Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "capabilities" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Washington's B-52 Diplomacy : US flyover in China-Japan island row: Tokyo's position on the issue really doesn't hold water - 0 views

  • Washington’s move to fly nuclear-capable bombers over China’s eastern air defense zone as a forceful endorsement of Japan’s claims over disputed islands is both needlessly confrontational and totally counterproductive. The territorial dispute over an uninhabited chain of islands in the East China Sea – referred to as the Senkaku Islands by Japan and the Diaoyu Islands by China – has been a highly contentious issue in Sino-Japanese relations for decades, and the issue has resurfaced in recent times as both sides assert their sovereignty over the area. 
  • See also - China sends war planes to newly declared air zone: China has said all planes transiting the zone must file flight plans and identify themselves, or face "defensive emergency measures". China deploys only aircraft carrier after US sends B-52s over disputed islands: China has deployed its one and only aircraft carrier after two unarmed American B-52 bombers flew over a disputed island chain and through what China insists is restricted airspace. US cautions airlines crossing China air zone: Commercial flights advised to take safety measures when flying over East China Sea as China-Japan row persists. Senkaku islands row reflects broader tensions between China and Japan: Op-Ed: Experts say chances of head-on collision between the world's second and third biggest economies are growing
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radicalizers' - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

Exclusive: Inside America's Plan to Kill Online Privacy Rights Everywhere | The Cable - 0 views

  • The United States and its key intelligence allies are quietly working behind the scenes to kneecap a mounting movement in the United Nations to promote a universal human right to online privacy, according to diplomatic sources and an internal American government document obtained by The Cable. The diplomatic battle is playing out in an obscure U.N. General Assembly committee that is considering a proposal by Brazil and Germany to place constraints on unchecked internet surveillance by the National Security Agency and other foreign intelligence services. American representatives have made it clear that they won't tolerate such checks on their global surveillance network. The stakes are high, particularly in Washington -- which is seeking to contain an international backlash against NSA spying -- and in Brasilia, where Brazilian President Dilma Roussef is personally involved in monitoring the U.N. negotiations.
  • The Brazilian and German initiative seeks to apply the right to privacy, which is enshrined in the International Covenant on Civil and Political Rights (ICCPR), to online communications. Their proposal, first revealed by The Cable, affirms a "right to privacy that is not to be subjected to arbitrary or unlawful interference with their privacy, family, home, or correspondence." It notes that while public safety may "justify the gathering and protection of certain sensitive information," nations "must ensure full compliance" with international human rights laws. A final version the text is scheduled to be presented to U.N. members on Wednesday evening and the resolution is expected to be adopted next week. A draft of the resolution, which was obtained by The Cable, calls on states to "to respect and protect the right to privacy," asserting that the "same rights that people have offline must also be protected online, including the right to privacy." It also requests the U.N. high commissioner for human rights, Navi Pillay, present the U.N. General Assembly next year with a report on the protection and promotion of the right to privacy, a provision that will ensure the issue remains on the front burner.
  • Publicly, U.S. representatives say they're open to an affirmation of privacy rights. "The United States takes very seriously our international legal obligations, including those under the International Covenant on Civil and Political Rights," Kurtis Cooper, a spokesman for the U.S. mission to the United Nations, said in an email. "We have been actively and constructively negotiating to ensure that the resolution promotes human rights and is consistent with those obligations." But privately, American diplomats are pushing hard to kill a provision of the Brazilian and German draft which states that "extraterritorial surveillance" and mass interception of communications, personal information, and metadata may constitute a violation of human rights. The United States and its allies, according to diplomats, outside observers, and documents, contend that the Covenant on Civil and Political Rights does not apply to foreign espionage.
  • ...6 more annotations...
  • n recent days, the United States circulated to its allies a confidential paper highlighting American objectives in the negotiations, "Right to Privacy in the Digital Age -- U.S. Redlines." It calls for changing the Brazilian and German text so "that references to privacy rights are referring explicitly to States' obligations under ICCPR and remove suggestion that such obligations apply extraterritorially." In other words: America wants to make sure it preserves the right to spy overseas. The U.S. paper also calls on governments to promote amendments that would weaken Brazil's and Germany's contention that some "highly intrusive" acts of online espionage may constitute a violation of freedom of expression. Instead, the United States wants to limit the focus to illegal surveillance -- which the American government claims it never, ever does. Collecting information on tens of millions of people around the world is perfectly acceptable, the Obama administration has repeatedly said. It's authorized by U.S. statute, overseen by Congress, and approved by American courts.
  • "Recall that the USG's [U.S. government's] collection activities that have been disclosed are lawful collections done in a manner protective of privacy rights," the paper states. "So a paragraph expressing concern about illegal surveillance is one with which we would agree." The privacy resolution, like most General Assembly decisions, is neither legally binding nor enforceable by any international court. But international lawyers say it is important because it creates the basis for an international consensus -- referred to as "soft law" -- that over time will make it harder and harder for the United States to argue that its mass collection of foreigners' data is lawful and in conformity with human rights norms. "They want to be able to say ‘we haven't broken the law, we're not breaking the law, and we won't break the law,'" said Dinah PoKempner, the general counsel for Human Rights Watch, who has been tracking the negotiations. The United States, she added, wants to be able to maintain that "we have the freedom to scoop up anything we want through the massive surveillance of foreigners because we have no legal obligations."
  • The United States negotiators have been pressing their case behind the scenes, raising concerns that the assertion of extraterritorial human rights could constrain America's effort to go after international terrorists. But Washington has remained relatively muted about their concerns in the U.N. negotiating sessions. According to one diplomat, "the United States has been very much in the backseat," leaving it to its allies, Australia, Britain, and Canada, to take the lead. There is no extraterritorial obligation on states "to comply with human rights," explained one diplomat who supports the U.S. position. "The obligation is on states to uphold the human rights of citizens within their territory and areas of their jurisdictions."
  • The position, according to Jamil Dakwar, the director of the American Civil Liberties Union's Human Rights Program, has little international backing. The International Court of Justice, the U.N. Human Rights Committee, and the European Court have all asserted that states do have an obligation to comply with human rights laws beyond their own borders, he noted. "Governments do have obligation beyond their territories," said Dakwar, particularly in situations, like the Guantanamo Bay detention center, where the United States exercises "effective control" over the lives of the detainees. Both PoKempner and Dakwar suggested that courts may also judge that the U.S. dominance of the Internet places special legal obligations on it to ensure the protection of users' human rights.
  • "It's clear that when the United States is conducting surveillance, these decisions and operations start in the United States, the servers are at NSA headquarters, and the capabilities are mainly in the United States," he said. "To argue that they have no human rights obligations overseas is dangerous because it sends a message that there is void in terms of human rights protection outside countries territory. It's going back to the idea that you can create a legal black hole where there is no applicable law." There were signs emerging on Wednesday that America may have been making ground in pressing the Brazilians and Germans to back on one of its toughest provisions. In an effort to address the concerns of the U.S. and its allies, Brazil and Germany agreed to soften the language suggesting that mass surveillance may constitute a violation of human rights. Instead, it simply deep "concern at the negative impact" that extraterritorial surveillance "may have on the exercise of and enjoyment of human rights." The U.S., however, has not yet indicated it would support the revised proposal.
  • The concession "is regrettable. But it’s not the end of the battle by any means," said Human Rights Watch’s PoKempner. She added that there will soon be another opportunity to corral America's spies: a U.N. discussion on possible human rights violations as a result of extraterritorial surveillance will soon be taken up by the U.N. High commissioner.
  •  
    Woo-hoo! Go get'em, U.N.
Paul Merrell

Documents: FBI Spyware Has Been Snaring Extortionists, Hackers for Years | Threat Level | Wired.com - 0 views

