: (1) an initial assessment to analyze the seriousness of information received; (2) a jurisdictional analysis – the formal commencement of an examination involving “a thorough factual and legal assessment” of whether there is “a reasonable basis to believe that the alleged crimes fall within the subject-matter jurisdiction of the Court;” (3) an admissibility determination – assessing whether the gravity of the crimes or prospect of national investigations and prosecutions preclude the need for the ICC to proceed ; (4) prudential considerations — determining whether an investigation would serve the “interests of justice.” It appears that the examination of U.S. detention operations has reached the third phase and crossed over the important threshold of a finding that there is a reasonable basis to believe U.S. forces committed war crimes within the jurisdiction of the Court. Heller posited that some aspects of the Prosecutor’s Afghanistan examination had already reached this stage in 2013. The 2014 report provides further corroboration specifically with respect to U.S. detention practices. For example, paragraph 96 of the 2014 report states that the Office of the Prosecutor is now “analysing the relevance and genuineness of national proceedings by the competent national authorities for the alleged conduct described above as well as the gravity of the alleged crimes”—clearly a phase three inquiry. That said, paragraph 96 also states that the Office is “continuing to assess the seriousness and reliability of such allegations”—which sounds like phase two and even phase one.
  • 95. Certain of the enhanced interrogation techniques apparently approved by US senior commanders in Afghanistan in the period from February 2003 through June 2004, could, depending on the severity and duration of their use, amount to cruel treatment, torture or outrages upon personal dignity as defined under international jurisprudence. In addition, there is information available that interrogators allegedly committed abuses that were outside the scope of any approved techniques, such as severe beating, especially beating on the soles of the feet, suspension by the wrists, and threats to shoot or kill. 96. While continuing to assess the seriousness and reliability of such allegations, the Office is analysing the relevance and genuineness of national proceedings by the competent national authorities for the alleged conduct described above as well as the gravity of the alleged crimes.
  • The OTP is considering whether the war crimes of cruel treatment, torture or outrages upon personal dignity were committed by U.S. forces. Article 8 of the ICC statute places something of a qualification on the jurisdiction of the Court over war crimes. It states that the Court shall have jurisdiction over war crimes “in particular when committed as part of a plan or policy or as part of a large-scale commission of such crimes.” In 2013, the Prosecutor’s annual report stated that the Office “continues to seek information to determine whether there is any reasonable basis to believe any such alleged acts, which could amount to torture or humiliating and degrading treatment, may have been committed as part of a policy.” That reference to the “as a part of policy” qualification does not appear in the 2014 report. And, on the contrary, the 2014 report highlights elements that indicate the existence of a policy such as the Presidential Directive of 7 February 2002 on the determination of POW status and the senior US commanders’ approval of interrogation techniques.
  • Will bilateral agreements between the US and Afghanistan preclude the ICC from investigating or prosecuting “U.S. persons”? One final question that might arise from these proceedings is the legal viability of the bilateral agreement between the United States and Afghanistan regarding the surrender of persons to the International Criminal Court (full text).  Since the case arises out of Afghanistan’s status under the ICC treaty, the United States might try to claim that the bilateral agreement provides US nationals and employees immunity for actions that took place in Afghanistan. I have briefly discussed the legal viability of such article 98 agreements in an  earlier post at Just Security.
Paul Merrell

There Are Several Thousand Secret Photos of America's Horrific Torture Program. Should Obama Release Them? | Mother Jones - 0 views

  • You may recall, from the dark days of Abu Ghraib, that there was a batch of photos that was never released—images the Pentagon deemed so inflammatory that they needed to stay under wraps. The ones we saw were disturbing enough: the piles of naked Iraqi prisoners, the soldier giving a thumbs up next to an ice-packed corpse, the prisoners being menaced by dogs. And who can forget that iconic shot of a hooded man (his name is Ali Shalil Qaissi), standing on a box in a shower with wires attached to his fingers—a mock execution. There are as many as 2,100 additional images, according to the ACLU, which sued the government in 2004 demanding their release. President Obama has resisted the legal efforts, noting in a statement that to make the photos public would "impact the safety of our troops." Newsweek's Lauren Walker nicely summarizes the developments so far, some of which my colleague Nick Baumann has also covered, so here's the upshot: In August, a federal judge gave the administration an ultimatum: either release the photos or provide evidence for each image explaining why publishing it would be detrimental to national security. On December 19, the administration indicated that it would take the latter course, and a hearing on the new evidence has been set for January 20.
  • Because the concealed images, the ACLU told Newsweek, aren't simply more examples of abuse: "One of the reasons we’ve been fighting for so long for these photographs is because the official narrative following the disclosure of the Abu Ghraib photos was that those abuses were the result of a few bad apples," says Alex Abdo, an ACLU staff attorney working on the case since 2005. "These photographs come from at least seven different detention facilities throughout Afghanistan and Iraq.... We think this would once and for all end the myth that the abuse that took place at Abu Ghraib was an aberration," he says. "It was essentially official policy. It was widespread at different facilities under different commanders."
  • Consider this exchange between Stanford psychologist Phil Zimbardo and former Staff Sgt. Ivan "Chip" Frederick, who got an eight-year prison sentence for his role in the Abu Ghraib horrorshow. (He was the guy who staged the mock execution.) The interview is from Zimbardo's 2007 book, The Lucifer Effect, which is about how good people placed in bad situations end up doing abhorrent things.
Paul Merrell