  • A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, newly declassified documents show. As first reported by Wired.com, the software, called a "computer and internet protocol address verifier," or CIPAV, is designed to infiltrate a target’s computer and gather a wide range of information, which it secretly sends to an FBI server in eastern Virginia. The FBI’s use of the spyware surfaced in 2007 when the bureau used it to track e-mailed bomb threats against a Washington state high school to a 15-year-old student. But the documents released Thursday under the Freedom of Information Act show the FBI has quietly obtained court authorization to deploy the CIPAV in a wide variety of cases, ranging from major hacker investigations, to someone posing as an FBI agent online. Shortly after its launch, the program became so popular with federal law enforcement that Justice Department lawyers in Washington warned that overuse of the novel technique could result in its electronic evidence being thrown out of court in some cases. "While the technique is of indisputable value in certain kinds of cases, we are seeing indications that it is being used needlessly by some agencies, unnecessarily raising difficult legal questions (and a risk of suppression) without any countervailing benefit," reads a formerly-classified March 7, 2002 memo from the Justice Department’s Computer Crime and Intellectual Property Section.
  • The documents, which are heavily redacted, do not detail the CIPAV’s capabilities, but an FBI affidavit in the 2007 case indicate it gathers and reports a computer’s IP address; MAC address; open ports; a list of running programs; the operating system type, version and serial number; preferred internet browser and version; the computer’s registered owner and registered company name; the current logged-in user name and the last-visited URL. After sending the information to the FBI, the CIPAV settles into a silent "pen register" mode, in which it lurks on the target computer and monitors its internet use, logging the IP address of every server to which the machine connects. The documents shed some light on how the FBI sneaks the CIPAV onto a target’s machine, hinting that the bureau may be using one or more web browser vulnerabilities. In several of the cases outlined, the FBI hosted the CIPAV on a website, and tricked the target into clicking on a link. That’s what happened in the Washington case, according to a formerly-secret planning document for the 2007 operation. "The CIPAV will be deployed via a Uniform Resource Locator (URL) address posted to the subject’s private chat room on MySpace.com."
  • The software’s primary utility appears to be in tracking down suspects that use proxy servers or anonymizing websites to cover their tracks.
  • ...1 more annotation...
  • The documents appear to settle one of the questions the FBI declined to answer in 2007: whether the bureau obtains search warrants before using the CIPAV, or if it sometimes relies on weaker "pen register" orders that don’t require a showing of probable cause that a crime has been committed. In all the criminal cases described in the documents, the FBI sought search warrants. The records also indicate that the FBI obtained court orders from the Foreign Intelligence Surveillance Court, which covers foreign espionage and terrorism investigations, but the details are redacted. The FBI released 152 heavily-redacted pages in response to Threat Level’s FOIA request, and withheld another 623.
  •  
    The article summarizes many cases in which the CIPAV exploit was used by the FBI. But the article's closing observation that the released documents "whether the bureau obtains search warrants before using the CIPAV" stretches the evidence a bit too far, methinks. If they exist, the FBI very likely would not have produced records of incidents in which it used CIPAV without court authorization. 
Paul Merrell

Snowden document shows Canada set up spy posts for NSA - Politics - CBC News - 0 views

  • A top secret document retrieved by American whistleblower Edward Snowden reveals Canada has set up covert spying posts around the world and conducted espionage against trading partners at the request of the U.S. National Security Agency. The leaked NSA document being reported exclusively by CBC News reveals Canada is involved with the huge American intelligence agency in clandestine surveillance activities in “approximately 20 high-priority countries."
  • Sections of the document with the highest classification make it clear in some instances why American spymasters are particularly keen about enlisting their Canadian counterparts, the Communications Security Establishment Canada. "CSEC shares with the NSA their unique geographic access to areas unavailable to the U.S," the document says. The briefing paper describes a "close co-operative relationship" between the NSA and its Canadian counterpart, the Communications Security Establishment Canada, or CSEC — a relationship "both sides would like to see expanded and strengthened. "The intelligence exchange with CSEC covers worldwide national and transnational targets."
  • The briefing notes make it clear that Canada plays a very robust role in intelligence-gathering around the world in a way that has won respect from its American equivalents.
  • ...5 more annotations...
  • The intimate Canada-U.S. electronic intelligence relationship dates back more than 60 years. Most recently, another Snowden document reported by CBC News showed the two agencies co-operated to allow the NSA to spy on the G20 summit of international leaders in Toronto in 2010. But what the latest secret document reveals for the first time is just how expansive Canada's international espionage activities have become.
  • The NSA document depicts CSEC as a sophisticated, capable and highly respected intelligence partner involved in all manner of joint spying missions, including setting up listening posts at the request of the Americans. "CSEC offers resources for advanced collection, processing and analysis, and has opened covert sites at the request of NSA," the document states.
  • Aside from compromising the actual intelligence operation, Wark says, an exposed spy mission can imperil Canada's other diplomatic operations — "the political contacts, the trade contacts, the generation of goodwill between the countries and any sense of co-operation." Wark says if a country feels targeted by a Canadian embassy, it can put everyone working there under a cloud of suspicion: “Are they really diplomats or are they spies?” As a result of those risks, Wark says, approval for CSEC to establish a covert spying post at the request of the NSA would have to come from the ministerial level of the Canadian government — or even from the prime minister himself.
  • Canada and the U.S. have long shared security intelligence with sister agencies in the U.K., Australia and New Zealand – the so-called "Five Eyes" partnership. But the latest secret Snowden missive shows CSEC and the NSA becoming physically intertwined. "Co-operative efforts include the exchange of liaison officers and integrees," the document reveals, a reference to CSEC operatives working inside the NSA, and vice-versa. It notes the NSA also supplies much of the computer hardware and software CSEC uses for encryption, decoding and other state-of-the-art essentials of electronic spying needed for "collection, processing and analytic efforts."
  • CSEC employs about 2,000 people, has an annual budget of roughly $450 million and will soon move into an architecturally spectacular new Ottawa headquarters costing Canadian taxpayers almost $1.2 billion. By comparison, the NSA employs an estimated 40,000 people plus thousands of private contractors, and spends over $40 billion a year NSA whistleblower Drake says the problem is that both CSEC and the NSA lack proper oversight, and without it, they have morphed into runaway surveillance. "There is a clear and compelling danger to democracy in Canada by virtue of how far these secret surveillance operations have gone."
  •  
    "'Co-operative efforts include the exchange of liaison officers and integrees,'the document reveals, a reference to CSEC operatives working inside the NSA, and vice-versa." And that fact raises potential U.S. Privacy Act issues. Under the Privacy Act, all U.S. agencies are prohibited from sharing information containing personal identifiers of U.S. citizens with any foreign government and requires that agencies make full disclosure to all persons  whose rights are thus violated. The Act also creates a cause of action for redress by the federal courts, with a minimum $1,500 damages plus attorney's fees and litigation expenses. Note that the other NSA documents show that NSA is sharing U.S. citizens' information that includes personal identifiers with Israeli intelligence. The NSA has been by another statute excused from compliance with some portions of the Privacy Act but not those discussed above.
Paul Merrell

Zionism's Last Card and Hope For Palestine - Alan Hart - 0 views

  • Following the interim agreement with Iran the next six months will tell us whether or not the American-led Zionist lobby and Zionism itself has played its last card and lost. If it does lose President Obama will be free to use the leverage he has to try to cause Israel to be serious about peace on terms almost all Palestinians and most other Arabs and Muslims everywhere could accept (and which would not pose any threat to the wellbeing and security of those Jews now living in Palestine that became Israel and who wanted to stay). The stakes could not be higher. As I write I am recalling what former President Carter said to my wife and I when we met with him and Rosalyn, words I quote in my book Zionism: The Real Enemy of the Jews and which bear repeating. “Any American president has only two windows of opportunity to take on the Zionist lobby – in the first nine months of his first term and the last year of his second term if he has one.”
  • I am happy to go public with this positive speculation in part because of an article by Philip Weiss. In it he noted that Netanyahu has been playing the Iran threat card “to keep the world’s eyes off the West Bank and Jerusalem.” Then, commenting on Netanyahu’s statement that Israel will not allow Iran to attain nuclear capability, he wrote this. “The ardent supporters of the Jewish state in the U.S. have never been in a worse position. They are largely supportive of this deal (as are a majority of all Americans, I add). They will have to throw Netanyahu under the bus.” Not long ago the proclaimed view of some American supporters of Israel right or wrong was that Obama was throwing Israel under a bus. The idea that American Jews should now throw Netanyahu under it appeals to me, as I am sure it does to Obama. If Congress does back away from doing Zionism’s bidding to wreck the prospects for a new-start American and European accommodation with Iran, what options if any will Netanyahu’s Israel have to distract the world’s media and political attention from Zionism’s on-going colonization – ethnic cleansing slowly and by stealth – of the occupied West Bank? Only one that I can see. War.
  • Though events may prove me wrong, my overall speculation is that Zionism’s last card is not a winner and that Obama will succeed in getting, six months or so from now, what he wants – a new-start and mutually beneficial relationship with Iran. And defeat for the Zionist lobby will, as I indicated in my opening paragraph, free him to use the presidential leverage to try to oblige Israel to be serious about peace on terms the vast majority of Palestinians could accept.
  • ...3 more annotations...
  • In the context above what I am suggesting is that if and when he is free to put real pressure on Israel to be serious about peace with the Palestinians, Obama should make best use of the Kennedy quote – “What we want from Israel arises because our relationship is a two-way street”. And he could and should put flesh on that bone by saying, among other things, that it is not in America’s own best interests to allow Israel to go on denying the Palestinians an acceptable measure of justice. But his crunch point could and should be something like this. “What America wants and needs, in order to best protect its own interests in the Arab and wider Muslim world, is an end to Israel’s denial of an acceptable amount of justice for the Palestinians. Unless we get that, I as president will have no choice but to use the leverage at my disposal to press you.” Israelis would know, even if Obama didn’t spell it out, that the pressure would include an end to American vetoes of Security Council resolutions condemning Israel and sanctions. If Obama was to go public with such a position in the wake of defeat for the Zionist lobby over the Iran nuclear issue, I think it’s reasonable to assume that a big majority of Jewish Americans would signal, if only by their silence and/or refusal to condemn Obama, that their first loyalty was to America not Israel.
  • There is no certainty about how the Jews of Israel would respond, but there’s a good case for believing that because what most of them care most about is the relationship with America, a significant majority of them would say to Netanyahu and his coalition government something like: “Enough is enough. We insist that you make peace with the Palestinians on terms they can accept, even if that means a short, sharp civil war with those settlers who refuse to withdraw from the West Bank and be relocated and compensated.”
  • For those who might believe there is little or no prospect of a Jewish civil war in the event of President Obama insisting with leverage as necessary on Israel making peace with the Palestinians on terms they could accept, I recommend Chapter 12 of Volume Three of the American edition of my book. This chapter is titled The Blood Oath. It reveals that Sharon convened a secret meeting of many senior military officers to sign a blood oath committing them to make common cause with those settlers who would resist “to the death” the implementation of any government decision to withdraw from the West Bank. My named and quoted source for that dramatic story was none other than Ezer Weizman, Israel’s defense minister of the time. When Ezer told me of the secret meeting minutes after he learned about it, he asked me a question. Did I think Sharon would act in accordance with the blood oath he and others had signed? I said: “What I think is of no consequence. I’m a visiting goy. You’re Israel’s defense minister, what do you think?” He replied: “Of course, he would. He’s mad enough to nuke the entire fucking Arab world!“ The coming months will tell us how mad Netanyahu is. And also whether or not the optimism expressed in this post was justified.
  •  
    'Twould be nice if it worked out this way. But Obama is spineless so I won't hold my breath. 
Paul Merrell