The Sound of Torture - The Intercept - 0 views

  • Suddenly there was a chilling scream. “Allah,” someone wailed. “Allah! Allah!” As I wrote at the time, this wasn’t a cry of religious ecstasy. It was the sound of deep pain, coming from elsewhere in the town library, which had been turned into a detention center by Iraqi security forces who were advised by American soldiers and contractors. I was embedded with the Americans for a week, and I had already heard two of them, from the Wisconsin National Guard, talk about seeing their Iraqi partners trussing up prisoners like animals at a slaughter. During raids, I had seen these Iraqis beat their detainees — muggings as a form of questioning — while their American advisers watched.
  • The CIA’s violations of its detainees are the tip of the torture iceberg. We run the risk, in the necessary debate sparked by the Senate’s release of 500 pages on CIA interrogation abuses, of focusing too narrowly on what happened to 119 detainees held at the agency’s black sites from 2002-2006. The problem of American torture — how much occurred, what impact it had, who bears responsibility — is much larger. Across Iraq and Afghanistan, American soldiers and the indigenous forces they fought alongside committed a large number of abuses against a considerable number of people. It didn’t begin at Abu Ghraib and it didn’t end there. The evidence, which has emerged in a drip-drip way over the years, is abundant though less dramatic than the aforementioned 500-page executive summary of the Senate’s still-classified report on the CIA.
  • Just as the CIA opposed release of the Senate torture report, the Pentagon and White House continue to do their best to suppress the evidence. The Daily Beast noted the other day that the Obama Administration, responding to pressure from the Pentagon, continues to fight in court to prevent the publication of thousands of photos of detainee abuse. The argument against release is nearly identical to the argument used by the CIA to repress the Senate’s report—it could put American lives in danger. To her credit, Sen. Dianne Feinstein pushed back and published an executive summary of her committee’s 6,000-page report (which has caused practically no protest or violence overseas). Repression is the gut instinct of institutions that have something to hide, and I came across that in Samarra, too. Shortly after I witnessed the threatened execution of a detainee (an Iraqi soldier pointed his AK-47 at a prisoner who was against a wall with his hands up), an order came down from the American command to get me out of Samarra. I was told to pack my backpack for the next convoy out of town. After I made a flurry of calls on my satellite phone, the order was rescinded. Someone wanted the truth to come out.
  • ...2 more annotations...
  • Here’s a partial reading list of essential reporting on torture in Iraq and Afghanistan: Senate Report on Abuses of Military Detainees (2008): http://media.washingtonpost.com/wp-srv/nation/pdf/12112008_detaineeabuse.pdf Haditha Killings by Tim McGirk: http://content.time.com/time/world/article/0,8599,1174649,00.html Taguba Report on Abuses at Abu Ghraib: https://www.aclu.org/sites/default/files/torturefoia/released/TR3.pdf Abu Ghraib Abuses by Seymour Hersh: http://www.newyorker.com/magazine/2004/05/10/torture-at-abu-ghraib Special Forces in Afghanistan by Matt Aikens: http://www.rollingstone.com/feature/a-team-killings-afghanistan-special-forces Constitution Project’s Task Force on Detainee Treament (See especially chapter 3): http://detaineetaskforce.org/report/ “The Dark Side” by Jane Mayer: http://www.amazon.com/The-Dark-Side-Inside-American/dp/0307456293
  • “None of Us Were Like This Before” by Joshua Phillips: http://www.amazon.com/None-Were-Like-This-Before/dp/1844678849 The Killing of Dilawar by Carlotta Gall: http://www.nytimes.com/2003/03/04/international/asia/04AFGH.html “Pay Any Price” by James Risen (See especially Chapter 7): http://www.barnesandnoble.com/w/pay-any-price-james-risen/1117916812?ean=9780544341418 “Dirty Wars” by Jeremy Scahill (a founder of The Intercept): http://www.amazon.com/Dirty-Wars-The-World-Battlefield/dp/156858671X “How to Break a Terrorist” by Matthew Alexander: http://www.amazon.com/How-Break-Terrorist-Interrogators-Brutality/dp/B0085S1S5K “The Black Banners” by Ali Soufan: http://www.amazon.com/Black-Banners-Inside-Against-al-Qaeda/dp/0393079422 “Kandahar’s Mystery Executions” by Anand Gopal: http://harpers.org/archive/2014/09/kandahars-mystery-executions/ “No Good Men Among the Living” by Anand Gopal: http://www.amazon.com/No-Good-Men-Among-Living/dp/0805091793
‹ Previous 21 - 40 of 138 Next › Last »
Showing 20 items per page