Fukushima - A Global Threat That Requires a Global Response - 0 views

  • The story of Fukushima should be on the front pages of every newspaper. Instead, it is rarely mentioned. The problems at Fukushima are unprecedented in human experience and involve a high risk of radiation events larger than any that the global community has ever experienced. It is going to take the best engineering minds in the world to solve these problems and to diminish their global impact. When we researched the realities of Fukushima in preparation for this article, words like apocalyptic, cataclysmic and Earth-threatening came to mind. But, when we say such things, people react as if we were the little red hen screaming "the sky is falling" and the reports are ignored. So, we’re going to present what is known in this article and you can decide whether we are facing a potentially cataclysmic event.
  • There are three major problems at Fukushima: (1) Three reactor cores are missing; (2) Radiated water has been leaking from the plant in mass quantities for 2.5 years; and (3) Eleven thousand spent nuclear fuel rods, perhaps the most dangerous things ever created by humans, are stored at the plant and need to be removed, 1,533 of those are in a very precarious and dangerous position. Each of these three could result in dramatic radiation events, unlike any radiation exposure humans have ever experienced.  We’ll discuss them in order, saving the most dangerous for last.
  • Missing reactor cores:  Since the accident at Fukushima on March 11, 2011, three reactor cores have gone missing.  There was an unprecedented three reactor ‘melt-down.’ These melted cores, called corium lavas, are thought to have passed through the basements of reactor buildings 1, 2 and 3, and to be somewhere in the ground underneath.  Harvey Wasserman, who has been working on nuclear energy issues for over 40 years, tells us that during those four decades no one ever talked about the possibility of a multiple meltdown, but that is what occurred at Fukushima.  It is an unprecedented situation to not know where these cores are. TEPCO is pouring water where they think the cores are, but they are not sure. There are occasional steam eruptions coming from the grounds of the reactors, so the cores are thought to still be hot. The concern is that the corium lavas will enter or may have already entered the aquifer below the plant. That would contaminate a much larger area with radioactive elements. Some suggest that it would require the area surrounding Tokyo, 40 million people, to be evacuated. Another concern is that if the corium lavas enter the aquifer, they could create a "super-heated pressurized steam reaction beneath a layer of caprock causing a major 'hydrovolcanic' explosion." A further concern is that a large reserve of groundwater which is coming in contact with the corium lavas is migrating towards the ocean at the rate of four meters per month. This could release greater amounts of radiation than were released in the early days of the disaster.
  • ...15 more annotations...
  • Radioactive water leaking into the Pacific Ocean:  TEPCO did not admit that leaks of radioactive water were occurring until July of this year. Shunichi Tanaka the head of Japan’s Nuclear Regulation Authority finally told reporters this July that radioactive water has been leaking into the Pacific Ocean since the disaster hit over two years ago. This is the largest single contribution of radionuclides to the marine environment ever observed according to a report by the French Institute for Radiological Protection and Nuclear Safety.  The Japanese government finally admitted that the situation was urgent this September – an emergency they did not acknowledge until 2.5 years after the water problem began. How much radioactive water is leaking into the ocean? An estimated 300 tons (71,895 gallons/272,152 liters) of contaminated water is flowing into the ocean every day.  The first radioactive ocean plume released by the Fukushima nuclear power plant disaster will take three years to reach the shores of the United States.  This means, according to a new study from the University of New South Wales, the United States will experience the first radioactive water coming to its shores sometime in early 2014.
  • One month after Fukushima, the FDA announced it was going to stop testing fish in the Pacific Ocean for radiation.  But, independent research is showing that every bluefin tuna tested in the waters off California has been contaminated with radiation that originated in Fukushima. Daniel Madigan, the marine ecologist who led the Stanford University study from May of 2012 was quoted in the Wall Street Journal saying, "The tuna packaged it up (the radiation) and brought it across the world’s largest ocean. We were definitely surprised to see it at all and even more surprised to see it in every one we measured." Marine biologist Nicholas Fisher of Stony Brook University in New York State, another member of the study group, said: "We found that absolutely every one of them had comparable concentrations of cesium 134 and cesium 137." In addition, Science reports that fish near Fukushima are being found to have high levels of the radioactive isotope, cesium-134. The levels found in these fish are not decreasing,  which indicates that radiation-polluted water continues to leak into the ocean. At least 42 fish species from the area around the plant are considered unsafe.  South Korea has banned Japanese fish as a result of the ongoing leaks.
  • Wasserman builds on the analogy, telling us it is "worse than pulling cigarettes out of a crumbled cigarette pack." It is likely they used salt water as a coolant out of desperation, which would cause corrosion because the rods were never meant to be in salt water.  The condition of the rods is unknown. There is debris in the coolant, so there has been some crumbling from somewhere. Gundersen  adds, "The roof has fallen in, which further distorted the racks," noting that if a fuel rod snaps, it will release radioactive gas which will require at a minimum evacuation of the plant. They will release those gases into the atmosphere and try again. The Japan Times writes: "The consequences could be far more severe than any nuclear accident the world has ever seen. If a fuel rod is dropped, breaks or becomes entangled while being removed, possible worst case scenarios include a big explosion, a meltdown in the pool, or a large fire. Any of these situations could lead to massive releases of deadly radionuclides into the atmosphere, putting much of Japan — including Tokyo and Yokohama — and even neighboring countries at serious risk."  
  • The most recent news on the water problem at Fukushima adds to the concerns. On October 11, 2013, TEPCO disclosed that the radioactivity level spiked 6,500 times at a Fukushima well.  "TEPCO said the findings show that radioactive substances like strontium have reached the groundwater. High levels of tritium, which transfers much easier in water than strontium, had already been detected." Spent Fuel Rods:  As bad as the problems of radioactive water and missing cores are, the biggest problem at Fukushima comes from the spent fuel rods.  The plant has been in operation for 40 years. As a result, they are storing 11 thousand spent fuel rods on the grounds of the Fukushima plant. These fuel rods are composed of highly radioactive materials such as plutonium and uranium. They are about the width of a thumb and about 15 feet long. The biggest and most immediate challenge is the 1,533 spent fuel rods packed tightly in a pool four floors above Reactor 4.  Before the storm hit, those rods had been removed for routine maintenance of the reactor.  But, now they are stored 100 feet in the air in damaged racks.  They weigh a total of 400 tons and contain radiation equivalent to 14,000 times the amount released by the Hiroshima atomic bomb.
  • The building in which these rods are stored has been damaged. TEPCO reinforced it with a steel frame, but the building itself is buckling and sagging, vulnerable to collapse if another earthquake or storm hits the area. Additionally, the ground under and around the building is becoming saturated with water, which further undermines the integrity of the structure and could cause it to tilt. How dangerous are these fuel rods?  Harvey Wasserman explains that the fuel rods are clad in zirconium which can ignite if they lose coolant. They could also ignite or explode if rods break or hit each other. Wasserman reports that some say this could result in a fission explosion like an atomic bomb, others say that is not what would happen, but agree it would be "a reaction like we have never seen before, a nuclear fire releasing incredible amounts of radiation," says Wasserman. These are not the only spent fuel rods at the plant, they are just the most precarious.  There are 11,000 fuel rods scattered around the plant, 6,000 in a cooling pool less than 50 meters from the sagging Reactor 4.  If a fire erupts in the spent fuel pool at Reactor 4, it could ignite the rods in the cooling pool and lead to an even greater release of radiation. It could set off a chain reaction that could not be stopped.
  • What would happen? Wasserman reports that the plant would have to be evacuated.  The workers who are essential to preventing damage at the plant would leave, and we will have lost a critical safeguard.  In addition, the computers will not work because of the intense radiation. As a result we would be blind - the world would have to sit and wait to see what happened. You might have to not only evacuate Fukushima but all of the population in and around Tokyo, reports Wasserman.  There is no question that the 1,533 spent fuel rods need to be removed.  But Arnie Gundersen, a veteran nuclear engineer and director of Fairewinds Energy Education, who used to build fuel assemblies, told Reuters "They are going to have difficulty in removing a significant number of the rods." He described the problem in a radio interview: "If you think of a nuclear fuel rack as a pack of cigarettes, if you pull a cigarette straight up it will come out — but these racks have been distorted. Now when they go to pull the cigarette straight out, it’s going to likely break and release radioactive cesium and other gases, xenon and krypton, into the air. I suspect come November, December, January we’re going to hear that the building’s been evacuated, they’ve broke a fuel rod, the fuel rod is off-gassing."
  • As bad as the ongoing leakage of radioactive water is into the Pacific, that is not the largest part of the water problem.  The Asia-Pacific Journal reported last month that TEPCO has 330,000 tons of water stored in 1,000 above-ground tanks and an undetermined amount in underground storage tanks.  Every day, 400 tons of water comes to the site from the mountains, 300 tons of that is the source for the contaminated water leaking into the Pacific daily. It is not clear where the rest of this water goes.   Each day TEPCO injects 400 tons of water into the destroyed facilities to keep them cool; about half is recycled, and the rest goes into the above-ground tanks. They are constantly building new storage tanks for this radioactive water. The tanks being used for storage were put together rapidly and are already leaking. They expect to have 800,000 tons of radioactive water stored on the site by 2016.  Harvey Wasserman warns that these unstable tanks are at risk of rupture if there is another earthquake or storm that hits Fukushima. The Asia-Pacific Journal concludes: "So at present there is no real solution to the water problem."
  • This is not the usual moving of fuel rods.  TEPCO has been saying this is routine, but in fact it is unique – a feat of engineering never done before.  As Gundersen says: "Tokyo Electric is portraying this as easy. In a normal nuclear reactor, all of this is done with computers. Everything gets pulled perfectly vertically. Well nothing is vertical anymore, the fuel racks are distorted, it’s all going to have to be done manually. The net effect is it’s a really difficult job. It wouldn’t surprise me if they snapped some of the fuel and they can’t remove it." Gregory Jaczko, Former Chairman of the U.S. Nuclear Regulatory Commission concurs with Gundersen describing the removal of the spent fuel rods as "a very significant activity, and . . . very, very unprecedented." Wasserman sums the challenge up: "We are doing something never done before – bent, crumbling, brittle fuel rods being removed from a pool that is compromised, in a building that is sinking, sagging and buckling, and it all must done under manual control, not with computers."  And the potential damage from failure would affect hundreds of millions of people.
  • The first thing that is needed is to end the media blackout.  The global public needs to be informed about the issues the world faces from Fukushima.  The impacts of Fukushima could affect almost everyone on the planet, so we all have a stake in the outcome.  If the public is informed about this problem, the political will to resolve it will rapidly develop. The nuclear industry, which wants to continue to expand, fears Fukushima being widely discussed because it undermines their already weak economic potential.  But, the profits of the nuclear industry are of minor concern compared to the risks of the triple Fukushima challenges. 
  • The second thing that must be faced is the incompetence of TEPCO.  They are not capable of handling this triple complex crisis. TEPCO "is already Japan’s most distrusted firm" and has been exposed as "dangerously incompetent."  A poll found that 91 percent of the Japanese public wants the government to intervene at Fukushima. Tepco’s management of the stricken power plant has been described as a comedy of errors. The constant stream of mistakes has been made worse by constant false denials and efforts to minimize major problems. Indeed the entire Fukushima catastrophe could have been avoided: "Tepco at first blamed the accident on ‘an unforeseen massive tsunami’ triggered by the Great East Japan Earthquake on March 11, 2011. Then it admitted it had in fact foreseen just such a scenario but hadn’t done anything about it."
  • The reality is Fukushima was plagued by human error from the outset.  An official Japanese government investigation concluded that the Fukushima accident was a "man-made" disaster, caused by "collusion" between government and Tepco and bad reactor design. On this point, TEPCO is not alone, this is an industry-wide problem. Many US nuclear plants have serious problems, are being operated beyond their life span, have the same design problems and are near earthquake faults. Regulatory officials in both the US and Japan are too corruptly tied to the industry. Then, the meltdown itself was denied for months, with TEPCO claiming it had not been confirmed.  Japan Times reports that "in December 2011, the government announced that the plant had reached ‘a state of cold shutdown.’ Normally, that means radiation releases are under control and the temperature of its nuclear fuel is consistently below boiling point."  Unfortunately, the statement was false – the reactors continue to need water to keep them cool, the fuel rods need to be kept cool – there has been no cold shutdown.
  • TEPCO has done a terrible job of cleaning up the plant.  Japan Times describes some of the problems: "The plant is being run on makeshift equipment and breakdowns are endemic. Among nearly a dozen serious problems since April this year there have been successive power outages, leaks of highly radioactive water from underground water pools — and a rat that chewed enough wires to short-circuit a switchboard, causing a power outage that interrupted cooling for nearly 30 hours. Later, the cooling system for a fuel-storage pool had to be switched off for safety checks when two dead rats were found in a transformer box."  TEPCO has been constantly cutting financial corners and not spending enough to solve the challenges of the Fukushima disaster resulting in shoddy practices that cause environmental damage. Washington’s Blog reports that the Japanese government is spreading radioactivity throughout Japan – and other countries – by burning radioactive waste in incinerators not built to handle such toxic substances. Workers have expressed concerns and even apologized for following order regarding the ‘clean-up.’
  • Indeed, the workers are another serious concern. The Guardian reported in October 2013 the plummeting morale of workers, problems of alcohol abuse, anxiety, loneliness, Post-Traumatic Stress Disorder and depression. TEPCO cut the pay of its workers by 20 percent in 2011 to save money even though these workers are doing very difficult work and face constant problems. Outside of work, many were traumatized by being forced to evacuate their homes after the Tsunami; and they have no idea how exposed to radiation they have been and what health consequences they will suffer. Contractors are hired based on the lowest bid, resulting in low wages for workers. According to the Guardian, Japan's top nuclear regulator, Shunichi Tanaka, told reporters: "Mistakes are often linked to morale. People usually don't make silly, careless mistakes when they're motivated and working in a positive environment. The lack of it, I think, may be related to the recent problems." The history of TEPCO shows we cannot trust this company and its mistreated workforce to handle the complex challenges faced at Fukushima. The crisis at Fukushima is a global one, requiring a global solution.
  • In an open letter to the United Nations, 16 top nuclear experts urged the government of Japan to transfer responsibility for the Fukushima reactor site to a worldwide engineering group overseen by a civil society panel and an international group of nuclear experts independent from TEPCO and the International Atomic Energy Administration , IAEA. They urge that the stabilization, clean-up and de-commissioning of the plant be well-funded. They make this request with "urgency" because the situation at the Fukushima plant is "progressively deteriorating, not stabilizing." 
  • The problems at Fukushima are in large part about facing reality – seeing the challenges, risks and potential harms from the incident. It is about TEPCO and Japan facing the reality that they are not equipped to handle the challenges of Fukushima and need the world to join the effort. 
  •  
    Excellent roundup of evidence that the Fukushima disaster recovery process has gone badly awry and is devolving quickly to looming further disasters. Political momentum is gathering to wrest the recovery efforts away from the Japanese government and to place its leadership in the hands of an international group of experts. The disaster was far worse than its portrayal in mainstream media, is continuing, and even worse secondary disasters now loom. 
Paul Merrell

Partnership between Facebook and police could make planning protests impossible - RT USA - 0 views

  • A partnership between police departments and social media sites discussed at a convention in Philadelphia this week could allow law enforcement to keep anything deemed criminal off the Internet—and even stop people from organizing protests. A high-ranking official from the Chicago Police Department told attendees at a law enforcement conference on Monday that his agency has been working with a security chief at Facebook to block certain users from the site “if it is determined they have posted what is deemed criminal content,” reports Kenneth Lipp, an independent journalist who attended the lecture. Lipp reported throughout the week from the International Association of Chiefs of Police conference, and now says that a speaker during one of the presentations suggested that a relationship exists between law enforcement and social media that that could be considered a form of censorship. According to Lipp, the unnamed CPD officer said specifically that his agency was working with Facebook to block users’ by their individual account, IP address or device, such as a cell phone or computer.
  •  
    Here's a First Amendment conspiracy civil rights case waiting to happen. Prior restraints on speech are a very big constitutional no-no. When private actors such as Facebook staff conspire with government officials to violate federal rights, they are just as susceptible to a civil rights lawsuit as the government officials are. Query, does Mark Zuckerberg now know how to hire and effectively use competent lawyers? 
Paul Merrell

The Day - U.S. alerts foreign services about Snowden documents | News from southeastern Connecticut - 0 views

  • U.S. officials are alerting some foreign intelligence services that documents detailing their secret cooperation with the United States have been obtained by former National Security Agency contractor Edward Snowden, according to government officials.Snowden, U.S. officials said, took tens of thousands of documents, some of which contain sensitive material about collection programs against adversaries such as Iran, Russia and China. Some refer to operations that in some cases involve countries not publicly allied with the United States.The process of informing officials in capital after capital about the risk of disclosure is delicate. In some cases, one part of the cooperating government may know about the collaboration while others may not, the officials said. The documents, if disclosed, could compromise operations, officials said.
  • The Office of the Director of National Intelligence is handling the job of informing the other intelligence services, the officials said. ODNI declined to comment.
  • Snowden lifted the documents from a top secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines, according to sources, who spoke on the condition of anonymity to discuss sensitive matters.Snowden took 30,000 documents that involve the intelligence work of one of the services, the official said. He gained access to the documents through the Joint Worldwide Intelligence Communications System, or JWICS, for top secret/sensitive compartmented information, the sources said.The material in question does not deal with NSA surveillance but primarily with standard intelligence about other countries' military capabilities, including weapons systems-missiles, ships and jets, the officials say.
  • ...1 more annotation...
  • Nonetheless, the military intelligence agencies remain fearful, officials said. The NSA in recent months has provided them with an accounting of the documents it believes Snowden obtained.Intelligence officials said they could discern no pattern to the military intelligence documents taken and said Snowden appeared to harvest them at random. "It didn't seem like he was targeting something specific," the U.S. official said.
  •  
    A bit of comedy here. Our spy agencies will warn collaborating nations but when it comes to Congress or the American public, no warning. 
Paul Merrell

IPS - U.N. Will Censure Illegal Spying, But Not U.S. | Inter Press Service - 0 views

  • When the 193-member General Assembly adopts a resolution next month censuring the illegal electronic surveillance of governments and world leaders by the U.S. National Security Agency (NSA), the U.N.’s highest policy-making body will spare the United States from public condemnation despite its culpability in widespread wiretapping. A draft resolution currently in limited circulation – a copy of which was obtained by IPS – criticises “the conduct of extra-territorial surveillance” and the “interception of communications in foreign jurisdictions”. But it refuses to single out the NSA or the United States, which stands accused of spying on foreign governments, including political leaders in Germany, France, Brazil, Spain and Mexico, among some 30 others.
  • The draft says that while the gathering and protection of certain sensitive information may be justified on grounds of national security and criminal activity, member states must still ensure full compliance with international human rights. The resolution will also emphasise “that illegal surveillance of private communications and the indiscriminate interception of personal data of citizens constitutes a highly intrusive act that violates the rights to freedom of expression and privacy, and threatens the foundations of a democratic society.” Additionally, it will call for the establishment of independent oversight mechanisms capable of ensuring transparency and accountability of state surveillance of communications. And the resolution will request the U.N. High Commissioner for Human Rights, Navi PIllay, to present an interim report on the issue of human rights and “indiscriminate surveillance, including on extra-territorial surveillance.” This report is to be presented to the 69th session of the General Assembly next September, and a final report to its 70th session in 2015.
  • Chakravarthi Raghavan, a veteran Indian journalist who has been reporting on the U.N. and its activities since the 1960s, both in New York and later in Geneva, told IPS the resolution may help start a process under which the national security interests of every state, international security and right to privacy and human rights of people can be discussed and a balance found in some universal forum. “Otherwise, the U.N. world order will break down, and no one will benefit or emerge unscathed,” he said. Much will depend on the follow-up action that the General Assembly resolution calls for, and with what tenacity members pursue it. “Frankly, I am not at all clear that some of the nations raising the issue now are really serious,” said Raghavan, editor-emeritus of the Geneva-based South-North Development Monitor SUNS. “If they were, any one of them in Europe would have granted asylum to Edward Snowden, and not play footsie with U.S. in its attempts to have him jailed in the U.S. on espionage charges.” The revelations of U.S. spying have come mostly from documents released by Snowden, a former NSA contractor, who sought political asylum in Russia after he was accused of espionage by the United States.
  • ...2 more annotations...
  • One Third World diplomat, speaking on condition of anonymity, told IPS the draft could undergo changes by the time it reaches the General Assembly mid-November. But he held out little hope the final resolution will specifically castigate the United States because of the political clout it wields at the United Nations, and Washington’s notoriety for exerting diplomatic pressure on its allies and aid recipients. Besides which, he said, everybody plays the spying game, including the French, the Germans, the Chinese and the Russians — and therefore none of them can afford to take a “holier than thou” attitude. Still, as the New York Times put it last week, “One thing is clear: the NSA’s Cold War-era argument, that everyone does it, seems unlikely to win the day.”
  • There has been a longstanding tradition that the “Five Eyes” do not spy on each other, the five being the United States, Britain, Canada, Australia and New Zealand. But the surveillance of European political leaders has triggered a strong rejoinder from the 28-member European Union (EU). Raghavan told IPS that even if other countries are not publicly feuding with the U.S. over this — and perhaps their own security apparatuses are secretly collaborating in this global “surveillance state” — the NSA activities at a minimum raise several systemic issues involving basic violations. These include violations of the U.N. Charter; “unauthorised” and blatantly illegal invasions and/or intrusions into national space; World Trade Organisation (WTO) agreements, in particular the Trade-Related Intellectual Property Rights (TRIPS) Agreement and the General Agreement on Trade in Services (GATS); the International Telecommunication Union Treaty and Conventions; treaties and protocols of the World Intellectual Property Organisation (WIPO); the Universal Human Rights Declaration and conventions; and the Vienna diplomatic conventions and codes of behaviour among civilised nations. “All these strike at the roots of the very basics of international law and international public law,” he said.
  •  
    So if Raghavan is correct, a new treaty will emerge from the debacle that limits but does not end foreign surveillance. And if so, I predict that it will have no enforcement provisions and absolutely no citizen remedies for rights violated. The farther we go down the NSA rabbit hole, the more convinced I am that it is a stark choice between having spy agencies equipped for digital surveillance and Internet Freedom.  Internet Freedom seems far better equipped to produce world peace through understanding than spy agencies who deliver their "intelligence" to only the favored few. 
Paul Merrell

The U.S. Has REPEATEDLY Defaulted | Washington's Blog - 2 views

  • It’s a Myth that the U.S. Has Never Defaulted On Its Debt Some people argue that countries can’t default.  But that’s false. It is widely stated that the U.S. government has never defaulted.  However, that is also a myth.
  •  
    Excellent article Paul! But it left me in tears. The bastardos are destroying the currency. Quick Count of The U.S. defaulting on its debt obligations: ... Continental Currency in 1779 ... Domestic debt between 1782 through 1790 ... Greenbacks in 1862 ... Liberty Bonds in 1934 ... 1933 Dollar to GOLD devaluation (1/35 th per ounce) ... 1971 Nixon ends GOLD backing of dollar, violating the terms of the Bretton Woods Agreement ... 1979 Treasury defaults, refusing to redeem maturing treasury bonds The only thing keeping the American Economy going is the massive rush to convert the fiat currency the Federal Reserve is churning out into hard assets; like land and corporate stock. In 2008 the Federal Reserve Bankster Cartel pumped $29 Trillion into the world banking system. They continue to pump $85 Billion per month into Bankster financial markets, buying up bad mortgage paper and backstopping the many insured derivatives scams now unwinding. The Banksters were bust in 2008, but are now flush with more dollars than anyone knows what to do with. Instead of "loaning" this money out, and investing in traditional business productivity, they use the freshly minted dollars to purchase hard assets. Business loans would provide profit based on interest - a gambit that requires confidence in the value of the dollar since the dollar is the measure of the economic reward. The purchase of hard assets is different. The "value" is not in the profitability of the investment, as measured in fiat currency. The value is in hard asset and any future economic power that asset holds through the expected currency crash. The only mystery here is that of military might. How do the banksters and global elites protect their assets in the future collapse they have made certain? Oh wait - private security companies capable of waging war. It's no accident that the early geopolitical energy wars of the 21st century saw a massive buildup of private corporate military and i
Paul Merrell

Asia Times Online :: US neo-cons despair over Iran diplomacy - 0 views

  • Last week began with a blistering denunciation by Israeli Prime Minister Benjamin Netanyahu of Iranian duplicity and ended with diminished prospects for Israel to take direct action to address Iran's nuclear capabilities ."The Israelis find themselves in a far worse position now than they have been for several years," concluded Elliott Abrams, a leading neo-conservative who served as George W Bush's main Middle East adviser, in Foreign Affairs. While Israel could still attack Iran's nuclear sites on its own, "[i]ts ability to do so is already being narrowed considerably by the diplomatic thaw" between Iran and the United States, Abrams wrote. "It is one thing to bomb Iran when it appears hopelessly <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> recalcitrant and isolated and quite another to bomb it when much of the world - especially the United States - is optimistic about the prospects of talks." Abrams' assessment was widely shared among his ideological comrades who believe Israel will be the big loser if hopes for detente between Washington and Tehran gather steam after next week's meeting in Geneva between Iran and the P5+1 (the United States, Britain, France, Russia and China plus Germany).
  • Gary Sick, an Iran expert who served on the National Security Council under presidents Ford, Carter and Reagan, told IPS that neo-conservatives' recent outpouring of defiance and despair constituted "the most convincing evidence I have seen to date that the die-hard supporters of sabotaging an agreement between the US and Iran are in full defensive mode".
  • A week before Iranian Foreign Minister Javad Zarif is expected to sit down with his P5+1 interlocutors in Geneva, Netanyahu and supporters in Washington face a diplomatic and political environment distinctly different from that of just five weeks ago. That environment is defined above all by a pervasive war-weariness among the US electorate, clearly indicated by strong public support for Obama's choice of diplomacy over missile strikes to dismantle Syria's chemical weapons arsenal.
  • ...1 more annotation...
  • According to Ignatius, Washington's engagement with Russia over Syria and Iran over its nuclear program presents a "great strategic opportunity" which critics are wrong to see as "signs of American weakness or even capitulation". "The United States will be stronger if it can create a new framework for security in the Middle East that involves Iran and defuses the Sunni-Shiite sectarian conflict threatening the region," and that "accommodates the security needs of Iranians, Saudis, Israelis, Russians and Americans." But such accommodation is anathema to Netanyahu and his neo-conservative supporters, who insist on Israeli primacy in the Middle East and depict its competition with Iran as a zero-sum proposition that cannot be compromised.
  •  
    Nice to see the NeoCons and Zionists on the defensive for a change. 
Paul Merrell

Scientist-developed malware prototype covertly jumps air gaps using inaudible sound | Ars Technica - 0 views

  • Computer scientists have proposed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection. The proof-of-concept software—or malicious trojans that adopt the same high-frequency communication methods—could prove especially adept in penetrating highly sensitive environments that routinely place an "air gap" between computers and the outside world. Using nothing more than the built-in microphones and speakers of standard computers, the researchers were able to transmit passwords and other small amounts of data from distances of almost 65 feet. The software can transfer data at much greater distances by employing an acoustical mesh network made up of attacker-controlled devices that repeat the audio signals. The researchers, from Germany's Fraunhofer Institute for Communication, Information Processing, and Ergonomics, recently disclosed their findings in a paper published in the Journal of Communications. It came a few weeks after a security researcher said his computers were infected with a mysterious piece of malware that used high-frequency transmissions to jump air gaps. The new research neither confirms nor disproves Dragos Ruiu's claims of the so-called badBIOS infections, but it does show that high-frequency networking is easily within the grasp of today's malware.
  •  
    Not event the Sneaker Net is secure. Note to self: surgically remove all microphones and video cams from all systems (just the laptop, I think, but check). 
Paul Merrell

Nuke option necessary in case of massive cyberwar, report concludes - Stripes - Independent U.S. military news from Iraq, Afghanistan and bases worldwide - 0 views

  • The United States should be prepared to use every military option, including nuclear retaliation, in response to a huge computer attack, an independent Department of Defense task force said. But the nation must determine whether its nuclear arsenal can withstand computer hackers, the Defense Science Board warns in a newly declassified report obtained by the Tribune-Review. In a full-scale cyber war, the board's experts say, the United States' weapons could be disabled or turned against its troops. "It would have to be extreme," Paul Kaminski, chair of the Science Board and a member of the President's Intelligence Advisory Board, said about the kind of attack that might trigger a nuclear response. "It would have to be the kind of attack that we would judge would be threatening our survival." The United States must assume that computer attacks will be part of conflicts, said the report from the task force made up of civilian experts with government advisers. Yet, the report said the country cannot be confident that its military's computer systems would still work under attack from a sophisticated adversary nation with a full range of military and intelligence options.
  • Some steps to increase computer defenses could be done "relatively inexpensively," said Brian Hughes, the Science Board's executive director. The report suggests the military segregate some weapons - such as 20 bombers out of a fleet of hundreds - from integrated computer networks. The planes would lose some capability but remain operational if a computer attack grounded the rest of the fleet. Other proposals include adding to the number of "cyber warriors," which Defense plans to do, and spending more time playing war games with launching and defending computer attacks. The military must be ready to launch potentially hundreds of simultaneous, synchronized computer attacks even as it defends against them.
  •  
    So much for the Open Web. R.I.P.
Paul Merrell

Seymour M. Hersh · Whose sarin? · LRB 8 December 2013 - 0 views

  • Barack Obama did not tell the whole story this autumn when he tried to make the case that Bashar al-Assad was responsible for the chemical weapons attack near Damascus on 21 August. In some instances, he omitted important intelligence, and in others he presented assumptions as facts. Most significant, he failed to acknowledge something known to the US intelligence community: that the Syrian army is not the only party in the country’s civil war with access to sarin, the nerve agent that a UN study concluded – without assessing responsibility – had been used in the rocket attack. In the months before the attack, the American intelligence agencies produced a series of highly classified reports, culminating in a formal Operations Order – a planning document that precedes a ground invasion – citing evidence that the al-Nusra Front, a jihadi group affiliated with al-Qaida, had mastered the mechanics of creating sarin and was capable of manufacturing it in quantity. When the attack occurred al-Nusra should have been a suspect, but the administration cherry-picked intelligence to justify a strike against Assad.
  •  
    Seymour M. Hersh utterly demolishes Obama's justification for missile strikes on Syria. Lots of new evidence that the White House fabricated evidence of Assad's responsibility for the August 21 sarin gas attack in Ghouta, Syria.
Paul Merrell

EPIC - Spotlight on Surveillance - December 2013 - 0 views

  • The Federal Bureau of Investigation (FBI) is developing a biometric identification database program called "Next Generation Identification" (NGI). When completed, the NGI system will be the largest biometric database in the world. The program is of particular interest to EPIC because of the far-reaching implications for personal privacy and the risks of mass surveillance.[1] The vast majority of records contained in the NGI database will be of US citizens. The NGI biometric identifiers will include fingerprints, iris scans, DNA profiles, voice identification profiles, palm prints, and photographs. The system will include facial recognition capabilities to analyze collected images. Millions of individuals who are neither criminals nor suspects will be included in the database.
  • Many of these individuals will be unaware that their images and other biometric identifiers are being captured. Biometric records collected by various civil service agencies could be added to the system. The NGI system could be integrated with other surveillance technology, such as Trapwire, that would enable real-time image-matching of live feeds from CCTV surveillance cameras. [2] The Department of Homeland Security has expended hundreds of millions of dollars to establish state and local surveillance systems, including CCTV cameras that record the routine activities of millions of individuals. [3] There are an estimated 30 million surveillance cameras in the United States. If NGI system was integrated with CCTV cameras operated by public agencies and private entities, NGI could use facial recognition on images of crowds to identify individuals in public settings, whether or not the police have made the necessary legal showing to compel the disclosure of identification documents. The NGI database will be used for both law enforcement and non-law enforcement purposes. It will be available to law enforcement agencies at the local, state, and federal level. But it will also be available to private entities, unrelated to a law enforcement agency. EPIC’s “Spotlight on Surveillance” project takes a deeper look at this massive surveillance initiative.
Paul Merrell

N.S.A. Spied on Allies, Aid Groups and Businesses - NYTimes.com - 0 views

  • Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.
  • While the names of some political and diplomatic leaders have previously emerged as targets, the newly disclosed intelligence documents provide a much fuller portrait of the spies’ sweeping interests in more than 60 countries. Britain’s Government Communications Headquarters, working closely with the National Security Agency, monitored the communications of senior European Union officials, foreign leaders including African heads of state and sometimes their family members, directors of United Nations and other relief programs, and officials overseeing oil and finance ministries, according to the documents. In addition to Israel, some targets involved close allies like France and Germany, where tensions have already erupted over recent revelations about spying by the N.S.A.
  • Details of the surveillance are described in documents from the N.S.A. and Britain’s eavesdropping agency, known as GCHQ, dating from 2008 to 2011. The target lists appear in a set of GCHQ reports that sometimes identify which agency requested the surveillance, but more often do not. The documents were leaked by the former N.S.A. contractor Edward J. Snowden and shared by The New York Times, The Guardian and Der Spiegel. The reports are spare, technical bulletins produced as the spies, typically working out of British intelligence sites, systematically tapped one international communications link after another, focusing especially on satellite transmissions. The value of each link is gauged, in part, by the number of surveillance targets found to be using it for emails, text messages or phone calls. More than 1,000 targets, which also include people suspected of being terrorists or militants, are in the reports. It is unclear what the eavesdroppers gleaned. The documents include a few fragmentary transcripts of conversations and messages, but otherwise contain only hints that further information was available elsewhere, possibly in a larger database.
  • ...8 more annotations...
  • Ms. Hansen, the spokeswoman for the European Commission, said that it was already engaged in talks with the United States that were “needed to restore trust and confidence in the trans-Atlantic relationship.” She added that “the commission will raise these new allegations with U.S. and U.K. authorities.”
  • Also appearing on the surveillance lists is Joaquín Almunia, vice president of the European Commission, which, among other powers, has oversight of antitrust issues in Europe. The commission has broad authority over local and foreign companies, and it has punished a number of American companies, including Microsoft and Intel, with heavy fines for hampering fair competition. The reports say that spies intercepted Mr. Almunia’s communications in 2008 and 2009. Mr. Almunia, a Spaniard, assumed direct authority over the commission’s antitrust office in 2010. He has been involved in a three-year standoff with Google over how the company runs its search engine. Competitors of the online giant had complained that it was prioritizing its own search results and using content like travel reviews and ratings from other websites without permission. While pushing for a settlement with Google, Mr. Almunia has warned that the company could face large fines if it does not cooperate.
  • Some condemned the surveillance on Friday as unjustified and improper. “This is not the type of behavior that we expect from strategic partners,” Pia Ahrenkilde Hansen, a spokeswoman for the European Commission, said on the latest revelations of American and British spying in Europe. Some of the surveillance relates to issues that are being scrutinized by President Obama and a panel he appointed in Washington that on Wednesday recommended tighter limits on the N.S.A., particularly on spying of foreign leaders, especially allies.
  • “We do not use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line,” said Vanee Vines, an N.S.A. spokeswoman. But she added that some economic spying was justified by national security needs. “The intelligence community’s efforts to understand economic systems and policies, and monitor anomalous economic activities, are critical to providing policy makers with the information they need to make informed decisions that are in the best interest of our national security,” Ms. Vines said.
  • The surveillance reports show American and British spies’ deep appetite for information. The French companies Total, the oil and gas giant, and Thales, an electronics, logistics and transportation outfit, appear as targets, as do a French ambassador, an “Estonian Skype security team” and the German Embassy in Rwanda.
  • Multiple United Nations Missions in Geneva are listed as targets, including Unicef and the United Nations Institute for Disarmament Research. So is Médecins du Monde, a medical relief organization that goes into war-ravaged areas. Leigh Daynes, an executive director of the organization in Britain, responded to news about the surveillance by saying: “There is absolutely no reason for our operations to be secretly monitored.” More obvious intelligence targets are also listed, though in smaller numbers, including people identified as “Israeli grey arms dealer,” “Taleban ministry of refugee affairs” and “various entities in Beijing.” Some of those included are described as possible members of Al Qaeda, and as suspected extremists or jihadists.
  • While few if any American citizens appear to be named in the documents, they make clear that some of the intercepted communications either began or ended in the United States and that N.S.A. facilities carried out interceptions around the world in collaboration with their British partners. Some of the interceptions appear to have been made at the Sugar Grove, W.Va., listening post run by the N.S.A. and code-named Timberline, and some are explicitly tied to N.S.A. target lists in the reports.
  • Strengthening the likelihood that full transcripts were taken during the intercepts is the case of Mohamed Ibn Chambas, an official of the Economic Community of West African States, known as Ecowas, a regional initiative of 15 countries that promotes economic and industrial activity. Whether intentionally or through some oversight, when Mr. Chambas’s communications were intercepted in August 2009, dozens of his complete text messages were copied into one of the reports.
  •  
    No mention of any "terrorist" targets. Could it be that Snowden and Greenwald are right, that the surveillance is not about terrorism at all? Surely our nation's leaders would not lie to us about that. Right. The Politics of Fear.
Paul Merrell

Why Turkey wanted to provoke war with a 'false flag' terrorist attack on Syria - Stop the War Coalition - 0 views

  • A leaked talk by high-ranking Turkish officials reveals them talking about how easy it would be to create a false flag incident, and how they could use that to justify a wide military intervention inside Syria.
  • It was stunning to hear the highest-ranking Turks causally discussing how to provoke a false flag incident that would justify a large military intervention in Syria. This is a big deal because Turkish troops in Syria opens the door to NATO troops in Syria, which drastically expands the conflict. As someone who has spent a number of years living and working in the Middle East, and having been to Syria multiple times, I was encouraged by my colleagues at Casey Research to share my perspective on this.
  • Turkey owns a very small piece of territory inside of Syria that dates back to the Ottoman Empire. This small piece of land is the tomb of Suleyman Shah, a relative of one of the founding Ottomans. It’s guarded by 24 Turkish troops and is considered sovereign Turkish territory. Having Turkish troops in this area is not controversial, as the Syrian government has long agreed to it. The region where this tomb is located has totally fallen out of the Syrian government’s control for many months. And now, the hardcore ISIL group controls the surrounding area. It has threatened the Turkish soldiers and told them to leave. The Turks refused, and that’s why the Turkish government is getting skittish. This is where the leaked tape comes in.
  • ...3 more annotations...
  • The conversation started out with the Turks talking about how they can protect this tomb from ISIL. This is not controversial. I don’t believe the Syrian government would care about the Turks intervening to protect the tomb, since this is an area where it has lost control anyways. Plus, I’d bet the Syrian government would be happy to see the Turks bogged down fighting ISIL militants who’d otherwise be fighting them. However, that was not the end of the conversation. The really sinister part comes when the high-ranking Turks talk about how easy it would be to create a false flag incident involving the tomb, and how they could use that to justify a much wider military intervention inside Syria. Such an incident would be a sort of foot in the door to further military activities inside Syria and would allow the Turks to help their favored rebel groups, which have seen serious setbacks lately.
  • That step would clearly cause them to go to war with the Syrian government and drastically expand the conflict. And once Turkey is involved inside Syria, that opens the door for NATO to be involved. The Erdogan government has staked a huge amount of domestic political capital by supporting the Syrian rebels. They gambled that their favored rebel groups would quickly win and as a result, Turkey would have more geopolitical influence in a post-Assad Syria. It was a losing bet. Turkey’s favored rebels have seriously faltered, and a growing number of Turkish voters have become skeptical of their government’s intervention and the blowback it’s causing. A false flag incident with the tomb would be a way for Erdogan to double down in a desperate attempt to turn things around in Syria. Whoever leaked this conversation clearly timed it to take the wind out the sails of such a strategy.
  • There are only a few people with the capability and motivation to do this. As an ally of the Syrian government, Russian intelligence is at the top of that list. They have leaked similarly shocking private conversations in Ukraine recently. Members of the Turkish military opposed to Erdogan could have also done it. Instead of coming up with a classy way of saying “touché,” the Turkish government responded by throwing a childish fit, futilely trying to block YouTube and Twitter. In this digital age, restricting Internet access, seizing and spying on digital data, and otherwise tampering with an individual’s digital presence have become new tools in the traditional toolbox of desperate governments.
Paul Merrell

Exposed: Google's "Smart Home" Surveillance Plans, or, How To Not Be Colonized | TBYP - 0 views

  • Two weeks ago, the New York Times’ truth-humor strip on “The Home of the Future” came on the heels of Google’s purchase of ‘smart thermostat’ manufacturer Nest for $3.2 Billion.  With power utility commissions such as California already stating their intention to “expand third-party access” to in-home data, the perfect storm is brewing for Google’s mission of making you their product – even in your own home. For context, this is the same Google whose executive chairman, Eric Schmidt, told MSNBC: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
  • So where does a ‘smart thermostat’ fit in the current corporatist drive for total in-home surveillance? For the last couple of years, utilities around the globe have all been touting their new metering systems with buzzwords such as ‘smart’, ‘advanced’, ‘upgraded’, or ‘modernized’.  All rhetoric aside, these devices are intended to integrate with all appliances in your home to form an inescapable wireless data-mining dragnet, dubbed as the “home area network”, with your HVAC and likely other in-home systems overseen by spy-giant Google, if they get their way. As we’ve seen, even former CIA director David Patraeus was publicly frothing over having the ability to spy through ‘smart’ appliances, intended to wirelessly report back to the meter continuously, while receiving energy-use dictates from the meter. According to a US Congressional Research Report:
  • “With smart meters, police will have access to data that might be used to track residents’ daily lives and routines while in their homes, including their eating, sleeping, and showering habits, what appliances they use and when, and whether they prefer the television to the treadmill, among a host of other details.” Smart grid planners and working groups have even laid these aims out in their internal roadmaps, citing goals such as “new tools for mining data and intel” and “data mining and analytics to become core competency” (see slide 17).
  • ...3 more annotations...
  • Despite pilot programs indicating no energy savings and mounting opposition now from several hundred activist groups, federal governments such as the US are continuing with their push to incentivize utilities to push forward ‘smart’ grid deployment. Apparently, having a piece of the $11 Billion taxpayer-funded ‘smart’ grid pie, pushed through by the Obama Administration immediately following the 2008 election, is sufficient motivation for utility executives to steamroll forward despite the growing resistance. As an example, PECO, a major utility in Pennsylvania, is slated to receive $200 Million in stimulus funding if they can deploy 600,000 ‘smart’ meters by April 2014. Significantly, anyone can choose to protect their in-home rights by saying no to the deployment of a ‘smart’ meter on their home.  There are no legal requirements in any country or region for an energy customer to accept a ‘smart’ meter.
  • So what can be done to protect rights?  While people cannot vote to prevent corporations from making products such as data-mining thermostats appliances, they do have a voice as utilities try their best to deploy the home-colonizing meters.  Public resistance to ‘smart’ meter deployments has predictably been considerable, as people are learning about not only surveillance capabilities, but also skyrocketing electricity costs, time-of-use billing, risk of fires, home hackability, electrical quality degradation and functional impairments from pulsed microwave radiation — amazingly, all being linked to the new utility metering system.
  • However, utilities are using tactics of intimidation, propaganda, and tacit acceptance – which means that unless you said a clear “no”, they assume a “yes.” In some cases even with a homeowner’s refusal, utilities are forcibly deploying anyway, apparently assuming the liability for doing so, risking litigation. So Google has played their hand with the $3.2 Billion purchase of Nest, desiring to capture the worldwide ‘smart’ home data-mining market, and praying to the all-spying-eye that people will stay tethered to their ‘smart’ wireless toys as their rights roll swiftly towards a cliff.  But will awareness eventually reach a game-changing crescendo?  It seems as though the potential exists. If we want to experience a future other than being ruled by technocrats, now is the time to speak up – even if facing the situation isn’t convenient.  People simply need to know the facts. As stated by former Apple executive Jeffrey Armstrong in our film Take Back Your Power, the question of whether homes will remain free of invasive ‘smart’ metering and appliance technology is “a test case for a technological democracy, if I have ever seen one.” 
Paul Merrell

U.S. rejects claim that Turkey planned Syria atrocity Anadolu Agency - 0 views

  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency.
  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency. Seymour Hersh, a freelance journalist, published an article in the London Review of Books (LRB) in which he claimed that Ankara had supplied the al Nusra Front with chemical weapons that they used to carry out the August 2013 attack. The Washington Post and the New Yorker declined the story prior to its publication in the LRB. “The Assad regime, and only the Assad regime, could have been responsible for the chemical weapons attack that took place on August 21,” said Shawn Turner and Caitlyn Hayden in a statement initially issued to fact checkers working on the report and later sent to AA. “The suggestion that there was an effort to suppress or alter intelligence is simply false.” State Department Spokesperson, Jen Psaki, in her daily press briefing said there is no doubt that the chemical attack was carried out by the Syrian regime.
  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency.
  • ...2 more annotations...
  • Psaki said, "In light of our reports and intelligence we had recieved, we believe beyond any doubt that the attack on 21 August had been carried out by the Syrian regime and we are still behind the same view shared by the international community." Hersh cited unidentified American officials and a classified intelligence analysis on the opposition's chemical weapons capabilities to back up his claim. “No such paper was ever requested or produced by Intelligence Community analysts,” said Turner and Hayden.     Hersh wrote that U.S. President Barack Obama had established September 2, 2013 as a fixed deadline for the U.S. military to undertake action in Syria following the chemical attack. Turner and Hayden rejected the claim as “completely fabricated”.  The journalist also wrote that the Obama administration had channeled weapons from Libya to the Syrian opposition through southern Turkey, a claim described by Turner and Hayden as “false”.
  • Turkey also reacted to the claim when Turkey's Deputy Prime Minister Bulent Arinc was asked a question about Hersh's claim that Turkey had provided Sarin gas to the people who had conducted chemical attack in Ghouta region. He said "A note sent by the Turkish Foreign Ministry in this regard says that it is absolutely not true. The White House official has also qualified these claims as definitely false and speculative in response to a question regarding the matter." Arinc said, "The claims based on anonymous sources have been conclusively rejected by the White House officials and it has been reconfirmed that the Assad regime is solely responsible for the chemical attack." Noting that they are well aware of previous articles written by Hersh, Arinc said, "Everyone knows very well that the individual's views and claims heard from some unnamed persons are certainly not any verified information and knowledge. In fact, the U.S. officials have quite fairly explained the matter and strictly rejected the claim."
  •  
    Seymour M. Hersh is among the most highly regarded journalists in the world. Mainstream media used to compete for the rights to publish his articles. But apparently he's been digging a little to deeply in the belly of the beast lately. See his latest article that the White House is denying. http://www.lrb.co.uk/2014/04/06/seymour-m-hersh/the-red-line-and-the-rat-line
« First ‹ Previous 201 - 220 of 383 Next › Last »
Showing 20 items per page